2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afsconfig.h>
11 #include <afs/param.h>
15 #include <afs/unified_afs.h>
29 extern void afsi_log(char *pattern, ...);
32 int cm_enableServerLocks = 1;
34 int cm_followBackupPath = 0;
37 * Case-folding array. This was constructed by inspecting of SMBtrace output.
38 * I do not know anything more about it.
40 unsigned char cm_foldUpper[256] = {
41 0x0, 0x1, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7,
42 0x8, 0x9, 0xa, 0xb, 0xc, 0xd, 0xe, 0xf,
43 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
44 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f,
45 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,
46 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f,
47 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
48 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f,
49 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47,
50 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f,
51 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57,
52 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f,
53 0x60, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47,
54 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f,
55 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57,
56 0x58, 0x59, 0x5a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f,
57 0x80, 0x9a, 0x90, 0x41, 0x8e, 0x41, 0x8f, 0x80,
58 0x45, 0x45, 0x45, 0x49, 0x49, 0x49, 0x8e, 0x8f,
59 0x90, 0x92, 0x92, 0x4f, 0x99, 0x4f, 0x55, 0x55,
60 0x59, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f,
61 0x41, 0x49, 0x4f, 0x55, 0xa5, 0xa5, 0x56, 0xa7,
62 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf,
63 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7,
64 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf,
65 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7,
66 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf,
67 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7,
68 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf,
69 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7,
70 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef,
71 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7,
72 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff
76 * Case-insensitive string comparison. We used to use stricmp, but it doesn't
77 * know about 8-bit characters (e.g. 129 is lowercase u-umlaut, 154 is
78 * upper-case u-umlaut).
80 int cm_stricmp(const char *str1, const char *str2)
92 c1 = (char) cm_foldUpper[(unsigned char)(*str1++)];
93 c2 = (char) cm_foldUpper[(unsigned char)(*str2++)];
103 /* return success if we can open this file in this mode */
104 long cm_CheckOpen(cm_scache_t *scp, int openMode, int trunc, cm_user_t *userp,
112 rights |= PRSFS_READ;
113 if (openMode == 1 || openMode == 2 || trunc)
114 rights |= PRSFS_WRITE;
116 lock_ObtainWrite(&scp->rw);
118 code = cm_SyncOp(scp, NULL, userp, reqp, rights,
119 CM_SCACHESYNC_GETSTATUS
120 | CM_SCACHESYNC_NEEDCALLBACK
121 | CM_SCACHESYNC_LOCK);
124 ((rights & PRSFS_WRITE) || (rights & PRSFS_READ)) &&
125 scp->fileType == CM_SCACHETYPE_FILE) {
128 unsigned int sLockType;
129 LARGE_INTEGER LOffset, LLength;
131 /* Check if there's some sort of lock on the file at the
134 key = cm_GenerateKey(CM_SESSION_CMINT,0,0);
136 if (rights & PRSFS_WRITE)
139 sLockType = LOCKING_ANDX_SHARED_LOCK;
141 LOffset.HighPart = CM_FLSHARE_OFFSET_HIGH;
142 LOffset.LowPart = CM_FLSHARE_OFFSET_LOW;
143 LLength.HighPart = CM_FLSHARE_LENGTH_HIGH;
144 LLength.LowPart = CM_FLSHARE_LENGTH_LOW;
146 code = cm_Lock(scp, sLockType, LOffset, LLength, key, 0, userp, reqp, NULL);
149 cm_Unlock(scp, sLockType, LOffset, LLength, key, 0, userp, reqp);
151 /* In this case, we allow the file open to go through even
152 though we can't enforce mandatory locking on the
154 if (code == CM_ERROR_NOACCESS &&
155 !(rights & PRSFS_WRITE))
158 if (code == CM_ERROR_LOCK_NOT_GRANTED)
159 code = CM_ERROR_SHARING_VIOLATION;
163 } else if (code != 0) {
167 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_LOCK);
171 lock_ReleaseWrite(&scp->rw);
176 /* return success if we can open this file in this mode */
177 long cm_CheckNTOpen(cm_scache_t *scp,
178 unsigned int desiredAccess,
179 unsigned int shareAccess,
180 unsigned int createDisp,
181 afs_offs_t process_id,
182 afs_offs_t handle_id,
183 cm_user_t *userp, cm_req_t *reqp,
184 cm_lock_data_t **ldpp)
188 afs_uint16 session_id;
190 osi_assertx(ldpp != NULL, "null cm_lock_data_t");
193 /* compute the session id */
194 if (reqp->flags & CM_REQ_SOURCE_SMB)
195 session_id = CM_SESSION_SMB;
196 else if (reqp->flags & CM_REQ_SOURCE_REDIR)
197 session_id = CM_SESSION_IFS;
199 session_id = CM_SESSION_CMINT;
201 /* Ignore the SYNCHRONIZE privilege */
202 desiredAccess &= ~SYNCHRONIZE;
204 /* Always allow delete; the RPC will tell us if it's OK */
207 if (desiredAccess == DELETE)
210 /* Always allow reading attributes (Hidden, System, Readonly, ...) */
211 if (desiredAccess == FILE_READ_ATTRIBUTES)
214 if (desiredAccess & (AFS_ACCESS_READ|AFS_ACCESS_EXECUTE))
215 rights |= (scp->fileType == CM_SCACHETYPE_DIRECTORY ? PRSFS_LOOKUP : PRSFS_READ);
217 /* We used to require PRSFS_WRITE if createDisp was 4
218 (OPEN_ALWAYS) even if AFS_ACCESS_WRITE was not requested.
219 However, we don't need to do that since the existence of the
220 scp implies that we don't need to create it. */
221 if (desiredAccess & AFS_ACCESS_WRITE)
222 rights |= PRSFS_WRITE;
224 if (desiredAccess & DELETE)
225 rights |= PRSFS_DELETE;
227 lock_ObtainWrite(&scp->rw);
229 code = cm_SyncOp(scp, NULL, userp, reqp, rights,
230 CM_SCACHESYNC_GETSTATUS
231 | CM_SCACHESYNC_NEEDCALLBACK
232 | CM_SCACHESYNC_LOCK);
235 * If the open will fail because the volume is readonly, then we will
236 * return an access denied error instead. This is to help brain-dead
237 * apps run correctly on replicated volumes.
238 * See defect 10007 for more information.
240 if (code == CM_ERROR_READONLY)
241 code = CM_ERROR_NOACCESS;
244 !(shareAccess & FILE_SHARE_WRITE) &&
245 ((rights & PRSFS_WRITE) || (rights & PRSFS_READ)) &&
246 scp->fileType == CM_SCACHETYPE_FILE) {
248 unsigned int sLockType;
249 LARGE_INTEGER LOffset, LLength;
251 /* Check if there's some sort of lock on the file at the
254 if (rights & PRSFS_WRITE)
257 sLockType = LOCKING_ANDX_SHARED_LOCK;
259 key = cm_GenerateKey(session_id, process_id, 0);
261 /* single byte lock at offset 0x0100 0000 0000 0000 */
262 LOffset.HighPart = CM_FLSHARE_OFFSET_HIGH;
263 LOffset.LowPart = CM_FLSHARE_OFFSET_LOW;
264 LLength.HighPart = CM_FLSHARE_LENGTH_HIGH;
265 LLength.LowPart = CM_FLSHARE_LENGTH_LOW;
267 code = cm_Lock(scp, sLockType, LOffset, LLength, key, 0, userp, reqp, NULL);
270 (*ldpp) = (cm_lock_data_t *)malloc(sizeof(cm_lock_data_t));
277 (*ldpp)->sLockType = sLockType;
278 (*ldpp)->LOffset.HighPart = LOffset.HighPart;
279 (*ldpp)->LOffset.LowPart = LOffset.LowPart;
280 (*ldpp)->LLength.HighPart = LLength.HighPart;
281 (*ldpp)->LLength.LowPart = LLength.LowPart;
284 * In this case, we allow the file open to go through even
285 * though we can't enforce mandatory locking on the
287 if (code == CM_ERROR_NOACCESS &&
288 !(rights & PRSFS_WRITE))
291 if (code == CM_ERROR_LOCK_NOT_GRANTED)
292 code = CM_ERROR_SHARING_VIOLATION;
295 } else if (code != 0) {
300 lock_ReleaseWrite(&scp->rw);
303 osi_Log3(afsd_logp,"cm_CheckNTOpen scp 0x%p ldp 0x%p code 0x%x", scp, *ldpp, code);
307 extern long cm_CheckNTOpenDone(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp,
308 cm_lock_data_t ** ldpp)
310 osi_Log2(afsd_logp,"cm_CheckNTOpenDone scp 0x%p ldp 0x%p", scp, ldpp ? *ldpp : 0);
311 lock_ObtainWrite(&scp->rw);
313 cm_Unlock(scp, (*ldpp)->sLockType, (*ldpp)->LOffset, (*ldpp)->LLength,
314 (*ldpp)->key, 0, userp, reqp);
318 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_LOCK);
319 lock_ReleaseWrite(&scp->rw);
323 * When CAP_NT_SMBS has been negotiated, deletion (of files or directories) is
324 * done in three steps:
325 * (1) open for deletion (NT_CREATE_AND_X)
326 * (2) set for deletion on close (NT_TRANSACTION2, SET_FILE_INFO)
328 * We must not do the RPC until step 3. But if we are going to return an error
329 * code (e.g. directory not empty), we must return it by step 2, otherwise most
330 * clients will not notice it. So we do a preliminary check. For deleting
331 * files, this is almost free, since we have already done the RPC to get the
332 * parent directory's status bits. But for deleting directories, we must do an
333 * additional RPC to get the directory's data to check if it is empty. Sigh.
335 long cm_CheckNTDelete(cm_scache_t *dscp, cm_scache_t *scp, cm_user_t *userp,
341 cm_dirEntry_t *dep = 0;
342 unsigned short *hashTable;
344 int BeyondPage = 0, HaveDot = 0, HaveDotDot = 0;
347 /* First check permissions */
348 lock_ObtainWrite(&scp->rw);
349 code = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_DELETE,
350 CM_SCACHESYNC_GETSTATUS | CM_SCACHESYNC_NEEDCALLBACK);
352 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
353 lock_ReleaseWrite(&scp->rw);
357 /* If deleting directory, must be empty */
359 if (scp->fileType != CM_SCACHETYPE_DIRECTORY)
362 thyper.HighPart = 0; thyper.LowPart = 0;
363 code = buf_Get(scp, &thyper, reqp, 0, &bufferp);
367 lock_ObtainMutex(&bufferp->mx);
368 lock_ObtainWrite(&scp->rw);
371 code = cm_SyncOp(scp, bufferp, userp, reqp, 0,
372 CM_SCACHESYNC_NEEDCALLBACK
374 | CM_SCACHESYNC_BUFLOCKED);
378 if (cm_HaveBuffer(scp, bufferp, 1)) {
379 cm_SyncOpDone(scp, bufferp, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_READ | CM_SCACHESYNC_BUFLOCKED);
383 /* otherwise, load the buffer and try again */
384 lock_ReleaseMutex(&bufferp->mx);
385 code = cm_GetBuffer(scp, bufferp, NULL, userp, reqp);
386 lock_ReleaseWrite(&scp->rw);
387 lock_ObtainMutex(&bufferp->mx);
388 lock_ObtainWrite(&scp->rw);
389 cm_SyncOpDone(scp, bufferp, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_READ | CM_SCACHESYNC_BUFLOCKED);
394 lock_ReleaseWrite(&scp->rw);
397 /* We try to determine emptiness without looking beyond the first page,
398 * and without assuming "." and ".." are present and are on the first
399 * page (though these assumptions might, after all, be reasonable).
401 hashTable = (unsigned short *)(bufferp->datap + (32 * 5));
402 for (i=0; i<128; i++) {
403 idx = ntohs(hashTable[i]);
409 dep = (cm_dirEntry_t *)(bufferp->datap + (32 * idx));
410 if (strcmp(dep->name, ".") == 0)
412 else if (strcmp(dep->name, "..") == 0)
415 code = CM_ERROR_NOTEMPTY;
418 idx = ntohs(dep->next);
421 if (BeyondPage && HaveDot && HaveDotDot)
422 code = CM_ERROR_NOTEMPTY;
426 lock_ReleaseMutex(&bufferp->mx);
427 buf_Release(bufferp);
429 lock_ReleaseWrite(&scp->rw);
434 * Iterate through all entries in a directory.
435 * When the function funcp is called, the buffer is locked but the
436 * directory vnode is not.
438 * If the retscp parameter is not NULL, the parmp must be a
439 * cm_lookupSearch_t object.
441 long cm_ApplyDir(cm_scache_t *scp, cm_DirFuncp_t funcp, void *parmp,
442 osi_hyper_t *startOffsetp, cm_user_t *userp, cm_req_t *reqp,
443 cm_scache_t **retscp)
447 cm_dirEntry_t *dep = 0;
450 osi_hyper_t dirLength;
451 osi_hyper_t bufferOffset;
452 osi_hyper_t curOffset;
456 cm_pageHeader_t *pageHeaderp;
458 long nextEntryCookie;
459 int numDirChunks; /* # of 32 byte dir chunks in this entry */
461 /* get the directory size */
462 lock_ObtainWrite(&scp->rw);
463 code = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_LOOKUP,
464 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
465 lock_ReleaseWrite(&scp->rw);
469 if (scp->fileType != CM_SCACHETYPE_DIRECTORY)
470 return CM_ERROR_NOTDIR;
472 if (retscp) /* if this is a lookup call */
474 cm_lookupSearch_t* sp = parmp;
477 #ifdef AFS_FREELANCE_CLIENT
478 /* Freelance entries never end up in the DNLC because they
479 * do not have an associated cm_server_t
481 !(cm_freelanceEnabled &&
482 sp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
483 sp->fid.volume==AFS_FAKE_ROOT_VOL_ID )
484 #else /* !AFS_FREELANCE_CLIENT */
489 int casefold = sp->caseFold;
490 sp->caseFold = 0; /* we have a strong preference for exact matches */
491 if ( *retscp = cm_dnlcLookup(scp, sp)) /* dnlc hit */
493 sp->caseFold = casefold;
496 sp->caseFold = casefold;
500 * see if we can find it using the directory hash tables.
501 * we can only do exact matches, since the hash is case
504 if (funcp != (cm_DirFuncp_t)cm_BPlusDirFoo)
513 code = cm_BeginDirOp(scp, userp, reqp, CM_DIRLOCK_READ,
514 CM_DIROP_FLAG_NONE, &dirop);
518 code = cm_BPlusDirLookup(&dirop, sp->nsearchNamep, &sp->fid);
523 code = cm_DirLookup(&dirop, sp->searchNamep, &sp->fid);
531 sp->ExactFound = TRUE;
532 *retscp = NULL; /* force caller to call cm_GetSCache() */
537 if (sp->caseFold && code == CM_ERROR_INEXACT_MATCH) {
540 sp->ExactFound = FALSE;
541 *retscp = NULL; /* force caller to call cm_GetSCache() */
545 return CM_ERROR_BPLUS_NOMATCH;
552 * XXX We only get the length once. It might change when we drop the
555 dirLength = scp->length;
558 bufferOffset.LowPart = bufferOffset.HighPart = 0;
560 curOffset = *startOffsetp;
562 curOffset.HighPart = 0;
563 curOffset.LowPart = 0;
567 /* make sure that curOffset.LowPart doesn't point to the first
568 * 32 bytes in the 2nd through last dir page, and that it
569 * doesn't point at the first 13 32-byte chunks in the first
570 * dir page, since those are dir and page headers, and don't
571 * contain useful information.
573 temp = curOffset.LowPart & (2048-1);
574 if (curOffset.HighPart == 0 && curOffset.LowPart < 2048) {
575 /* we're in the first page */
576 if (temp < 13*32) temp = 13*32;
579 /* we're in a later dir page */
580 if (temp < 32) temp = 32;
583 /* make sure the low order 5 bits are zero */
586 /* now put temp bits back ito curOffset.LowPart */
587 curOffset.LowPart &= ~(2048-1);
588 curOffset.LowPart |= temp;
590 /* check if we've passed the dir's EOF */
591 if (LargeIntegerGreaterThanOrEqualTo(curOffset, dirLength))
594 /* see if we can use the bufferp we have now; compute in which
595 * page the current offset would be, and check whether that's
596 * the offset of the buffer we have. If not, get the buffer.
598 thyper.HighPart = curOffset.HighPart;
599 thyper.LowPart = curOffset.LowPart & ~(cm_data.buf_blockSize-1);
600 if (!bufferp || !LargeIntegerEqualTo(thyper, bufferOffset)) {
603 lock_ReleaseMutex(&bufferp->mx);
604 buf_Release(bufferp);
608 code = buf_Get(scp, &thyper, reqp, 0, &bufferp);
610 /* if buf_Get() fails we do not have a buffer object to lock */
615 lock_ObtainMutex(&bufferp->mx);
616 bufferOffset = thyper;
618 /* now get the data in the cache */
620 lock_ObtainWrite(&scp->rw);
621 code = cm_SyncOp(scp, bufferp, userp, reqp,
623 CM_SCACHESYNC_NEEDCALLBACK
625 | CM_SCACHESYNC_BUFLOCKED);
627 lock_ReleaseWrite(&scp->rw);
631 if (cm_HaveBuffer(scp, bufferp, 1)) {
632 cm_SyncOpDone(scp, bufferp, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_READ | CM_SCACHESYNC_BUFLOCKED);
633 lock_ReleaseWrite(&scp->rw);
637 /* otherwise, load the buffer and try again */
638 lock_ReleaseMutex(&bufferp->mx);
639 code = cm_GetBuffer(scp, bufferp, NULL, userp,
641 cm_SyncOpDone(scp, bufferp, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_READ);
642 lock_ReleaseWrite(&scp->rw);
643 lock_ObtainMutex(&bufferp->mx);
648 lock_ReleaseMutex(&bufferp->mx);
649 buf_Release(bufferp);
653 } /* if (wrong buffer) ... */
655 /* now we have the buffer containing the entry we're interested
656 * in; copy it out if it represents a non-deleted entry.
658 entryInDir = curOffset.LowPart & (2048-1);
659 entryInBuffer = curOffset.LowPart & (cm_data.buf_blockSize - 1);
661 /* page header will help tell us which entries are free. Page
662 * header can change more often than once per buffer, since
663 * AFS 3 dir page size may be less than (but not more than) a
664 * buffer package buffer.
666 /* only look intra-buffer */
667 temp = curOffset.LowPart & (cm_data.buf_blockSize - 1);
668 temp &= ~(2048 - 1); /* turn off intra-page bits */
669 pageHeaderp = (cm_pageHeader_t *) (bufferp->datap + temp);
671 /* now determine which entry we're looking at in the page. If
672 * it is free (there's a free bitmap at the start of the dir),
673 * we should skip these 32 bytes.
675 slotInPage = (entryInDir & 0x7e0) >> 5;
676 if (!(pageHeaderp->freeBitmap[slotInPage>>3]
677 & (1 << (slotInPage & 0x7)))) {
678 /* this entry is free */
679 numDirChunks = 1; /* only skip this guy */
683 tp = bufferp->datap + entryInBuffer;
684 dep = (cm_dirEntry_t *) tp; /* now points to AFS3 dir entry */
687 * here are some consistency checks
689 if (dep->flag != CM_DIR_FFIRST ||
690 strlen(dep->name) > 256) {
691 code = CM_ERROR_INVAL;
693 "cm_ApplyDir invalid directory entry for scp %p bufp %p",
695 osi_Log4(afsd_logp,"... cell %u vol %u vnode %u uniq %u",
696 scp->fid.cell, scp->fid.volume, scp->fid.vnode, scp->fid.unique);
697 bufferp->dataVersion = CM_BUF_VERSION_BAD;
701 /* while we're here, compute the next entry's location, too,
702 * since we'll need it when writing out the cookie into the
703 * dir listing stream.
705 numDirChunks = cm_NameEntries(dep->name, NULL);
707 /* compute the offset of the cookie representing the next entry */
708 nextEntryCookie = curOffset.LowPart
709 + (CM_DIR_CHUNKSIZE * numDirChunks);
711 if (dep->fid.vnode != 0) {
712 /* this is one of the entries to use: it is not deleted */
713 code = (*funcp)(scp, dep, parmp, &curOffset);
716 } /* if we're including this name */
719 /* and adjust curOffset to be where the new cookie is */
721 thyper.LowPart = CM_DIR_CHUNKSIZE * numDirChunks;
722 curOffset = LargeIntegerAdd(thyper, curOffset);
723 } /* while copying data for dir listing */
725 /* release the mutex */
727 lock_ReleaseMutex(&bufferp->mx);
728 buf_Release(bufferp);
733 int cm_NoneUpper(normchar_t *s)
737 if (c >= 'A' && c <= 'Z')
742 int cm_NoneLower(normchar_t *s)
746 if (c >= 'a' && c <= 'z')
751 long cm_LookupSearchProc(cm_scache_t *scp, cm_dirEntry_t *dep, void *rockp,
754 cm_lookupSearch_t *sp;
756 normchar_t matchName[MAX_PATH];
757 int looking_for_short_name = FALSE;
759 sp = (cm_lookupSearch_t *) rockp;
761 if (cm_FsStringToNormString(dep->name, -1, matchName, lengthof(matchName)) == 0) {
762 /* Can't normalize FS string. */
767 match = cm_NormStrCmpI(matchName, sp->nsearchNamep);
769 match = cm_NormStrCmp(matchName, sp->nsearchNamep);
774 && !cm_Is8Dot3(matchName)) {
776 cm_Gen8Dot3NameInt(dep->name, &dep->fid, matchName, NULL);
778 match = cm_NormStrCmpI(matchName, sp->nsearchNamep);
780 match = cm_NormStrCmp(matchName, sp->nsearchNamep);
781 looking_for_short_name = TRUE;
791 if (!sp->caseFold || looking_for_short_name) {
792 cm_SetFid(&sp->fid, sp->fid.cell, sp->fid.volume, ntohl(dep->fid.vnode), ntohl(dep->fid.unique));
793 return CM_ERROR_STOPNOW;
797 * If we get here, we are doing a case-insensitive search, and we
798 * have found a match. Now we determine what kind of match it is:
799 * exact, lower-case, upper-case, or none of the above. This is done
800 * in order to choose among matches, if there are more than one.
803 /* Exact matches are the best. */
804 match = cm_NormStrCmp(matchName, sp->nsearchNamep);
807 cm_SetFid(&sp->fid, sp->fid.cell, sp->fid.volume, ntohl(dep->fid.vnode), ntohl(dep->fid.unique));
808 return CM_ERROR_STOPNOW;
811 /* Lower-case matches are next. */
814 if (cm_NoneUpper(matchName)) {
819 /* Upper-case matches are next. */
822 if (cm_NoneLower(matchName)) {
827 /* General matches are last. */
833 cm_SetFid(&sp->fid, sp->fid.cell, sp->fid.volume, ntohl(dep->fid.vnode), ntohl(dep->fid.unique));
837 /* read the contents of a mount point into the appropriate string.
838 * called with write locked scp, and returns with locked scp.
840 long cm_ReadMountPoint(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
844 code = cm_SyncOp(scp, NULL, userp, reqp, 0, CM_SCACHESYNC_FETCHDATA);
848 if (scp->mountPointStringp[0] &&
849 scp->mpDataVersion == scp->dataVersion) {
854 #ifdef AFS_FREELANCE_CLIENT
855 /* File servers do not have data for freelance entries */
856 if (cm_freelanceEnabled &&
857 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
858 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID )
860 code = cm_FreelanceFetchMountPointString(scp);
862 #endif /* AFS_FREELANCE_CLIENT */
864 char temp[MOUNTPOINTLEN];
866 afs_uint32 bytesRead = 0;
868 /* otherwise, we have to read it in */
869 offset.LowPart = offset.HighPart = 0;
870 code = cm_GetData(scp, &offset, temp, MOUNTPOINTLEN, &bytesRead, userp, reqp);
875 * scp->length is the actual length of the mount point string.
876 * It is current because cm_GetData merged the most up to date
877 * status info into scp and has not dropped the rwlock since.
879 if (scp->length.LowPart > MOUNTPOINTLEN - 1) {
880 code = CM_ERROR_TOOBIG;
884 if (scp->length.LowPart == 0) {
885 code = CM_ERROR_INVAL;
889 /* convert the terminating dot to a NUL */
890 temp[scp->length.LowPart - 1] = 0;
891 memcpy(scp->mountPointStringp, temp, scp->length.LowPart);
892 scp->mpDataVersion = scp->dataVersion;
896 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_FETCHDATA);
902 /* called with a locked scp and chases the mount point, yielding outScpp.
903 * scp remains write locked, just for simplicity of describing the interface.
905 long cm_FollowMountPoint(cm_scache_t *scp, cm_scache_t *dscp, cm_user_t *userp,
906 cm_req_t *reqp, cm_scache_t **outScpp)
908 fschar_t *cellNamep = NULL;
909 fschar_t *volNamep = NULL;
913 cm_volume_t *volp = NULL;
922 if (scp->mountRootFid.cell != 0 && scp->mountRootGen >= cm_data.mountRootGen) {
923 tfid = scp->mountRootFid;
924 lock_ReleaseWrite(&scp->rw);
925 code = cm_GetSCache(&tfid, NULL, outScpp, userp, reqp);
926 lock_ObtainWrite(&scp->rw);
930 /* parse the volume name */
931 mpNamep = scp->mountPointStringp;
933 return CM_ERROR_NOSUCHPATH;
934 mtType = *scp->mountPointStringp;
936 cp = cm_FsStrChr(mpNamep, _FS(':'));
938 /* cellular mount point */
939 cellNamep = (fschar_t *)malloc((cp - mpNamep) * sizeof(fschar_t));
940 cm_FsStrCpyN(cellNamep, cp - mpNamep, mpNamep + 1, cp - mpNamep - 1);
941 volNamep = cm_FsStrDup(cp+1);
943 /* now look up the cell */
944 lock_ReleaseWrite(&scp->rw);
945 cellp = cm_GetCell(cellNamep, CM_FLAG_CREATE|CM_FLAG_NOPROBE);
946 lock_ObtainWrite(&scp->rw);
949 volNamep = cm_FsStrDup(mpNamep + 1);
951 #ifdef AFS_FREELANCE_CLIENT
953 * Mount points in the Freelance cell should default
954 * to the workstation cell.
