2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afs/param.h>
27 extern void afsi_log(char *pattern, ...);
30 int cm_enableServerLocks = 1;
32 int cm_followBackupPath = 0;
35 * Case-folding array. This was constructed by inspecting of SMBtrace output.
36 * I do not know anything more about it.
38 unsigned char cm_foldUpper[256] = {
39 0x0, 0x1, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7,
40 0x8, 0x9, 0xa, 0xb, 0xc, 0xd, 0xe, 0xf,
41 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
42 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f,
43 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,
44 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f,
45 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
46 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f,
47 0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47,
48 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f,
49 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57,
50 0x58, 0x59, 0x5a, 0x5b, 0x5c, 0x5d, 0x5e, 0x5f,
51 0x60, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47,
52 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f,
53 0x50, 0x51, 0x52, 0x53, 0x54, 0x55, 0x56, 0x57,
54 0x58, 0x59, 0x5a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f,
55 0x80, 0x9a, 0x90, 0x41, 0x8e, 0x41, 0x8f, 0x80,
56 0x45, 0x45, 0x45, 0x49, 0x49, 0x49, 0x8e, 0x8f,
57 0x90, 0x92, 0x92, 0x4f, 0x99, 0x4f, 0x55, 0x55,
58 0x59, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f,
59 0x41, 0x49, 0x4f, 0x55, 0xa5, 0xa5, 0x56, 0xa7,
60 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf,
61 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7,
62 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf,
63 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7,
64 0xc8, 0xc9, 0xca, 0xcb, 0xcc, 0xcd, 0xce, 0xcf,
65 0xd0, 0xd1, 0xd2, 0xd3, 0xd4, 0xd5, 0xd6, 0xd7,
66 0xd8, 0xd9, 0xda, 0xdb, 0xdc, 0xdd, 0xde, 0xdf,
67 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7,
68 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef,
69 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7,
70 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff
74 * Case-insensitive string comparison. We used to use stricmp, but it doesn't
75 * know about 8-bit characters (e.g. 129 is lowercase u-umlaut, 154 is
76 * upper-case u-umlaut).
78 int cm_stricmp(const char *str1, const char *str2)
90 c1 = (char) cm_foldUpper[(unsigned char)(*str1++)];
91 c2 = (char) cm_foldUpper[(unsigned char)(*str2++)];
99 /* characters that are legal in an 8.3 name */
101 * We used to have 1's for all characters from 128 to 254. But
102 * the NT client behaves better if we create an 8.3 name for any
103 * name that has a character with the high bit on, and if we
104 * delete those characters from 8.3 names. In particular, see
105 * Sybase defect 10859.
107 char cm_LegalChars[256] = {
108 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
109 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
110 0, 1, 0, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 1, 0, 0,
111 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0,
112 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
113 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 0, 0, 1, 1,
114 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1,
115 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 0, 1, 1, 1,
116 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
117 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
118 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
119 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
120 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
121 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
122 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
123 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
126 /* return true iff component is a valid 8.3 name */
127 int cm_Is8Dot3(char *namep)
134 * can't have a leading dot;
135 * special case for . and ..
137 if (namep[0] == '.') {
140 if (namep[1] == '.' && namep[2] == 0)
144 while (tc = *namep++) {
146 /* saw another dot */
147 if (sawDot) return 0; /* second dot */
152 if (cm_LegalChars[tc] == 0)
155 if (!sawDot && charCount > 8)
156 /* more than 8 chars in name */
158 if (sawDot && charCount > 3)
159 /* more than 3 chars in extension */
166 * Number unparsing map for generating 8.3 names;
167 * The version taken from DFS was on drugs.
168 * You can't include '&' and '@' in a file name.
170 char cm_8Dot3Mapping[42] =
171 {'0', '1', '2', '3', '4', '5', '6', '7', '8', '9',
172 'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'J', 'K',
173 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S', 'T', 'U',
174 'V', 'W', 'X', 'Y', 'Z', '_', '-', '$', '#', '!', '+', '='
176 int cm_8Dot3MapSize = sizeof(cm_8Dot3Mapping);
178 void cm_Gen8Dot3NameInt(const char * longname, cm_dirFid_t * pfid,
179 char *shortName, char **shortNameEndp)
183 int vnode = ntohl(pfid->vnode);
185 int validExtension = 0;
189 /* Unparse the file's vnode number to get a "uniquifier" */
191 number[nsize] = cm_8Dot3Mapping[vnode % cm_8Dot3MapSize];
193 vnode /= cm_8Dot3MapSize;
197 * Look for valid extension. There has to be a dot, and
198 * at least one of the characters following has to be legal.
200 lastDot = strrchr(longname, '.');
202 temp = lastDot; temp++;
204 if (cm_LegalChars[tc])
210 /* Copy name characters */
211 for (i = 0, name = longname;
212 i < (7 - nsize) && name != lastDot; ) {
217 if (!cm_LegalChars[tc])
220 *shortName++ = toupper(tc);
226 /* Copy uniquifier characters */
227 memcpy(shortName, number, nsize);
230 if (validExtension) {
231 /* Copy extension characters */
232 *shortName++ = *lastDot++; /* copy dot */
233 for (i = 0, tc = *lastDot++;
236 if (cm_LegalChars[tc]) {
238 *shortName++ = toupper(tc);
247 *shortNameEndp = shortName;
250 /* return success if we can open this file in this mode */
251 long cm_CheckOpen(cm_scache_t *scp, int openMode, int trunc, cm_user_t *userp,
259 rights |= PRSFS_READ;
260 if (openMode == 1 || openMode == 2 || trunc)
261 rights |= PRSFS_WRITE;
263 lock_ObtainWrite(&scp->rw);
265 code = cm_SyncOp(scp, NULL, userp, reqp, rights,
266 CM_SCACHESYNC_GETSTATUS
267 | CM_SCACHESYNC_NEEDCALLBACK
268 | CM_SCACHESYNC_LOCK);
271 ((rights & PRSFS_WRITE) || (rights & PRSFS_READ)) &&
272 scp->fileType == CM_SCACHETYPE_FILE) {
275 unsigned int sLockType;
276 LARGE_INTEGER LOffset, LLength;
278 /* Check if there's some sort of lock on the file at the
281 key = cm_GenerateKey(CM_SESSION_CMINT,0,0);
283 if (rights & PRSFS_WRITE)
286 sLockType = LOCKING_ANDX_SHARED_LOCK;
288 LOffset.HighPart = CM_FLSHARE_OFFSET_HIGH;
289 LOffset.LowPart = CM_FLSHARE_OFFSET_LOW;
290 LLength.HighPart = CM_FLSHARE_LENGTH_HIGH;
291 LLength.LowPart = CM_FLSHARE_LENGTH_LOW;
293 code = cm_Lock(scp, sLockType, LOffset, LLength, key, 0, userp, reqp, NULL);
296 cm_Unlock(scp, sLockType, LOffset, LLength, key, userp, reqp);
298 /* In this case, we allow the file open to go through even
299 though we can't enforce mandatory locking on the
301 if (code == CM_ERROR_NOACCESS &&
302 !(rights & PRSFS_WRITE))
306 case CM_ERROR_ALLOFFLINE:
307 case CM_ERROR_ALLDOWN:
308 case CM_ERROR_ALLBUSY:
309 case CM_ERROR_TIMEDOUT:
311 case CM_ERROR_WOULDBLOCK:
314 code = CM_ERROR_SHARING_VIOLATION;
319 } else if (code != 0) {
323 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_LOCK);
327 lock_ReleaseWrite(&scp->rw);
332 /* return success if we can open this file in this mode */
333 long cm_CheckNTOpen(cm_scache_t *scp, unsigned int desiredAccess,
334 unsigned int createDisp, cm_user_t *userp, cm_req_t *reqp,
335 cm_lock_data_t **ldpp)
340 osi_assertx(ldpp != NULL, "null cm_lock_data_t");
343 /* Always allow delete; the RPC will tell us if it's OK */
344 if (desiredAccess == DELETE)
349 if (desiredAccess & (AFS_ACCESS_READ|AFS_ACCESS_EXECUTE))
350 rights |= (scp->fileType == CM_SCACHETYPE_DIRECTORY ? PRSFS_LOOKUP : PRSFS_READ);
352 /* We used to require PRSFS_WRITE if createDisp was 4
353 (OPEN_ALWAYS) even if AFS_ACCESS_WRITE was not requested.
354 However, we don't need to do that since the existence of the
355 scp implies that we don't need to create it. */
356 if (desiredAccess & AFS_ACCESS_WRITE)
357 rights |= PRSFS_WRITE;
359 lock_ObtainWrite(&scp->rw);
361 code = cm_SyncOp(scp, NULL, userp, reqp, rights,
362 CM_SCACHESYNC_GETSTATUS
363 | CM_SCACHESYNC_NEEDCALLBACK
364 | CM_SCACHESYNC_LOCK);
367 * If the open will fail because the volume is readonly, then we will
368 * return an access denied error instead. This is to help brain-dead
369 * apps run correctly on replicated volumes.
370 * See defect 10007 for more information.