956 if (cm_freelanceEnabled &&
957 scp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
958 scp->fid.volume==AFS_FAKE_ROOT_VOL_ID )
960 fschar_t rootCellName[256]="";
961 cm_GetRootCellName(rootCellName);
962 cellp = cm_GetCell(rootCellName, 0);
964 #endif /* AFS_FREELANCE_CLIENT */
965 cellp = cm_FindCellByID(scp->fid.cell, 0);
969 code = CM_ERROR_NOSUCHCELL;
973 vnLength = cm_FsStrLen(volNamep);
974 if (vnLength >= 8 && cm_FsStrCmp(volNamep + vnLength - 7, ".backup") == 0)
975 targetType = BACKVOL;
976 else if (vnLength >= 10
977 && cm_FsStrCmp(volNamep + vnLength - 9, ".readonly") == 0)
982 /* check for backups within backups */
983 if (targetType == BACKVOL
984 && (scp->flags & (CM_SCACHEFLAG_RO | CM_SCACHEFLAG_PURERO))
985 == CM_SCACHEFLAG_RO) {
986 code = CM_ERROR_TOO_MANY_SYMLINKS;
990 /* now we need to get the volume */
991 lock_ReleaseWrite(&scp->rw);
992 if (cm_VolNameIsID(volNamep)) {
993 code = cm_FindVolumeByID(cellp, atoi(volNamep), userp, reqp,
994 CM_GETVOL_FLAG_CREATE, &volp);
996 code = cm_FindVolumeByName(cellp, volNamep, userp, reqp,
997 CM_GETVOL_FLAG_CREATE, &volp);
999 lock_ObtainWrite(&scp->rw);
1002 afs_uint32 cell, volume;
1003 cm_vol_state_t *statep;
1005 cell = cellp->cellID;
1007 /* if the mt pt originates in a .backup volume (not a .readonly)
1008 * and FollowBackupPath is active, and if there is a .backup
1009 * volume for the target, then use the .backup of the target
1010 * instead of the read-write.
1012 if (cm_followBackupPath &&
1013 volp->vol[BACKVOL].ID != 0 &&
1014 (dscp->flags & (CM_SCACHEFLAG_RO|CM_SCACHEFLAG_PURERO)) == CM_SCACHEFLAG_RO &&
1015 (targetType == RWVOL || targetType == ROVOL && volp->vol[ROVOL].ID == 0)
1017 targetType = BACKVOL;
1019 /* if the mt pt is in a read-only volume (not just a
1020 * backup), and if there is a read-only volume for the
1021 * target, and if this is a targetType '#' mount point, use
1022 * the read-only, otherwise use the one specified.
1024 else if (mtType == '#' && targetType == RWVOL &&
1025 (scp->flags & CM_SCACHEFLAG_PURERO) &&
1026 volp->vol[ROVOL].ID != 0) {
1030 lock_ObtainWrite(&volp->rw);
1031 statep = cm_VolumeStateByType(volp, targetType);
1032 volume = statep->ID;
1033 statep->dotdotFid = dscp->fid;
1034 lock_ReleaseWrite(&volp->rw);
1036 /* the rest of the fid is a magic number */
1037 cm_SetFid(&scp->mountRootFid, cell, volume, 1, 1);
1038 scp->mountRootGen = cm_data.mountRootGen;
1040 tfid = scp->mountRootFid;
1041 lock_ReleaseWrite(&scp->rw);
1042 code = cm_GetSCache(&tfid, NULL, outScpp, userp, reqp);
1043 lock_ObtainWrite(&scp->rw);
1056 long cm_LookupInternal(cm_scache_t *dscp, clientchar_t *cnamep, long flags, cm_user_t *userp,
1057 cm_req_t *reqp, cm_scache_t **outScpp)
1060 int dnlcHit = 1; /* did we hit in the dnlc? yes, we did */
1061 cm_scache_t *tscp = NULL;
1062 cm_scache_t *mountedScp;
1063 cm_lookupSearch_t rock;
1065 normchar_t *nnamep = NULL;
1066 fschar_t *fnamep = NULL;
1071 memset(&rock, 0, sizeof(rock));
1073 if (dscp->fid.vnode == 1 && dscp->fid.unique == 1
1074 && cm_ClientStrCmp(cnamep, _C("..")) == 0) {
1075 if (dscp->dotdotFid.volume == 0)
1076 return CM_ERROR_NOSUCHVOLUME;
1077 rock.fid = dscp->dotdotFid;
1079 } else if (cm_ClientStrCmp(cnamep, _C(".")) == 0) {
1080 rock.fid = dscp->fid;
1084 nnamep = cm_ClientStringToNormStringAlloc(cnamep, -1, NULL);
1086 code = CM_ERROR_NOSUCHFILE;
1089 fnamep = cm_ClientStringToFsStringAlloc(cnamep, -1, NULL);
1091 code = CM_ERROR_NOSUCHFILE;
1096 if (flags & CM_FLAG_NOMOUNTCHASE) {
1097 /* In this case, we should go and call cm_Dir* functions
1098 directly since the following cm_ApplyDir() function will
1106 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ,
1107 CM_DIROP_FLAG_NONE, &dirop);
1110 code = cm_BPlusDirLookup(&dirop, nnamep, &rock.fid);
1115 code = cm_DirLookup(&dirop, fnamep, &rock.fid);
1117 cm_EndDirOp(&dirop);
1127 if (code == CM_ERROR_INEXACT_MATCH && (flags & CM_FLAG_CASEFOLD)) {
1134 code = CM_ERROR_BPLUS_NOMATCH;
1140 rock.fid.cell = dscp->fid.cell;
1141 rock.fid.volume = dscp->fid.volume;
1142 rock.searchNamep = fnamep;
1143 rock.nsearchNamep = nnamep;
1144 rock.caseFold = (flags & CM_FLAG_CASEFOLD);
1145 rock.hasTilde = ((cm_ClientStrChr(cnamep, '~') != NULL) ? 1 : 0);
1147 /* If NOMOUNTCHASE, bypass DNLC by passing NULL scp pointer */
1148 code = cm_ApplyDir(dscp, cm_LookupSearchProc, &rock, NULL, userp, reqp,
1149 (flags & CM_FLAG_NOMOUNTCHASE) ? NULL : &tscp);
1151 /* code == 0 means we fell off the end of the dir, while stopnow means
1152 * that we stopped early, probably because we found the entry we're
1153 * looking for. Any other non-zero code is an error.
1155 if (code && code != CM_ERROR_STOPNOW) {
1156 /* if the cm_scache_t we are searching in is not a directory
1157 * we must return path not found because the error
1158 * is to describe the final component not an intermediary
1160 if (code == CM_ERROR_NOTDIR) {
1161 if (flags & CM_FLAG_CHECKPATH)
1162 code = CM_ERROR_NOSUCHPATH;
1164 code = CM_ERROR_NOSUCHFILE;
1170 getroot = (dscp==cm_data.rootSCachep) ;
1172 if (!(cm_freelanceEnabled && cm_freelanceDiscovery) || !getroot) {
1173 if (flags & CM_FLAG_CHECKPATH)
1174 code = CM_ERROR_NOSUCHPATH;
1176 code = CM_ERROR_NOSUCHFILE;
1179 else if (!cm_ClientStrChr(cnamep, '#') &&
1180 !cm_ClientStrChr(cnamep, '%') &&
1181 cm_ClientStrCmpI(cnamep, _C("srvsvc")) &&
1182 cm_ClientStrCmpI(cnamep, _C("wkssvc")) &&
1183 cm_ClientStrCmpI(cnamep, _C("ipc$")))
1185 /* nonexistent dir on freelance root, so add it */
1186 fschar_t fullname[CELL_MAXNAMELEN + 1] = "."; /* +1 so that when we skip the . the size is still CELL_MAXNAMELEN */
1190 osi_Log1(afsd_logp,"cm_Lookup adding mount for non-existent directory: %S",
1191 osi_LogSaveClientString(afsd_logp,cnamep));
1194 * There is an ugly behavior where a share name "foo" will be searched
1195 * for as "fo". If the searched for name differs by an already existing
1196 * symlink or mount point in the Freelance directory, do not add the
1197 * new value automatically.
1201 fnlen = strlen(fnamep);
1202 if ( fnamep[fnlen-1] == '.') {
1203 fnamep[fnlen-1] = '\0';
1208 if (cnamep[0] == '.') {
1209 if (cm_GetCell_Gen(&fnamep[1], &fullname[1], CM_FLAG_CREATE)) {
1211 code = cm_FreelanceAddMount(fullname, &fullname[1], "root.cell", 1, &rock.fid);
1212 if ( cm_FsStrCmpI(&fnamep[1], &fullname[1])) {
1214 * Do not permit symlinks that are one of:
1215 * . the cellname followed by a dot
1216 * . the cellname minus a single character
1217 * . a substring of the cellname that does not consist of full components
1219 if ( cm_strnicmp_utf8(&fnamep[1], fullname, (int)fnlen-1) == 0 &&
1220 (fnlen-1 == strlen(fullname)-1 || fullname[fnlen-1] != '.'))
1222 /* do not add; substitute fullname for the search */
1224 fnamep = malloc(strlen(fullname)+2);
1226 strncpy(&fnamep[1], fullname, strlen(fullname)+1);
1229 code = cm_FreelanceAddSymlink(fnamep, fullname, &rock.fid);
1234 if (cm_GetCell_Gen(fnamep, fullname, CM_FLAG_CREATE)) {
1236 code = cm_FreelanceAddMount(fullname, fullname, "root.cell", 0, &rock.fid);
1237 if ( cm_FsStrCmpI(fnamep, fullname)) {
1239 * Do not permit symlinks that are one of:
1240 * . the cellname followed by a dot
1241 * . the cellname minus a single character
1242 * . a substring of the cellname that does not consist of full components
1244 if ( cm_strnicmp_utf8(fnamep, fullname, (int)fnlen-1) == 0 &&
1245 (fnlen == strlen(fullname)-1 || fullname[fnlen] != '.'))
1247 /* do not add; substitute fullname for the search */
1249 fnamep = strdup(fullname);
1253 code = cm_FreelanceAddSymlink(fnamep, fullname, &rock.fid);
1262 nnamep = cm_FsStringToNormStringAlloc(fnamep, -1, NULL);
1266 if (!found || code) { /* add mount point failed, so give up */
1267 if (flags & CM_FLAG_CHECKPATH)
1268 code = CM_ERROR_NOSUCHPATH;
1270 code = CM_ERROR_NOSUCHFILE;
1273 tscp = NULL; /* to force call of cm_GetSCache */
1275 if (flags & CM_FLAG_CHECKPATH)
1276 code = CM_ERROR_NOSUCHPATH;
1278 code = CM_ERROR_NOSUCHFILE;
1284 if ( !tscp ) /* we did not find it in the dnlc */
1287 code = cm_GetSCache(&rock.fid, &dscp->fid, &tscp, userp, reqp);
1291 /* tscp is now held */
1293 lock_ObtainWrite(&tscp->rw);
1296 * Do not get status if we do not already have a callback or know the type.
1297 * The process of reading the mount point string will obtain status information
1298 * in a single RPC. No reason to add a second round trip.
1300 * If we do have a callback, use cm_SyncOp to get status in case the
1301 * current cm_user_t is not the same as the one that obtained the
1302 * mount point string contents.
1304 if (cm_HaveCallback(tscp) || tscp->fileType == CM_SCACHETYPE_UNKNOWN) {
1305 code = cm_SyncOp(tscp, NULL, userp, reqp, 0,
1306 CM_SCACHESYNC_GETSTATUS | CM_SCACHESYNC_NEEDCALLBACK);
1308 lock_ReleaseWrite(&tscp->rw);
1309 cm_ReleaseSCache(tscp);
1312 cm_SyncOpDone(tscp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1314 /* tscp is now locked */
1316 if (!(flags & CM_FLAG_NOMOUNTCHASE)
1317 && tscp->fileType == CM_SCACHETYPE_MOUNTPOINT) {
1318 /* mount points are funny: they have a volume name to mount
1321 code = cm_ReadMountPoint(tscp, userp, reqp);
1323 code = cm_FollowMountPoint(tscp, dscp, userp, reqp,
1325 lock_ReleaseWrite(&tscp->rw);
1326 cm_ReleaseSCache(tscp);
1333 lock_ReleaseWrite(&tscp->rw);
1336 /* copy back pointer */
1339 /* insert scache in dnlc */
1340 if ( !dnlcHit && !(flags & CM_FLAG_NOMOUNTCHASE) && rock.ExactFound ) {
1341 /* lock the directory entry to prevent racing callback revokes */
1342 lock_ObtainRead(&dscp->rw);
1343 if ( dscp->cbServerp != NULL && dscp->cbExpires > 0 ) {
1344 /* TODO: reuse nnamep from above */
1347 nnamep = cm_ClientStringToNormStringAlloc(cnamep, -1, NULL);
1349 cm_dnlcEnter(dscp, nnamep, tscp);
1351 lock_ReleaseRead(&dscp->rw);
1368 int cm_ExpandSysName(cm_req_t * reqp, clientchar_t *inp, clientchar_t *outp, long outSizeCch, unsigned int index)
1373 int use_sysname64 = 0;
1375 if (cm_sysName64Count > 0 && reqp && !(reqp->flags & CM_REQ_WOW64) && (reqp->flags & CM_REQ_SOURCE_REDIR))
1379 tp = cm_ClientStrRChr(inp, '@');
1381 return 0; /* no @sys */
1383 if (cm_ClientStrCmp(tp, _C("@sys")) != 0)
1384 return 0; /* no @sys */
1386 /* caller just wants to know if this is a valid @sys type of name */
1391 if (use_sysname64 && index >= cm_sysName64Count)
1395 if (index >= cm_sysNameCount)
1398 /* otherwise generate the properly expanded @sys name */
1399 prefixCount = (int)(tp - inp);
1401 cm_ClientStrCpyN(outp, outSizeCch, inp, prefixCount); /* copy out "a." from "a.@sys" */
1402 outp[prefixCount] = 0; /* null terminate the "a." */
1405 cm_ClientStrCat(outp, outSizeCch, cm_sysName64List[index]);
1408 cm_ClientStrCat(outp, outSizeCch, cm_sysNameList[index]);
1413 long cm_EvaluateVolumeReference(clientchar_t * namep, long flags, cm_user_t * userp,
1414 cm_req_t *reqp, cm_scache_t ** outScpp)
1416 afs_uint32 code = 0;
1417 fschar_t cellName[CELL_MAXNAMELEN];
1418 fschar_t volumeName[VL_MAXNAMELEN];
1422 fschar_t * fnamep = NULL;
1424 cm_cell_t * cellp = NULL;
1425 cm_volume_t * volp = NULL;
1429 int mountType = RWVOL;
1431 osi_Log1(afsd_logp, "cm_EvaluateVolumeReference for string [%S]",
1432 osi_LogSaveClientString(afsd_logp, namep));
1434 if (cm_ClientStrCmpNI(namep, _C(CM_PREFIX_VOL), CM_PREFIX_VOL_CCH) != 0) {
1435 goto _exit_invalid_path;
1438 /* namep is assumed to look like the following:
1440 @vol:<cellname>%<volume>\0
1442 @vol:<cellname>#<volume>\0
1446 fnamep = cm_ClientStringToFsStringAlloc(namep, -1, NULL);
1447 cp = fnamep + CM_PREFIX_VOL_CCH; /* cp points to cell name, hopefully */
1448 tp = cm_FsStrChr(cp, '%');
1450 tp = cm_FsStrChr(cp, '#');
1452 (len = tp - cp) == 0 ||
1453 len > CELL_MAXNAMELEN)
1454 goto _exit_invalid_path;
1455 cm_FsStrCpyN(cellName, lengthof(cellName), cp, len);
1460 cp = tp+1; /* cp now points to volume, supposedly */
1461 cm_FsStrCpy(volumeName, lengthof(volumeName), cp);
1463 /* OK, now we have the cell and the volume */
1464 osi_Log2(afsd_logp, " Found cell [%s] and volume [%s]",
1465 osi_LogSaveFsString(afsd_logp, cellName),
1466 osi_LogSaveFsString(afsd_logp, volumeName));
1468 cellp = cm_GetCell(cellName, CM_FLAG_CREATE);
1469 if (cellp == NULL) {
1470 goto _exit_invalid_path;
1473 len = cm_FsStrLen(volumeName);
1474 if (len >= 8 && cm_FsStrCmp(volumeName + len - 7, ".backup") == 0)
1476 else if (len >= 10 &&
1477 cm_FsStrCmp(volumeName + len - 9, ".readonly") == 0)
1482 if (cm_VolNameIsID(volumeName)) {
1483 code = cm_FindVolumeByID(cellp, atoi(volumeName), userp, reqp,
1484 CM_GETVOL_FLAG_CREATE, &volp);
1486 code = cm_FindVolumeByName(cellp, volumeName, userp, reqp,
1487 CM_GETVOL_FLAG_CREATE, &volp);
1493 if (volType == BACKVOL)
1494 volume = volp->vol[BACKVOL].ID;
1495 else if (volType == ROVOL ||
1496 (volType == RWVOL && mountType == ROVOL && volp->vol[ROVOL].ID != 0))
1497 volume = volp->vol[ROVOL].ID;
1499 volume = volp->vol[RWVOL].ID;
1501 cm_SetFid(&fid, cellp->cellID, volume, 1, 1);
1503 code = cm_GetSCache(&fid, NULL, outScpp, userp, reqp);
1516 if (flags & CM_FLAG_CHECKPATH)
1517 return CM_ERROR_NOSUCHPATH;
1519 return CM_ERROR_NOSUCHFILE;
1522 #ifdef DEBUG_REFCOUNT
1523 long cm_LookupDbg(cm_scache_t *dscp, clientchar_t *namep, long flags, cm_user_t *userp,
1524 cm_req_t *reqp, cm_scache_t **outScpp, char * file, long line)
1526 long cm_Lookup(cm_scache_t *dscp, clientchar_t *namep, long flags, cm_user_t *userp,
1527 cm_req_t *reqp, cm_scache_t **outScpp)
1531 clientchar_t tname[AFSPATHMAX];
1532 int sysNameIndex = 0;
1533 cm_scache_t *scp = NULL;
1535 #ifdef DEBUG_REFCOUNT
1536 afsi_log("%s:%d cm_Lookup dscp 0x%p ref %d", file, line, dscp, dscp->refCount, file, line);
1537 osi_Log2(afsd_logp, "cm_Lookup dscp 0x%p ref %d", dscp, dscp->refCount);
1540 if ( cm_ClientStrCmpI(namep,_C(SMB_IOCTL_FILENAME_NOSLASH)) == 0 ) {
1541 if (flags & CM_FLAG_CHECKPATH)
1542 return CM_ERROR_NOSUCHPATH;
1544 return CM_ERROR_NOSUCHFILE;
1547 if (dscp == cm_data.rootSCachep &&
1548 cm_ClientStrCmpNI(namep, _C(CM_PREFIX_VOL), CM_PREFIX_VOL_CCH) == 0) {
1549 return cm_EvaluateVolumeReference(namep, flags, userp, reqp, outScpp);
1552 if (cm_ExpandSysName(reqp, namep, NULL, 0, 0) > 0) {
1553 for ( sysNameIndex = 0; sysNameIndex < MAXNUMSYSNAMES; sysNameIndex++) {
1554 code = cm_ExpandSysName(reqp, namep, tname, lengthof(tname), sysNameIndex);
1556 code = cm_LookupInternal(dscp, tname, flags, userp, reqp, &scp);
1557 #ifdef DEBUG_REFCOUNT
1558 afsi_log("%s:%d cm_LookupInternal (1) code 0x%x dscp 0x%p ref %d scp 0x%p ref %d", file, line, code, dscp, dscp->refCount, scp, scp ? scp->refCount : 0);
1559 osi_Log3(afsd_logp, "cm_LookupInternal (1) code 0x%x dscp 0x%p scp 0x%p", code, dscp, scp);
1567 cm_ReleaseSCache(scp);
1571 code = cm_LookupInternal(dscp, namep, flags, userp, reqp, &scp);
1572 #ifdef DEBUG_REFCOUNT
1573 afsi_log("%s:%d cm_LookupInternal (2) code 0x%x dscp 0x%p ref %d scp 0x%p ref %d", file, line, code, dscp, dscp->refCount, scp, scp ? scp->refCount : 0);
1574 osi_Log3(afsd_logp, "cm_LookupInternal (2) code 0x%x dscp 0x%p scp 0x%p", code, dscp, scp);
1581 code = cm_LookupInternal(dscp, namep, flags, userp, reqp, &scp);
1582 #ifdef DEBUG_REFCOUNT
1583 afsi_log("%s:%d cm_LookupInternal (2) code 0x%x dscp 0x%p ref %d scp 0x%p ref %d", file, line, code, dscp, dscp->refCount, scp, scp ? scp->refCount : 0);
1584 osi_Log3(afsd_logp, "cm_LookupInternal (2) code 0x%x dscp 0x%p scp 0x%p", code, dscp, scp);
1590 /* None of the possible sysName expansions could be found */
1591 if (flags & CM_FLAG_CHECKPATH)
1592 return CM_ERROR_NOSUCHPATH;
1594 return CM_ERROR_NOSUCHFILE;
1597 /*! \brief Unlink a file name
1599 Encapsulates a call to RXAFS_RemoveFile().
1601 \param[in] dscp cm_scache_t pointing at the directory containing the
1602 name to be unlinked.
1604 \param[in] fnamep Original name to be unlinked. This is the
1605 name that will be passed into the RXAFS_RemoveFile() call.
1606 This parameter is optional. If not provided, the value will
1609 \param[in] came Client name to be unlinked. This name will be used
1610 to update the local directory caches.
1612 \param[in] userp cm_user_t for the request.
1614 \param[in] reqp Request tracker.
1617 long cm_Unlink(cm_scache_t *dscp, fschar_t *fnamep, clientchar_t * cnamep,
1618 cm_user_t *userp, cm_req_t *reqp)
1624 AFSFetchStatus newDirStatus;
1626 struct rx_connection * rxconnp;
1628 cm_scache_t *scp = NULL;
1629 int free_fnamep = FALSE;
1632 memset(&volSync, 0, sizeof(volSync));
1634 if (fnamep == NULL) {
1637 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ,
1638 CM_DIROP_FLAG_NONE, &dirop);
1640 code = cm_BPlusDirLookupOriginalName(&dirop, cnamep, &fnamep);
1643 cm_EndDirOp(&dirop);
1650 #ifdef AFS_FREELANCE_CLIENT
1651 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1652 /* deleting a mount point from the root dir. */
1653 code = cm_FreelanceRemoveMount(fnamep);
1658 code = cm_Lookup(dscp, cnamep, CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
1662 /* Check for RO volume */
1663 if (dscp->flags & CM_SCACHEFLAG_RO) {
1664 code = CM_ERROR_READONLY;
1668 /* make sure we don't screw up the dir status during the merge */
1669 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE,
1670 CM_DIROP_FLAG_NONE, &dirop);
1672 lock_ObtainWrite(&dscp->rw);
1673 sflags = CM_SCACHESYNC_STOREDATA;
1674 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, sflags);
1675 lock_ReleaseWrite(&dscp->rw);
1677 cm_EndDirOp(&dirop);
1682 InterlockedIncrement(&dscp->activeRPCs);
1684 afsFid.Volume = dscp->fid.volume;
1685 afsFid.Vnode = dscp->fid.vnode;
1686 afsFid.Unique = dscp->fid.unique;
1688 osi_Log1(afsd_logp, "CALL RemoveFile scp 0x%p", dscp);
1690 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
1694 rxconnp = cm_GetRxConn(connp);
1695 code = RXAFS_RemoveFile(rxconnp, &afsFid, fnamep,
1696 &newDirStatus, &volSync);
1697 rx_PutConnection(rxconnp);
1699 } while (cm_Analyze(connp, userp, reqp, &dscp->fid, NULL, 1, &newDirStatus, &volSync, NULL, NULL, code));
1700 code = cm_MapRPCError(code, reqp);
1703 osi_Log1(afsd_logp, "CALL RemoveFile FAILURE, code 0x%x", code);
1705 osi_Log0(afsd_logp, "CALL RemoveFile SUCCESS");
1708 lock_ObtainWrite(&dirop.scp->dirlock);
1709 dirop.lockType = CM_DIRLOCK_WRITE;
1711 lock_ObtainWrite(&dscp->rw);
1712 cm_dnlcRemove(dscp, cnamep);
1714 code = cm_MergeStatus(NULL, dscp, &newDirStatus, &volSync, userp, reqp, CM_MERGEFLAG_DIROP);
1716 if (cm_CheckDirOpForSingleChange(&dirop) && cnamep) {
1717 lock_ReleaseWrite(&dscp->rw);
1718 cm_DirDeleteEntry(&dirop, fnamep);
1720 cm_BPlusDirDeleteEntry(&dirop, cnamep);
1722 lock_ObtainWrite(&dscp->rw);
1725 InterlockedDecrement(&scp->activeRPCs);
1726 if (code == CM_ERROR_NOSUCHFILE) {
1727 /* windows would not have allowed the request to delete the file
1728 * if it did not believe the file existed. therefore, we must
1729 * have an inconsistent view of the world.