372 if (code == CM_ERROR_READONLY)
373 code = CM_ERROR_NOACCESS;
376 ((rights & PRSFS_WRITE) || (rights & PRSFS_READ)) &&
377 scp->fileType == CM_SCACHETYPE_FILE) {
379 unsigned int sLockType;
380 LARGE_INTEGER LOffset, LLength;
382 /* Check if there's some sort of lock on the file at the
385 key = cm_GenerateKey(CM_SESSION_CMINT,0,0);
386 if (rights & PRSFS_WRITE)
389 sLockType = LOCKING_ANDX_SHARED_LOCK;
391 /* single byte lock at offset 0x0100 0000 0000 0000 */
392 LOffset.HighPart = CM_FLSHARE_OFFSET_HIGH;
393 LOffset.LowPart = CM_FLSHARE_OFFSET_LOW;
394 LLength.HighPart = CM_FLSHARE_LENGTH_HIGH;
395 LLength.LowPart = CM_FLSHARE_LENGTH_LOW;
397 code = cm_Lock(scp, sLockType, LOffset, LLength, key, 0, userp, reqp, NULL);
400 (*ldpp) = (cm_lock_data_t *)malloc(sizeof(cm_lock_data_t));
407 (*ldpp)->sLockType = sLockType;
408 (*ldpp)->LOffset.HighPart = LOffset.HighPart;
409 (*ldpp)->LOffset.LowPart = LOffset.LowPart;
410 (*ldpp)->LLength.HighPart = LLength.HighPart;
411 (*ldpp)->LLength.LowPart = LLength.LowPart;
413 /* In this case, we allow the file open to go through even
414 though we can't enforce mandatory locking on the
416 if (code == CM_ERROR_NOACCESS &&
417 !(rights & PRSFS_WRITE))
421 case CM_ERROR_ALLOFFLINE:
422 case CM_ERROR_ALLDOWN:
423 case CM_ERROR_ALLBUSY:
424 case CM_ERROR_TIMEDOUT:
426 case CM_ERROR_WOULDBLOCK:
429 code = CM_ERROR_SHARING_VIOLATION;
433 } else if (code != 0) {
438 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_LOCK);
441 lock_ReleaseWrite(&scp->rw);
443 osi_Log3(afsd_logp,"cm_CheckNTOpen scp 0x%p ldp 0x%p code 0x%x", scp, *ldpp, code);
447 extern long cm_CheckNTOpenDone(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp,
448 cm_lock_data_t ** ldpp)
450 osi_Log2(afsd_logp,"cm_CheckNTOpenDone scp 0x%p ldp 0x%p", scp, *ldpp);
452 lock_ObtainWrite(&scp->rw);
453 cm_Unlock(scp, (*ldpp)->sLockType, (*ldpp)->LOffset, (*ldpp)->LLength,
454 (*ldpp)->key, userp, reqp);
455 lock_ReleaseWrite(&scp->rw);
462 * When CAP_NT_SMBS has been negotiated, deletion (of files or directories) is
463 * done in three steps:
464 * (1) open for deletion (NT_CREATE_AND_X)
465 * (2) set for deletion on close (NT_TRANSACTION2, SET_FILE_INFO)
467 * We must not do the RPC until step 3. But if we are going to return an error
468 * code (e.g. directory not empty), we must return it by step 2, otherwise most
469 * clients will not notice it. So we do a preliminary check. For deleting
470 * files, this is almost free, since we have already done the RPC to get the
471 * parent directory's status bits. But for deleting directories, we must do an
472 * additional RPC to get the directory's data to check if it is empty. Sigh.
474 long cm_CheckNTDelete(cm_scache_t *dscp, cm_scache_t *scp, cm_user_t *userp,
480 cm_dirEntry_t *dep = 0;
481 unsigned short *hashTable;
483 int BeyondPage = 0, HaveDot = 0, HaveDotDot = 0;
486 /* First check permissions */
487 lock_ObtainWrite(&scp->rw);
488 code = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_DELETE,
489 CM_SCACHESYNC_GETSTATUS | CM_SCACHESYNC_NEEDCALLBACK);
490 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
491 lock_ReleaseWrite(&scp->rw);
495 /* If deleting directory, must be empty */
497 if (scp->fileType != CM_SCACHETYPE_DIRECTORY)
500 thyper.HighPart = 0; thyper.LowPart = 0;
501 code = buf_Get(scp, &thyper, &bufferp);
505 lock_ObtainMutex(&bufferp->mx);
506 lock_ObtainWrite(&scp->rw);
509 code = cm_SyncOp(scp, bufferp, userp, reqp, 0,
510 CM_SCACHESYNC_NEEDCALLBACK
512 | CM_SCACHESYNC_BUFLOCKED);
516 if (cm_HaveBuffer(scp, bufferp, 1))
519 /* otherwise, load the buffer and try again */
520 lock_ReleaseMutex(&bufferp->mx);
521 code = cm_GetBuffer(scp, bufferp, NULL, userp, reqp);
522 lock_ReleaseWrite(&scp->rw);
523 lock_ObtainMutex(&bufferp->mx);
524 lock_ObtainWrite(&scp->rw);
525 cm_SyncOpDone(scp, bufferp, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_READ | CM_SCACHESYNC_BUFLOCKED);
530 lock_ReleaseWrite(&scp->rw);
533 /* We try to determine emptiness without looking beyond the first page,
534 * and without assuming "." and ".." are present and are on the first
535 * page (though these assumptions might, after all, be reasonable).
537 hashTable = (unsigned short *)(bufferp->datap + (32 * 5));
538 for (i=0; i<128; i++) {
539 idx = ntohs(hashTable[i]);
545 dep = (cm_dirEntry_t *)(bufferp->datap + (32 * idx));
546 if (strcmp(dep->name, ".") == 0)
548 else if (strcmp(dep->name, "..") == 0)
551 code = CM_ERROR_NOTEMPTY;
554 idx = ntohs(dep->next);
557 if (BeyondPage && HaveDot && HaveDotDot)
558 code = CM_ERROR_NOTEMPTY;
562 lock_ReleaseMutex(&bufferp->mx);
563 buf_Release(bufferp);
565 lock_ReleaseWrite(&scp->rw);
570 * Iterate through all entries in a directory.
571 * When the function funcp is called, the buffer is locked but the
572 * directory vnode is not.
574 * If the retscp parameter is not NULL, the parmp must be a
575 * cm_lookupSearch_t object.
577 long cm_ApplyDir(cm_scache_t *scp, cm_DirFuncp_t funcp, void *parmp,
578 osi_hyper_t *startOffsetp, cm_user_t *userp, cm_req_t *reqp,
579 cm_scache_t **retscp)
583 cm_dirEntry_t *dep = 0;
586 osi_hyper_t dirLength;
587 osi_hyper_t bufferOffset;
588 osi_hyper_t curOffset;
592 cm_pageHeader_t *pageHeaderp;
594 long nextEntryCookie;
595 int numDirChunks; /* # of 32 byte dir chunks in this entry */
597 /* get the directory size */
598 lock_ObtainWrite(&scp->rw);
599 code = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_LOOKUP,
600 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
601 lock_ReleaseWrite(&scp->rw);
605 if (scp->fileType != CM_SCACHETYPE_DIRECTORY)
606 return CM_ERROR_NOTDIR;
608 if (retscp) /* if this is a lookup call */
610 cm_lookupSearch_t* sp = parmp;
613 #ifdef AFS_FREELANCE_CLIENT
614 /* Freelance entries never end up in the DNLC because they
615 * do not have an associated cm_server_t
617 !(cm_freelanceEnabled &&
618 sp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
619 sp->fid.volume==AFS_FAKE_ROOT_VOL_ID )
620 #else /* !AFS_FREELANCE_CLIENT */
625 int casefold = sp->caseFold;
626 sp->caseFold = 0; /* we have a strong preference for exact matches */
627 if ( *retscp = cm_dnlcLookup(scp, sp)) /* dnlc hit */
629 sp->caseFold = casefold;
632 sp->caseFold = casefold;
634 /* see if we can find it using the directory hash tables.
635 we can only do exact matches, since the hash is case
645 code = cm_BeginDirOp(scp, userp, reqp, CM_DIRLOCK_READ, &dirop);
649 code = cm_BPlusDirLookup(&dirop, sp->searchNamep, &sp->fid);
654 code = cm_DirLookup(&dirop, sp->searchNamep, &sp->fid);
662 sp->ExactFound = TRUE;
663 *retscp = NULL; /* force caller to call cm_GetSCache() */
668 if (sp->caseFold && code == CM_ERROR_INEXACT_MATCH) {
671 sp->ExactFound = FALSE;
672 *retscp = NULL; /* force caller to call cm_GetSCache() */
676 return CM_ERROR_BPLUS_NOMATCH;
684 * XXX We only get the length once. It might change when we drop the
687 dirLength = scp->length;
690 bufferOffset.LowPart = bufferOffset.HighPart = 0;
692 curOffset = *startOffsetp;
694 curOffset.HighPart = 0;
695 curOffset.LowPart = 0;
699 /* make sure that curOffset.LowPart doesn't point to the first
700 * 32 bytes in the 2nd through last dir page, and that it
701 * doesn't point at the first 13 32-byte chunks in the first
702 * dir page, since those are dir and page headers, and don't
703 * contain useful information.
705 temp = curOffset.LowPart & (2048-1);
706 if (curOffset.HighPart == 0 && curOffset.LowPart < 2048) {
707 /* we're in the first page */
708 if (temp < 13*32) temp = 13*32;
711 /* we're in a later dir page */
712 if (temp < 32) temp = 32;
715 /* make sure the low order 5 bits are zero */
718 /* now put temp bits back ito curOffset.LowPart */
719 curOffset.LowPart &= ~(2048-1);
720 curOffset.LowPart |= temp;
722 /* check if we've passed the dir's EOF */
723 if (LargeIntegerGreaterThanOrEqualTo(curOffset, dirLength))
726 /* see if we can use the bufferp we have now; compute in which
727 * page the current offset would be, and check whether that's
728 * the offset of the buffer we have. If not, get the buffer.
730 thyper.HighPart = curOffset.HighPart;
731 thyper.LowPart = curOffset.LowPart & ~(cm_data.buf_blockSize-1);
732 if (!bufferp || !LargeIntegerEqualTo(thyper, bufferOffset)) {
735 lock_ReleaseMutex(&bufferp->mx);
736 buf_Release(bufferp);
740 code = buf_Get(scp, &thyper, &bufferp);
742 /* if buf_Get() fails we do not have a buffer object to lock */
747 lock_ObtainMutex(&bufferp->mx);
748 bufferOffset = thyper;
750 /* now get the data in the cache */
752 lock_ObtainWrite(&scp->rw);
753 code = cm_SyncOp(scp, bufferp, userp, reqp,
755 CM_SCACHESYNC_NEEDCALLBACK
757 | CM_SCACHESYNC_BUFLOCKED);
759 lock_ReleaseWrite(&scp->rw);
762 cm_SyncOpDone(scp, bufferp, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_READ | CM_SCACHESYNC_BUFLOCKED);
764 if (cm_HaveBuffer(scp, bufferp, 1)) {
765 lock_ReleaseWrite(&scp->rw);
769 /* otherwise, load the buffer and try again */
770 lock_ReleaseMutex(&bufferp->mx);
771 code = cm_GetBuffer(scp, bufferp, NULL, userp,
773 lock_ReleaseWrite(&scp->rw);
774 lock_ObtainMutex(&bufferp->mx);
779 lock_ReleaseMutex(&bufferp->mx);
780 buf_Release(bufferp);
784 } /* if (wrong buffer) ... */
786 /* now we have the buffer containing the entry we're interested
787 * in; copy it out if it represents a non-deleted entry.
789 entryInDir = curOffset.LowPart & (2048-1);
790 entryInBuffer = curOffset.LowPart & (cm_data.buf_blockSize - 1);
792 /* page header will help tell us which entries are free. Page
793 * header can change more often than once per buffer, since
794 * AFS 3 dir page size may be less than (but not more than) a
795 * buffer package buffer.