1731 dscp->cbServerp = NULL;
1735 cm_SyncOpDone(dscp, NULL, sflags);
1736 lock_ReleaseWrite(&dscp->rw);
1738 cm_EndDirOp(&dirop);
1740 if (invalidate && RDR_Initialized &&
1741 scp->fileType != CM_SCACHETYPE_FILE && scp->fileType != CM_SCACHETYPE_DIRECTORY)
1742 RDR_InvalidateObject(dscp->fid.cell, dscp->fid.volume, dscp->fid.vnode,
1743 dscp->fid.unique, dscp->fid.hash,
1744 dscp->fileType, AFS_INVALIDATE_DATA_VERSION);
1748 lock_ObtainWrite(&scp->rw);
1749 if (--scp->linkCount == 0) {
1750 _InterlockedOr(&scp->flags, CM_SCACHEFLAG_DELETED);
1751 lock_ObtainWrite(&cm_scacheLock);
1752 cm_AdjustScacheLRU(scp);
1753 lock_ReleaseWrite(&cm_scacheLock);
1755 cm_DiscardSCache(scp);
1756 lock_ReleaseWrite(&scp->rw);
1757 if (RDR_Initialized && !(reqp->flags & CM_REQ_SOURCE_REDIR))
1758 RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode,
1759 scp->fid.unique, scp->fid.hash,
1760 scp->fileType, AFS_INVALIDATE_DELETED);
1762 cm_ReleaseSCache(scp);
1772 /* called with a write locked vnode, and fills in the link info.
1773 * returns this the vnode still write locked.
1775 long cm_HandleLink(cm_scache_t *linkScp, cm_user_t *userp, cm_req_t *reqp)
1779 lock_AssertWrite(&linkScp->rw);
1780 if (!linkScp->mountPointStringp[0] ||
1781 linkScp->mpDataVersion != linkScp->dataVersion) {
1783 #ifdef AFS_FREELANCE_CLIENT
1784 /* File servers do not have data for freelance entries */
1785 if (cm_freelanceEnabled &&
1786 linkScp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
1787 linkScp->fid.volume==AFS_FAKE_ROOT_VOL_ID )
1789 code = cm_FreelanceFetchMountPointString(linkScp);
1791 #endif /* AFS_FREELANCE_CLIENT */
1793 char temp[MOUNTPOINTLEN];
1795 afs_uint32 bytesRead = 0;
1797 /* read the link data from the file server */
1798 offset.LowPart = offset.HighPart = 0;
1799 code = cm_GetData(linkScp, &offset, temp, MOUNTPOINTLEN, &bytesRead, userp, reqp);
1804 * linkScp->length is the actual length of the symlink target string.
1805 * It is current because cm_GetData merged the most up to date
1806 * status info into scp and has not dropped the rwlock since.
1808 if (linkScp->length.LowPart > MOUNTPOINTLEN - 1)
1809 return CM_ERROR_TOOBIG;
1810 if (linkScp->length.LowPart == 0)
1811 return CM_ERROR_INVAL;
1813 /* make sure we are NUL terminated */
1814 temp[linkScp->length.LowPart] = 0;
1815 memcpy(linkScp->mountPointStringp, temp, linkScp->length.LowPart + 1);
1816 linkScp->mpDataVersion = linkScp->dataVersion;
1819 if ( !strnicmp(linkScp->mountPointStringp, "msdfs:", strlen("msdfs:")) )
1820 linkScp->fileType = CM_SCACHETYPE_DFSLINK;
1822 } /* don't have symlink contents cached */
1827 /* called with a held vnode and a path suffix, with the held vnode being a
1828 * symbolic link. Our goal is to generate a new path to interpret, and return
1829 * this new path in newSpaceBufferp. If the new vnode is relative to a dir
1830 * other than the directory containing the symbolic link, then the new root is
1831 * returned in *newRootScpp, otherwise a null is returned there.
1833 long cm_AssembleLink(cm_scache_t *linkScp, fschar_t *pathSuffixp,
1834 cm_scache_t **newRootScpp, cm_space_t **newSpaceBufferp,
1835 cm_user_t *userp, cm_req_t *reqp)
1842 *newRootScpp = NULL;
1843 *newSpaceBufferp = NULL;
1845 lock_ObtainWrite(&linkScp->rw);
1847 * Do not get status if we do not already have a callback.
1848 * The process of reading the symlink string will obtain status information
1849 * in a single RPC. No reason to add a second round trip.
1851 * If we do have a callback, use cm_SyncOp to get status in case the
1852 * current cm_user_t is not the same as the one that obtained the
1853 * symlink string contents.
1855 if (cm_HaveCallback(linkScp)) {
1856 code = cm_SyncOp(linkScp, NULL, userp, reqp, 0,
1857 CM_SCACHESYNC_GETSTATUS | CM_SCACHESYNC_NEEDCALLBACK);
1859 lock_ReleaseWrite(&linkScp->rw);
1860 cm_ReleaseSCache(linkScp);
1863 cm_SyncOpDone(linkScp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1865 code = cm_HandleLink(linkScp, userp, reqp);
1869 /* if we may overflow the buffer, bail out; buffer is signficantly
1870 * bigger than max path length, so we don't really have to worry about
1871 * being a little conservative here.
1873 if (cm_FsStrLen(linkScp->mountPointStringp) + cm_FsStrLen(pathSuffixp) + 2
1874 >= CM_UTILS_SPACESIZE) {
1875 code = CM_ERROR_TOOBIG;
1879 tsp = cm_GetSpace();
1880 linkp = linkScp->mountPointStringp;
1881 if (strncmp(linkp, cm_mountRoot, cm_mountRootLen) == 0) {
1882 if (strlen(linkp) > cm_mountRootLen)
1883 StringCbCopyA((char *) tsp->data, sizeof(tsp->data), linkp+cm_mountRootLen+1);
1886 *newRootScpp = cm_RootSCachep(userp, reqp);
1887 cm_HoldSCache(*newRootScpp);
1888 } else if (linkp[0] == '\\' && linkp[1] == '\\') {
1889 if (!strnicmp(&linkp[2], cm_NetbiosName, (len = (long)strlen(cm_NetbiosName))))
1891 char * p = &linkp[len + 3];
1892 if (strnicmp(p, "all", 3) == 0)
1895 StringCbCopyA(tsp->data, sizeof(tsp->data), p);
1896 for (p = tsp->data; *p; p++) {
1900 *newRootScpp = cm_RootSCachep(userp, reqp);
1901 cm_HoldSCache(*newRootScpp);
1903 linkScp->fileType = CM_SCACHETYPE_DFSLINK;
1904 StringCchCopyA(tsp->data,lengthof(tsp->data), linkp);
1905 code = CM_ERROR_PATH_NOT_COVERED;
1907 } else if ( linkScp->fileType == CM_SCACHETYPE_DFSLINK ||
1908 !strnicmp(linkp, "msdfs:", (len = (long)strlen("msdfs:"))) ) {
1909 linkScp->fileType = CM_SCACHETYPE_DFSLINK;
1910 StringCchCopyA(tsp->data,lengthof(tsp->data), linkp);
1911 code = CM_ERROR_PATH_NOT_COVERED;
1912 } else if (*linkp == '\\' || *linkp == '/') {
1914 /* formerly, this was considered to be from the AFS root,
1915 * but this seems to create problems. instead, we will just
1916 * reject the link */
1917 StringCchCopyA(tsp->data,lengthof(tsp->data), linkp+1);
1918 *newRootScpp = cm_RootSCachep(userp, reqp);
1919 cm_HoldSCache(*newRootScpp);
1921 /* we still copy the link data into the response so that
1922 * the user can see what the link points to
1924 linkScp->fileType = CM_SCACHETYPE_INVALID;
1925 StringCchCopyA(tsp->data,lengthof(tsp->data), linkp);
1926 code = CM_ERROR_NOSUCHPATH;
1929 /* a relative link */
1930 StringCchCopyA(tsp->data,lengthof(tsp->data), linkp);
1932 if (pathSuffixp[0] != 0) { /* if suffix string is non-null */
1933 StringCchCatA(tsp->data,lengthof(tsp->data), "\\");
1934 StringCchCatA(tsp->data,lengthof(tsp->data), pathSuffixp);
1938 clientchar_t * cpath = cm_FsStringToClientStringAlloc(tsp->data, -1, NULL);
1939 if (cpath != NULL) {
1940 cm_ClientStrCpy(tsp->wdata, lengthof(tsp->wdata), cpath);
1942 *newSpaceBufferp = tsp;
1944 code = CM_ERROR_NOSUCHPATH;
1951 if (code == CM_ERROR_PATH_NOT_COVERED && reqp->tidPathp && reqp->relPathp) {
1952 cm_VolStatus_Notify_DFS_Mapping(linkScp, reqp->tidPathp, reqp->relPathp);
1957 lock_ReleaseWrite(&linkScp->rw);
1960 #ifdef DEBUG_REFCOUNT
1961 long cm_NameIDbg(cm_scache_t *rootSCachep, clientchar_t *pathp, long flags,
1962 cm_user_t *userp, clientchar_t *tidPathp, cm_req_t *reqp,
1963 cm_scache_t **outScpp,
1964 char * file, long line)
1966 long cm_NameI(cm_scache_t *rootSCachep, clientchar_t *pathp, long flags,
1967 cm_user_t *userp, clientchar_t *tidPathp,
1968 cm_req_t *reqp, cm_scache_t **outScpp)
1972 clientchar_t *tp; /* ptr moving through input buffer */
1973 clientchar_t tc; /* temp char */
1974 int haveComponent; /* has new component started? */
1975 clientchar_t component[AFSPATHMAX]; /* this is the new component */
1976 clientchar_t *cp; /* component name being assembled */
1977 cm_scache_t *tscp; /* current location in the hierarchy */
1978 cm_scache_t *nscp; /* next dude down */
1979 cm_scache_t *dirScp; /* last dir we searched */
1980 cm_scache_t *linkScp; /* new root for the symlink we just
1982 cm_space_t *psp; /* space for current path, if we've hit
1984 cm_space_t *tempsp; /* temp vbl */
1985 clientchar_t *restp; /* rest of the pathname to interpret */
1986 int symlinkCount; /* count of # of symlinks traversed */
1987 int extraFlag; /* avoid chasing mt pts for dir cmd */
1988 int phase = 1; /* 1 = tidPathp, 2 = pathp */
1989 cm_fid_t fids[MAX_FID_COUNT]; /* array of fids processed in this path walk */
1990 int fid_count = 0; /* number of fids processed in this path walk */
1995 #ifdef DEBUG_REFCOUNT
1996 afsi_log("%s:%d cm_NameI rootscp 0x%p ref %d", file, line, rootSCachep, rootSCachep->refCount);
1997 osi_Log4(afsd_logp,"cm_NameI rootscp 0x%p path %S tidpath %S flags 0x%x",
1998 rootSCachep, pathp ? pathp : L"<NULL>", tidPathp ? tidPathp : L"<NULL>",
2013 cm_HoldSCache(tscp);
2021 /* map Unix slashes into DOS ones so we can interpret Unix
2027 if (!haveComponent) {
2030 } else if (tc == 0) {
2044 /* we have a component here */
2045 if (tc == 0 || tc == '\\') {
2046 /* end of the component; we're at the last
2047 * component if tc == 0. However, if the last
2048 * is a symlink, we have more to do.
2050 *cp++ = 0; /* add null termination */
2053 if (tscp == cm_RootSCachep(userp, reqp)) {
2054 code = cm_Lookup(tscp, component, CM_FLAG_CHECKPATH, userp, reqp, &nscp);
2056 if ((code == CM_ERROR_NOSUCHPATH || code == CM_ERROR_NOSUCHFILE ||
2057 code == CM_ERROR_BPLUS_NOMATCH) &&
2058 tscp == cm_data.rootSCachep) {
2060 clientchar_t volref[AFSPATHMAX];
2062 if (wcschr(component, '%') != NULL || wcschr(component, '#') != NULL) {
2064 * A volume reference: <cell>{%,#}<volume> -> @vol:<cell>{%,#}<volume>
2066 cm_ClientStrCpyN(volref, AFSPATHMAX, _C(CM_PREFIX_VOL), CM_PREFIX_VOL_CCH);
2067 cm_ClientStrCat(volref, AFSPATHMAX, component);
2069 code = cm_EvaluateVolumeReference(volref, CM_FLAG_CHECKPATH, userp, reqp, &nscp);
2071 #ifdef AFS_FREELANCE_CLIENT
2072 else if (tscp->fid.cell == AFS_FAKE_ROOT_CELL_ID && tscp->fid.volume == AFS_FAKE_ROOT_VOL_ID &&
2073 tscp->fid.vnode == 1 && tscp->fid.unique == 1) {
2075 * If this is the Freelance volume root directory then treat unrecognized
2076 * names as cell names and attempt to find the appropriate "root.cell".
2078 cm_ClientStrCpyN(volref, AFSPATHMAX, _C(CM_PREFIX_VOL), CM_PREFIX_VOL_CCH);
2079 if (component[0] == L'.') {
2080 cm_ClientStrCat(volref, AFSPATHMAX, &component[1]);
2081 cm_ClientStrCatN(volref, AFSPATHMAX, L"%", sizeof(WCHAR));
2083 cm_ClientStrCat(volref, AFSPATHMAX, component);
2084 cm_ClientStrCatN(volref, AFSPATHMAX, L"#", sizeof(WCHAR));
2086 cm_ClientStrCatN(volref, AFSPATHMAX, L"root.cell", 9 * sizeof(WCHAR));
2088 code = cm_EvaluateVolumeReference(volref, CM_FLAG_CHECKPATH, userp, reqp, &nscp);
2093 if ((flags & CM_FLAG_DIRSEARCH) && tc == 0)
2094 extraFlag = CM_FLAG_NOMOUNTCHASE;
2095 code = cm_Lookup(tscp, component,
2097 userp, reqp, &nscp);
2100 if (!cm_ClientStrCmp(component,_C("..")) ||
2101 !cm_ClientStrCmp(component,_C("."))) {
2103 * roll back the fid list until we find the
2104 * fid that matches where we are now. Its not
2105 * necessarily one or two fids because they
2106 * might have been symlinks or mount points or
2107 * both that were crossed.
2109 for ( i=fid_count-1; i>=0; i--) {
2110 if (!cm_FidCmp(&nscp->fid, &fids[i]))
2115 /* add the new fid to the list */
2116 if (fid_count == MAX_FID_COUNT) {
2117 code = CM_ERROR_TOO_MANY_SYMLINKS;
2118 cm_ReleaseSCache(nscp);
2122 fids[fid_count++] = nscp->fid;
2127 cm_ReleaseSCache(tscp);
2129 cm_ReleaseSCache(dirScp);
2132 if ((code == CM_ERROR_NOSUCHFILE || code == CM_ERROR_BPLUS_NOMATCH) &&
2133 tscp->fileType == CM_SCACHETYPE_SYMLINK) {
2134 osi_Log0(afsd_logp,"cm_NameI code CM_ERROR_NOSUCHPATH");
2135 return CM_ERROR_NOSUCHPATH;
2137 osi_Log1(afsd_logp,"cm_NameI code 0x%x", code);
2142 haveComponent = 0; /* component done */
2144 cm_ReleaseSCache(dirScp);
2145 dirScp = tscp; /* for some symlinks */
2146 tscp = nscp; /* already held */
2148 if (tc == 0 && !(flags & CM_FLAG_FOLLOW) && phase == 2) {
2151 cm_ReleaseSCache(dirScp);
2157 /* now, if tscp is a symlink, we should follow it and
2158 * assemble the path again.
2160 lock_ObtainWrite(&tscp->rw);
2161 code = cm_SyncOp(tscp, NULL, userp, reqp, 0,
2162 CM_SCACHESYNC_GETSTATUS
2163 | CM_SCACHESYNC_NEEDCALLBACK);
2165 lock_ReleaseWrite(&tscp->rw);
2166 cm_ReleaseSCache(tscp);
2169 cm_ReleaseSCache(dirScp);
2174 cm_SyncOpDone(tscp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2176 if (tscp->fileType == CM_SCACHETYPE_SYMLINK) {
2177 /* this is a symlink; assemble a new buffer */
2178 lock_ReleaseWrite(&tscp->rw);
2179 if (symlinkCount++ >= MAX_SYMLINK_COUNT) {
2180 cm_ReleaseSCache(tscp);
2183 cm_ReleaseSCache(dirScp);
2188 osi_Log0(afsd_logp,"cm_NameI code CM_ERROR_TOO_MANY_SYMLINKS");
2189 return CM_ERROR_TOO_MANY_SYMLINKS;
2199 /* TODO: make this better */
2200 frestp = cm_ClientStringToFsStringAlloc(restp, -1, NULL);
2201 code = cm_AssembleLink(tscp, frestp, &linkScp, &tempsp, userp, reqp);
2205 if (code == 0 && linkScp != NULL) {
2206 if (linkScp == cm_data.rootSCachep) {
2210 for ( i=0; i<fid_count; i++) {
2211 if ( !cm_FidCmp(&linkScp->fid, &fids[i]) ) {
2212 code = CM_ERROR_TOO_MANY_SYMLINKS;
2213 cm_ReleaseSCache(linkScp);
2219 if (i == fid_count && fid_count < MAX_FID_COUNT) {
2220 fids[fid_count++] = linkScp->fid;
2225 /* something went wrong */
2226 cm_ReleaseSCache(tscp);
2229 cm_ReleaseSCache(dirScp);
2235 /* otherwise, tempsp has the new path,
2236 * and linkScp is the new root from
2237 * which to interpret that path.
2238 * Continue with the namei processing,
2239 * also doing the bookkeeping for the
2240 * space allocation and tracking the
2241 * vnode reference counts.
2247 cm_ReleaseSCache(tscp);
2252 * now, if linkScp is null, that's
2253 * AssembleLink's way of telling us that
2254 * the sym link is relative to the dir
2255 * containing the link. We have a ref
2256 * to it in dirScp, and we hold it now
2257 * and reuse it as the new spot in the
2265 /* not a symlink, we may be done */
2266 lock_ReleaseWrite(&tscp->rw);
2274 cm_ReleaseSCache(dirScp);
2282 cm_ReleaseSCache(dirScp);
2285 } /* end of a component */
2288 } /* we have a component */
2289 } /* big while loop over all components */
2293 cm_ReleaseSCache(dirScp);
2299 cm_ReleaseSCache(tscp);
2301 #ifdef DEBUG_REFCOUNT
2302 afsi_log("%s:%d cm_NameI code 0x%x outScpp 0x%p ref %d", file, line, code, *outScpp, (*outScpp) ? (*outScpp)->refCount : 0);
2304 osi_Log2(afsd_logp,"cm_NameI code 0x%x outScpp 0x%p", code, *outScpp);
2308 /* called with a dir, and a vnode within the dir that happens to be a symlink.
2309 * We chase the link, and return a held pointer to the target, if it exists,
2310 * in *outScpp. If we succeed, we return 0, otherwise we return an error code
2311 * and do not hold or return a target vnode.
2313 * This is very similar to calling cm_NameI with the last component of a name,
2314 * which happens to be a symlink, except that we've already passed by the name.
2316 * This function is typically called by the directory listing functions, which
2317 * encounter symlinks but need to return the proper file length so programs
2318 * like "more" work properly when they make use of the attributes retrieved from
2321 * The input vnode should not be locked when this function is called.
2323 long cm_EvaluateSymLink(cm_scache_t *dscp, cm_scache_t *linkScp,
2324 cm_scache_t **outScpp, cm_user_t *userp, cm_req_t *reqp)
2328 cm_scache_t *newRootScp;
2332 osi_Log1(afsd_logp, "Evaluating symlink scp 0x%p", linkScp);
2334 code = cm_AssembleLink(linkScp, "", &newRootScp, &spacep, userp, reqp);
2338 /* now, if newRootScp is NULL, we're really being told that the symlink
2339 * is relative to the current directory (dscp).
2341 if (newRootScp == NULL) {
2343 cm_HoldSCache(dscp);
2346 code = cm_NameI(newRootScp, spacep->wdata,
2347 CM_FLAG_CASEFOLD | CM_FLAG_FOLLOW | CM_FLAG_DIRSEARCH,
2348 userp, NULL, reqp, outScpp);
2350 if (code == CM_ERROR_NOSUCHFILE || code == CM_ERROR_BPLUS_NOMATCH)
2351 code = CM_ERROR_NOSUCHPATH;
2353 /* this stuff is allocated no matter what happened on the namei call,
2355 cm_FreeSpace(spacep);
2356 cm_ReleaseSCache(newRootScp);
2358 if (linkScp == *outScpp) {
2359 cm_ReleaseSCache(*outScpp);
2361 code = CM_ERROR_NOSUCHPATH;
2367 /* for a given entry, make sure that it isn't in the stat cache, and then
2368 * add it to the list of file IDs to be obtained.
2370 * Don't bother adding it if we already have a vnode. Note that the dir
2371 * is locked, so we have to be careful checking the vnode we're thinking of
2372 * processing, to avoid deadlocks.
2374 long cm_TryBulkProc(cm_scache_t *scp, cm_dirEntry_t *dep, void *rockp,
2385 /* Don't overflow bsp. */
2386 if (bsp->counter >= CM_BULKMAX)
2387 return CM_ERROR_STOPNOW;
2389 thyper.LowPart = cm_data.buf_blockSize;
2390 thyper.HighPart = 0;
2391 thyper = LargeIntegerAdd(thyper, bsp->bufOffset);
2393 /* thyper is now the first byte past the end of the record we're
2394 * interested in, and bsp->bufOffset is the first byte of the record
2395 * we're interested in.
2396 * Skip data in the others.
2399 if (LargeIntegerLessThan(*offp, bsp->bufOffset))
2401 if (LargeIntegerGreaterThanOrEqualTo(*offp, thyper))
2402 return CM_ERROR_STOPNOW;
2403 if (strcmp(dep->name, ".") == 0 || strcmp(dep->name, "..") == 0)
2406 cm_SetFid(&tfid, scp->fid.cell, scp->fid.volume, ntohl(dep->fid.vnode), ntohl(dep->fid.unique));
2407 tscp = cm_FindSCache(&tfid);
2409 if (lock_TryWrite(&tscp->rw)) {
2410 /* we have an entry that we can look at */
2411 if (!cm_EAccesFindEntry(bsp->userp, &tscp->fid) && cm_HaveCallback(tscp)) {
2412 /* we have a callback on it. Don't bother
2413 * fetching this stat entry, since we're happy
2414 * with the info we have.
2416 lock_ReleaseWrite(&tscp->rw);
2417 cm_ReleaseSCache(tscp);
2420 lock_ReleaseWrite(&tscp->rw);
2422 cm_ReleaseSCache(tscp);
2425 #ifdef AFS_FREELANCE_CLIENT
2426 // yj: if this is a mountpoint under root.afs then we don't want it
2427 // to be bulkstat-ed, instead, we call getSCache directly and under
2428 // getSCache, it is handled specially.
2429 if ( cm_freelanceEnabled &&
2430 tfid.cell==AFS_FAKE_ROOT_CELL_ID &&
2431 tfid.volume==AFS_FAKE_ROOT_VOL_ID &&
2432 !(tfid.vnode==0x1 && tfid.unique==0x1) )
2434 osi_Log0(afsd_logp, "cm_TryBulkProc Freelance calls cm_SCache on root.afs mountpoint");
2435 return cm_GetSCache(&tfid, NULL, &tscp, NULL, NULL);
2437 #endif /* AFS_FREELANCE_CLIENT */
2440 bsp->fids[i].Volume = scp->fid.volume;
2441 bsp->fids[i].Vnode = tfid.vnode;
2442 bsp->fids[i].Unique = tfid.unique;
2447 cm_TryBulkStatRPC(cm_scache_t *dscp, cm_bulkStat_t *bbp, cm_user_t *userp, cm_req_t *reqp)
2450 AFSCBFids fidStruct;
2451 AFSBulkStats statStruct;
2453 AFSCBs callbackStruct;
2456 cm_callbackRequest_t cbReq;
2463 struct rx_connection * rxconnp;
2464 int inlinebulk; /* Did we use InlineBulkStatus RPC or not? */
2466 memset(&volSync, 0, sizeof(volSync));
2468 /* otherwise, we may have one or more bulk stat's worth of stuff in bb;
2469 * make the calls to create the entries. Handle AFSCBMAX files at a
2472 for (filex = 0; filex < bbp->counter; filex += filesThisCall) {
2473 filesThisCall = bbp->counter - filex;
2474 if (filesThisCall > AFSCBMAX)
2475 filesThisCall = AFSCBMAX;
2477 fidStruct.AFSCBFids_len = filesThisCall;
2478 fidStruct.AFSCBFids_val = &bbp->fids[filex];
2479 statStruct.AFSBulkStats_len = filesThisCall;
2480 statStruct.AFSBulkStats_val = &bbp->stats[filex];
2481 callbackStruct.AFSCBs_len = filesThisCall;
2482 callbackStruct.AFSCBs_val = &bbp->callbacks[filex];
2483 cm_StartCallbackGrantingCall(NULL, &cbReq);
2484 osi_Log1(afsd_logp, "CALL BulkStatus, %d entries", filesThisCall);
2487 * Whenever cm_Analyze is called for a RXAFS_ RPC there must
2488 * be a FID provided. However, the error code from RXAFS_BulkStatus
2489 * or RXAFS_InlinkBulkStatus does not apply to any FID. Therefore,
2490 * we generate an invalid FID to match with the RPC error.
2492 cm_SetFid(&tfid, dscp->fid.cell, dscp->fid.volume, 0, 0);
2497 code = cm_ConnFromFID(&tfid, userp, reqp, &connp);
2501 rxconnp = cm_GetRxConn(connp);
2502 if (SERVERHASINLINEBULK(connp)) {
2503 code = RXAFS_InlineBulkStatus(rxconnp, &fidStruct,
2504 &statStruct, &callbackStruct, &volSync);
2505 if (code == RXGEN_OPCODE) {
2506 SET_SERVERHASNOINLINEBULK(connp);
2513 * It is important to note that RXAFS_BulkStatus is quite braindead.
2514 * The AFS 3.6 file server implementation returns arrays that are
2515 * sized to hold responses for all of the requested FIDs but it only
2516 * populates their contents up to the point where it detects an error.
2517 * Unfortunately, it does inform the caller which entries were filled
2518 * and which were not. The caller has no ability to determine which
2519 * FID the RPC return code applies to or which of the FIDs valid status
2520 * info and callbacks have been issued for. As a result, when an
2521 * error is returned, none of the data received can be trusted.
2523 code = RXAFS_BulkStatus(rxconnp, &fidStruct,
2524 &statStruct, &callbackStruct, &volSync);
2526 rx_PutConnection(rxconnp);
2529 * If InlineBulk RPC was called and it succeeded,
2530 * then pull out the return code from the status info
2531 * and use it for cm_Analyze so that we can failover to other
2532 * .readonly volume instances. But only do it for errors that
2533 * are volume global.
2535 if (inlinebulk && code == 0 && (&bbp->stats[0])->errorCode) {
2536 osi_Log1(afsd_logp, "cm_TryBulkStat inline-bulk stat error: %d",
2537 (&bbp->stats[0])->errorCode);
2538 switch ((&bbp->stats[0])->errorCode) {
2547 code = (&bbp->stats[0])->errorCode;
2550 /* Rx and Rxkad errors are volume global */
2551 if ( (&bbp->stats[0])->errorCode >= -64 && (&bbp->stats[0])->errorCode < 0 ||
2552 (&bbp->stats[0])->errorCode >= ERROR_TABLE_BASE_RXK && (&bbp->stats[0])->errorCode < ERROR_TABLE_BASE_RXK + 256)
2553 code = (&bbp->stats[0])->errorCode;
2556 } while (cm_Analyze(connp, userp, reqp, &tfid, NULL, 0, &bbp->stats[0], &volSync, NULL, &cbReq, code));
2557 code = cm_MapRPCError(code, reqp);
2560 * might as well quit on an error, since we're not going to do
2561 * much better on the next immediate call, either.
2564 osi_Log2(afsd_logp, "CALL %sBulkStatus FAILURE code 0x%x",
2565 inlinebulk ? "Inline" : "", code);
2568 * Since an error occurred and it is impossible to determine
2569 * the context in which the returned error code should be
2570 * interpreted, we return the CM_ERROR_BULKSTAT_FAILURE error
2571 * which indicates that Bulk Stat cannot be used for the
2572 * current request. The caller should fallback to using
2573 * individual RXAFS_FetchStatus calls.
2575 code = CM_ERROR_BULKSTAT_FAILURE;
2577 cm_EndCallbackGrantingCall(NULL, &cbReq, NULL, NULL, 0);
2582 * The bulk RPC has succeeded or at least not failed with a
2583 * volume global error result. For items that have inlineBulk
2584 * errors we must call cm_Analyze in order to perform required
2585 * logging of errors.
2587 * If the RPC was not inline bulk or the entry either has no error
2588 * the status must be merged.
2590 osi_Log1(afsd_logp, "CALL %sBulkStatus SUCCESS", inlinebulk ? "Inline" : "");
2592 for (i = 0; i<filesThisCall; i++) {
2594 cm_SetFid(&tfid, dscp->fid.cell, bbp->fids[j].Volume, bbp->fids[j].Vnode, bbp->fids[j].Unique);
2596 if (inlinebulk && (&bbp->stats[j])->errorCode) {
2597 cm_req_t treq = *reqp;
2598 cm_Analyze(NULL, userp, &treq, &tfid, NULL, 0, &bbp->stats[j], &volSync,
2599 NULL, &cbReq, (&bbp->stats[j])->errorCode);
2600 switch ((&bbp->stats[j])->errorCode) {
2605 cm_EAccesAddEntry(userp, &tfid, &dscp->fid);
2608 code = cm_GetSCache(&tfid, &dscp->fid, &scp, userp, reqp);
2613 * otherwise, if this entry has no callback info,
2614 * merge in this. If there is existing callback info
2615 * we skip the merge because the existing data must be
2616 * current (we have a callback) and the response from
2617 * a non-inline bulk rpc might actually be wrong.
2619 * now, we have to be extra paranoid on merging in this
2620 * information, since we didn't use cm_SyncOp before
2621 * starting the fetch to make sure that no bad races
2622 * were occurring. Specifically, we need to make sure
2623 * we don't obliterate any newer information in the
2624 * vnode than have here.
2626 * Right now, be pretty conservative: if there's a
2627 * callback or a pending call, skip it.
2628 * However, if the prior attempt to obtain status
2629 * was refused access or the volume is .readonly,
2630 * take the data in any case since we have nothing
2631 * better for the in flight directory enumeration that
2632 * resulted in this function being called.
2634 lock_ObtainRead(&scp->rw);
2635 if ((scp->cbServerp == NULL &&
2636 !(scp->flags & (CM_SCACHEFLAG_FETCHING | CM_SCACHEFLAG_STORING | CM_SCACHEFLAG_SIZESTORING))) ||
2637 (scp->flags & CM_SCACHEFLAG_PURERO) ||
2638 cm_EAccesFindEntry(userp, &scp->fid))
2640 lock_ConvertRToW(&scp->rw);
2641 lostRace = cm_EndCallbackGrantingCall(scp, &cbReq,
2644 CM_CALLBACK_MAINTAINCOUNT|CM_CALLBACK_BULKSTAT);
2646 InterlockedIncrement(&scp->activeRPCs);
2647 code = cm_MergeStatus(dscp, scp, &bbp->stats[j], &volSync, userp, reqp, CM_MERGEFLAG_BULKSTAT);
2649 lock_ReleaseWrite(&scp->rw);
2651 lock_ReleaseRead(&scp->rw);
2653 cm_ReleaseSCache(scp);
2655 } /* all files in the response */
2656 /* now tell it to drop the count,
2657 * after doing the vnode processing above */
2658 cm_EndCallbackGrantingCall(NULL, &cbReq, NULL, NULL, 0);
2659 } /* while there are still more files to process */
2664 /* called with a write locked scp and a pointer to a buffer. Make bulk stat
2665 * calls on all undeleted files in the page of the directory specified.
2668 cm_TryBulkStat(cm_scache_t *dscp, osi_hyper_t *offsetp, cm_user_t *userp,
2674 osi_Log1(afsd_logp, "cm_TryBulkStat dir 0x%p", dscp);
2676 /* should be on a buffer boundary */
2677 osi_assertx((offsetp->LowPart & (cm_data.buf_blockSize - 1)) == 0, "invalid offset");
2679 bbp = malloc(sizeof(cm_bulkStat_t));
2680 memset(bbp, 0, sizeof(cm_bulkStat_t));
2682 bbp->bufOffset = *offsetp;
2684 lock_ReleaseWrite(&dscp->rw);
2685 /* first, assemble the file IDs we need to stat */
2686 code = cm_ApplyDir(dscp, cm_TryBulkProc, (void *) bbp, offsetp, userp, reqp, NULL);
2688 /* if we failed, bail out early */
2689 if (code && code != CM_ERROR_STOPNOW) {
2691 lock_ObtainWrite(&dscp->rw);
2695 code = cm_TryBulkStatRPC(dscp, bbp, userp, reqp);
2696 osi_Log1(afsd_logp, "END cm_TryBulkStat code 0x%x", code);
2698 lock_ObtainWrite(&dscp->rw);
2703 void cm_StatusFromAttr(AFSStoreStatus *statusp, cm_scache_t *scp, cm_attr_t *attrp)
2707 /* initialize store back mask as inexpensive local variable */
2709 memset(statusp, 0, sizeof(AFSStoreStatus));
2711 /* copy out queued info from scache first, if scp passed in */
2713 if (scp->mask & CM_SCACHEMASK_CLIENTMODTIME) {
2714 statusp->ClientModTime = scp->clientModTime;
2715 mask |= AFS_SETMODTIME;
2716 scp->mask &= ~CM_SCACHEMASK_CLIENTMODTIME;
2721 /* now add in our locally generated request */
2722 if (attrp->mask & CM_ATTRMASK_CLIENTMODTIME) {
2723 statusp->ClientModTime = attrp->clientModTime;
2724 mask |= AFS_SETMODTIME;
2726 if (attrp->mask & CM_ATTRMASK_UNIXMODEBITS) {
2727 statusp->UnixModeBits = attrp->unixModeBits;
2728 mask |= AFS_SETMODE;
2730 if (attrp->mask & CM_ATTRMASK_OWNER) {
2731 statusp->Owner = attrp->owner;
2732 mask |= AFS_SETOWNER;
2734 if (attrp->mask & CM_ATTRMASK_GROUP) {
2735 statusp->Group = attrp->group;
2736 mask |= AFS_SETGROUP;
2739 statusp->Mask = mask;
2743 cm_IsSpaceAvailable(cm_fid_t * fidp, osi_hyper_t *sizep, cm_user_t *userp, cm_req_t *reqp)
2748 struct rx_connection * rxconnp;
2749 AFSFetchVolumeStatus volStat;
2750 cm_volume_t *volp = NULL;
2755 char volName[32]="(unknown)";
2756 char offLineMsg[256]="server temporarily inaccessible";
2757 char motd[256]="server temporarily inaccessible";
2758 osi_hyper_t freespace;
2762 if (fidp->cell==AFS_FAKE_ROOT_CELL_ID &&
2763 fidp->volume==AFS_FAKE_ROOT_VOL_ID)
2768 volp = cm_FindVolumeByFID(fidp, userp, reqp);
2773 volType = cm_VolumeType(volp, fidp->volume);
2774 if (volType == ROVOL || volType == BACKVOL) {
2779 cm_SetFid(&vfid, fidp->cell, fidp->volume, 1, 1);
2780 code = cm_GetSCache(&vfid, NULL, &vscp, userp, reqp);
2782 lock_ObtainWrite(&vscp->rw);
2783 code = cm_SyncOp(vscp, NULL, userp, reqp, PRSFS_READ,
2784 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2785 lock_ReleaseWrite(&vscp->rw);
2788 OfflineMsg = offLineMsg;
2792 code = cm_ConnFromFID(&vfid, userp, reqp, &connp);
2795 rxconnp = cm_GetRxConn(connp);
2796 code = RXAFS_GetVolumeStatus(rxconnp, fidp->volume,
2797 &volStat, &Name, &OfflineMsg, &MOTD);
2798 rx_PutConnection(rxconnp);
2800 } while (cm_Analyze(connp, userp, reqp, &vfid, NULL, 0, NULL, NULL, NULL, NULL, code));
2801 code = cm_MapRPCError(code, reqp);
2804 lock_ObtainWrite(&vscp->rw);
2805 cm_SyncOpDone(vscp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2806 lock_ReleaseWrite(&vscp->rw);
2807 cm_ReleaseSCache(vscp);
2811 if (volStat.MaxQuota) {
2812 freespace.QuadPart = 1024 * (afs_int64)min(volStat.MaxQuota - volStat.BlocksInUse, volStat.PartBlocksAvail);
2814 freespace.QuadPart = 1024 * (afs_int64)volStat.PartBlocksAvail;
2816 spaceAvail = LargeIntegerGreaterThanOrEqualTo(freespace, *sizep);
2818 /* the rpc failed, assume there is space and we can fail it later. */
2827 /* set the file size, and make sure that all relevant buffers have been
2828 * truncated. Ensure that any partially truncated buffers have been zeroed
2829 * to the end of the buffer.
2831 long cm_SetLength(cm_scache_t *scp, osi_hyper_t *sizep, cm_user_t *userp,
2838 /* start by locking out buffer creation */
2839 lock_ObtainWrite(&scp->bufCreateLock);
2841 /* verify that this is a file, not a dir or a symlink */
2842 lock_ObtainWrite(&scp->rw);
2843 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2844 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2847 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2849 if (scp->fileType != CM_SCACHETYPE_FILE) {
2850 code = CM_ERROR_ISDIR;
2855 if (LargeIntegerLessThan(*sizep, scp->length))
2860 lock_ReleaseWrite(&scp->rw);
2862 /* can't hold scp->rw lock here, since we may wait for a storeback to
2863 * finish if the buffer package is cleaning a buffer by storing it to
2867 buf_Truncate(scp, userp, reqp, sizep);
2869 /* now ensure that file length is short enough, and update truncPos */
2870 lock_ObtainWrite(&scp->rw);
2872 /* make sure we have a callback (so we have the right value for the
2873 * length), and wait for it to be safe to do a truncate.
2875 code = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_WRITE,
2876 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS
2877 | CM_SCACHESYNC_SETSTATUS | CM_SCACHESYNC_SETSIZE);
2879 /* If we only have 'i' bits, then we should still be able to set
2880 the size of a file we created. */
2881 if (code == CM_ERROR_NOACCESS && scp->creator == userp) {
2882 code = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_INSERT,
2883 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS
2884 | CM_SCACHESYNC_SETSTATUS | CM_SCACHESYNC_SETSIZE);
2890 if (LargeIntegerLessThan(*sizep, scp->length)) {
2891 /* a real truncation. If truncPos is not set yet, or is bigger
2892 * than where we're truncating the file, set truncPos to this
2896 cm_SyncOpDone(scp, NULL,
2897 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS
2898 | CM_SCACHESYNC_SETSTATUS | CM_SCACHESYNC_SETSIZE);
2901 if (!(scp->mask & CM_SCACHEMASK_TRUNCPOS)
2902 || LargeIntegerLessThan(*sizep, scp->length)) {
2904 scp->truncPos = *sizep;
2905 scp->mask |= CM_SCACHEMASK_TRUNCPOS;
2907 /* in either case, the new file size has been changed */
2908 scp->length = *sizep;
2909 scp->mask |= CM_SCACHEMASK_LENGTH;
2911 else if (LargeIntegerGreaterThan(*sizep, scp->length)) {
2913 * Really extending the file so must check to see if we
2914 * have sufficient quota. cm_IsSpaceAvailable() obtains
2915 * the cm_scache.rw lock on the volume root directory.
2916 * vnode 1 < scp->fid.vnode therefore calling cm_IsSpaceAvailable
2917 * while holding scp->rw is a lock order violation.
2918 * Dropping it is ok because we are holding scp->bufCreateLock
2919 * which prevents the size of the file from changing.
2921 afs_uint64 nextChunk = scp->length.QuadPart;
2923 nextChunk -= (nextChunk & 0xFFFFF);
2924 nextChunk += 0x100000;
2926 if (sizep->QuadPart > nextChunk) {
2927 lock_ReleaseWrite(&scp->rw);
2928 available = cm_IsSpaceAvailable(&scp->fid, sizep, userp, reqp);
2929 lock_ObtainWrite(&scp->rw);
2932 * The file server permits 1MB quota overruns so only check
2933 * when the file size increases by at least that much.
2938 scp->length = *sizep;
2939 scp->mask |= CM_SCACHEMASK_LENGTH;
2941 code = CM_ERROR_SPACE;
2946 /* done successfully */
2950 cm_SyncOpDone(scp, NULL,
2951 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS
2952 | CM_SCACHESYNC_SETSTATUS | CM_SCACHESYNC_SETSIZE);
2955 lock_ReleaseWrite(&scp->rw);
2956 lock_ReleaseWrite(&scp->bufCreateLock);
2961 /* set the file size or other attributes (but not both at once) */
2962 long cm_SetAttr(cm_scache_t *scp, cm_attr_t *attrp, cm_user_t *userp,
2966 AFSFetchStatus afsOutStatus;
2970 AFSStoreStatus afsInStatus;
2971 struct rx_connection * rxconnp;
2973 memset(&volSync, 0, sizeof(volSync));
2975 /* handle file length setting */
2976 if (attrp->mask & CM_ATTRMASK_LENGTH)
2977 return cm_SetLength(scp, &attrp->length, userp, reqp);
2979 lock_ObtainWrite(&scp->rw);
2980 /* Check for RO volume */
2981 if (scp->flags & CM_SCACHEFLAG_RO) {
2982 code = CM_ERROR_READONLY;
2983 lock_ReleaseWrite(&scp->rw);
2987 /* otherwise, we have to make an RPC to get the status */
2988 code = cm_SyncOp(scp, NULL, userp, reqp, 0, CM_SCACHESYNC_STORESTATUS);
2990 lock_ReleaseWrite(&scp->rw);
2993 lock_ConvertWToR(&scp->rw);
2995 /* make the attr structure */
2996 cm_StatusFromAttr(&afsInStatus, scp, attrp);
2998 tfid.Volume = scp->fid.volume;
2999 tfid.Vnode = scp->fid.vnode;
3000 tfid.Unique = scp->fid.unique;
3001 lock_ReleaseRead(&scp->rw);
3003 /* now make the RPC */
3004 InterlockedIncrement(&scp->activeRPCs);
3006 osi_Log1(afsd_logp, "CALL StoreStatus scp 0x%p", scp);
3008 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
3012 rxconnp = cm_GetRxConn(connp);
3013 code = RXAFS_StoreStatus(rxconnp, &tfid,
3014 &afsInStatus, &afsOutStatus, &volSync);
3015 rx_PutConnection(rxconnp);
3017 } while (cm_Analyze(connp, userp, reqp,
3018 &scp->fid, NULL, 1, &afsOutStatus, &volSync, NULL, NULL, code));
3019 code = cm_MapRPCError(code, reqp);
3022 osi_Log1(afsd_logp, "CALL StoreStatus FAILURE, code 0x%x", code);
3024 osi_Log0(afsd_logp, "CALL StoreStatus SUCCESS");
3026 lock_ObtainWrite(&scp->rw);
3028 code = cm_MergeStatus( NULL, scp, &afsOutStatus, &volSync, userp, reqp,
3029 CM_MERGEFLAG_FORCE|CM_MERGEFLAG_STOREDATA);
3031 InterlockedDecrement(&scp->activeRPCs);
3032 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_STORESTATUS);
3034 /* if we're changing the mode bits, discard the ACL cache,
3035 * since we changed the mode bits.
3037 if (afsInStatus.Mask & AFS_SETMODE)
3038 cm_FreeAllACLEnts(scp);
3039 lock_ReleaseWrite(&scp->rw);
3043 long cm_Create(cm_scache_t *dscp, clientchar_t *cnamep, long flags, cm_attr_t *attrp,
3044 cm_scache_t **scpp, cm_user_t *userp, cm_req_t *reqp)
3049 cm_callbackRequest_t cbReq;
3052 cm_scache_t *scp = NULL;
3055 AFSStoreStatus inStatus;
3056 AFSFetchStatus updatedDirStatus;
3057 AFSFetchStatus newFileStatus;
3058 AFSCallBack newFileCallback;
3060 struct rx_connection * rxconnp;
3062 fschar_t * fnamep = NULL;
3064 memset(&volSync, 0, sizeof(volSync));
3066 /* can't create names with @sys in them; must expand it manually first.
3067 * return "invalid request" if they try.
3069 if (cm_ExpandSysName(NULL, cnamep, NULL, 0, 0)) {
3070 return CM_ERROR_ATSYS;
3073 #ifdef AFS_FREELANCE_CLIENT
3074 /* Freelance root volume does not hold files */
3075 if (cm_freelanceEnabled &&
3076 dscp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
3077 dscp->fid.volume==AFS_FAKE_ROOT_VOL_ID )
3079 return CM_ERROR_NOACCESS;
3081 #endif /* AFS_FREELANCE_CLIENT */
3083 /* Check for RO volume */
3084 if (dscp->flags & CM_SCACHEFLAG_RO)
3085 return CM_ERROR_READONLY;
3087 /* before starting the RPC, mark that we're changing the file data, so
3088 * that someone who does a chmod will know to wait until our call
3091 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, CM_DIROP_FLAG_NONE,
3093 lock_ObtainWrite(&dscp->rw);
3094 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
3095 lock_ReleaseWrite(&dscp->rw);
3097 cm_StartCallbackGrantingCall(NULL, &cbReq);
3099 cm_EndDirOp(&dirop);
3106 fnamep = cm_ClientStringToFsStringAlloc(cnamep, -1, NULL);
3108 cm_StatusFromAttr(&inStatus, NULL, attrp);
3110 /* try the RPC now */
3111 InterlockedIncrement(&dscp->activeRPCs);
3112 osi_Log1(afsd_logp, "CALL CreateFile scp 0x%p", dscp);
3114 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
3118 dirAFSFid.Volume = dscp->fid.volume;
3119 dirAFSFid.Vnode = dscp->fid.vnode;
3120 dirAFSFid.Unique = dscp->fid.unique;
3122 rxconnp = cm_GetRxConn(connp);
3123 code = RXAFS_CreateFile(connp->rxconnp, &dirAFSFid, fnamep,
3124 &inStatus, &newAFSFid, &newFileStatus,
3125 &updatedDirStatus, &newFileCallback,
3127 rx_PutConnection(rxconnp);
3129 } while (cm_Analyze(connp, userp, reqp,
3130 &dscp->fid, NULL, 1, &updatedDirStatus, &volSync, NULL, &cbReq, code));
3131 code = cm_MapRPCError(code, reqp);
3134 osi_Log1(afsd_logp, "CALL CreateFile FAILURE, code 0x%x", code);
3136 osi_Log0(afsd_logp, "CALL CreateFile SUCCESS");
3139 lock_ObtainWrite(&dirop.scp->dirlock);
3140 dirop.lockType = CM_DIRLOCK_WRITE;
3142 lock_ObtainWrite(&dscp->rw);
3144 code = cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, reqp, CM_MERGEFLAG_DIROP);
3145 cm_SetFid(&newFid, dscp->fid.cell, dscp->fid.volume, newAFSFid.Vnode, newAFSFid.Unique);
3146 if (cm_CheckDirOpForSingleChange(&dirop)) {
3147 lock_ReleaseWrite(&dscp->rw);
3148 cm_DirCreateEntry(&dirop, fnamep, &newFid);
3150 cm_BPlusDirCreateEntry(&dirop, cnamep, &newFid);
3152 lock_ObtainWrite(&dscp->rw);
3155 InterlockedDecrement(&dscp->activeRPCs);
3157 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
3158 lock_ReleaseWrite(&dscp->rw);
3160 /* now try to create the file's entry, too, but be careful to
3161 * make sure that we don't merge in old info. Since we weren't locking
3162 * out any requests during the file's creation, we may have pretty old
3166 code = cm_GetSCache(&newFid, &dscp->fid, &scp, userp, reqp);
3168 lock_ObtainWrite(&scp->rw);
3169 scp->creator = userp; /* remember who created it */
3170 if (!cm_HaveCallback(scp)) {
3171 lostRace = cm_EndCallbackGrantingCall(scp, &cbReq,
3172 &newFileCallback, &volSync, 0);
3174 InterlockedIncrement(&scp->activeRPCs);
3175 code = cm_MergeStatus( dscp, scp, &newFileStatus, &volSync,
3180 lock_ReleaseWrite(&scp->rw);
3184 /* make sure we end things properly */
3186 cm_EndCallbackGrantingCall(NULL, &cbReq, NULL, NULL, 0);
3188 cm_EndDirOp(&dirop);
3197 cm_ReleaseSCache(scp);
3203 * locked if TRUE means write-locked
3204 * else the cm_scache_t rw must not be held
3206 long cm_FSync(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp, afs_uint32 locked)
3211 lock_ReleaseWrite(&scp->rw);
3213 osi_Log2(afsd_logp, "cm_FSync scp 0x%p userp 0x%p", scp, userp);
3215 code = buf_CleanVnode(scp, userp, reqp);
3217 lock_ObtainWrite(&scp->rw);
3219 if (scp->mask & (CM_SCACHEMASK_TRUNCPOS
3220 | CM_SCACHEMASK_CLIENTMODTIME
3221 | CM_SCACHEMASK_LENGTH))
3222 code = cm_StoreMini(scp, userp, reqp);
3224 if (scp->flags & (CM_SCACHEFLAG_OVERQUOTA | CM_SCACHEFLAG_OUTOFSPACE)) {
3225 code = (scp->flags & CM_SCACHEFLAG_OVERQUOTA) ? CM_ERROR_QUOTA : CM_ERROR_SPACE;
3226 scp->flags &= ~(CM_SCACHEFLAG_OVERQUOTA | CM_SCACHEFLAG_OUTOFSPACE);
3230 lock_ReleaseWrite(&scp->rw);
3231 } else if (locked) {
3232 lock_ObtainWrite(&scp->rw);
3237 long cm_MakeDir(cm_scache_t *dscp, clientchar_t *cnamep, long flags, cm_attr_t *attrp,
3238 cm_user_t *userp, cm_req_t *reqp, cm_scache_t **scpp)
3243 cm_callbackRequest_t cbReq;
3246 cm_scache_t *scp = NULL;
3249 AFSStoreStatus inStatus;
3250 AFSFetchStatus updatedDirStatus;
3251 AFSFetchStatus newDirStatus;
3252 AFSCallBack newDirCallback;
3254 struct rx_connection * rxconnp;
3256 fschar_t * fnamep = NULL;
3258 memset(&volSync, 0, sizeof(volSync));
3260 /* can't create names with @sys in them; must expand it manually first.
3261 * return "invalid request" if they try.