797 /* only look intra-buffer */
798 temp = curOffset.LowPart & (cm_data.buf_blockSize - 1);
799 temp &= ~(2048 - 1); /* turn off intra-page bits */
800 pageHeaderp = (cm_pageHeader_t *) (bufferp->datap + temp);
802 /* now determine which entry we're looking at in the page. If
803 * it is free (there's a free bitmap at the start of the dir),
804 * we should skip these 32 bytes.
806 slotInPage = (entryInDir & 0x7e0) >> 5;
807 if (!(pageHeaderp->freeBitmap[slotInPage>>3]
808 & (1 << (slotInPage & 0x7)))) {
809 /* this entry is free */
810 numDirChunks = 1; /* only skip this guy */
814 tp = bufferp->datap + entryInBuffer;
815 dep = (cm_dirEntry_t *) tp; /* now points to AFS3 dir entry */
817 /* while we're here, compute the next entry's location, too,
818 * since we'll need it when writing out the cookie into the
819 * dir listing stream.
821 numDirChunks = cm_NameEntries(dep->name, NULL);
823 /* compute the offset of the cookie representing the next entry */
824 nextEntryCookie = curOffset.LowPart
825 + (CM_DIR_CHUNKSIZE * numDirChunks);
827 if (dep->fid.vnode != 0) {
828 /* this is one of the entries to use: it is not deleted */
829 code = (*funcp)(scp, dep, parmp, &curOffset);
832 } /* if we're including this name */
835 /* and adjust curOffset to be where the new cookie is */
837 thyper.LowPart = CM_DIR_CHUNKSIZE * numDirChunks;
838 curOffset = LargeIntegerAdd(thyper, curOffset);
839 } /* while copying data for dir listing */
841 /* release the mutex */
843 lock_ReleaseMutex(&bufferp->mx);
844 buf_Release(bufferp);
849 int cm_NoneUpper(char *s)
853 if (c >= 'A' && c <= 'Z')
858 int cm_NoneLower(char *s)
862 if (c >= 'a' && c <= 'z')
867 long cm_LookupSearchProc(cm_scache_t *scp, cm_dirEntry_t *dep, void *rockp,
870 cm_lookupSearch_t *sp;
872 char matchName[MAX_PATH];
873 int looking_for_short_name = FALSE;
875 sp = (cm_lookupSearch_t *) rockp;
877 cm_NormalizeUtf8String(dep->name, -1, matchName, sizeof(matchName)/sizeof(char));
879 match = cm_stricmp_utf8(matchName, sp->searchNamep);
881 match = strcmp(matchName, sp->searchNamep);
885 && !cm_Is8Dot3(dep->name)) {
887 cm_Gen8Dot3Name(dep, matchName, NULL);
889 match = cm_stricmp_utf8(matchName, sp->searchNamep);
891 match = strcmp(matchName, sp->searchNamep);
892 looking_for_short_name = TRUE;
902 if (!sp->caseFold || looking_for_short_name) {
903 cm_SetFid(&sp->fid, sp->fid.cell, sp->fid.volume, ntohl(dep->fid.vnode), ntohl(dep->fid.unique));
904 return CM_ERROR_STOPNOW;
908 * If we get here, we are doing a case-insensitive search, and we
909 * have found a match. Now we determine what kind of match it is:
910 * exact, lower-case, upper-case, or none of the above. This is done
911 * in order to choose among matches, if there are more than one.
914 /* Exact matches are the best. */
915 match = strcmp(matchName, sp->searchNamep);
918 cm_SetFid(&sp->fid, sp->fid.cell, sp->fid.volume, ntohl(dep->fid.vnode), ntohl(dep->fid.unique));
919 return CM_ERROR_STOPNOW;
922 /* Lower-case matches are next. */
925 if (cm_NoneUpper(matchName)) {
930 /* Upper-case matches are next. */
933 if (cm_NoneLower(matchName)) {
938 /* General matches are last. */
944 cm_SetFid(&sp->fid, sp->fid.cell, sp->fid.volume, ntohl(dep->fid.vnode), ntohl(dep->fid.unique));
948 /* read the contents of a mount point into the appropriate string.
949 * called with write locked scp, and returns with locked scp.
951 long cm_ReadMountPoint(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
958 if (scp->mountPointStringp[0])
961 /* otherwise, we have to read it in */
962 lock_ReleaseWrite(&scp->rw);
964 thyper.LowPart = thyper.HighPart = 0;
965 code = buf_Get(scp, &thyper, &bufp);
967 lock_ObtainWrite(&scp->rw);
972 code = cm_SyncOp(scp, bufp, userp, reqp, 0,
973 CM_SCACHESYNC_READ | CM_SCACHESYNC_NEEDCALLBACK);
977 cm_SyncOpDone(scp, bufp, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_READ);
979 if (cm_HaveBuffer(scp, bufp, 0))
982 /* otherwise load buffer */
983 code = cm_GetBuffer(scp, bufp, NULL, userp, reqp);
987 /* locked, has callback, has valid data in buffer */
988 if ((tlen = scp->length.LowPart) > MOUNTPOINTLEN - 1)
989 return CM_ERROR_TOOBIG;
991 code = CM_ERROR_INVAL;
995 /* someone else did the work while we were out */
996 if (scp->mountPointStringp[0]) {
1001 /* otherwise, copy out the link */
1002 memcpy(scp->mountPointStringp, bufp->datap, tlen);
1004 /* now make it null-terminated. Note that the original contents of a
1005 * link that is a mount point is "#volname." where "." is there just to
1006 * be turned into a null. That is, we can trash the last char of the
1007 * link without damaging the vol name. This is a stupid convention,
1008 * but that's the protocol.
1010 scp->mountPointStringp[tlen-1] = 0;
1020 /* called with a locked scp and chases the mount point, yielding outScpp.
1021 * scp remains write locked, just for simplicity of describing the interface.
1023 long cm_FollowMountPoint(cm_scache_t *scp, cm_scache_t *dscp, cm_user_t *userp,
1024 cm_req_t *reqp, cm_scache_t **outScpp)
1032 cm_volume_t *volp = NULL;
1039 if (scp->mountRootFid.cell != 0 && scp->mountRootGen >= cm_data.mountRootGen) {
1040 tfid = scp->mountRootFid;
1041 lock_ReleaseWrite(&scp->rw);
1042 code = cm_GetSCache(&tfid, outScpp, userp, reqp);
1043 lock_ObtainWrite(&scp->rw);
1047 /* parse the volume name */
1048 mpNamep = scp->mountPointStringp;
1050 return CM_ERROR_NOSUCHPATH;
1051 tlen = (int)strlen(scp->mountPointStringp);
1052 mtType = *scp->mountPointStringp;
1053 cellNamep = malloc(tlen);
1054 volNamep = malloc(tlen);
1056 cp = strrchr(mpNamep, ':');
1058 /* cellular mount point */
1059 memset(cellNamep, 0, tlen);
1060 strncpy(cellNamep, mpNamep+1, cp - mpNamep - 1);
1061 strcpy(volNamep, cp+1);
1062 /* now look up the cell */
1063 lock_ReleaseWrite(&scp->rw);
1064 cellp = cm_GetCell(cellNamep, CM_FLAG_CREATE);
1065 lock_ObtainWrite(&scp->rw);
1069 strcpy(volNamep, mpNamep+1);
1071 cellp = cm_FindCellByID(scp->fid.cell, 0);
1075 code = CM_ERROR_NOSUCHCELL;
1079 vnLength = strlen(volNamep);
1080 if (vnLength >= 8 && strcmp(volNamep + vnLength - 7, ".backup") == 0)
1081 targetType = BACKVOL;
1082 else if (vnLength >= 10
1083 && strcmp(volNamep + vnLength - 9, ".readonly") == 0)
1088 /* check for backups within backups */
1089 if (targetType == BACKVOL
1090 && (scp->flags & (CM_SCACHEFLAG_RO | CM_SCACHEFLAG_PURERO))
1091 == CM_SCACHEFLAG_RO) {
1092 code = CM_ERROR_NOSUCHVOLUME;
1096 /* now we need to get the volume */
1097 lock_ReleaseWrite(&scp->rw);
1098 if (cm_VolNameIsID(volNamep)) {
1099 code = cm_FindVolumeByID(cellp, atoi(volNamep), userp, reqp,
1100 CM_GETVOL_FLAG_CREATE, &volp);
1102 code = cm_FindVolumeByName(cellp, volNamep, userp, reqp,
1103 CM_GETVOL_FLAG_CREATE, &volp);
1105 lock_ObtainWrite(&scp->rw);
1108 afs_uint32 cell, volume;
1109 cm_vol_state_t *statep;
1111 cell = cellp->cellID;
1113 /* if the mt pt originates in a .backup volume (not a .readonly)
1114 * and FollowBackupPath is active, and if there is a .backup
1115 * volume for the target, then use the .backup of the target
1116 * instead of the read-write.
1118 if (cm_followBackupPath &&
1119 volp->vol[BACKVOL].ID != 0 &&
1120 (dscp->flags & (CM_SCACHEFLAG_RO|CM_SCACHEFLAG_PURERO)) == CM_SCACHEFLAG_RO &&
1121 (targetType == RWVOL || targetType == ROVOL && volp->vol[ROVOL].ID == 0)
1123 targetType = BACKVOL;
1125 /* if the mt pt is in a read-only volume (not just a
1126 * backup), and if there is a read-only volume for the
1127 * target, and if this is a targetType '#' mount point, use
1128 * the read-only, otherwise use the one specified.
1130 else if (mtType == '#' && targetType == RWVOL &&
1131 (scp->flags & CM_SCACHEFLAG_PURERO) &&
1132 volp->vol[ROVOL].ID != 0) {
1136 lock_ObtainWrite(&volp->rw);
1137 statep = cm_VolumeStateByType(volp, targetType);
1138 volume = statep->ID;
1139 statep->dotdotFid = dscp->fid;
1140 lock_ReleaseWrite(&volp->rw);
1142 /* the rest of the fid is a magic number */
1143 cm_SetFid(&scp->mountRootFid, cell, volume, 1, 1);
1144 scp->mountRootGen = cm_data.mountRootGen;
1146 tfid = scp->mountRootFid;
1147 lock_ReleaseWrite(&scp->rw);
1148 code = cm_GetSCache(&tfid, outScpp, userp, reqp);
1149 lock_ObtainWrite(&scp->rw);
1160 long cm_LookupInternal(cm_scache_t *dscp, char *namep, long flags, cm_user_t *userp,
1161 cm_req_t *reqp, cm_scache_t **outpScpp)
1164 int dnlcHit = 1; /* did we hit in the dnlc? yes, we did */
1165 cm_scache_t *tscp = NULL;
1166 cm_scache_t *mountedScp;
1167 cm_lookupSearch_t rock;
1170 memset(&rock, 0, sizeof(rock));
1172 if (dscp->fid.vnode == 1 && dscp->fid.unique == 1
1173 && strcmp(namep, "..") == 0) {
1174 if (dscp->dotdotFid.volume == 0)
1175 return CM_ERROR_NOSUCHVOLUME;
1176 rock.fid = dscp->dotdotFid;
1178 } else if (strcmp(namep, ".") == 0) {
1179 rock.fid = dscp->fid;
1183 if (flags & CM_FLAG_NOMOUNTCHASE) {
1184 /* In this case, we should go and call cm_Dir* functions
1185 directly since the following cm_ApplyDir() function will
1193 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_READ, &dirop);
1196 code = cm_BPlusDirLookup(&dirop, namep, &rock.fid);
1201 code = cm_DirLookup(&dirop, namep, &rock.fid);
1203 cm_EndDirOp(&dirop);
1213 if (code == CM_ERROR_INEXACT_MATCH && (flags & CM_FLAG_CASEFOLD)) {
1220 return CM_ERROR_BPLUS_NOMATCH;
1225 rock.fid.cell = dscp->fid.cell;
1226 rock.fid.volume = dscp->fid.volume;
1227 rock.searchNamep = namep;
1228 rock.caseFold = (flags & CM_FLAG_CASEFOLD);
1229 rock.hasTilde = ((strchr(namep, '~') != NULL) ? 1 : 0);
1231 /* If NOMOUNTCHASE, bypass DNLC by passing NULL scp pointer */
1232 code = cm_ApplyDir(dscp, cm_LookupSearchProc, &rock, NULL, userp, reqp,
1233 (flags & CM_FLAG_NOMOUNTCHASE) ? NULL : &tscp);
1235 /* code == 0 means we fell off the end of the dir, while stopnow means
1236 * that we stopped early, probably because we found the entry we're
1237 * looking for. Any other non-zero code is an error.
1239 if (code && code != CM_ERROR_STOPNOW) {
1240 /* if the cm_scache_t we are searching in is not a directory
1241 * we must return path not found because the error
1242 * is to describe the final component not an intermediary
1244 if (code == CM_ERROR_NOTDIR) {
1245 if (flags & CM_FLAG_CHECKPATH)
1246 return CM_ERROR_NOSUCHPATH;
1248 return CM_ERROR_NOSUCHFILE;
1253 getroot = (dscp==cm_data.rootSCachep) ;
1255 if (!cm_freelanceEnabled || !getroot) {
1256 if (flags & CM_FLAG_CHECKPATH)
1257 return CM_ERROR_NOSUCHPATH;
1259 return CM_ERROR_NOSUCHFILE;
1261 else if (!strchr(namep, '#') && !strchr(namep, '%') &&
1262 strcmp(namep, "srvsvc") && strcmp(namep, "wkssvc") &&
1263 strcmp(namep, "ipc$"))
1265 /* nonexistent dir on freelance root, so add it */
1266 char fullname[200] = ".";
1269 osi_Log1(afsd_logp,"cm_Lookup adding mount for non-existent directory: %s",
1270 osi_LogSaveString(afsd_logp,namep));
1273 * There is an ugly behavior where a share name "foo" will be searched
1274 * for as "fo". If the searched for name differs by an already existing
1275 * symlink or mount point in the Freelance directory, do not add the
1276 * new value automatically.
1280 if (namep[0] == '.') {
1281 if (cm_GetCell_Gen(&namep[1], &fullname[1], CM_FLAG_CREATE)) {
1283 if (!cm_FreelanceMountPointExists(fullname, 0))
1284 code = cm_FreelanceAddMount(fullname, &fullname[1], "root.cell.", 1, &rock.fid);
1285 if ( cm_stricmp_utf8(&namep[1], &fullname[1]) &&
1286 !cm_FreelanceMountPointExists(namep, flags & CM_FLAG_DFS_REFERRAL ? 1 : 0) &&
1287 !cm_FreelanceSymlinkExists(namep, flags & CM_FLAG_DFS_REFERRAL ? 1 : 0))
1288 code = cm_FreelanceAddSymlink(namep, fullname, &rock.fid);
1291 if (cm_GetCell_Gen(namep, fullname, CM_FLAG_CREATE)) {
1293 if (!cm_FreelanceMountPointExists(fullname, 0))
1294 code = cm_FreelanceAddMount(fullname, fullname, "root.cell.", 0, &rock.fid);
1295 if ( cm_stricmp_utf8(namep, fullname) &&
1296 !cm_FreelanceMountPointExists(namep, flags & CM_FLAG_DFS_REFERRAL ? 1 : 0) &&
1297 !cm_FreelanceSymlinkExists(namep, flags & CM_FLAG_DFS_REFERRAL ? 1 : 0))
1298 code = cm_FreelanceAddSymlink(namep, fullname, &rock.fid);
1301 if (!found || code < 0) { /* add mount point failed, so give up */
1302 if (flags & CM_FLAG_CHECKPATH)
1303 return CM_ERROR_NOSUCHPATH;
1305 return CM_ERROR_NOSUCHFILE;
1307 tscp = NULL; /* to force call of cm_GetSCache */
1309 if (flags & CM_FLAG_CHECKPATH)
1310 return CM_ERROR_NOSUCHPATH;
1312 return CM_ERROR_NOSUCHFILE;
1317 if ( !tscp ) /* we did not find it in the dnlc */
1320 code = cm_GetSCache(&rock.fid, &tscp, userp, reqp);
1324 /* tscp is now held */
1326 lock_ObtainWrite(&tscp->rw);
1327 code = cm_SyncOp(tscp, NULL, userp, reqp, 0,
1328 CM_SCACHESYNC_GETSTATUS | CM_SCACHESYNC_NEEDCALLBACK);
1330 lock_ReleaseWrite(&tscp->rw);
1331 cm_ReleaseSCache(tscp);
1334 cm_SyncOpDone(tscp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
1335 /* tscp is now locked */
1337 if (!(flags & CM_FLAG_NOMOUNTCHASE)
1338 && tscp->fileType == CM_SCACHETYPE_MOUNTPOINT) {
1339 /* mount points are funny: they have a volume name to mount
1342 code = cm_ReadMountPoint(tscp, userp, reqp);
1344 code = cm_FollowMountPoint(tscp, dscp, userp, reqp,
1346 lock_ReleaseWrite(&tscp->rw);
1347 cm_ReleaseSCache(tscp);
1354 lock_ReleaseWrite(&tscp->rw);
1357 /* copy back pointer */
1360 /* insert scache in dnlc */
1361 if ( !dnlcHit && !(flags & CM_FLAG_NOMOUNTCHASE) && rock.ExactFound ) {
1362 /* lock the directory entry to prevent racing callback revokes */
1363 lock_ObtainRead(&dscp->rw);
1364 if ( dscp->cbServerp != NULL && dscp->cbExpires > 0 ) {
1365 /* Note: namep is a normalized name */
1366 cm_dnlcEnter(dscp, namep, tscp);
1368 lock_ReleaseRead(&dscp->rw);
1375 int cm_ExpandSysName(char *inp, char *outp, long outSize, unsigned int index)
1380 tp = strrchr(inp, '@');
1382 return 0; /* no @sys */
1384 if (strcmp(tp, "@sys") != 0)
1385 return 0; /* no @sys */
1387 /* caller just wants to know if this is a valid @sys type of name */
1391 if (index >= cm_sysNameCount)
1394 /* otherwise generate the properly expanded @sys name */
1395 prefixCount = (int)(tp - inp);
1397 strncpy(outp, inp, prefixCount); /* copy out "a." from "a.@sys" */
1398 outp[prefixCount] = 0; /* null terminate the "a." */
1399 strcat(outp, cm_sysNameList[index]);/* append i386_nt40 */
1403 long cm_EvaluateVolumeReference(char * namep, long flags, cm_user_t * userp,
1404 cm_req_t *reqp, cm_scache_t ** outpScpp)
1407 char cellName[CELL_MAXNAMELEN];
1408 char volumeName[VL_MAXNAMELEN];
1413 cm_cell_t * cellp = NULL;
1414 cm_volume_t * volp = NULL;
1418 int mountType = RWVOL;
1420 osi_Log1(afsd_logp, "cm_EvaluateVolumeReference for string [%s]",
1421 osi_LogSaveString(afsd_logp, namep));
1423 if (strnicmp(namep, CM_PREFIX_VOL, CM_PREFIX_VOL_CCH) != 0) {
1424 goto _exit_invalid_path;
1427 /* namep is assumed to look like the following:
1429 @vol:<cellname>%<volume>\0
1431 @vol:<cellname>#<volume>\0
1435 cp = namep + CM_PREFIX_VOL_CCH; /* cp points to cell name, hopefully */
1436 tp = strchr(cp, '%');
1438 tp = strchr(cp, '#');
1440 (len = tp - cp) == 0 ||
1441 len > CELL_MAXNAMELEN)
1442 goto _exit_invalid_path;
1443 strncpy(cellName, cp, len);
1444 cellName[len] = '\0';
1449 cp = tp+1; /* cp now points to volume, supposedly */
1450 strncpy(volumeName, cp, VL_MAXNAMELEN-1);
1451 volumeName[VL_MAXNAMELEN - 1] = 0;
1453 /* OK, now we have the cell and the volume */
1454 osi_Log2(afsd_logp, " Found cell [%s] and volume [%s]",
1455 osi_LogSaveString(afsd_logp, cellName),
1456 osi_LogSaveString(afsd_logp, volumeName));
1458 cellp = cm_GetCell(cellName, CM_FLAG_CREATE);
1459 if (cellp == NULL) {
1460 goto _exit_invalid_path;
1463 len = strlen(volumeName);
1464 if (len >= 8 && strcmp(volumeName + len - 7, ".backup") == 0)
1466 else if (len >= 10 &&
1467 strcmp(volumeName + len - 9, ".readonly") == 0)