3263 if (cm_ExpandSysName(NULL, cnamep, NULL, 0, 0)) {
3264 return CM_ERROR_ATSYS;
3267 #ifdef AFS_FREELANCE_CLIENT
3268 /* Freelance root volume does not hold subdirectories */
3269 if (cm_freelanceEnabled &&
3270 dscp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
3271 dscp->fid.volume==AFS_FAKE_ROOT_VOL_ID )
3273 return CM_ERROR_NOACCESS;
3275 #endif /* AFS_FREELANCE_CLIENT */
3277 /* Check for RO volume */
3278 if (dscp->flags & CM_SCACHEFLAG_RO)
3279 return CM_ERROR_READONLY;
3281 /* before starting the RPC, mark that we're changing the directory
3282 * data, so that someone who does a chmod on the dir will wait until
3283 * our call completes.
3285 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, CM_DIROP_FLAG_NONE,
3287 lock_ObtainWrite(&dscp->rw);
3288 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
3289 lock_ReleaseWrite(&dscp->rw);
3291 cm_StartCallbackGrantingCall(NULL, &cbReq);
3293 cm_EndDirOp(&dirop);
3300 fnamep = cm_ClientStringToFsStringAlloc(cnamep, -1, NULL);
3301 cm_StatusFromAttr(&inStatus, NULL, attrp);
3303 /* try the RPC now */
3304 InterlockedIncrement(&dscp->activeRPCs);
3305 osi_Log1(afsd_logp, "CALL MakeDir scp 0x%p", dscp);
3307 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
3311 dirAFSFid.Volume = dscp->fid.volume;
3312 dirAFSFid.Vnode = dscp->fid.vnode;
3313 dirAFSFid.Unique = dscp->fid.unique;
3315 rxconnp = cm_GetRxConn(connp);
3316 code = RXAFS_MakeDir(connp->rxconnp, &dirAFSFid, fnamep,
3317 &inStatus, &newAFSFid, &newDirStatus,
3318 &updatedDirStatus, &newDirCallback,
3320 rx_PutConnection(rxconnp);
3322 } while (cm_Analyze(connp, userp, reqp,
3323 &dscp->fid, NULL, 1, &updatedDirStatus, &volSync, NULL, &cbReq, code));
3324 code = cm_MapRPCError(code, reqp);
3327 osi_Log1(afsd_logp, "CALL MakeDir FAILURE, code 0x%x", code);
3329 osi_Log0(afsd_logp, "CALL MakeDir SUCCESS");
3332 lock_ObtainWrite(&dirop.scp->dirlock);
3333 dirop.lockType = CM_DIRLOCK_WRITE;
3335 lock_ObtainWrite(&dscp->rw);
3337 code = cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, reqp, CM_MERGEFLAG_DIROP);
3338 cm_SetFid(&newFid, dscp->fid.cell, dscp->fid.volume, newAFSFid.Vnode, newAFSFid.Unique);
3339 if (cm_CheckDirOpForSingleChange(&dirop)) {
3340 lock_ReleaseWrite(&dscp->rw);
3341 cm_DirCreateEntry(&dirop, fnamep, &newFid);
3343 cm_BPlusDirCreateEntry(&dirop, cnamep, &newFid);
3345 lock_ObtainWrite(&dscp->rw);
3348 InterlockedDecrement(&dscp->activeRPCs);
3350 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
3351 lock_ReleaseWrite(&dscp->rw);
3353 /* now try to create the new dir's entry, too, but be careful to
3354 * make sure that we don't merge in old info. Since we weren't locking
3355 * out any requests during the file's creation, we may have pretty old
3359 code = cm_GetSCache(&newFid, &dscp->fid, &scp, userp, reqp);
3361 lock_ObtainWrite(&scp->rw);
3362 if (!cm_HaveCallback(scp)) {
3363 lostRace = cm_EndCallbackGrantingCall(scp, &cbReq,
3364 &newDirCallback, &volSync, 0);
3366 InterlockedIncrement(&scp->activeRPCs);
3367 code = cm_MergeStatus( dscp, scp, &newDirStatus, &volSync,
3372 lock_ReleaseWrite(&scp->rw);
3376 /* make sure we end things properly */
3378 cm_EndCallbackGrantingCall(NULL, &cbReq, NULL, NULL, 0);
3380 cm_EndDirOp(&dirop);
3388 cm_ReleaseSCache(scp);
3391 /* and return error code */
3395 long cm_Link(cm_scache_t *dscp, clientchar_t *cnamep, cm_scache_t *sscp, long flags,
3396 cm_user_t *userp, cm_req_t *reqp)
3401 AFSFid existingAFSFid;
3402 AFSFetchStatus updatedDirStatus;
3403 AFSFetchStatus newLinkStatus;
3405 struct rx_connection * rxconnp;
3407 fschar_t * fnamep = NULL;
3410 memset(&volSync, 0, sizeof(volSync));
3412 if (dscp->fid.cell != sscp->fid.cell ||
3413 dscp->fid.volume != sscp->fid.volume) {
3414 return CM_ERROR_CROSSDEVLINK;
3417 /* Check for RO volume */
3418 if (dscp->flags & CM_SCACHEFLAG_RO)
3419 return CM_ERROR_READONLY;
3421 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, CM_DIROP_FLAG_NONE,
3423 lock_ObtainWrite(&dscp->rw);
3424 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
3425 lock_ReleaseWrite(&dscp->rw);
3427 cm_EndDirOp(&dirop);
3432 fnamep = cm_ClientStringToFsStringAlloc(cnamep, -1, NULL);
3434 /* try the RPC now */
3435 InterlockedIncrement(&dscp->activeRPCs);
3436 osi_Log1(afsd_logp, "CALL Link scp 0x%p", dscp);
3438 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
3441 dirAFSFid.Volume = dscp->fid.volume;
3442 dirAFSFid.Vnode = dscp->fid.vnode;
3443 dirAFSFid.Unique = dscp->fid.unique;
3445 existingAFSFid.Volume = sscp->fid.volume;
3446 existingAFSFid.Vnode = sscp->fid.vnode;
3447 existingAFSFid.Unique = sscp->fid.unique;
3449 rxconnp = cm_GetRxConn(connp);
3450 code = RXAFS_Link(rxconnp, &dirAFSFid, fnamep, &existingAFSFid,
3451 &newLinkStatus, &updatedDirStatus, &volSync);
3452 rx_PutConnection(rxconnp);
3453 osi_Log1(afsd_logp," RXAFS_Link returns 0x%x", code);
3455 } while (cm_Analyze(connp, userp, reqp, &dscp->fid, NULL, 1, &updatedDirStatus, &volSync, NULL, NULL, code));
3457 code = cm_MapRPCError(code, reqp);
3460 osi_Log1(afsd_logp, "CALL Link FAILURE, code 0x%x", code);
3462 osi_Log0(afsd_logp, "CALL Link SUCCESS");
3465 lock_ObtainWrite(&dirop.scp->dirlock);
3466 dirop.lockType = CM_DIRLOCK_WRITE;
3468 lock_ObtainWrite(&dscp->rw);
3470 code = cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, reqp, CM_MERGEFLAG_DIROP);
3473 if (cm_CheckDirOpForSingleChange(&dirop)) {
3474 lock_ReleaseWrite(&dscp->rw);
3475 cm_DirCreateEntry(&dirop, fnamep, &sscp->fid);
3477 cm_BPlusDirCreateEntry(&dirop, cnamep, &sscp->fid);
3479 lock_ObtainWrite(&dscp->rw);
3482 InterlockedDecrement(&dscp->activeRPCs);
3484 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
3485 lock_ReleaseWrite(&dscp->rw);
3487 cm_EndDirOp(&dirop);
3489 if (invalidate && RDR_Initialized)
3490 RDR_InvalidateObject(dscp->fid.cell, dscp->fid.volume, dscp->fid.vnode,
3491 dscp->fid.unique, dscp->fid.hash,
3492 dscp->fileType, AFS_INVALIDATE_DATA_VERSION);
3494 /* Update the linked object status */
3496 lock_ObtainWrite(&sscp->rw);
3497 InterlockedIncrement(&sscp->activeRPCs);
3498 code = cm_MergeStatus(NULL, sscp, &newLinkStatus, &volSync, userp, reqp, 0);
3499 lock_ReleaseWrite(&sscp->rw);
3507 long cm_SymLink(cm_scache_t *dscp, clientchar_t *cnamep, fschar_t *contentsp, long flags,
3508 cm_attr_t *attrp, cm_user_t *userp, cm_req_t *reqp, cm_scache_t **scpp)
3516 AFSStoreStatus inStatus;
3517 AFSFetchStatus updatedDirStatus;
3518 AFSFetchStatus newLinkStatus;
3520 struct rx_connection * rxconnp;
3522 fschar_t *fnamep = NULL;
3527 /* Check for RO volume */
3528 if (dscp->flags & CM_SCACHEFLAG_RO)
3529 return CM_ERROR_READONLY;
3531 memset(&volSync, 0, sizeof(volSync));
3533 /* before starting the RPC, mark that we're changing the directory data,
3534 * so that someone who does a chmod on the dir will wait until our
3537 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, CM_DIROP_FLAG_NONE,
3539 lock_ObtainWrite(&dscp->rw);
3540 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
3541 lock_ReleaseWrite(&dscp->rw);
3543 cm_EndDirOp(&dirop);
3548 fnamep = cm_ClientStringToFsStringAlloc(cnamep, -1, NULL);
3550 cm_StatusFromAttr(&inStatus, NULL, attrp);
3552 /* try the RPC now */
3553 InterlockedIncrement(&dscp->activeRPCs);
3554 osi_Log1(afsd_logp, "CALL Symlink scp 0x%p", dscp);
3556 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
3560 dirAFSFid.Volume = dscp->fid.volume;
3561 dirAFSFid.Vnode = dscp->fid.vnode;
3562 dirAFSFid.Unique = dscp->fid.unique;
3564 rxconnp = cm_GetRxConn(connp);
3565 code = RXAFS_Symlink(rxconnp, &dirAFSFid, fnamep, contentsp,
3566 &inStatus, &newAFSFid, &newLinkStatus,
3567 &updatedDirStatus, &volSync);
3568 rx_PutConnection(rxconnp);
3570 } while (cm_Analyze(connp, userp, reqp,
3571 &dscp->fid, NULL, 1, &updatedDirStatus, &volSync, NULL, NULL, code));
3572 code = cm_MapRPCError(code, reqp);
3575 osi_Log1(afsd_logp, "CALL Symlink FAILURE, code 0x%x", code);
3577 osi_Log0(afsd_logp, "CALL Symlink SUCCESS");
3580 lock_ObtainWrite(&dirop.scp->dirlock);
3581 dirop.lockType = CM_DIRLOCK_WRITE;
3583 lock_ObtainWrite(&dscp->rw);
3585 code = cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, reqp, CM_MERGEFLAG_DIROP);
3586 cm_SetFid(&newFid, dscp->fid.cell, dscp->fid.volume, newAFSFid.Vnode, newAFSFid.Unique);
3587 if (cm_CheckDirOpForSingleChange(&dirop)) {
3588 lock_ReleaseWrite(&dscp->rw);
3589 cm_SetFid(&newFid, dscp->fid.cell, dscp->fid.volume, newAFSFid.Vnode, newAFSFid.Unique);
3591 cm_DirCreateEntry(&dirop, fnamep, &newFid);
3593 cm_BPlusDirCreateEntry(&dirop, cnamep, &newFid);
3595 lock_ObtainWrite(&dscp->rw);
3598 InterlockedDecrement(&dscp->activeRPCs);
3600 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
3601 lock_ReleaseWrite(&dscp->rw);
3603 cm_EndDirOp(&dirop);
3605 /* now try to create the new dir's entry, too, but be careful to
3606 * make sure that we don't merge in old info. Since we weren't locking
3607 * out any requests during the file's creation, we may have pretty old
3611 code = cm_GetSCache(&newFid, &dscp->fid, &scp, userp, reqp);
3613 lock_ObtainWrite(&scp->rw);
3614 if (!cm_HaveCallback(scp)) {
3615 InterlockedIncrement(&scp->activeRPCs);
3616 code = cm_MergeStatus( dscp, scp, &newLinkStatus, &volSync,
3619 lock_ReleaseWrite(&scp->rw);
3624 cm_ReleaseSCache(scp);
3631 /* and return error code */
3635 /*! \brief Remove a directory
3637 Encapsulates a call to RXAFS_RemoveDir().
3639 \param[in] dscp cm_scache_t for the directory containing the
3640 directory to be removed.
3642 \param[in] fnamep This will be the original name of the directory
3643 as known to the file server. It will be passed in to RXAFS_RemoveDir().
3644 This parameter is optional. If it is not provided the value
3647 \param[in] cnamep Normalized name used to update the local
3650 \param[in] userp cm_user_t for the request.
3652 \param[in] reqp Request tracker.
3654 long cm_RemoveDir(cm_scache_t *dscp, fschar_t *fnamep, clientchar_t *cnamep, cm_user_t *userp, cm_req_t *reqp)
3660 AFSFetchStatus updatedDirStatus;
3662 struct rx_connection * rxconnp;
3664 cm_scache_t *scp = NULL;
3665 int free_fnamep = FALSE;
3667 memset(&volSync, 0, sizeof(volSync));
3669 if (fnamep == NULL) {
3672 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ,
3673 CM_DIROP_FLAG_NONE, &dirop);
3675 code = cm_BPlusDirLookupOriginalName(&dirop, cnamep, &fnamep);
3678 cm_EndDirOp(&dirop);
3685 code = cm_Lookup(dscp, cnamep, CM_FLAG_NOMOUNTCHASE, userp, reqp, &scp);
3689 /* Check for RO volume */
3690 if (dscp->flags & CM_SCACHEFLAG_RO) {
3691 code = CM_ERROR_READONLY;
3695 /* before starting the RPC, mark that we're changing the directory data,
3696 * so that someone who does a chmod on the dir will wait until our
3699 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, CM_DIROP_FLAG_NONE,
3701 lock_ObtainWrite(&dscp->rw);
3702 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
3703 lock_ReleaseWrite(&dscp->rw);
3705 cm_EndDirOp(&dirop);
3710 /* try the RPC now */
3711 InterlockedIncrement(&dscp->activeRPCs);
3712 osi_Log1(afsd_logp, "CALL RemoveDir scp 0x%p", dscp);
3714 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
3718 dirAFSFid.Volume = dscp->fid.volume;
3719 dirAFSFid.Vnode = dscp->fid.vnode;
3720 dirAFSFid.Unique = dscp->fid.unique;
3722 rxconnp = cm_GetRxConn(connp);
3723 code = RXAFS_RemoveDir(rxconnp, &dirAFSFid, fnamep,
3724 &updatedDirStatus, &volSync);
3725 rx_PutConnection(rxconnp);
3727 } while (cm_Analyze(connp, userp, reqp,
3728 &dscp->fid, NULL, 1, &updatedDirStatus, &volSync, NULL, NULL, code));
3729 code = cm_MapRPCErrorRmdir(code, reqp);
3732 osi_Log1(afsd_logp, "CALL RemoveDir FAILURE, code 0x%x", code);
3734 osi_Log0(afsd_logp, "CALL RemoveDir SUCCESS");
3737 lock_ObtainWrite(&dirop.scp->dirlock);
3738 dirop.lockType = CM_DIRLOCK_WRITE;
3740 lock_ObtainWrite(&dscp->rw);
3742 cm_dnlcRemove(dscp, cnamep);
3743 code = cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, reqp, CM_MERGEFLAG_DIROP);
3744 if (cm_CheckDirOpForSingleChange(&dirop) && cnamep != NULL) {
3745 lock_ReleaseWrite(&dscp->rw);
3746 cm_DirDeleteEntry(&dirop, fnamep);
3748 cm_BPlusDirDeleteEntry(&dirop, cnamep);
3750 lock_ObtainWrite(&dscp->rw);
3753 InterlockedDecrement(&dscp->activeRPCs);
3755 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
3756 lock_ReleaseWrite(&dscp->rw);
3758 cm_EndDirOp(&dirop);
3762 lock_ObtainWrite(&scp->rw);
3763 _InterlockedOr(&scp->flags, CM_SCACHEFLAG_DELETED);
3764 lock_ObtainWrite(&cm_scacheLock);
3765 cm_AdjustScacheLRU(scp);
3766 lock_ReleaseWrite(&cm_scacheLock);
3767 lock_ReleaseWrite(&scp->rw);
3768 if (RDR_Initialized && !(reqp->flags & CM_REQ_SOURCE_REDIR))
3769 RDR_InvalidateObject(scp->fid.cell, scp->fid.volume, scp->fid.vnode,
3770 scp->fid.unique, scp->fid.hash,
3771 scp->fileType, AFS_INVALIDATE_DELETED);
3773 cm_ReleaseSCache(scp);
3780 /* and return error code */
3784 long cm_Open(cm_scache_t *scp, int type, cm_user_t *userp)
3786 /* grab mutex on contents */
3787 lock_ObtainWrite(&scp->rw);
3789 /* reset the prefetch info */
3790 scp->prefetch.base.LowPart = 0; /* base */
3791 scp->prefetch.base.HighPart = 0;
3792 scp->prefetch.end.LowPart = 0; /* and end */
3793 scp->prefetch.end.HighPart = 0;
3795 /* release mutex on contents */
3796 lock_ReleaseWrite(&scp->rw);
3802 /*! \brief Rename a file or directory
3804 Encapsulates a RXAFS_Rename() call.
3806 \param[in] oldDscp cm_scache_t for the directory containing the old
3809 \param[in] oldNamep The original old name known to the file server.
3810 This is the name that will be passed into the RXAFS_Rename().
3811 If it is not provided, it will be looked up.
3813 \param[in] normalizedOldNamep Normalized old name. This is used for
3814 updating local directory caches.
3816 \param[in] newDscp cm_scache_t for the directory containing the new
3819 \param[in] newNamep New name. Normalized.
3821 \param[in] userp cm_user_t for the request.
3823 \param[in,out] reqp Request tracker.
3826 long cm_Rename(cm_scache_t *oldDscp, fschar_t *oldNamep, clientchar_t *cOldNamep,
3827 cm_scache_t *newDscp, clientchar_t *cNewNamep, cm_user_t *userp,
3832 AFSFid oldDirAFSFid;
3833 AFSFid newDirAFSFid;
3834 AFSFetchStatus updatedOldDirStatus;
3835 AFSFetchStatus updatedNewDirStatus;
3838 int bTargetExists = 0;
3839 struct rx_connection * rxconnp;
3840 cm_dirOp_t oldDirOp;
3843 cm_dirOp_t newDirOp;
3844 fschar_t * newNamep = NULL;
3845 int free_oldNamep = FALSE;
3846 cm_scache_t *oldScp = NULL, *oldTargetScp = NULL;
3847 int rpc_skipped = 0;
3849 memset(&volSync, 0, sizeof(volSync));
3851 if (cOldNamep == NULL || cNewNamep == NULL ||
3852 cm_ClientStrLen(cOldNamep) == 0 ||
3853 cm_ClientStrLen(cNewNamep) == 0)
3854 return CM_ERROR_INVAL;
3856 /* check for identical names */
3857 if (oldDscp == newDscp &&
3858 cm_ClientStrCmp(cOldNamep, cNewNamep) == 0) {
3859 osi_Log2(afsd_logp, "cm_Rename oldDscp 0x%p newDscp 0x%p CM_ERROR_RENAME_IDENTICAL",
3861 return CM_ERROR_RENAME_IDENTICAL;
3864 /* Check for RO volume */
3865 if ((oldDscp->flags & CM_SCACHEFLAG_RO) || (newDscp->flags & CM_SCACHEFLAG_RO)) {
3866 return CM_ERROR_READONLY;
3869 if (oldNamep == NULL) {
3872 code = cm_BeginDirOp(oldDscp, userp, reqp, CM_DIRLOCK_READ,
3873 CM_DIROP_FLAG_NONE, &oldDirOp);
3875 code = cm_BPlusDirLookupOriginalName(&oldDirOp, cOldNamep, &oldNamep);
3877 free_oldNamep = TRUE;
3878 cm_EndDirOp(&oldDirOp);
3882 osi_Log2(afsd_logp, "cm_Rename oldDscp 0x%p cOldName %S Original Name lookup failed",
3883 oldDscp, osi_LogSaveStringW(afsd_logp, cOldNamep));
3888 /* before starting the RPC, mark that we're changing the directory data,
3889 * so that someone who does a chmod on the dir will wait until our call
3890 * completes. We do this in vnode order so that we don't deadlock,
3891 * which makes the code a little verbose.
3893 if (oldDscp == newDscp) {
3895 cm_BeginDirOp(oldDscp, userp, reqp, CM_DIRLOCK_NONE,
3896 CM_DIROP_FLAG_NONE, &oldDirOp);
3897 lock_ObtainWrite(&oldDscp->rw);
3898 cm_dnlcRemove(oldDscp, cOldNamep);
3899 cm_dnlcRemove(oldDscp, cNewNamep);
3900 code = cm_SyncOp(oldDscp, NULL, userp, reqp, 0,
3901 CM_SCACHESYNC_STOREDATA);
3902 lock_ReleaseWrite(&oldDscp->rw);
3904 cm_EndDirOp(&oldDirOp);
3908 /* two distinct dir vnodes */
3910 if (oldDscp->fid.cell != newDscp->fid.cell ||
3911 oldDscp->fid.volume != newDscp->fid.volume) {
3912 osi_Log2(afsd_logp, "cm_Rename oldDscp 0x%p newDscp 0x%p CM_ERROR_CROSSDEVLINK",
3914 code = CM_ERROR_CROSSDEVLINK;
3918 /* shouldn't happen that we have distinct vnodes for two
3919 * different files, but could due to deliberate attack, or
3920 * stale info. Avoid deadlocks and quit now.
3922 if (oldDscp->fid.vnode == newDscp->fid.vnode) {
3923 osi_Log2(afsd_logp, "cm_Rename oldDscp 0x%p newDscp 0x%p vnode collision",
3925 code = CM_ERROR_CROSSDEVLINK;
3929 if (oldDscp->fid.vnode < newDscp->fid.vnode) {
3930 cm_BeginDirOp(oldDscp, userp, reqp, CM_DIRLOCK_NONE,
3931 CM_DIROP_FLAG_NONE, &oldDirOp);
3932 lock_ObtainWrite(&oldDscp->rw);
3933 cm_dnlcRemove(oldDscp, cOldNamep);
3934 code = cm_SyncOp(oldDscp, NULL, userp, reqp, 0,
3935 CM_SCACHESYNC_STOREDATA);
3936 lock_ReleaseWrite(&oldDscp->rw);
3938 cm_EndDirOp(&oldDirOp);
3940 cm_BeginDirOp(newDscp, userp, reqp, CM_DIRLOCK_NONE,
3941 CM_DIROP_FLAG_NONE, &newDirOp);
3942 lock_ObtainWrite(&newDscp->rw);
3943 cm_dnlcRemove(newDscp, cNewNamep);
3944 code = cm_SyncOp(newDscp, NULL, userp, reqp, 0,
3945 CM_SCACHESYNC_STOREDATA);
3946 lock_ReleaseWrite(&newDscp->rw);
3948 cm_EndDirOp(&newDirOp);
3950 /* cleanup first one */
3951 lock_ObtainWrite(&oldDscp->rw);
3952 cm_SyncOpDone(oldDscp, NULL,
3953 CM_SCACHESYNC_STOREDATA);
3954 lock_ReleaseWrite(&oldDscp->rw);
3955 cm_EndDirOp(&oldDirOp);
3960 /* lock the new vnode entry first */
3961 cm_BeginDirOp(newDscp, userp, reqp, CM_DIRLOCK_NONE,
3962 CM_DIROP_FLAG_NONE, &newDirOp);
3963 lock_ObtainWrite(&newDscp->rw);
3964 cm_dnlcRemove(newDscp, cNewNamep);
3965 code = cm_SyncOp(newDscp, NULL, userp, reqp, 0,
3966 CM_SCACHESYNC_STOREDATA);
3967 lock_ReleaseWrite(&newDscp->rw);
3969 cm_EndDirOp(&newDirOp);
3971 cm_BeginDirOp(oldDscp, userp, reqp, CM_DIRLOCK_NONE,
3972 CM_DIROP_FLAG_NONE, &oldDirOp);
3973 lock_ObtainWrite(&oldDscp->rw);
3974 cm_dnlcRemove(oldDscp, cOldNamep);
3975 code = cm_SyncOp(oldDscp, NULL, userp, reqp, 0,
3976 CM_SCACHESYNC_STOREDATA);
3977 lock_ReleaseWrite(&oldDscp->rw);
3979 cm_EndDirOp(&oldDirOp);
3981 /* cleanup first one */
3982 lock_ObtainWrite(&newDscp->rw);
3983 cm_SyncOpDone(newDscp, NULL,
3984 CM_SCACHESYNC_STOREDATA);
3985 lock_ReleaseWrite(&newDscp->rw);
3986 cm_EndDirOp(&newDirOp);
3990 } /* two distinct vnodes */
3996 * The source and destination directories are now locked and no other local
3997 * changes can occur.
3999 * Before we permit the operation, make sure that we do not already have
4000 * an object in the destination directory that has a case-insensitive match
4001 * for this name UNLESS the matching object is the object we are renaming.
4003 code = cm_Lookup(oldDscp, cOldNamep, 0, userp, reqp, &oldScp);
4005 osi_Log2(afsd_logp, "cm_Rename oldDscp 0x%p cOldName %S old name lookup failed",
4006 oldDscp, osi_LogSaveStringW(afsd_logp, cOldNamep));
4011 /* Case sensitive lookup. If this succeeds we are done. */
4012 code = cm_Lookup(newDscp, cNewNamep, 0, userp, reqp, &oldTargetScp);
4015 * Case insensitive lookup. If this succeeds, it could have found the
4016 * same file with a name that differs only by case or it could be a
4017 * different file entirely.