1472 if (cm_VolNameIsID(volumeName)) {
1473 code = cm_FindVolumeByID(cellp, atoi(volumeName), userp, reqp,
1474 CM_GETVOL_FLAG_CREATE, &volp);
1476 code = cm_FindVolumeByName(cellp, volumeName, userp, reqp,
1477 CM_GETVOL_FLAG_CREATE, &volp);
1483 if (volType == BACKVOL)
1484 volume = volp->vol[BACKVOL].ID;
1485 else if (volType == ROVOL ||
1486 (volType == RWVOL && mountType == ROVOL && volp->vol[ROVOL].ID != 0))
1487 volume = volp->vol[ROVOL].ID;
1489 volume = volp->vol[RWVOL].ID;
1491 cm_SetFid(&fid, cellp->cellID, volume, 1, 1);
1493 code = cm_GetSCache(&fid, outpScpp, userp, reqp);
1503 if (flags & CM_FLAG_CHECKPATH)
1504 return CM_ERROR_NOSUCHPATH;
1506 return CM_ERROR_NOSUCHFILE;
1509 #ifdef DEBUG_REFCOUNT
1510 long cm_LookupDbg(cm_scache_t *dscp, char *namep, long flags, cm_user_t *userp,
1511 cm_req_t *reqp, cm_scache_t **outpScpp, char * file, long line)
1513 long cm_Lookup(cm_scache_t *dscp, char *namep, long flags, cm_user_t *userp,
1514 cm_req_t *reqp, cm_scache_t **outpScpp)
1518 char tname[AFSPATHMAX];
1519 int sysNameIndex = 0;
1520 cm_scache_t *scp = NULL;
1522 #ifdef DEBUG_REFCOUNT
1523 afsi_log("%s:%d cm_Lookup dscp 0x%p ref %d", file, line, dscp, dscp->refCount, file, line);
1524 osi_Log2(afsd_logp, "cm_Lookup dscp 0x%p ref %d", dscp, dscp->refCount);
1527 if ( cm_stricmp_utf8N(namep,SMB_IOCTL_FILENAME_NOSLASH) == 0 ) {
1528 if (flags & CM_FLAG_CHECKPATH)
1529 return CM_ERROR_NOSUCHPATH;
1531 return CM_ERROR_NOSUCHFILE;
1534 if (dscp == cm_data.rootSCachep &&
1535 strnicmp(namep, CM_PREFIX_VOL, CM_PREFIX_VOL_CCH) == 0) {
1536 return cm_EvaluateVolumeReference(namep, flags, userp, reqp, outpScpp);
1539 if (cm_ExpandSysName(namep, NULL, 0, 0) > 0) {
1540 for ( sysNameIndex = 0; sysNameIndex < MAXNUMSYSNAMES; sysNameIndex++) {
1541 code = cm_ExpandSysName(namep, tname, sizeof(tname), sysNameIndex);
1543 code = cm_LookupInternal(dscp, tname, flags, userp, reqp, &scp);
1544 #ifdef DEBUG_REFCOUNT
1545 afsi_log("%s:%d cm_LookupInternal (1) code 0x%x dscp 0x%p ref %d scp 0x%p ref %d", file, line, code, dscp, dscp->refCount, scp, scp ? scp->refCount : 0);
1546 osi_Log3(afsd_logp, "cm_LookupInternal (1) code 0x%x dscp 0x%p scp 0x%p", code, dscp, scp);
1554 cm_ReleaseSCache(scp);
1558 code = cm_LookupInternal(dscp, namep, flags, userp, reqp, &scp);
1559 #ifdef DEBUG_REFCOUNT
1560 afsi_log("%s:%d cm_LookupInternal (2) code 0x%x dscp 0x%p ref %d scp 0x%p ref %d", file, line, code, dscp, dscp->refCount, scp, scp ? scp->refCount : 0);
1561 osi_Log3(afsd_logp, "cm_LookupInternal (2) code 0x%x dscp 0x%p scp 0x%p", code, dscp, scp);
1568 code = cm_LookupInternal(dscp, namep, flags, userp, reqp, &scp);
1569 #ifdef DEBUG_REFCOUNT
1570 afsi_log("%s:%d cm_LookupInternal (2) code 0x%x dscp 0x%p ref %d scp 0x%p ref %d", file, line, code, dscp, dscp->refCount, scp, scp ? scp->refCount : 0);
1571 osi_Log3(afsd_logp, "cm_LookupInternal (2) code 0x%x dscp 0x%p scp 0x%p", code, dscp, scp);
1577 /* None of the possible sysName expansions could be found */
1578 if (flags & CM_FLAG_CHECKPATH)
1579 return CM_ERROR_NOSUCHPATH;
1581 return CM_ERROR_NOSUCHFILE;
1584 /*! \brief Unlink a file name
1586 Encapsulates a call to RXAFS_RemoveFile().
1588 \param[in] dscp cm_scache_t pointing at the directory containing the
1589 name to be unlinked.
1591 \param[in] namep Non-normalized name to be unlinked. This is the
1592 name that will be passed into the RXAFS_RemoveFile() call.
1594 \param[in] normalizedName Normalized name to be unlinked. This name
1595 will be used to update the local directory caches.
1597 \param[in] userp cm_user_t for the request.
1599 \param[in] reqp Request tracker.
1602 long cm_Unlink(cm_scache_t *dscp, char *namep, char * normalizedName,
1603 cm_user_t *userp, cm_req_t *reqp)
1609 AFSFetchStatus newDirStatus;
1611 struct rx_connection * callp;
1614 #ifdef AFS_FREELANCE_CLIENT
1615 if (cm_freelanceEnabled && dscp == cm_data.rootSCachep) {
1616 /* deleting a mount point from the root dir. */
1617 code = cm_FreelanceRemoveMount(namep);
1622 /* make sure we don't screw up the dir status during the merge */
1623 code = cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, &dirop);
1625 lock_ObtainWrite(&dscp->rw);
1626 sflags = CM_SCACHESYNC_STOREDATA;
1627 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, sflags);
1628 lock_ReleaseWrite(&dscp->rw);
1630 cm_EndDirOp(&dirop);
1635 afsFid.Volume = dscp->fid.volume;
1636 afsFid.Vnode = dscp->fid.vnode;
1637 afsFid.Unique = dscp->fid.unique;
1639 osi_Log1(afsd_logp, "CALL RemoveFile scp 0x%p", dscp);
1641 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
1645 callp = cm_GetRxConn(connp);
1646 code = RXAFS_RemoveFile(callp, &afsFid, namep,
1647 &newDirStatus, &volSync);
1648 rx_PutConnection(callp);
1650 } while (cm_Analyze(connp, userp, reqp, &dscp->fid, &volSync, NULL, NULL, code));
1651 code = cm_MapRPCError(code, reqp);
1654 osi_Log1(afsd_logp, "CALL RemoveFile FAILURE, code 0x%x", code);
1656 osi_Log0(afsd_logp, "CALL RemoveFile SUCCESS");
1659 lock_ObtainWrite(&dirop.scp->dirlock);
1660 dirop.lockType = CM_DIRLOCK_WRITE;
1662 lock_ObtainWrite(&dscp->rw);
1663 cm_dnlcRemove(dscp, normalizedName);
1664 cm_SyncOpDone(dscp, NULL, sflags);
1666 cm_MergeStatus(NULL, dscp, &newDirStatus, &volSync, userp, CM_MERGEFLAG_DIROP);
1667 } else if (code == CM_ERROR_NOSUCHFILE) {
1668 /* windows would not have allowed the request to delete the file
1669 * if it did not believe the file existed. therefore, we must
1670 * have an inconsistent view of the world.
1672 dscp->cbServerp = NULL;
1674 lock_ReleaseWrite(&dscp->rw);
1676 if (code == 0 && cm_CheckDirOpForSingleChange(&dirop) && normalizedName) {
1677 cm_DirDeleteEntry(&dirop, namep);
1679 cm_BPlusDirDeleteEntry(&dirop, normalizedName);
1682 cm_EndDirOp(&dirop);
1687 /* called with a write locked vnode, and fills in the link info.
1688 * returns this the vnode still write locked.
1690 long cm_HandleLink(cm_scache_t *linkScp, cm_user_t *userp, cm_req_t *reqp)
1697 lock_AssertWrite(&linkScp->rw);
1698 if (!linkScp->mountPointStringp[0]) {
1699 /* read the link data */
1700 lock_ReleaseWrite(&linkScp->rw);
1701 thyper.LowPart = thyper.HighPart = 0;
1702 code = buf_Get(linkScp, &thyper, &bufp);
1703 lock_ObtainWrite(&linkScp->rw);
1707 code = cm_SyncOp(linkScp, bufp, userp, reqp, 0,
1708 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_READ);
1713 cm_SyncOpDone(linkScp, bufp, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_READ);
1715 if (cm_HaveBuffer(linkScp, bufp, 0))
1718 code = cm_GetBuffer(linkScp, bufp, NULL, userp, reqp);
1723 } /* while loop to get the data */
1725 /* now if we still have no link read in,
1726 * copy the data from the buffer */
1727 if ((temp = linkScp->length.LowPart) >= MOUNTPOINTLEN) {
1729 return CM_ERROR_TOOBIG;
1732 /* otherwise, it fits; make sure it is still null (could have
1733 * lost race with someone else referencing this link above),
1734 * and if so, copy in the data.
1736 if (!linkScp->mountPointStringp[0]) {
1737 strncpy(linkScp->mountPointStringp, bufp->datap, temp);
1738 linkScp->mountPointStringp[temp] = 0; /* null terminate */
1740 if ( !strnicmp(linkScp->mountPointStringp, "msdfs:", strlen("msdfs:")) )
1741 linkScp->fileType = CM_SCACHETYPE_DFSLINK;
1744 } /* don't have sym link contents cached */
1749 /* called with a held vnode and a path suffix, with the held vnode being a
1750 * symbolic link. Our goal is to generate a new path to interpret, and return
1751 * this new path in newSpaceBufferp. If the new vnode is relative to a dir
1752 * other than the directory containing the symbolic link, then the new root is
1753 * returned in *newRootScpp, otherwise a null is returned there.
1755 long cm_AssembleLink(cm_scache_t *linkScp, char *pathSuffixp,
1756 cm_scache_t **newRootScpp, cm_space_t **newSpaceBufferp,
1757 cm_user_t *userp, cm_req_t *reqp)
1764 *newRootScpp = NULL;
1765 *newSpaceBufferp = NULL;
1767 lock_ObtainWrite(&linkScp->rw);
1768 code = cm_HandleLink(linkScp, userp, reqp);
1772 /* if we may overflow the buffer, bail out; buffer is signficantly
1773 * bigger than max path length, so we don't really have to worry about
1774 * being a little conservative here.