4019 code = cm_Lookup(newDscp, cNewNamep, CM_FLAG_CASEFOLD, userp, reqp, &oldTargetScp);
4021 /* found a matching object with the new name */
4022 if (cm_FidCmp(&oldScp->fid, &oldTargetScp->fid)) {
4023 /* and they don't match so return an error */
4024 osi_Log2(afsd_logp, "cm_Rename newDscp 0x%p cNewName %S new name already exists",
4025 newDscp, osi_LogSaveStringW(afsd_logp, cNewNamep));
4026 code = CM_ERROR_EXISTS;
4028 cm_ReleaseSCache(oldTargetScp);
4029 oldTargetScp = NULL;
4030 } else if (code == CM_ERROR_AMBIGUOUS_FILENAME) {
4031 code = CM_ERROR_EXISTS;
4033 /* The target does not exist. Clear the error and perform the rename. */
4045 newNamep = cm_ClientStringToFsStringAlloc(cNewNamep, -1, NULL);
4047 /* try the RPC now */
4048 InterlockedIncrement(&oldDscp->activeRPCs);
4050 InterlockedIncrement(&newDscp->activeRPCs);
4051 osi_Log2(afsd_logp, "CALL Rename old scp 0x%p new scp 0x%p",
4054 code = cm_ConnFromFID(&oldDscp->fid, userp, reqp, &connp);
4058 oldDirAFSFid.Volume = oldDscp->fid.volume;
4059 oldDirAFSFid.Vnode = oldDscp->fid.vnode;
4060 oldDirAFSFid.Unique = oldDscp->fid.unique;
4061 newDirAFSFid.Volume = newDscp->fid.volume;
4062 newDirAFSFid.Vnode = newDscp->fid.vnode;
4063 newDirAFSFid.Unique = newDscp->fid.unique;
4065 rxconnp = cm_GetRxConn(connp);
4066 code = RXAFS_Rename(rxconnp, &oldDirAFSFid, oldNamep,
4067 &newDirAFSFid, newNamep,
4068 &updatedOldDirStatus, &updatedNewDirStatus,
4070 rx_PutConnection(rxconnp);
4072 } while (cm_Analyze(connp, userp, reqp, &oldDscp->fid, NULL, 1,
4073 &updatedOldDirStatus, &volSync, NULL, NULL, code));
4074 code = cm_MapRPCError(code, reqp);
4077 osi_Log1(afsd_logp, "CALL Rename FAILURE, code 0x%x", code);
4079 osi_Log0(afsd_logp, "CALL Rename SUCCESS");
4082 /* update the individual stat cache entries for the directories */
4084 lock_ObtainWrite(&oldDirOp.scp->dirlock);
4085 oldDirOp.lockType = CM_DIRLOCK_WRITE;
4088 lock_ObtainWrite(&oldDscp->rw);
4090 code = cm_MergeStatus( NULL, oldDscp, &updatedOldDirStatus, &volSync,
4091 userp, reqp, CM_MERGEFLAG_DIROP);
4092 if (cm_CheckDirOpForSingleChange(&oldDirOp)) {
4093 lock_ReleaseWrite(&oldDscp->rw);
4094 if (bTargetExists && oneDir) {
4095 diropCode = cm_DirDeleteEntry(&oldDirOp, newNamep);
4097 cm_BPlusDirDeleteEntry(&oldDirOp, cNewNamep);
4102 diropCode = cm_BPlusDirLookup(&oldDirOp, cOldNamep, &fileFid);
4103 if (diropCode == CM_ERROR_INEXACT_MATCH)
4105 else if (diropCode == EINVAL)
4107 diropCode = cm_DirLookup(&oldDirOp, oldNamep, &fileFid);
4109 if (diropCode == 0) {
4111 diropCode = cm_DirCreateEntry(&oldDirOp, newNamep, &fileFid);
4113 cm_BPlusDirCreateEntry(&oldDirOp, cNewNamep, &fileFid);
4117 if (diropCode == 0) {
4118 diropCode = cm_DirDeleteEntry(&oldDirOp, oldNamep);
4120 cm_BPlusDirDeleteEntry(&oldDirOp, cOldNamep);
4124 lock_ObtainWrite(&oldDscp->rw);
4128 InterlockedDecrement(&oldDscp->activeRPCs);
4130 cm_SyncOpDone(oldDscp, NULL, CM_SCACHESYNC_STOREDATA);
4131 lock_ReleaseWrite(&oldDscp->rw);
4133 cm_EndDirOp(&oldDirOp);
4135 /* and update it for the new one, too, if necessary */
4138 lock_ObtainWrite(&newDirOp.scp->dirlock);
4139 newDirOp.lockType = CM_DIRLOCK_WRITE;
4141 lock_ObtainWrite(&newDscp->rw);
4143 code = cm_MergeStatus( NULL, newDscp, &updatedNewDirStatus, &volSync,
4144 userp, reqp, CM_MERGEFLAG_DIROP);
4147 * we only make the local change if we successfully made
4148 * the change in the old directory AND there was only one
4149 * change in the new directory
4151 if (diropCode == 0 && cm_CheckDirOpForSingleChange(&newDirOp)) {
4152 lock_ReleaseWrite(&newDscp->rw);
4154 if (bTargetExists && !oneDir) {
4155 diropCode = cm_DirDeleteEntry(&newDirOp, newNamep);
4157 cm_BPlusDirDeleteEntry(&newDirOp, cNewNamep);
4161 cm_DirCreateEntry(&newDirOp, newNamep, &fileFid);
4163 cm_BPlusDirCreateEntry(&newDirOp, cNewNamep, &fileFid);
4165 lock_ObtainWrite(&newDscp->rw);
4169 InterlockedIncrement(&newDscp->activeRPCs);
4171 cm_SyncOpDone(newDscp, NULL, CM_SCACHESYNC_STOREDATA);
4172 lock_ReleaseWrite(&newDscp->rw);
4174 cm_EndDirOp(&newDirOp);
4179 * After the rename the file server has invalidated the callbacks
4180 * on the file that was moved and destroyed any target file.
4182 lock_ObtainWrite(&oldScp->rw);
4183 cm_DiscardSCache(oldScp);
4184 lock_ReleaseWrite(&oldScp->rw);
4186 if (RDR_Initialized)
4187 RDR_InvalidateObject(oldScp->fid.cell, oldScp->fid.volume, oldScp->fid.vnode, oldScp->fid.unique,
4188 oldScp->fid.hash, oldScp->fileType, AFS_INVALIDATE_CALLBACK);
4191 lock_ObtainWrite(&oldTargetScp->rw);
4192 cm_DiscardSCache(oldTargetScp);
4193 lock_ReleaseWrite(&oldTargetScp->rw);
4195 if (RDR_Initialized)
4196 RDR_InvalidateObject(oldTargetScp->fid.cell, oldTargetScp->fid.volume, oldTargetScp->fid.vnode, oldTargetScp->fid.unique,
4197 oldTargetScp->fid.hash, oldTargetScp->fileType, AFS_INVALIDATE_CALLBACK);
4203 cm_ReleaseSCache(oldScp);
4206 cm_ReleaseSCache(oldTargetScp);
4213 /* and return error code */
4217 /* Byte range locks:
4219 The OpenAFS Windows client has to fake byte range locks given no
4220 server side support for such locks. This is implemented as keyed
4221 byte range locks on the cache manager.
4223 Keyed byte range locks:
4225 Each cm_scache_t structure keeps track of a list of keyed locks.
4226 The key for a lock identifies an owner of a set of locks (referred
4227 to as a client). Each key is represented by a value. The set of
4228 key values used within a specific cm_scache_t structure form a
4229 namespace that has a scope of just that cm_scache_t structure. The
4230 same key value can be used with another cm_scache_t structure and
4231 correspond to a completely different client. However it is
4232 advantageous for the SMB or IFS layer to make sure that there is a
4233 1-1 mapping between client and keys over all cm_scache_t objects.
4235 Assume a client C has key Key(C) (although, since the scope of the
4236 key is a cm_scache_t, the key can be Key(C,S), where S is the
4237 cm_scache_t. But assume a 1-1 relation between keys and clients).
4238 A byte range (O,+L) denotes byte addresses (O) through (O+L-1)
4239 inclusive (a.k.a. [O,O+L-1]). The function Key(x) is implemented
4240 through cm_generateKey() function for both SMB and IFS.
4242 The list of locks for a cm_scache_t object S is maintained in
4243 S->fileLocks. The cache manager will set a lock on the AFS file
4244 server in order to assert the locks in S->fileLocks. If only
4245 shared locks are in place for S, then the cache manager will obtain
4246 a LockRead lock, while if there are any exclusive locks, it will
4247 obtain a LockWrite lock. If the exclusive locks are all released
4248 while the shared locks remain, then the cache manager will
4249 downgrade the lock from LockWrite to LockRead. Similarly, if an
4250 exclusive lock is obtained when only shared locks exist, then the
4251 cache manager will try to upgrade the lock from LockRead to
4254 Each lock L owned by client C maintains a key L->key such that
4255 L->key == Key(C), the effective range defined by L->LOffset and
4256 L->LLength such that the range of bytes affected by the lock is
4257 (L->LOffset, +L->LLength), a type maintained in L->LockType which
4258 is either exclusive or shared.
4262 A lock exists iff it is in S->fileLocks for some cm_scache_t
4263 S. Existing locks are in one of the following states: ACTIVE,
4264 WAITLOCK, WAITUNLOCK, LOST, DELETED.
4266 The following sections describe each lock and the associated
4269 1. ACTIVE: A lock L is ACTIVE iff the cache manager has asserted
4270 the lock with the AFS file server. This type of lock can be
4271 exercised by a client to read or write to the locked region (as
4274 1.1 ACTIVE->LOST: When the AFS file server fails to extend a
4275 server lock that was required to assert the lock. Before
4276 marking the lock as lost, the cache manager checks if the file
4277 has changed on the server. If the file has not changed, then
4278 the cache manager will attempt to obtain a new server lock
4279 that is sufficient to assert the client side locks for the
4280 file. If any of these fail, the lock is marked as LOST.
4281 Otherwise, it is left as ACTIVE.
4283 1.2 ACTIVE->DELETED: Lock is released.
4285 2. WAITLOCK: A lock is in a WAITLOCK state if the cache manager
4286 grants the lock but the lock is yet to be asserted with the AFS
4287 file server. Once the file server grants the lock, the state
4288 will transition to an ACTIVE lock.
4290 2.1 WAITLOCK->ACTIVE: The server granted the lock.
4292 2.2 WAITLOCK->DELETED: Lock is abandoned, or timed out during
4295 2.3 WAITLOCK->LOST: One or more locks from this client were
4296 marked as LOST. No further locks will be granted to this
4297 client until all lost locks are removed.
4299 3. WAITUNLOCK: A lock is in a WAITUNLOCK state if the cache manager
4300 receives a request for a lock that conflicts with an existing
4301 ACTIVE or WAITLOCK lock. The lock will be placed in the queue
4302 and will be granted at such time the conflicting locks are
4303 removed, at which point the state will transition to either
4306 3.1 WAITUNLOCK->ACTIVE: The conflicting lock was removed. The
4307 current serverLock is sufficient to assert this lock, or a
4308 sufficient serverLock is obtained.
4310 3.2 WAITUNLOCK->WAITLOCK: The conflicting lock was removed,
4311 however the required serverLock is yet to be asserted with the
4314 3.3 WAITUNLOCK->DELETED: The lock is abandoned, timed out or
4317 3.5 WAITUNLOCK->LOST: One or more locks from this client were
4318 marked as LOST. No further locks will be granted to this
4319 client until all lost locks are removed.
4321 4. LOST: A lock L is LOST if the server lock that was required to
4322 assert the lock could not be obtained or if it could not be
4323 extended, or if other locks by the same client were LOST.
4324 Essentially, once a lock is LOST, the contract between the cache
4325 manager and that specific client is no longer valid.
4327 The cache manager rechecks the server lock once every minute and
4328 extends it as appropriate. If this is not done for 5 minutes,
4329 the AFS file server will release the lock (the 5 minute timeout
4330 is based on current file server code and is fairly arbitrary).
4331 Once released, the lock cannot be re-obtained without verifying
4332 that the contents of the file hasn't been modified since the
4333 time the lock was released. Re-obtaining the lock without
4334 verifying this may lead to data corruption. If the lock can not
4335 be obtained safely, then all active locks for the cm_scache_t
4338 4.1 LOST->DELETED: The lock is released.
4340 5. DELETED: The lock is no longer relevant. Eventually, it will
4341 get removed from the cm_scache_t. In the meantime, it will be
4342 treated as if it does not exist.
4344 5.1 DELETED->not exist: The lock is removed from the
4347 The following are classifications of locks based on their state.
4349 6* A lock L is ACCEPTED if it is ACTIVE or WAITLOCK. These locks
4350 have been accepted by the cache manager, but may or may not have
4351 been granted back to the client.
4353 7* A lock L is QUEUED if it is ACTIVE, WAITLOCK or WAITUNLOCK.
4355 8* A lock L is WAITING if it is WAITLOCK or WAITUNLOCK.
4359 A client C can READ range (Offset,+Length) of a file represented by
4360 cm_scache_t S iff (1):
4362 1. for all _a_ in (Offset,+Length), all of the following is true:
4364 1.1 For each ACTIVE lock L in S->fileLocks such that _a_ in
4365 (L->LOffset,+L->LLength); L->key == Key(C) OR L->LockType is
4368 1.2 For each LOST lock L in S->fileLocks such that _a_ in
4369 (L->LOffset,+L->LLength); L->LockType is shared AND L->key !=
4372 (When locks are lost on an cm_scache_t, all locks are lost. By
4373 4.2 (below), if there is an exclusive LOST lock, then there
4374 can't be any overlapping ACTIVE locks.)
4376 A client C can WRITE range (Offset,+Length) of cm_scache_t S iff (2):
4378 2. for all _a_ in (Offset,+Length), one of the following is true:
4380 2.1 Byte _a_ of S is unowned (as specified in 1.1) AND there
4381 does not exist a LOST lock L such that _a_ in
4382 (L->LOffset,+L->LLength).
4384 2.2 Byte _a_ of S is owned by C under lock L (as specified in
4385 1.2) AND L->LockType is exclusive.
4387 A client C can OBTAIN a lock L on cm_scache_t S iff (both 3 and 4):
4389 3. for all _a_ in (L->LOffset,+L->LLength), ALL of the following is
4392 3.1 If L->LockType is exclusive then there does NOT exist a
4393 ACCEPTED lock M in S->fileLocks such that _a_ in
4394 (M->LOffset,+M->LLength).
4396 (If we count all QUEUED locks then we hit cases such as
4397 cascading waiting locks where the locks later on in the queue
4398 can be granted without compromising file integrity. On the
4399 other hand if only ACCEPTED locks are considered, then locks
4400 that were received earlier may end up waiting for locks that
4401 were received later to be unlocked. The choice of ACCEPTED
4402 locks was made to mimic the Windows byte range lock
4405 3.2 If L->LockType is shared then for each ACCEPTED lock M in
4406 S->fileLocks, if _a_ in (M->LOffset,+M->LLength) then
4407 M->LockType is shared.
4409 4. For all LOST locks M in S->fileLocks, ALL of the following are true:
4411 4.1 M->key != Key(C)
4413 4.2 If M->LockType is exclusive, then (L->LOffset,+L->LLength)
4414 and (M->LOffset,+M->LLength) do not intersect.
4416 (Note: If a client loses a lock, it loses all locks.
4417 Subsequently, it will not be allowed to obtain any more locks
4418 until all existing LOST locks that belong to the client are
4419 released. Once all locks are released by a single client,
4420 there exists no further contract between the client and AFS
4421 about the contents of the file, hence the client can then
4422 proceed to obtain new locks and establish a new contract.
4424 This doesn't quite work as you think it should, because most
4425 applications aren't built to deal with losing locks they
4426 thought they once had. For now, we don't have a good
4427 solution to lost locks.
4429 Also, for consistency reasons, we have to hold off on
4430 granting locks that overlap exclusive LOST locks.)
4432 A client C can only unlock locks L in S->fileLocks which have
4435 The representation and invariants are as follows:
4437 - Each cm_scache_t structure keeps:
4439 - A queue of byte-range locks (cm_scache_t::fileLocks) which
4440 are of type cm_file_lock_t.
4442 - A record of the highest server-side lock that has been
4443 obtained for this object (cm_scache_t::serverLock), which is
4444 one of (-1), LockRead, LockWrite.
4446 - A count of ACCEPTED exclusive and shared locks that are in the
4447 queue (cm_scache_t::sharedLocks and
4448 cm_scache_t::exclusiveLocks)
4450 - Each cm_file_lock_t structure keeps:
4452 - The type of lock (cm_file_lock_t::LockType)
4454 - The key associated with the lock (cm_file_lock_t::key)
4456 - The offset and length of the lock (cm_file_lock_t::LOffset
4457 and cm_file_lock_t::LLength)
4459 - The state of the lock.
4461 - Time of issuance or last successful extension
4463 Semantic invariants:
4465 I1. The number of ACCEPTED locks in S->fileLocks are
4466 (S->sharedLocks + S->exclusiveLocks)
4468 External invariants:
4470 I3. S->serverLock is the lock that we have asserted with the
4471 AFS file server for this cm_scache_t.
4473 I4. S->serverLock == LockRead iff there is at least one ACTIVE
4474 shared lock, but no ACTIVE exclusive locks.
4476 I5. S->serverLock == LockWrite iff there is at least one ACTIVE
4479 I6. If L is a LOST lock, then for each lock M in S->fileLocks,
4480 M->key == L->key IMPLIES M is LOST or DELETED.
4485 #define IS_LOCK_ACTIVE(lockp) (((lockp)->flags & (CM_FILELOCK_FLAG_DELETED|CM_FILELOCK_FLAG_WAITLOCK|CM_FILELOCK_FLAG_WAITUNLOCK|CM_FILELOCK_FLAG_LOST)) == 0)
4487 #define IS_LOCK_WAITLOCK(lockp) (((lockp)->flags & (CM_FILELOCK_FLAG_DELETED|CM_FILELOCK_FLAG_WAITLOCK|CM_FILELOCK_FLAG_WAITUNLOCK|CM_FILELOCK_FLAG_LOST)) == CM_FILELOCK_FLAG_WAITLOCK)
4489 #define IS_LOCK_WAITUNLOCK(lockp) (((lockp)->flags & (CM_FILELOCK_FLAG_DELETED|CM_FILELOCK_FLAG_WAITLOCK|CM_FILELOCK_FLAG_WAITUNLOCK|CM_FILELOCK_FLAG_LOST)) == CM_FILELOCK_FLAG_WAITUNLOCK)
4491 #define IS_LOCK_LOST(lockp) (((lockp)->flags & (CM_FILELOCK_FLAG_DELETED|CM_FILELOCK_FLAG_LOST)) == CM_FILELOCK_FLAG_LOST)
4493 #define IS_LOCK_DELETED(lockp) (((lockp)->flags & CM_FILELOCK_FLAG_DELETED) == CM_FILELOCK_FLAG_DELETED)
4496 #define IS_LOCK_ACCEPTED(lockp) (IS_LOCK_ACTIVE(lockp) || IS_LOCK_WAITLOCK(lockp))
4499 #define IS_LOCK_CLIENTONLY(lockp) ((((lockp)->scp->flags & CM_SCACHEFLAG_RO) == CM_SCACHEFLAG_RO) || (((lockp)->flags & CM_FILELOCK_FLAG_CLIENTONLY) == CM_FILELOCK_FLAG_CLIENTONLY))
4502 #define INTERSECT_RANGE(r1,r2) (((r2).offset+(r2).length) > (r1).offset && ((r1).offset +(r1).length) > (r2).offset)
4505 #define CONTAINS_RANGE(r1,r2) (((r2).offset+(r2).length) <= ((r1).offset+(r1).length) && (r1).offset <= (r2).offset)
4507 #if defined(VICED_CAPABILITY_USE_BYTE_RANGE_LOCKS) && !defined(LOCK_TESTING)
4508 #define SCP_SUPPORTS_BRLOCKS(scp) ((scp)->cbServerp && ((scp)->cbServerp->capabilities & VICED_CAPABILITY_USE_BYTE_RANGE_LOCKS))
4510 #define SCP_SUPPORTS_BRLOCKS(scp) (1)
4513 #define SERVERLOCKS_ENABLED(scp) (!((scp)->flags & CM_SCACHEFLAG_RO) && cm_enableServerLocks && SCP_SUPPORTS_BRLOCKS(scp))
4515 #if defined(VICED_CAPABILITY_WRITELOCKACL)
4516 #define SCP_SUPPORTS_WRITELOCKACL(scp) ((scp)->cbServerp && ((scp->cbServerp->capabilities & VICED_CAPABILITY_WRITELOCKACL)))
4518 #define SCP_SUPPORTS_WRITELOCKACL(scp) (0)
4520 /* This should really be defined in any build that this code is being
4522 #error VICED_CAPABILITY_WRITELOCKACL not defined.
4525 static void cm_LockRangeSubtract(cm_range_t * pos, const cm_range_t * neg)
4527 afs_int64 int_begin;
4530 int_begin = max(pos->offset, neg->offset);
4531 int_end = min(pos->offset+pos->length, neg->offset+neg->length);
4533 if (int_begin < int_end) {
4534 if (int_begin == pos->offset) {
4535 pos->length = pos->offset + pos->length - int_end;
4536 pos->offset = int_end;
4537 } else if (int_end == pos->offset + pos->length) {
4538 pos->length = int_begin - pos->offset;
4541 /* We only subtract ranges if the resulting range is
4542 contiguous. If we try to support non-contigous ranges, we
4543 aren't actually improving performance. */
4547 /* Called with scp->rw held. Returns 0 if all is clear to read the
4548 specified range by the client identified by key.
4550 long cm_LockCheckRead(cm_scache_t *scp,
4551 LARGE_INTEGER LOffset,
4552 LARGE_INTEGER LLength,
4555 #ifndef ADVISORY_LOCKS
4557 cm_file_lock_t *fileLock;
4561 int substract_ranges = FALSE;
4563 range.offset = LOffset.QuadPart;
4564 range.length = LLength.QuadPart;
4568 1. for all _a_ in (Offset,+Length), all of the following is true:
4570 1.1 For each ACTIVE lock L in S->fileLocks such that _a_ in
4571 (L->LOffset,+L->LLength); L->key == Key(C) OR L->LockType is
4574 1.2 For each LOST lock L in S->fileLocks such that _a_ in
4575 (L->LOffset,+L->LLength); L->LockType is shared AND L->key !=
4580 lock_ObtainRead(&cm_scacheLock);
4582 for (q = scp->fileLocksH; q && range.length > 0; q = osi_QNext(q)) {
4584 (cm_file_lock_t *)((char *) q - offsetof(cm_file_lock_t, fileq));
4586 if (INTERSECT_RANGE(range, fileLock->range)) {
4587 if (IS_LOCK_ACTIVE(fileLock)) {
4588 if (cm_KeyEquals(&fileLock->key, &key, 0)) {
4590 /* If there is an active lock for this client, it
4591 is safe to substract ranges.*/
4592 cm_LockRangeSubtract(&range, &fileLock->range);
4593 substract_ranges = TRUE;
4595 if (fileLock->lockType != LockRead) {
4596 code = CM_ERROR_LOCK_CONFLICT;
4600 /* even if the entire range is locked for reading,
4601 we still can't grant the lock at this point
4602 because the client may have lost locks. That
4603 is, unless we have already seen an active lock
4604 belonging to the client, in which case there
4605 can't be any lost locks for this client. */
4606 if (substract_ranges)
4607 cm_LockRangeSubtract(&range, &fileLock->range);
4609 } else if (IS_LOCK_LOST(fileLock) &&
4610 (cm_KeyEquals(&fileLock->key, &key, 0) || fileLock->lockType == LockWrite)) {
4611 code = CM_ERROR_BADFD;
4617 lock_ReleaseRead(&cm_scacheLock);
4619 osi_Log4(afsd_logp, "cm_LockCheckRead scp 0x%x offset %d length %d code 0x%x",
4620 scp, (unsigned long)LOffset.QuadPart, (unsigned long)LLength.QuadPart, code);
4631 /* Called with scp->rw held. Returns 0 if all is clear to write the
4632 specified range by the client identified by key.
4634 long cm_LockCheckWrite(cm_scache_t *scp,
4635 LARGE_INTEGER LOffset,
4636 LARGE_INTEGER LLength,
4639 #ifndef ADVISORY_LOCKS
4641 cm_file_lock_t *fileLock;
4646 range.offset = LOffset.QuadPart;
4647 range.length = LLength.QuadPart;
4650 A client C can WRITE range (Offset,+Length) of cm_scache_t S iff (2):
4652 2. for all _a_ in (Offset,+Length), one of the following is true:
4654 2.1 Byte _a_ of S is unowned AND there does not exist a LOST
4655 lock L such that _a_ in (L->LOffset,+L->LLength).
4657 2.2 Byte _a_ of S is owned by C under lock L AND L->LockType is
4661 lock_ObtainRead(&cm_scacheLock);
4663 for (q = scp->fileLocksH; q && range.length > 0; q = osi_QNext(q)) {
4665 (cm_file_lock_t *)((char *) q - offsetof(cm_file_lock_t, fileq));
4667 if (INTERSECT_RANGE(range, fileLock->range)) {
4668 if (IS_LOCK_ACTIVE(fileLock)) {
4669 if (cm_KeyEquals(&fileLock->key, &key, 0)) {
4670 if (fileLock->lockType == LockWrite) {
4672 /* if there is an active lock for this client, it
4673 is safe to substract ranges */
4674 cm_LockRangeSubtract(&range, &fileLock->range);
4676 code = CM_ERROR_LOCK_CONFLICT;
4680 code = CM_ERROR_LOCK_CONFLICT;
4683 } else if (IS_LOCK_LOST(fileLock)) {
4684 code = CM_ERROR_BADFD;
4690 lock_ReleaseRead(&cm_scacheLock);
4692 osi_Log4(afsd_logp, "cm_LockCheckWrite scp 0x%x offset %d length %d code 0x%x",
4693 scp, (unsigned long)LOffset.QuadPart, (unsigned long)LLength.QuadPart, code);
4704 /* Called with cm_scacheLock write locked */
4705 static cm_file_lock_t * cm_GetFileLock(void) {
4708 l = (cm_file_lock_t *) cm_freeFileLocks;
4710 osi_QRemove(&cm_freeFileLocks, &l->q);
4712 l = malloc(sizeof(cm_file_lock_t));
4713 osi_assertx(l, "null cm_file_lock_t");
4716 memset(l, 0, sizeof(cm_file_lock_t));
4721 /* Called with cm_scacheLock write locked */
4722 static void cm_PutFileLock(cm_file_lock_t *l) {
4723 osi_QAdd(&cm_freeFileLocks, &l->q);
4726 /* called with scp->rw held. May release it during processing, but
4727 leaves it held on exit. */
4728 long cm_IntSetLock(cm_scache_t * scp, cm_user_t * userp, int lockType,
4734 struct rx_connection * rxconnp;
4736 afs_uint32 reqflags = reqp->flags;
4738 osi_Log2(afsd_logp, "CALL SetLock scp 0x%p for lock %d", scp, lockType);
4742 * The file server prior to 1.6.2 does not report an accurate value
4743 * and callbacks are not issued if the lock is dropped due to expiration.
4745 if ((lockType != LOCKING_ANDX_SHARED_LOCK && scp->fsLockCount != 0) ||
4746 (lockType == LOCKING_ANDX_SHARED_LOCK && scp->fsLockCount < 0))
4748 code = CM_ERROR_LOCK_NOT_GRANTED;
4749 osi_Log2(afsd_logp, "CALL SetLock FAILURE, fsLockCount %d code 0x%x", scp->fsLockCount, code);
4754 memset(&volSync, 0, sizeof(volSync));
4756 tfid.Volume = scp->fid.volume;
4757 tfid.Vnode = scp->fid.vnode;
4758 tfid.Unique = scp->fid.unique;
4761 reqp->flags |= CM_REQ_NORETRY;
4762 lock_ReleaseWrite(&scp->rw);
4765 code = cm_ConnFromFID(&cfid, userp, reqp, &connp);
4769 rxconnp = cm_GetRxConn(connp);
4770 code = RXAFS_SetLock(rxconnp, &tfid, lockType,
4772 rx_PutConnection(rxconnp);
4774 } while (cm_Analyze(connp, userp, reqp, &cfid, NULL, 1, NULL, &volSync,
4777 code = cm_MapRPCError(code, reqp);
4779 osi_Log1(afsd_logp, "CALL SetLock FAILURE, code 0x%x", code);
4781 osi_Log0(afsd_logp, "CALL SetLock SUCCESS");
4784 reqp->flags = reqflags;
4786 lock_ObtainWrite(&scp->rw);
4789 * The file server does not return a status structure so we must
4790 * locally track the file server lock count to the best of our
4793 if (lockType == LockWrite)
4794 scp->fsLockCount = -1;
4801 /* called with scp->rw held. Releases it during processing */
4802 long cm_IntReleaseLock(cm_scache_t * scp, cm_user_t * userp,
4808 struct rx_connection * rxconnp;
4811 if (scp->flags & CM_SCACHEFLAG_DELETED) {
4812 osi_Log1(afsd_logp, "CALL ReleaseLock on Deleted Vnode scp 0x%p", scp);
4816 memset(&volSync, 0, sizeof(volSync));
4818 tfid.Volume = scp->fid.volume;
4819 tfid.Vnode = scp->fid.vnode;
4820 tfid.Unique = scp->fid.unique;
4823 lock_ReleaseWrite(&scp->rw);
4825 osi_Log1(afsd_logp, "CALL ReleaseLock scp 0x%p", scp);
4828 code = cm_ConnFromFID(&cfid, userp, reqp, &connp);
4832 rxconnp = cm_GetRxConn(connp);
4833 code = RXAFS_ReleaseLock(rxconnp, &tfid, &volSync);
4834 rx_PutConnection(rxconnp);
4836 } while (cm_Analyze(connp, userp, reqp, &cfid, NULL, 1, NULL, &volSync,
4838 code = cm_MapRPCError(code, reqp);
4841 "CALL ReleaseLock FAILURE, code 0x%x", code);
4844 "CALL ReleaseLock SUCCESS");
4846 lock_ObtainWrite(&scp->rw);
4849 * The file server does not return a status structure so we must
4850 * locally track the file server lock count to the best of our
4854 if (scp->fsLockCount < 0)
4855 scp->fsLockCount = 0;
4858 return (code != CM_ERROR_BADFD ? code : 0);
4861 /* called with scp->rw held. May release it during processing, but
4862 will exit with lock held.
4866 - 0 if the user has permission to get the specified lock for the scp
4868 - CM_ERROR_NOACCESS if not
4870 Any other error from cm_SyncOp will be sent down untranslated.
4872 If CM_ERROR_NOACCESS is returned and lock_type is LockRead, then
4873 phas_insert (if non-NULL) will receive a boolean value indicating
4874 whether the user has INSERT permission or not.
4876 long cm_LockCheckPerms(cm_scache_t * scp,
4883 long code = 0, code2 = 0;
4885 /* lock permissions are slightly tricky because of the 'i' bit.
4886 If the user has PRSFS_LOCK, she can read-lock the file. If the
4887 user has PRSFS_WRITE, she can write-lock the file. However, if
4888 the user has PRSFS_INSERT, then she can write-lock new files,
4889 but not old ones. Since we don't have information about
4890 whether a file is new or not, we assume that if the user owns
4891 the scp, then she has the permissions that are granted by
4894 osi_Log3(afsd_logp, "cm_LockCheckPerms for scp[0x%p] type[%d] user[0x%p]",
4895 scp, lock_type, userp);
4897 if (lock_type == LockRead)
4898 rights |= PRSFS_LOCK;
4899 else if (lock_type == LockWrite)
4900 rights |= PRSFS_WRITE | PRSFS_LOCK;
4903 osi_assertx(FALSE, "invalid lock type");
4908 *phas_insert = FALSE;
4910 code = cm_SyncOp(scp, NULL, userp, reqp, rights,
4911 CM_SCACHESYNC_GETSTATUS |
4912 CM_SCACHESYNC_NEEDCALLBACK);
4914 if (phas_insert && scp->creator == userp) {
4916 /* If this file was created by the user, then we check for
4917 PRSFS_INSERT. If the file server is recent enough, then
4918 this should be sufficient for her to get a write-lock (but
4919 not necessarily a read-lock). VICED_CAPABILITY_WRITELOCKACL
4920 indicates whether a file server supports getting write
4921 locks when the user only has PRSFS_INSERT.
4923 If the file was not created by the user we skip the check
4924 because the INSERT bit will not apply to this user even
4928 code2 = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_INSERT,
4929 CM_SCACHESYNC_GETSTATUS |
4930 CM_SCACHESYNC_NEEDCALLBACK);
4932 if (code2 == CM_ERROR_NOACCESS) {
4933 osi_Log0(afsd_logp, "cm_LockCheckPerms user has no INSERT bits");
4935 *phas_insert = TRUE;
4936 osi_Log0(afsd_logp, "cm_LockCheckPerms user has INSERT bits");
4940 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
4942 osi_Log1(afsd_logp, "cm_LockCheckPerms returning code %d", code);
4947 /* called with scp->rw held */
4948 long cm_Lock(cm_scache_t *scp, unsigned char sLockType,
4949 LARGE_INTEGER LOffset, LARGE_INTEGER LLength,
4951 int allowWait, cm_user_t *userp, cm_req_t *reqp,
4952 cm_file_lock_t **lockpp)
4955 int Which = ((sLockType & LOCKING_ANDX_SHARED_LOCK) ? LockRead : LockWrite);
4956 cm_file_lock_t *fileLock;
4959 int wait_unlock = FALSE;
4960 int force_client_lock = FALSE;
4962 osi_Log4(afsd_logp, "cm_Lock scp 0x%x type 0x%x offset %d length %d",
4963 scp, sLockType, (unsigned long)LOffset.QuadPart, (unsigned long)LLength.QuadPart);
4964 osi_Log4(afsd_logp, "... allowWait %d key <0x%x, 0x%x, 0x%x>", allowWait,
4965 key.process_id, key.session_id, key.file_id);
4968 A client C can OBTAIN a lock L on cm_scache_t S iff (both 3 and 4):
4970 3. for all _a_ in (L->LOffset,+L->LLength), ALL of the following is
4973 3.1 If L->LockType is exclusive then there does NOT exist a
4974 ACCEPTED lock M in S->fileLocks such that _a_ in
4975 (M->LOffset,+M->LLength).
4977 3.2 If L->LockType is shared then for each ACCEPTED lock M in
4978 S->fileLocks, if _a_ in (M->LOffset,+M->LLength) then
4979 M->LockType is shared.
4981 4. For all LOST locks M in S->fileLocks, ALL of the following are true:
4983 4.1 M->key != Key(C)
4985 4.2 If M->LockType is exclusive, then (L->LOffset,+L->LLength)
4986 and (M->LOffset,+M->LLength) do not intersect.
4989 range.offset = LOffset.QuadPart;
4990 range.length = LLength.QuadPart;
4992 lock_ObtainRead(&cm_scacheLock);
4994 for (q = scp->fileLocksH; q; q = osi_QNext(q)) {
4996 (cm_file_lock_t *)((char *) q - offsetof(cm_file_lock_t, fileq));
4998 if (IS_LOCK_LOST(fileLock)) {
4999 if (cm_KeyEquals(&fileLock->key, &key, 0)) {
5000 code = CM_ERROR_BADFD;
5002 } else if (fileLock->lockType == LockWrite && INTERSECT_RANGE(range, fileLock->range)) {
5003 code = CM_ERROR_WOULDBLOCK;
5009 /* we don't need to check for deleted locks here since deleted
5010 locks are dequeued from scp->fileLocks */
5011 if (IS_LOCK_ACCEPTED(fileLock) &&
5012 INTERSECT_RANGE(range, fileLock->range)) {
5014 if ((sLockType & LOCKING_ANDX_SHARED_LOCK) == 0 ||
5015 fileLock->lockType != LockRead) {
5017 code = CM_ERROR_WOULDBLOCK;
5023 lock_ReleaseRead(&cm_scacheLock);
5025 if (code == 0 && SERVERLOCKS_ENABLED(scp)) {
5026 if (Which == scp->serverLock ||
5027 (Which == LockRead && scp->serverLock == LockWrite)) {
5031 /* we already have the lock we need */
5032 osi_Log3(afsd_logp, " we already have the correct lock. exclusives[%d], shared[%d], serverLock[%d]",
5033 scp->exclusiveLocks, scp->sharedLocks, (int)(signed char) scp->serverLock);
5035 code = cm_LockCheckPerms(scp, Which, userp, reqp, &has_insert);
5037 /* special case: if we don't have permission to read-lock
5038 the file, then we force a clientside lock. This is to
5039 compensate for applications that obtain a read-lock for
5040 reading files off of directories that don't grant
5041 read-locks to the user. */
5042 if (code == CM_ERROR_NOACCESS && Which == LockRead) {
5044 if (has_insert && SCP_SUPPORTS_WRITELOCKACL(scp)) {
5045 osi_Log0(afsd_logp, " User has no read-lock perms, but has INSERT perms.");
5048 osi_Log0(afsd_logp, " User has no read-lock perms. Forcing client-side lock");
5049 force_client_lock = TRUE;
5053 } else if ((scp->exclusiveLocks > 0) ||
5054 (scp->sharedLocks > 0 && scp->serverLock != LockRead)) {
5057 /* We are already waiting for some other lock. We should
5058 wait for the daemon to catch up instead of generating a
5059 flood of SetLock calls. */
5060 osi_Log3(afsd_logp, " already waiting for other lock. exclusives[%d], shared[%d], serverLock[%d]",
5061 scp->exclusiveLocks, scp->sharedLocks, (int)(signed char) scp->serverLock);
5063 /* see if we have permission to create the lock in the
5065 code = cm_LockCheckPerms(scp, Which, userp, reqp, &has_insert);
5067 code = CM_ERROR_WOULDBLOCK;
5068 else if (code == CM_ERROR_NOACCESS && Which == LockRead) {
5070 if (has_insert && SCP_SUPPORTS_WRITELOCKACL(scp)) {
5072 " User has no read-lock perms, but has INSERT perms.");
5073 code = CM_ERROR_WOULDBLOCK;
5076 " User has no read-lock perms. Forcing client-side lock");
5077 force_client_lock = TRUE;
5081 /* leave any other codes as-is */
5085 int check_data_version = FALSE;
5088 /* first check if we have permission to elevate or obtain
5090 code = cm_LockCheckPerms(scp, Which, userp, reqp, &has_insert);
5092 if (code == CM_ERROR_NOACCESS && Which == LockRead &&
5093 (!has_insert || !SCP_SUPPORTS_WRITELOCKACL(scp))) {
5094 osi_Log0(afsd_logp, " User has no read-lock perms. Forcing client-side lock");
5095 force_client_lock = TRUE;
5100 /* has_insert => (Which == LockRead, code == CM_ERROR_NOACCESS) */
5102 if (scp->serverLock == LockRead && Which == LockWrite) {
5104 /* We want to escalate the lock to a LockWrite.
5105 * Unfortunately that's not really possible without
5106 * letting go of the current lock. But for now we do
5110 " attempting to UPGRADE from LockRead to LockWrite.");
5112 " dataVersion on scp: %I64d", scp->dataVersion);
5114 /* we assume at this point (because scp->serverLock
5115 was valid) that we had a valid server lock. */
5116 scp->lockDataVersion = scp->dataVersion;
5117 check_data_version = TRUE;
5119 code = cm_IntReleaseLock(scp, userp, reqp);
5122 /* We couldn't release the lock */
5125 scp->serverLock = -1;
5129 /* We need to obtain a server lock of type Which in order
5130 * to assert this file lock */
5131 #ifndef AGGRESSIVE_LOCKS
5134 newLock = LockWrite;
5137 code = cm_IntSetLock(scp, userp, newLock, reqp);
5139 #ifdef AGGRESSIVE_LOCKS
5140 if ((code == CM_ERROR_WOULDBLOCK ||
5141 code == CM_ERROR_NOACCESS) && newLock != Which) {
5142 /* we wanted LockRead. We tried LockWrite. Now try
5147 osi_assertx(newLock == LockRead, "lock type not read");
5149 code = cm_IntSetLock(scp, userp, newLock, reqp);
5153 if (code == CM_ERROR_NOACCESS) {
5154 if (Which == LockRead) {
5155 if (has_insert && SCP_SUPPORTS_WRITELOCKACL(scp)) {
5157 /* We requested a read-lock, but we have permission to
5158 * get a write-lock. Try that */
5160 tcode = cm_LockCheckPerms(scp, LockWrite, userp, reqp, NULL);
5163 newLock = LockWrite;
5165 osi_Log0(afsd_logp, " User has 'i' perms and the request was for a LockRead. Trying to get a LockWrite instead");
5167 code = cm_IntSetLock(scp, userp, newLock, reqp);
5170 osi_Log0(afsd_logp, " User has no read-lock perms. Forcing client-side lock");
5171 force_client_lock = TRUE;
5173 } else if (Which == LockWrite &&
5174 scp->creator == userp && !SCP_SUPPORTS_WRITELOCKACL(scp)) {
5177 /* Special case: if the lock request was for a
5178 * LockWrite and the user owns the file and we weren't
5179 * allowed to obtain the serverlock, we either lost a
5180 * race (the permissions changed from under us), or we
5181 * have 'i' bits, but we aren't allowed to lock the
5184 /* check if we lost a race... */
5185 tcode = cm_LockCheckPerms(scp, Which, userp, reqp, NULL);
5188 osi_Log0(afsd_logp, " User has 'i' perms but can't obtain write locks. Using client-side locks.");
5189 force_client_lock = TRUE;
5194 if (code == 0 && check_data_version &&
5195 scp->dataVersion != scp->lockDataVersion) {
5196 /* We lost a race. Although we successfully obtained
5197 * a lock, someone modified the file in between. The
5198 * locks have all been technically lost. */
5201 " Data version mismatch while upgrading lock.");
5203 " Data versions before=%I64d, after=%I64d",
5204 scp->lockDataVersion,
5207 " Releasing stale lock for scp 0x%x", scp);
5209 code = cm_IntReleaseLock(scp, userp, reqp);
5211 scp->serverLock = -1;
5213 code = CM_ERROR_INVAL;
5214 } else if (code == 0) {
5215 scp->serverLock = newLock;
5216 scp->lockDataVersion = scp->dataVersion;
5220 (scp->sharedLocks > 0 || scp->exclusiveLocks > 0) &&
5221 scp->serverLock == -1) {
5222 /* Oops. We lost the lock. */
5223 cm_LockMarkSCacheLost(scp);
5226 } else if (code == 0) { /* server locks not enabled */
5228 " Skipping server lock for scp");
5233 if (code != 0 && !force_client_lock) {
5234 /* Special case error translations
5236 Applications don't expect certain errors from a
5237 LockFile/UnlockFile call. We need to translate some error
5238 code to codes that apps expect and handle. */
5240 /* We shouldn't actually need to handle this case since we
5241 simulate locks for RO scps anyway. */
5242 if (code == CM_ERROR_READONLY) {
5243 osi_Log0(afsd_logp, " Reinterpreting CM_ERROR_READONLY as CM_ERROR_NOACCESS");
5244 code = CM_ERROR_NOACCESS;
5248 if (code == 0 || (code == CM_ERROR_WOULDBLOCK && allowWait) ||
5249 force_client_lock) {
5251 /* clear the error if we are forcing a client lock, so we
5252 don't get confused later. */
5253 if (force_client_lock && code != CM_ERROR_WOULDBLOCK)
5258 lock_ObtainWrite(&cm_scacheLock);
5259 fileLock = cm_GetFileLock();
5261 fileLock->fid = scp->fid;
5263 fileLock->key = key;
5264 fileLock->lockType = Which;
5265 fileLock->userp = userp;
5266 fileLock->range = range;
5267 fileLock->flags = (code == 0 ? 0 :
5269 CM_FILELOCK_FLAG_WAITUNLOCK :
5270 CM_FILELOCK_FLAG_WAITLOCK));
5272 if (force_client_lock || !SERVERLOCKS_ENABLED(scp))
5273 fileLock->flags |= CM_FILELOCK_FLAG_CLIENTONLY;
5275 fileLock->lastUpdate = (code == 0 && !force_client_lock) ? time(NULL) : 0;
5277 osi_QAddT(&scp->fileLocksH, &scp->fileLocksT, &fileLock->fileq);
5278 cm_HoldSCacheNoLock(scp);
5279 fileLock->scp = scp;
5280 osi_QAdd(&cm_allFileLocks, &fileLock->q);
5281 lock_ReleaseWrite(&cm_scacheLock);
5287 if (IS_LOCK_CLIENTONLY(fileLock)) {
5289 } else if (IS_LOCK_ACCEPTED(fileLock)) {
5290 if (Which == LockRead)
5293 scp->exclusiveLocks++;
5297 "cm_Lock Lock added 0x%p flags 0x%x to scp [0x%p]",
5298 fileLock, fileLock->flags, scp);
5300 " exclusives[%d] shared[%d] client[%d] serverLock[%d]",
5301 scp->exclusiveLocks, scp->sharedLocks, scp->clientLocks,
5302 (int)(signed char) scp->serverLock);
5305 "cm_Lock Rejecting lock (code = 0x%x)", code);
5308 /* Convert from would block to lock not granted */
5309 if (code == CM_ERROR_WOULDBLOCK)
5310 code = CM_ERROR_LOCK_NOT_GRANTED;
5316 cm_IntUnlock(cm_scache_t * scp,
5322 osi_assertx(scp->sharedLocks >= 0, "scp->sharedLocks < 0");
5323 osi_assertx(scp->exclusiveLocks >= 0, "scp->exclusiveLocks < 0");
5324 osi_assertx(scp->clientLocks >= 0, "scp->clientLocks < 0");
5326 if (!SERVERLOCKS_ENABLED(scp)) {
5327 osi_Log0(afsd_logp, " Skipping server lock for scp");
5331 /* Ideally we would go through the rest of the locks to determine
5332 * if one or more locks that were formerly in WAITUNLOCK can now
5333 * be put to ACTIVE or WAITLOCK and update scp->exclusiveLocks and
5334 * scp->sharedLocks accordingly. However, the retrying of locks
5335 * in that manner is done cm_RetryLock() manually.