1776 if (strlen(linkScp->mountPointStringp) + strlen(pathSuffixp) + 2
1777 >= CM_UTILS_SPACESIZE) {
1778 code = CM_ERROR_TOOBIG;
1782 tsp = cm_GetSpace();
1783 linkp = linkScp->mountPointStringp;
1784 if (strncmp(linkp, cm_mountRoot, cm_mountRootLen) == 0) {
1785 if (strlen(linkp) > cm_mountRootLen)
1786 strcpy(tsp->data, linkp+cm_mountRootLen+1);
1789 *newRootScpp = cm_data.rootSCachep;
1790 cm_HoldSCache(cm_data.rootSCachep);
1791 } else if (linkp[0] == '\\' && linkp[1] == '\\') {
1792 if (!strnicmp(&linkp[2], cm_NetbiosName, (len = (long)strlen(cm_NetbiosName))))
1794 char * p = &linkp[len + 3];
1795 if (strnicmp(p, "all", 3) == 0)
1798 strcpy(tsp->data, p);
1799 for (p = tsp->data; *p; p++) {
1803 *newRootScpp = cm_data.rootSCachep;
1804 cm_HoldSCache(cm_data.rootSCachep);
1806 linkScp->fileType = CM_SCACHETYPE_DFSLINK;
1807 strcpy(tsp->data, linkp);
1808 code = CM_ERROR_PATH_NOT_COVERED;
1810 } else if ( linkScp->fileType == CM_SCACHETYPE_DFSLINK ||
1811 !strnicmp(linkp, "msdfs:", (len = (long)strlen("msdfs:"))) ) {
1812 linkScp->fileType = CM_SCACHETYPE_DFSLINK;
1813 strcpy(tsp->data, linkp);
1814 code = CM_ERROR_PATH_NOT_COVERED;
1815 } else if (*linkp == '\\' || *linkp == '/') {
1817 /* formerly, this was considered to be from the AFS root,
1818 * but this seems to create problems. instead, we will just
1819 * reject the link */
1820 strcpy(tsp->data, linkp+1);
1821 *newRootScpp = cm_data.rootSCachep;
1822 cm_HoldSCache(cm_data.rootSCachep);
1824 /* we still copy the link data into the response so that
1825 * the user can see what the link points to
1827 linkScp->fileType = CM_SCACHETYPE_INVALID;
1828 strcpy(tsp->data, linkp);
1829 code = CM_ERROR_NOSUCHPATH;
1832 /* a relative link */
1833 strcpy(tsp->data, linkp);
1835 if (pathSuffixp[0] != 0) { /* if suffix string is non-null */
1836 strcat(tsp->data, "\\");
1837 strcat(tsp->data, pathSuffixp);
1840 *newSpaceBufferp = tsp;
1844 if (code == CM_ERROR_PATH_NOT_COVERED && reqp->tidPathp && reqp->relPathp)
1845 cm_VolStatus_Notify_DFS_Mapping(linkScp, reqp->tidPathp, reqp->relPathp);
1849 lock_ReleaseWrite(&linkScp->rw);
1852 #ifdef DEBUG_REFCOUNT
1853 long cm_NameIDbg(cm_scache_t *rootSCachep, char *pathp, long flags,
1854 cm_user_t *userp, char *tidPathp, cm_req_t *reqp, cm_scache_t **outScpp,
1855 char * file, long line)
1857 long cm_NameI(cm_scache_t *rootSCachep, char *pathp, long flags,
1858 cm_user_t *userp, char *tidPathp, cm_req_t *reqp, cm_scache_t **outScpp)
1862 char *tp; /* ptr moving through input buffer */
1863 char tc; /* temp char */
1864 int haveComponent; /* has new component started? */
1865 char component[AFSPATHMAX]; /* this is the new component */
1866 char *cp; /* component name being assembled */
1867 cm_scache_t *tscp; /* current location in the hierarchy */
1868 cm_scache_t *nscp; /* next dude down */
1869 cm_scache_t *dirScp; /* last dir we searched */
1870 cm_scache_t *linkScp; /* new root for the symlink we just
1872 cm_space_t *psp; /* space for current path, if we've hit
1874 cm_space_t *tempsp; /* temp vbl */
1875 char *restp; /* rest of the pathname to interpret */
1876 int symlinkCount; /* count of # of symlinks traversed */
1877 int extraFlag; /* avoid chasing mt pts for dir cmd */
1878 int phase = 1; /* 1 = tidPathp, 2 = pathp */
1879 #define MAX_FID_COUNT 512
1880 cm_fid_t fids[MAX_FID_COUNT]; /* array of fids processed in this path walk */
1881 int fid_count = 0; /* number of fids processed in this path walk */
1884 #ifdef DEBUG_REFCOUNT
1885 afsi_log("%s:%d cm_NameI rootscp 0x%p ref %d", file, line, rootSCachep, rootSCachep->refCount);
1886 osi_Log4(afsd_logp,"cm_NameI rootscp 0x%p path %s tidpath %s flags 0x%x",
1887 rootSCachep, pathp ? pathp : "<NULL>", tidPathp ? tidPathp : "<NULL>",
1902 cm_HoldSCache(tscp);
1910 /* map Unix slashes into DOS ones so we can interpret Unix
1916 if (!haveComponent) {
1919 } else if (tc == 0) {
1933 /* we have a component here */
1934 if (tc == 0 || tc == '\\') {
1935 /* end of the component; we're at the last
1936 * component if tc == 0. However, if the last
1937 * is a symlink, we have more to do.
1939 *cp++ = 0; /* add null termination */
1941 if ((flags & CM_FLAG_DIRSEARCH) && tc == 0)
1942 extraFlag = CM_FLAG_NOMOUNTCHASE;
1943 code = cm_Lookup(tscp, component,
1945 userp, reqp, &nscp);
1948 if (!strcmp(component,"..") || !strcmp(component,".")) {
1950 * roll back the fid list until we find the fid
1951 * that matches where we are now. Its not necessarily
1952 * one or two fids because they might have been
1953 * symlinks or mount points or both that were crossed.
1955 for ( i=fid_count-1; i>=0; i--) {
1956 if (!cm_FidCmp(&nscp->fid, &fids[i]))
1961 /* add the new fid to the list */
1962 for ( i=0; i<fid_count; i++) {
1963 if ( !cm_FidCmp(&nscp->fid, &fids[i]) ) {
1964 code = CM_ERROR_TOO_MANY_SYMLINKS;
1965 cm_ReleaseSCache(nscp);
1970 if (i == fid_count && fid_count < MAX_FID_COUNT) {
1971 fids[fid_count++] = nscp->fid;
1977 cm_ReleaseSCache(tscp);
1979 cm_ReleaseSCache(dirScp);
1982 if ((code == CM_ERROR_NOSUCHFILE || code == CM_ERROR_BPLUS_NOMATCH) &&
1983 tscp->fileType == CM_SCACHETYPE_SYMLINK)
1985 osi_Log0(afsd_logp,"cm_NameI code CM_ERROR_NOSUCHPATH");
1986 return CM_ERROR_NOSUCHPATH;
1988 osi_Log1(afsd_logp,"cm_NameI code 0x%x", code);
1993 haveComponent = 0; /* component done */
1995 cm_ReleaseSCache(dirScp);
1996 dirScp = tscp; /* for some symlinks */
1997 tscp = nscp; /* already held */
1999 if (tc == 0 && !(flags & CM_FLAG_FOLLOW) && phase == 2) {
2002 cm_ReleaseSCache(dirScp);
2008 /* now, if tscp is a symlink, we should follow
2009 * it and assemble the path again.
2011 lock_ObtainWrite(&tscp->rw);
2012 code = cm_SyncOp(tscp, NULL, userp, reqp, 0,
2013 CM_SCACHESYNC_GETSTATUS
2014 | CM_SCACHESYNC_NEEDCALLBACK);
2016 lock_ReleaseWrite(&tscp->rw);
2017 cm_ReleaseSCache(tscp);
2020 cm_ReleaseSCache(dirScp);
2025 cm_SyncOpDone(tscp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2027 if (tscp->fileType == CM_SCACHETYPE_SYMLINK) {
2028 /* this is a symlink; assemble a new buffer */
2029 lock_ReleaseWrite(&tscp->rw);
2030 if (symlinkCount++ >= MAX_SYMLINK_COUNT) {
2031 cm_ReleaseSCache(tscp);
2034 cm_ReleaseSCache(dirScp);
2039 osi_Log0(afsd_logp,"cm_NameI code CM_ERROR_TOO_MANY_SYMLINKS");
2040 return CM_ERROR_TOO_MANY_SYMLINKS;
2046 code = cm_AssembleLink(tscp, restp, &linkScp, &tempsp, userp, reqp);
2048 if (code == 0 && linkScp != NULL) {
2049 if (linkScp == cm_data.rootSCachep)
2052 for ( i=0; i<fid_count; i++) {
2053 if ( !cm_FidCmp(&linkScp->fid, &fids[i]) ) {
2054 code = CM_ERROR_TOO_MANY_SYMLINKS;
2055 cm_ReleaseSCache(linkScp);
2061 if (i == fid_count && fid_count < MAX_FID_COUNT) {
2062 fids[fid_count++] = linkScp->fid;
2067 /* something went wrong */
2068 cm_ReleaseSCache(tscp);
2071 cm_ReleaseSCache(dirScp);
2077 /* otherwise, tempsp has the new path,
2078 * and linkScp is the new root from
2079 * which to interpret that path.
2080 * Continue with the namei processing,
2081 * also doing the bookkeeping for the
2082 * space allocation and tracking the
2083 * vnode reference counts.
2089 cm_ReleaseSCache(tscp);
2094 * now, if linkScp is null, that's
2095 * AssembleLink's way of telling us that
2096 * the sym link is relative to the dir
2097 * containing the link. We have a ref
2098 * to it in dirScp, and we hold it now
2099 * and reuse it as the new spot in the
2107 /* not a symlink, we may be done */
2108 lock_ReleaseWrite(&tscp->rw);
2116 cm_ReleaseSCache(dirScp);
2124 cm_ReleaseSCache(dirScp);
2127 } /* end of a component */
2130 } /* we have a component */
2131 } /* big while loop over all components */
2135 cm_ReleaseSCache(dirScp);
2141 cm_ReleaseSCache(tscp);
2143 #ifdef DEBUG_REFCOUNT
2144 afsi_log("%s:%d cm_NameI code 0x%x outScpp 0x%p ref %d", file, line, code, *outScpp, (*outScpp)->refCount);
2146 osi_Log2(afsd_logp,"cm_NameI code 0x%x outScpp 0x%p", code, *outScpp);
2150 /* called with a dir, and a vnode within the dir that happens to be a symlink.
2151 * We chase the link, and return a held pointer to the target, if it exists,
2152 * in *outScpp. If we succeed, we return 0, otherwise we return an error code
2153 * and do not hold or return a target vnode.
2155 * This is very similar to calling cm_NameI with the last component of a name,
2156 * which happens to be a symlink, except that we've already passed by the name.
2158 * This function is typically called by the directory listing functions, which
2159 * encounter symlinks but need to return the proper file length so programs
2160 * like "more" work properly when they make use of the attributes retrieved from
2163 * The input vnode should not be locked when this function is called.
2165 long cm_EvaluateSymLink(cm_scache_t *dscp, cm_scache_t *linkScp,
2166 cm_scache_t **outScpp, cm_user_t *userp, cm_req_t *reqp)
2170 cm_scache_t *newRootScp;
2172 osi_Log1(afsd_logp, "Evaluating symlink scp 0x%p", linkScp);
2174 code = cm_AssembleLink(linkScp, "", &newRootScp, &spacep, userp, reqp);
2178 /* now, if newRootScp is NULL, we're really being told that the symlink
2179 * is relative to the current directory (dscp).
2181 if (newRootScp == NULL) {
2183 cm_HoldSCache(dscp);
2186 code = cm_NameI(newRootScp, spacep->data,
2187 CM_FLAG_CASEFOLD | CM_FLAG_FOLLOW | CM_FLAG_DIRSEARCH,
2188 userp, NULL, reqp, outScpp);
2190 if (code == CM_ERROR_NOSUCHFILE || code == CM_ERROR_BPLUS_NOMATCH)
2191 code = CM_ERROR_NOSUCHPATH;
2193 /* this stuff is allocated no matter what happened on the namei call,
2195 cm_FreeSpace(spacep);
2196 cm_ReleaseSCache(newRootScp);
2198 if (linkScp == *outScpp) {
2199 cm_ReleaseSCache(*outScpp);
2201 code = CM_ERROR_NOSUCHPATH;
2207 /* make this big enough so that one buffer of dir pages won't overflow. We'll
2208 * check anyway, but we want to minimize the chance that we have to leave stuff
2211 #define CM_BULKMAX (3 * AFSCBMAX)
2213 /* rock for bulk stat calls */
2214 typedef struct cm_bulkStat {
2215 osi_hyper_t bufOffset; /* only do it for things in this buffer page */
2217 /* info for the actual call */
2218 int counter; /* next free slot */
2219 AFSFid fids[CM_BULKMAX];
2220 AFSFetchStatus stats[CM_BULKMAX];
2221 AFSCallBack callbacks[CM_BULKMAX];
2224 /* for a given entry, make sure that it isn't in the stat cache, and then
2225 * add it to the list of file IDs to be obtained.
2227 * Don't bother adding it if we already have a vnode. Note that the dir
2228 * is locked, so we have to be careful checking the vnode we're thinking of
2229 * processing, to avoid deadlocks.
2231 long cm_TryBulkProc(cm_scache_t *scp, cm_dirEntry_t *dep, void *rockp,
2242 /* Don't overflow bsp. */
2243 if (bsp->counter >= CM_BULKMAX)
2244 return CM_ERROR_STOPNOW;
2246 thyper.LowPart = cm_data.buf_blockSize;
2247 thyper.HighPart = 0;
2248 thyper = LargeIntegerAdd(thyper, bsp->bufOffset);
2250 /* thyper is now the first byte past the end of the record we're
2251 * interested in, and bsp->bufOffset is the first byte of the record
2252 * we're interested in.
2253 * Skip data in the others.
2256 if (LargeIntegerLessThan(*offp, bsp->bufOffset))
2258 if (LargeIntegerGreaterThanOrEqualTo(*offp, thyper))
2259 return CM_ERROR_STOPNOW;
2260 if (strcmp(dep->name, ".") == 0 || strcmp(dep->name, "..") == 0)
2263 cm_SetFid(&tfid, scp->fid.cell, scp->fid.volume, ntohl(dep->fid.vnode), ntohl(dep->fid.unique));
2264 tscp = cm_FindSCache(&tfid);
2266 if (lock_TryWrite(&tscp->rw)) {
2267 /* we have an entry that we can look at */
2268 if (!(tscp->flags & CM_SCACHEFLAG_EACCESS) && cm_HaveCallback(tscp)) {
2269 /* we have a callback on it. Don't bother
2270 * fetching this stat entry, since we're happy
2271 * with the info we have.
2273 lock_ReleaseWrite(&tscp->rw);
2274 cm_ReleaseSCache(tscp);
2277 lock_ReleaseWrite(&tscp->rw);
2279 cm_ReleaseSCache(tscp);
2282 #ifdef AFS_FREELANCE_CLIENT
2283 // yj: if this is a mountpoint under root.afs then we don't want it
2284 // to be bulkstat-ed, instead, we call getSCache directly and under
2285 // getSCache, it is handled specially.
2286 if ( cm_freelanceEnabled &&
2287 tfid.cell==AFS_FAKE_ROOT_CELL_ID &&
2288 tfid.volume==AFS_FAKE_ROOT_VOL_ID &&
2289 !(tfid.vnode==0x1 && tfid.unique==0x1) )
2291 osi_Log0(afsd_logp, "cm_TryBulkProc Freelance calls cm_SCache on root.afs mountpoint");
2292 return cm_GetSCache(&tfid, &tscp, NULL, NULL);
2294 #endif /* AFS_FREELANCE_CLIENT */
2297 bsp->fids[i].Volume = scp->fid.volume;
2298 bsp->fids[i].Vnode = tfid.vnode;
2299 bsp->fids[i].Unique = tfid.unique;
2303 /* called with a write locked scp and a pointer to a buffer. Make bulk stat
2304 * calls on all undeleted files in the page of the directory specified.
2307 cm_TryBulkStat(cm_scache_t *dscp, osi_hyper_t *offsetp, cm_user_t *userp,
2311 cm_bulkStat_t bb; /* this is *BIG*, probably 16K or so;
2312 * watch for stack problems */
2313 AFSCBFids fidStruct;
2314 AFSBulkStats statStruct;
2316 AFSCBs callbackStruct;
2319 cm_callbackRequest_t cbReq;
2325 struct rx_connection * callp;
2326 int inlinebulk = 0; /* Did we use InlineBulkStatus RPC or not? */
2328 osi_Log1(afsd_logp, "cm_TryBulkStat dir 0x%p", dscp);
2330 /* should be on a buffer boundary */
2331 osi_assertx((offsetp->LowPart & (cm_data.buf_blockSize - 1)) == 0, "invalid offset");
2333 memset(&bb, 0, sizeof(bb));
2334 bb.bufOffset = *offsetp;
2336 lock_ReleaseWrite(&dscp->rw);
2337 /* first, assemble the file IDs we need to stat */
2338 code = cm_ApplyDir(dscp, cm_TryBulkProc, (void *) &bb, offsetp, userp, reqp, NULL);
2340 /* if we failed, bail out early */
2341 if (code && code != CM_ERROR_STOPNOW) {
2342 lock_ObtainWrite(&dscp->rw);
2346 /* otherwise, we may have one or more bulk stat's worth of stuff in bb;
2347 * make the calls to create the entries. Handle AFSCBMAX files at a
2351 while (filex < bb.counter) {
2352 filesThisCall = bb.counter - filex;
2353 if (filesThisCall > AFSCBMAX)
2354 filesThisCall = AFSCBMAX;
2356 fidStruct.AFSCBFids_len = filesThisCall;
2357 fidStruct.AFSCBFids_val = &bb.fids[filex];
2358 statStruct.AFSBulkStats_len = filesThisCall;
2359 statStruct.AFSBulkStats_val = &bb.stats[filex];
2360 callbackStruct.AFSCBs_len = filesThisCall;
2361 callbackStruct.AFSCBs_val = &bb.callbacks[filex];
2362 cm_StartCallbackGrantingCall(NULL, &cbReq);
2363 osi_Log1(afsd_logp, "CALL BulkStatus, %d entries", filesThisCall);
2365 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
2369 callp = cm_GetRxConn(connp);
2370 if (!(connp->serverp->flags & CM_SERVERFLAG_NOINLINEBULK)) {
2371 code = RXAFS_InlineBulkStatus(callp, &fidStruct,
2372 &statStruct, &callbackStruct, &volSync);
2373 if (code == RXGEN_OPCODE) {
2374 cm_SetServerNoInlineBulk(connp->serverp, 0);
2380 code = RXAFS_BulkStatus(callp, &fidStruct,
2381 &statStruct, &callbackStruct, &volSync);
2383 rx_PutConnection(callp);
2385 } while (cm_Analyze(connp, userp, reqp, &dscp->fid,
2386 &volSync, NULL, &cbReq, code));
2387 code = cm_MapRPCError(code, reqp);
2389 osi_Log2(afsd_logp, "CALL %sBulkStatus FAILURE code 0x%x",
2390 inlinebulk ? "Inline" : "", code);
2392 osi_Log1(afsd_logp, "CALL %sBulkStatus SUCCESS", inlinebulk ? "Inline" : "");
2394 /* may as well quit on an error, since we're not going to do
2395 * much better on the next immediate call, either.
2398 cm_EndCallbackGrantingCall(NULL, &cbReq, NULL, 0);
2402 /* otherwise, we should do the merges */
2403 for (i = 0; i<filesThisCall; i++) {
2405 cm_SetFid(&tfid, dscp->fid.cell, bb.fids[j].Volume, bb.fids[j].Vnode, bb.fids[j].Unique);
2406 code = cm_GetSCache(&tfid, &scp, userp, reqp);
2410 /* otherwise, if this entry has no callback info,
2413 lock_ObtainWrite(&scp->rw);
2414 /* now, we have to be extra paranoid on merging in this
2415 * information, since we didn't use cm_SyncOp before
2416 * starting the fetch to make sure that no bad races
2417 * were occurring. Specifically, we need to make sure
2418 * we don't obliterate any newer information in the
2419 * vnode than have here.
2421 * Right now, be pretty conservative: if there's a
2422 * callback or a pending call, skip it.