5338 if (scp->serverLock == LockWrite &&
5339 scp->exclusiveLocks == 0 &&
5340 scp->sharedLocks > 0) {
5341 /* The serverLock should be downgraded to LockRead */
5342 osi_Log0(afsd_logp, " DOWNGRADE lock from LockWrite to LockRead");
5344 /* Make sure there are no dirty buffers left. */
5345 code = cm_FSync(scp, userp, reqp, TRUE);
5347 /* since scp->serverLock looked sane, we are going to assume
5348 that we have a valid server lock. */
5349 scp->lockDataVersion = scp->dataVersion;
5350 osi_Log1(afsd_logp, " dataVersion on scp = %I64d", scp->dataVersion);
5352 /* before we downgrade, make sure that we have enough
5353 permissions to get the read lock. */
5354 code = cm_LockCheckPerms(scp, LockRead, userp, reqp, NULL);
5357 osi_Log0(afsd_logp, " SKIPPING downgrade because user doesn't have perms to get downgraded lock");
5363 code = cm_IntReleaseLock(scp, userp, reqp);
5366 /* so we couldn't release it. Just let the lock be for now */
5370 scp->serverLock = -1;
5373 code = cm_IntSetLock(scp, userp, LockRead, reqp);
5375 if (code == 0 && scp->lockDataVersion == scp->dataVersion) {
5376 scp->serverLock = LockRead;
5377 } else if (code == 0 && scp->lockDataVersion != scp->dataVersion) {
5378 /* We lost a race condition. Although we have a valid
5379 lock on the file, the data has changed and essentially
5380 we have lost the lock we had during the transition. */
5382 osi_Log0(afsd_logp, "Data version mismatch during lock downgrade");
5383 osi_Log2(afsd_logp, " Data versions before=%I64d, after=%I64d",
5384 scp->lockDataVersion,
5387 code = cm_IntReleaseLock(scp, userp, reqp);
5389 code = CM_ERROR_INVAL;
5390 scp->serverLock = -1;
5394 (scp->sharedLocks > 0 || scp->exclusiveLocks > 0) &&
5395 (scp->serverLock == -1)) {
5397 cm_LockMarkSCacheLost(scp);
5400 /* failure here has no bearing on the return value of cm_Unlock() */
5403 } else if (scp->serverLock != (-1) &&
5404 scp->exclusiveLocks == 0 &&
5405 scp->sharedLocks == 0) {
5406 /* The serverLock should be released entirely */
5408 if (scp->serverLock == LockWrite) {
5409 osi_Log0(afsd_logp, " RELEASE LockWrite -> LockNone");
5411 /* Make sure there are no dirty buffers left. */
5412 code = cm_FSync(scp, userp, reqp, TRUE);
5414 osi_Log0(afsd_logp, " RELEASE LockRead -> LockNone");
5417 code = cm_IntReleaseLock(scp, userp, reqp);
5420 scp->serverLock = (-1);
5426 /* Called with scp->rw held */
5427 long cm_UnlockByKey(cm_scache_t * scp,
5434 cm_file_lock_t *fileLock;
5435 osi_queue_t *q, *qn;
5438 osi_Log4(afsd_logp, "cm_UnlockByKey scp 0x%p key <0x%x,0x%x,0x%x",
5439 scp, key.process_id, key.session_id, key.file_id);
5440 osi_Log1(afsd_logp, " flags=0x%x", flags);
5442 lock_ObtainWrite(&cm_scacheLock);
5444 for (q = scp->fileLocksH; q; q = qn) {
5447 fileLock = (cm_file_lock_t *)
5448 ((char *) q - offsetof(cm_file_lock_t, fileq));
5451 osi_Log4(afsd_logp, " Checking lock[0x%x] range[%d,+%d] type[%d]",
5453 (unsigned long) fileLock->range.offset,
5454 (unsigned long) fileLock->range.length,
5455 fileLock->lockType);
5456 osi_Log4(afsd_logp, " key<0x%x, 0x%x, 0x%x> flags[0x%x]",
5457 fileLock->key.process_id, fileLock->key.session_id, fileLock->key.file_id,
5460 if (cm_FidCmp(&fileLock->fid, &fileLock->scp->fid)) {
5461 osi_Log0(afsd_logp, "!!fileLock->fid != scp->fid");
5462 osi_Log4(afsd_logp, " fileLock->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
5464 fileLock->fid.volume,
5465 fileLock->fid.vnode,
5466 fileLock->fid.unique);
5467 osi_Log4(afsd_logp, " scp->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
5468 fileLock->scp->fid.cell,
5469 fileLock->scp->fid.volume,
5470 fileLock->scp->fid.vnode,
5471 fileLock->scp->fid.unique);
5472 osi_assertx(FALSE, "invalid fid value");
5476 if (!IS_LOCK_DELETED(fileLock) &&
5477 cm_KeyEquals(&fileLock->key, &key, flags)) {
5478 osi_Log3(afsd_logp, "...Unlock range [%d,+%d] type %d",
5479 fileLock->range.offset,
5480 fileLock->range.length,
5481 fileLock->lockType);
5483 osi_QRemoveHT(&scp->fileLocksH, &scp->fileLocksT, q);
5485 if (IS_LOCK_CLIENTONLY(fileLock)) {
5487 } else if (IS_LOCK_ACCEPTED(fileLock)) {
5488 if (fileLock->lockType == LockRead)
5491 scp->exclusiveLocks--;
5494 fileLock->flags |= CM_FILELOCK_FLAG_DELETED;
5496 cm_ReleaseUser(fileLock->userp);
5497 cm_ReleaseSCacheNoLock(scp);
5499 fileLock->userp = NULL;
5500 fileLock->scp = NULL;
5506 lock_ReleaseWrite(&cm_scacheLock);
5508 if (n_unlocks == 0) {
5509 osi_Log0(afsd_logp, "cm_UnlockByKey no locks found");
5510 osi_Log3(afsd_logp, " Leaving scp with exclusives[%d], shared[%d], serverLock[%d]",
5511 scp->exclusiveLocks, scp->sharedLocks, (int)(signed char) scp->serverLock);
5516 code = cm_IntUnlock(scp, userp, reqp);
5517 osi_Log1(afsd_logp, "cm_UnlockByKey code 0x%x", code);
5519 osi_Log4(afsd_logp, " Leaving scp with excl[%d], shared[%d], client[%d], serverLock[%d]",
5520 scp->exclusiveLocks, scp->sharedLocks, scp->clientLocks,
5521 (int)(signed char) scp->serverLock);
5526 /* Called with scp->rw held */
5527 long cm_Unlock(cm_scache_t *scp,
5528 unsigned char sLockType,
5529 LARGE_INTEGER LOffset, LARGE_INTEGER LLength,
5536 int Which = ((sLockType & LOCKING_ANDX_SHARED_LOCK) ? LockRead : LockWrite);
5537 cm_file_lock_t *fileLock;
5539 int release_userp = FALSE;
5540 int exact_match = !(flags & CM_UNLOCK_FLAG_MATCH_RANGE);
5542 LARGE_INTEGER RangeEnd;
5544 osi_Log4(afsd_logp, "cm_Unlock scp 0x%p type 0x%x offset 0x%x length 0x%x",
5545 scp, sLockType, (unsigned long)LOffset.QuadPart, (unsigned long)LLength.QuadPart);
5546 osi_Log4(afsd_logp, "... key <0x%x,0x%x,0x%x> flags 0x%x",
5547 key.process_id, key.session_id, key.file_id, flags);
5550 RangeEnd.QuadPart = LOffset.QuadPart + LLength.QuadPart;
5553 lock_ObtainRead(&cm_scacheLock);
5555 for (q = scp->fileLocksH; q; q = osi_QNext(q)) {
5556 fileLock = (cm_file_lock_t *)
5557 ((char *) q - offsetof(cm_file_lock_t, fileq));
5560 if (cm_FidCmp(&fileLock->fid, &fileLock->scp->fid)) {
5561 osi_Log0(afsd_logp, "!!fileLock->fid != scp->fid");
5562 osi_Log4(afsd_logp, " fileLock->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
5564 fileLock->fid.volume,
5565 fileLock->fid.vnode,
5566 fileLock->fid.unique);
5567 osi_Log4(afsd_logp, " scp->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
5568 fileLock->scp->fid.cell,
5569 fileLock->scp->fid.volume,
5570 fileLock->scp->fid.vnode,
5571 fileLock->scp->fid.unique);
5572 osi_assertx(FALSE, "invalid fid value");
5576 if (!IS_LOCK_DELETED(fileLock) &&
5577 cm_KeyEquals(&fileLock->key, &key, 0) &&
5578 fileLock->range.offset == LOffset.QuadPart &&
5579 fileLock->range.length == LLength.QuadPart) {
5585 if (!IS_LOCK_DELETED(fileLock) &&
5586 cm_KeyEquals(&fileLock->key, &key, 0) &&
5587 fileLock->range.offset >= LOffset.QuadPart &&
5588 fileLock->range.offset < RangeEnd.QuadPart &&
5589 (fileLock->range.offset + fileLock->range.length) <= RangeEnd.QuadPart) {
5597 lock_ReleaseRead(&cm_scacheLock);
5599 if (lock_found && !exact_match) {
5603 osi_Log0(afsd_logp, "cm_Unlock lock not found; failure");
5605 /* The lock didn't exist anyway. *shrug* */
5606 return CM_ERROR_RANGE_NOT_LOCKED;
5610 /* discard lock record */
5611 lock_ConvertRToW(&cm_scacheLock);
5612 osi_QRemoveHT(&scp->fileLocksH, &scp->fileLocksT, q);
5615 * Don't delete it here; let the daemon delete it, to simplify
5616 * the daemon's traversal of the list.
5619 if (IS_LOCK_CLIENTONLY(fileLock)) {
5621 } else if (IS_LOCK_ACCEPTED(fileLock)) {
5622 if (fileLock->lockType == LockRead)
5625 scp->exclusiveLocks--;
5628 fileLock->flags |= CM_FILELOCK_FLAG_DELETED;
5630 if (userp != NULL) {
5631 cm_ReleaseUser(fileLock->userp);
5633 userp = fileLock->userp;
5634 release_userp = TRUE;
5636 cm_ReleaseSCacheNoLock(scp);
5637 fileLock->userp = NULL;
5638 fileLock->scp = NULL;
5639 lock_ReleaseWrite(&cm_scacheLock);
5641 code = cm_IntUnlock(scp, userp, reqp);
5643 if (release_userp) {
5644 cm_ReleaseUser(userp);
5645 release_userp = FALSE;
5649 osi_Log1(afsd_logp, "cm_Unlock not exact match, searching for next lock, code 0x%x", code);
5650 goto try_again; /* might be more than one lock in the range */
5655 osi_Log1(afsd_logp, "cm_Unlock code 0x%x", code);
5656 osi_Log4(afsd_logp, " leaving scp with excl[%d], shared[%d], client[%d], serverLock[%d]",
5657 scp->exclusiveLocks, scp->sharedLocks, scp->clientLocks,
5658 (int)(signed char) scp->serverLock);
5663 /* called with scp->rw held */
5664 void cm_LockMarkSCacheLost(cm_scache_t * scp)
5666 cm_file_lock_t *fileLock;
5669 osi_Log1(afsd_logp, "cm_LockMarkSCacheLost scp 0x%x", scp);
5671 /* cm_scacheLock needed because we are modifying fileLock->flags */
5672 lock_ObtainWrite(&cm_scacheLock);
5674 for (q = scp->fileLocksH; q; q = osi_QNext(q)) {
5676 (cm_file_lock_t *)((char *) q - offsetof(cm_file_lock_t, fileq));
5678 if (IS_LOCK_ACTIVE(fileLock) &&
5679 !IS_LOCK_CLIENTONLY(fileLock)) {
5680 if (fileLock->lockType == LockRead)
5683 scp->exclusiveLocks--;
5685 fileLock->flags |= CM_FILELOCK_FLAG_LOST;
5689 scp->serverLock = -1;
5690 scp->lockDataVersion = CM_SCACHE_VERSION_BAD;
5691 lock_ReleaseWrite(&cm_scacheLock);
5694 /* Called with no relevant locks held */
5695 void cm_CheckLocks()
5697 osi_queue_t *q, *nq;
5698 cm_file_lock_t *fileLock;
5704 struct rx_connection * rxconnp;
5707 memset(&volSync, 0, sizeof(volSync));
5711 lock_ObtainWrite(&cm_scacheLock);
5713 cm_lockRefreshCycle++;
5715 osi_Log1(afsd_logp, "cm_CheckLocks starting lock check cycle %d", cm_lockRefreshCycle);
5717 for (q = cm_allFileLocks; q; q = nq) {
5718 fileLock = (cm_file_lock_t *) q;
5722 if (IS_LOCK_DELETED(fileLock)) {
5723 cm_user_t *userp = fileLock->userp;
5724 cm_scache_t *scp = fileLock->scp;
5725 fileLock->userp = NULL;
5726 fileLock->scp = NULL;
5729 lock_ReleaseWrite(&cm_scacheLock);
5730 lock_ObtainWrite(&scp->rw);
5731 code = cm_IntUnlock(scp, userp, &req);
5732 lock_ReleaseWrite(&scp->rw);
5734 cm_ReleaseUser(userp);
5735 lock_ObtainWrite(&cm_scacheLock);
5736 cm_ReleaseSCacheNoLock(scp);
5738 osi_QRemove(&cm_allFileLocks, q);
5739 cm_PutFileLock(fileLock);
5741 } else if (IS_LOCK_ACTIVE(fileLock) && !IS_LOCK_CLIENTONLY(fileLock)) {
5743 /* Server locks must have been enabled for us to have
5744 received an active non-client-only lock. */
5745 osi_assertx(cm_enableServerLocks, "!cm_enableServerLocks");
5747 scp = fileLock->scp;
5748 osi_assertx(scp != NULL, "null cm_scache_t");
5750 cm_HoldSCacheNoLock(scp);
5753 if (cm_FidCmp(&fileLock->fid, &fileLock->scp->fid)) {
5754 osi_Log0(afsd_logp, "!!fileLock->fid != scp->fid");
5755 osi_Log4(afsd_logp, " fileLock->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
5757 fileLock->fid.volume,
5758 fileLock->fid.vnode,
5759 fileLock->fid.unique);
5760 osi_Log4(afsd_logp, " scp->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
5761 fileLock->scp->fid.cell,
5762 fileLock->scp->fid.volume,
5763 fileLock->scp->fid.vnode,
5764 fileLock->scp->fid.unique);
5765 osi_assertx(FALSE, "invalid fid");
5768 /* Server locks are extended once per scp per refresh
5770 if (scp->lastRefreshCycle != cm_lockRefreshCycle) {
5772 int scp_done = FALSE;
5774 osi_Log1(afsd_logp, "cm_CheckLocks Updating scp 0x%x", scp);
5776 lock_ReleaseWrite(&cm_scacheLock);
5777 lock_ObtainWrite(&scp->rw);
5779 /* did the lock change while we weren't holding the lock? */
5780 if (!IS_LOCK_ACTIVE(fileLock))
5781 goto post_syncopdone;
5783 code = cm_SyncOp(scp, NULL, fileLock->userp, &req, 0,
5784 CM_SCACHESYNC_LOCK);
5788 "cm_CheckLocks SyncOp failure code 0x%x", code);
5789 goto post_syncopdone;
5792 /* cm_SyncOp releases scp->rw during which the lock
5793 may get released. */
5794 if (!IS_LOCK_ACTIVE(fileLock))
5795 goto pre_syncopdone;
5797 if (scp->serverLock != -1 && !(scp->flags & CM_SCACHEFLAG_DELETED)) {
5801 tfid.Volume = scp->fid.volume;
5802 tfid.Vnode = scp->fid.vnode;
5803 tfid.Unique = scp->fid.unique;
5805 userp = fileLock->userp;
5807 osi_Log3(afsd_logp, "CALL ExtendLock lock 0x%p for scp=0x%p with lock %d",
5810 (int) scp->serverLock);
5812 lock_ReleaseWrite(&scp->rw);
5815 code = cm_ConnFromFID(&cfid, userp,
5820 rxconnp = cm_GetRxConn(connp);
5821 code = RXAFS_ExtendLock(rxconnp, &tfid,
5823 rx_PutConnection(rxconnp);
5825 osi_Log1(afsd_logp, " ExtendLock returns %d", code);
5827 } while (cm_Analyze(connp, userp, &req,
5828 &cfid, NULL, 1, NULL, &volSync, NULL, NULL,
5831 code = cm_MapRPCError(code, &req);
5833 lock_ObtainWrite(&scp->rw);
5836 osi_Log1(afsd_logp, "CALL ExtendLock FAILURE, code 0x%x", code);
5837 scp->fsLockCount = 0;
5839 osi_Log0(afsd_logp, "CALL ExtendLock SUCCESS");
5840 scp->lockDataVersion = scp->dataVersion;
5843 if ((code == EINVAL || code == CM_ERROR_INVAL) &&
5844 scp->lockDataVersion == scp->dataVersion) {
5848 (scp->exclusiveLocks > 0) ? LockWrite: LockRead;
5850 /* we might still have a chance to obtain a
5853 code = cm_IntSetLock(scp, userp, lockType, &req);
5856 code = CM_ERROR_INVAL;
5857 } else if (scp->lockDataVersion != scp->dataVersion) {
5859 /* now check if we still have the file at
5860 the right data version. */
5862 "Data version mismatch on scp 0x%p",
5865 " Data versions: before=%I64d, after=%I64d",
5866 scp->lockDataVersion,
5869 code = cm_IntReleaseLock(scp, userp, &req);
5871 code = CM_ERROR_INVAL;
5875 if (code == EINVAL || code == CM_ERROR_INVAL ||
5876 code == CM_ERROR_BADFD) {
5877 cm_LockMarkSCacheLost(scp);
5881 /* interestingly, we have found an active lock
5882 belonging to an scache that has no
5884 cm_LockMarkSCacheLost(scp);
5891 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_LOCK);
5894 lock_ReleaseWrite(&scp->rw);
5896 lock_ObtainWrite(&cm_scacheLock);
5899 fileLock->lastUpdate = time(NULL);
5903 scp->lastRefreshCycle = cm_lockRefreshCycle;
5906 /* we have already refreshed the locks on this scp */
5907 fileLock->lastUpdate = time(NULL);
5910 cm_ReleaseSCacheNoLock(scp);
5912 } else if (IS_LOCK_ACTIVE(fileLock) && IS_LOCK_CLIENTONLY(fileLock)) {
5913 /* TODO: Check callbacks */
5917 lock_ReleaseWrite(&cm_scacheLock);
5918 osi_Log1(afsd_logp, "cm_CheckLocks completes lock check cycle %d", cm_lockRefreshCycle);
5921 /* NOT called with scp->rw held. */
5922 long cm_RetryLock(cm_file_lock_t *oldFileLock, int client_is_dead)
5925 cm_scache_t *scp = NULL;
5926 cm_file_lock_t *fileLock;
5930 int force_client_lock = FALSE;
5931 int has_insert = FALSE;
5932 int check_data_version = FALSE;
5936 if (client_is_dead) {
5937 code = CM_ERROR_TIMEDOUT;
5941 lock_ObtainRead(&cm_scacheLock);
5943 osi_Log2(afsd_logp, "cm_RetryLock checking lock %p (scp=%p)", oldFileLock, oldFileLock->scp);
5944 osi_Log4(afsd_logp, " offset(%x:%x) length(%x:%x)",
5945 (unsigned)(oldFileLock->range.offset >> 32),
5946 (unsigned)(oldFileLock->range.offset & 0xffffffff),
5947 (unsigned)(oldFileLock->range.length >> 32),
5948 (unsigned)(oldFileLock->range.length & 0xffffffff));
5949 osi_Log4(afsd_logp, " key<0x%x,0x%x,0x%x> flags=%x",
5950 oldFileLock->key.process_id, oldFileLock->key.session_id, oldFileLock->key.file_id,
5951 (unsigned)(oldFileLock->flags));
5953 /* if the lock has already been granted, then we have nothing to do */
5954 if (IS_LOCK_ACTIVE(oldFileLock)) {
5955 lock_ReleaseRead(&cm_scacheLock);
5956 osi_Log0(afsd_logp, "cm_RetryLock lock already granted");
5960 /* we can't do anything with lost or deleted locks at the moment. */
5961 if (IS_LOCK_LOST(oldFileLock) || IS_LOCK_DELETED(oldFileLock)) {
5962 code = CM_ERROR_BADFD;
5963 osi_Log0(afsd_logp, "cm_RetryLock lock is lost or deleted");
5964 lock_ReleaseRead(&cm_scacheLock);
5968 scp = oldFileLock->scp;
5970 osi_assertx(scp != NULL, "null cm_scache_t");
5972 lock_ReleaseRead(&cm_scacheLock);
5973 lock_ObtainWrite(&scp->rw);
5975 code = cm_LockCheckPerms(scp, oldFileLock->lockType,
5979 if (code == CM_ERROR_NOACCESS && oldFileLock->lockType == LockRead) {
5980 if (!has_insert || !SCP_SUPPORTS_WRITELOCKACL(scp)) {
5981 force_client_lock = TRUE;
5985 lock_ReleaseWrite(&scp->rw);
5989 lock_ObtainWrite(&cm_scacheLock);
5991 /* Check if we already have a sufficient server lock to allow this
5992 lock to go through. */
5993 if (IS_LOCK_WAITLOCK(oldFileLock) &&
5994 (!SERVERLOCKS_ENABLED(scp) ||
5995 scp->serverLock == oldFileLock->lockType ||
5996 scp->serverLock == LockWrite)) {
5998 oldFileLock->flags &= ~CM_FILELOCK_FLAG_WAITLOCK;
6000 if (SERVERLOCKS_ENABLED(scp)) {
6001 osi_Log1(afsd_logp, "cm_RetryLock Server lock (%d) is sufficient for lock. Granting",
6002 (int) scp->serverLock);
6004 osi_Log0(afsd_logp, "cm_RetryLock skipping server lock for scp");
6007 lock_ReleaseWrite(&cm_scacheLock);
6008 lock_ReleaseWrite(&scp->rw);
6013 if (IS_LOCK_WAITUNLOCK(oldFileLock)) {
6015 /* check if the conflicting locks have dissappeared already */
6016 for (q = scp->fileLocksH; q; q = osi_QNext(q)) {
6018 fileLock = (cm_file_lock_t *)
6019 ((char *) q - offsetof(cm_file_lock_t, fileq));
6021 if (IS_LOCK_LOST(fileLock)) {
6022 if (cm_KeyEquals(&fileLock->key, &oldFileLock->key, 0)) {
6023 code = CM_ERROR_BADFD;
6024 oldFileLock->flags |= CM_FILELOCK_FLAG_LOST;
6025 osi_Log1(afsd_logp, " found lost lock %p for same key. Marking lock as lost",
6028 } else if (fileLock->lockType == LockWrite &&
6029 INTERSECT_RANGE(oldFileLock->range, fileLock->range)) {
6030 osi_Log1(afsd_logp, " found conflicting LOST lock %p", fileLock);
6031 code = CM_ERROR_WOULDBLOCK;
6036 if (IS_LOCK_ACCEPTED(fileLock) &&
6037 INTERSECT_RANGE(oldFileLock->range, fileLock->range)) {
6039 if (oldFileLock->lockType != LockRead ||
6040 fileLock->lockType != LockRead) {
6042 osi_Log1(afsd_logp, " found conflicting lock %p", fileLock);
6043 code = CM_ERROR_WOULDBLOCK;
6051 lock_ReleaseWrite(&cm_scacheLock);
6052 lock_ReleaseWrite(&scp->rw);
6057 /* when we get here, the lock is either a WAITUNLOCK or WAITLOCK.
6058 If it is WAITUNLOCK, then we didn't find any conflicting lock
6059 but we haven't verfied whether the serverLock is sufficient to
6060 assert it. If it is WAITLOCK, then the serverLock is
6061 insufficient to assert it. Eitherway, we are ready to accept
6062 the lock as either ACTIVE or WAITLOCK depending on the
6065 /* First, promote the WAITUNLOCK to a WAITLOCK */
6066 if (IS_LOCK_WAITUNLOCK(oldFileLock)) {
6067 if (oldFileLock->lockType == LockRead)
6070 scp->exclusiveLocks++;
6072 oldFileLock->flags &= ~CM_FILELOCK_FLAG_WAITUNLOCK;
6073 oldFileLock->flags |= CM_FILELOCK_FLAG_WAITLOCK;
6076 osi_assertx(IS_LOCK_WAITLOCK(oldFileLock), "!IS_LOCK_WAITLOCK");
6078 if (force_client_lock ||
6079 !SERVERLOCKS_ENABLED(scp) ||
6080 scp->serverLock == oldFileLock->lockType ||
6081 (oldFileLock->lockType == LockRead &&
6082 scp->serverLock == LockWrite)) {
6084 oldFileLock->flags &= ~CM_FILELOCK_FLAG_WAITLOCK;
6086 if ((force_client_lock ||
6087 !SERVERLOCKS_ENABLED(scp)) &&
6088 !IS_LOCK_CLIENTONLY(oldFileLock)) {
6090 oldFileLock->flags |= CM_FILELOCK_FLAG_CLIENTONLY;
6092 if (oldFileLock->lockType == LockRead)
6095 scp->exclusiveLocks--;
6100 lock_ReleaseWrite(&cm_scacheLock);
6101 lock_ReleaseWrite(&scp->rw);
6108 code = cm_SyncOp(scp, NULL, oldFileLock->userp, &req, 0,
6109 CM_SCACHESYNC_LOCK);
6111 osi_Log1(afsd_logp, "cm_RetryLock SyncOp failure code 0x%x", code);
6112 lock_ReleaseWrite(&cm_scacheLock);
6113 goto post_syncopdone;
6116 if (!IS_LOCK_WAITLOCK(oldFileLock))
6117 goto pre_syncopdone;
6119 userp = oldFileLock->userp;
6121 #ifndef AGGRESSIVE_LOCKS
6122 newLock = oldFileLock->lockType;
6124 newLock = LockWrite;
6128 /* if has_insert is non-zero, then:
6129 - the lock a LockRead
6130 - we don't have permission to get a LockRead
6131 - we do have permission to get a LockWrite
6132 - the server supports VICED_CAPABILITY_WRITELOCKACL
6135 newLock = LockWrite;
6138 lock_ReleaseWrite(&cm_scacheLock);
6140 /* when we get here, either we have a read-lock and want a
6141 write-lock or we don't have any locks and we want some
6144 if (scp->serverLock == LockRead) {
6146 osi_assertx(newLock == LockWrite, "!LockWrite");
6148 osi_Log0(afsd_logp, " Attempting to UPGRADE from LockRead to LockWrite");
6150 scp->lockDataVersion = scp->dataVersion;
6151 check_data_version = TRUE;
6153 code = cm_IntReleaseLock(scp, userp, &req);
6156 goto pre_syncopdone;
6158 scp->serverLock = -1;
6161 code = cm_IntSetLock(scp, userp, newLock, &req);
6164 if (scp->dataVersion != scp->lockDataVersion) {
6165 /* we lost a race. too bad */
6168 " Data version mismatch while upgrading lock.");
6170 " Data versions before=%I64d, after=%I64d",
6171 scp->lockDataVersion,
6174 " Releasing stale lock for scp 0x%x", scp);
6176 code = cm_IntReleaseLock(scp, userp, &req);
6178 scp->serverLock = -1;
6180 code = CM_ERROR_INVAL;
6182 cm_LockMarkSCacheLost(scp);
6184 scp->serverLock = newLock;
6189 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_LOCK);
6195 if (code != 0 && code != CM_ERROR_WOULDBLOCK) {
6196 lock_ObtainWrite(&cm_scacheLock);
6197 osi_QRemoveHT(&scp->fileLocksH, &scp->fileLocksT, &oldFileLock->fileq);
6198 lock_ReleaseWrite(&cm_scacheLock);
6200 lock_ReleaseWrite(&scp->rw);
6203 lock_ObtainWrite(&cm_scacheLock);
6205 oldFileLock->flags &= ~CM_FILELOCK_FLAG_WAITLOCK;
6206 } else if (code != CM_ERROR_WOULDBLOCK) {
6207 oldFileLock->flags |= CM_FILELOCK_FLAG_DELETED;
6208 cm_ReleaseUser(oldFileLock->userp);
6209 oldFileLock->userp = NULL;
6210 if (oldFileLock->scp) {
6211 cm_ReleaseSCacheNoLock(oldFileLock->scp);
6212 oldFileLock->scp = NULL;
6215 lock_ReleaseWrite(&cm_scacheLock);
6220 cm_key_t cm_GenerateKey(afs_uint16 session_id, afs_offs_t process_id, afs_uint64 file_id)
6224 key.process_id = process_id;
6225 key.session_id = session_id;
6226 key.file_id = file_id;
6231 int cm_KeyEquals(cm_key_t *k1, cm_key_t *k2, int flags)
6233 return (k1->session_id == k2->session_id) && (k1->file_id == k2->file_id) &&
6234 ((flags & CM_UNLOCK_FLAG_BY_FID) || (k1->process_id == k2->process_id));
6237 void cm_ReleaseAllLocks(void)
6243 cm_file_lock_t *fileLock;
6246 for (i = 0; i < cm_data.scacheHashTableSize; i++)
6248 for ( scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp ) {
6249 while (scp->fileLocksH != NULL) {
6250 lock_ObtainWrite(&scp->rw);
6251 lock_ObtainWrite(&cm_scacheLock);
6252 if (!scp->fileLocksH) {
6253 lock_ReleaseWrite(&cm_scacheLock);
6254 lock_ReleaseWrite(&scp->rw);
6257 fileLock = (cm_file_lock_t *)((char *) scp->fileLocksH - offsetof(cm_file_lock_t, fileq));
6258 userp = fileLock->userp;
6260 key = fileLock->key;
6261 cm_HoldSCacheNoLock(scp);
6262 lock_ReleaseWrite(&cm_scacheLock);
6263 cm_UnlockByKey(scp, key, 0, userp, &req);
6264 cm_ReleaseSCache(scp);
6265 cm_ReleaseUser(userp);
6266 lock_ReleaseWrite(&scp->rw);