2424 if ((scp->cbServerp == NULL || (scp->flags & CM_SCACHEFLAG_EACCESS))
2426 (CM_SCACHEFLAG_FETCHING
2427 | CM_SCACHEFLAG_STORING
2428 | CM_SCACHEFLAG_SIZESTORING))) {
2429 cm_EndCallbackGrantingCall(scp, &cbReq,
2431 CM_CALLBACK_MAINTAINCOUNT);
2432 cm_MergeStatus(dscp, scp, &bb.stats[j], &volSync, userp, 0);
2434 lock_ReleaseWrite(&scp->rw);
2435 cm_ReleaseSCache(scp);
2436 } /* all files in the response */
2437 /* now tell it to drop the count,
2438 * after doing the vnode processing above */
2439 cm_EndCallbackGrantingCall(NULL, &cbReq, NULL, 0);
2441 filex += filesThisCall;
2442 } /* while there are still more files to process */
2443 lock_ObtainWrite(&dscp->rw);
2445 /* If we did the InlineBulk RPC pull out the return code and log it */
2447 if ((&bb.stats[0])->errorCode) {
2448 osi_Log1(afsd_logp, "cm_TryBulkStat bulk stat error: %d",
2449 (&bb.stats[0])->errorCode);
2453 osi_Log0(afsd_logp, "END cm_TryBulkStat");
2457 void cm_StatusFromAttr(AFSStoreStatus *statusp, cm_scache_t *scp, cm_attr_t *attrp)
2461 /* initialize store back mask as inexpensive local variable */
2463 memset(statusp, 0, sizeof(AFSStoreStatus));
2465 /* copy out queued info from scache first, if scp passed in */
2467 if (scp->mask & CM_SCACHEMASK_CLIENTMODTIME) {
2468 statusp->ClientModTime = scp->clientModTime;
2469 mask |= AFS_SETMODTIME;
2470 scp->mask &= ~CM_SCACHEMASK_CLIENTMODTIME;
2475 /* now add in our locally generated request */
2476 if (attrp->mask & CM_ATTRMASK_CLIENTMODTIME) {
2477 statusp->ClientModTime = attrp->clientModTime;
2478 mask |= AFS_SETMODTIME;
2480 if (attrp->mask & CM_ATTRMASK_UNIXMODEBITS) {
2481 statusp->UnixModeBits = attrp->unixModeBits;
2482 mask |= AFS_SETMODE;
2484 if (attrp->mask & CM_ATTRMASK_OWNER) {
2485 statusp->Owner = attrp->owner;
2486 mask |= AFS_SETOWNER;
2488 if (attrp->mask & CM_ATTRMASK_GROUP) {
2489 statusp->Group = attrp->group;
2490 mask |= AFS_SETGROUP;
2493 statusp->Mask = mask;
2496 /* set the file size, and make sure that all relevant buffers have been
2497 * truncated. Ensure that any partially truncated buffers have been zeroed
2498 * to the end of the buffer.
2500 long cm_SetLength(cm_scache_t *scp, osi_hyper_t *sizep, cm_user_t *userp,
2506 /* start by locking out buffer creation */
2507 lock_ObtainWrite(&scp->bufCreateLock);
2509 /* verify that this is a file, not a dir or a symlink */
2510 lock_ObtainWrite(&scp->rw);
2511 code = cm_SyncOp(scp, NULL, userp, reqp, 0,
2512 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2515 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
2517 if (scp->fileType != CM_SCACHETYPE_FILE) {
2518 code = CM_ERROR_ISDIR;
2523 if (LargeIntegerLessThan(*sizep, scp->length))
2528 lock_ReleaseWrite(&scp->rw);
2530 /* can't hold scp->rw lock here, since we may wait for a storeback to
2531 * finish if the buffer package is cleaning a buffer by storing it to
2535 buf_Truncate(scp, userp, reqp, sizep);
2537 /* now ensure that file length is short enough, and update truncPos */
2538 lock_ObtainWrite(&scp->rw);
2540 /* make sure we have a callback (so we have the right value for the
2541 * length), and wait for it to be safe to do a truncate.
2543 code = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_WRITE,
2544 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS
2545 | CM_SCACHESYNC_SETSTATUS | CM_SCACHESYNC_SETSIZE);
2547 /* If we only have 'i' bits, then we should still be able to set
2548 the size of a file we created. */
2549 if (code == CM_ERROR_NOACCESS && scp->creator == userp) {
2550 code = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_INSERT,
2551 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS
2552 | CM_SCACHESYNC_SETSTATUS | CM_SCACHESYNC_SETSIZE);
2558 if (LargeIntegerLessThan(*sizep, scp->length)) {
2559 /* a real truncation. If truncPos is not set yet, or is bigger
2560 * than where we're truncating the file, set truncPos to this
2565 if (!(scp->mask & CM_SCACHEMASK_TRUNCPOS)
2566 || LargeIntegerLessThan(*sizep, scp->length)) {
2568 scp->truncPos = *sizep;
2569 scp->mask |= CM_SCACHEMASK_TRUNCPOS;
2571 /* in either case, the new file size has been changed */
2572 scp->length = *sizep;
2573 scp->mask |= CM_SCACHEMASK_LENGTH;
2575 else if (LargeIntegerGreaterThan(*sizep, scp->length)) {
2576 /* really extending the file */
2577 scp->length = *sizep;
2578 scp->mask |= CM_SCACHEMASK_LENGTH;
2581 /* done successfully */
2584 cm_SyncOpDone(scp, NULL,
2585 CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS
2586 | CM_SCACHESYNC_SETSTATUS | CM_SCACHESYNC_SETSIZE);
2589 lock_ReleaseWrite(&scp->rw);
2590 lock_ReleaseWrite(&scp->bufCreateLock);
2595 /* set the file size or other attributes (but not both at once) */
2596 long cm_SetAttr(cm_scache_t *scp, cm_attr_t *attrp, cm_user_t *userp,
2600 AFSFetchStatus afsOutStatus;
2604 AFSStoreStatus afsInStatus;
2605 struct rx_connection * callp;
2607 /* handle file length setting */
2608 if (attrp->mask & CM_ATTRMASK_LENGTH)
2609 return cm_SetLength(scp, &attrp->length, userp, reqp);
2611 lock_ObtainWrite(&scp->rw);
2612 /* otherwise, we have to make an RPC to get the status */
2613 code = cm_SyncOp(scp, NULL, userp, reqp, 0, CM_SCACHESYNC_STORESTATUS);
2615 lock_ReleaseWrite(&scp->rw);
2618 lock_ConvertWToR(&scp->rw);
2620 /* make the attr structure */
2621 cm_StatusFromAttr(&afsInStatus, scp, attrp);
2623 tfid.Volume = scp->fid.volume;
2624 tfid.Vnode = scp->fid.vnode;
2625 tfid.Unique = scp->fid.unique;
2626 lock_ReleaseRead(&scp->rw);
2628 /* now make the RPC */
2629 osi_Log1(afsd_logp, "CALL StoreStatus scp 0x%p", scp);
2631 code = cm_ConnFromFID(&scp->fid, userp, reqp, &connp);
2635 callp = cm_GetRxConn(connp);
2636 code = RXAFS_StoreStatus(callp, &tfid,
2637 &afsInStatus, &afsOutStatus, &volSync);
2638 rx_PutConnection(callp);
2640 } while (cm_Analyze(connp, userp, reqp,
2641 &scp->fid, &volSync, NULL, NULL, code));
2642 code = cm_MapRPCError(code, reqp);
2645 osi_Log1(afsd_logp, "CALL StoreStatus FAILURE, code 0x%x", code);
2647 osi_Log0(afsd_logp, "CALL StoreStatus SUCCESS");
2649 lock_ObtainWrite(&scp->rw);
2650 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_STORESTATUS);
2652 cm_MergeStatus(NULL, scp, &afsOutStatus, &volSync, userp,
2653 CM_MERGEFLAG_FORCE|CM_MERGEFLAG_STOREDATA);
2655 /* if we're changing the mode bits, discard the ACL cache,
2656 * since we changed the mode bits.
2658 if (afsInStatus.Mask & AFS_SETMODE)
2659 cm_FreeAllACLEnts(scp);
2660 lock_ReleaseWrite(&scp->rw);
2664 long cm_Create(cm_scache_t *dscp, char *namep, long flags, cm_attr_t *attrp,
2665 cm_scache_t **scpp, cm_user_t *userp, cm_req_t *reqp)
2670 cm_callbackRequest_t cbReq;
2673 cm_scache_t *scp = NULL;
2675 AFSStoreStatus inStatus;
2676 AFSFetchStatus updatedDirStatus;
2677 AFSFetchStatus newFileStatus;
2678 AFSCallBack newFileCallback;
2680 struct rx_connection * callp;
2683 /* can't create names with @sys in them; must expand it manually first.
2684 * return "invalid request" if they try.
2686 if (cm_ExpandSysName(namep, NULL, 0, 0)) {
2687 return CM_ERROR_ATSYS;
2690 #ifdef AFS_FREELANCE_CLIENT
2691 /* Freelance root volume does not hold files */
2692 if (cm_freelanceEnabled &&
2693 dscp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
2694 dscp->fid.volume==AFS_FAKE_ROOT_VOL_ID )
2696 return CM_ERROR_NOACCESS;
2698 #endif /* AFS_FREELANCE_CLIENT */
2700 /* before starting the RPC, mark that we're changing the file data, so
2701 * that someone who does a chmod will know to wait until our call
2704 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, &dirop);
2705 lock_ObtainWrite(&dscp->rw);
2706 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
2707 lock_ReleaseWrite(&dscp->rw);
2709 cm_StartCallbackGrantingCall(NULL, &cbReq);
2711 cm_EndDirOp(&dirop);
2718 cm_StatusFromAttr(&inStatus, NULL, attrp);
2720 /* try the RPC now */
2721 osi_Log1(afsd_logp, "CALL CreateFile scp 0x%p", dscp);
2723 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
2727 dirAFSFid.Volume = dscp->fid.volume;
2728 dirAFSFid.Vnode = dscp->fid.vnode;
2729 dirAFSFid.Unique = dscp->fid.unique;
2731 callp = cm_GetRxConn(connp);
2732 code = RXAFS_CreateFile(connp->callp, &dirAFSFid, namep,
2733 &inStatus, &newAFSFid, &newFileStatus,
2734 &updatedDirStatus, &newFileCallback,
2736 rx_PutConnection(callp);
2738 } while (cm_Analyze(connp, userp, reqp,
2739 &dscp->fid, &volSync, NULL, &cbReq, code));
2740 code = cm_MapRPCError(code, reqp);
2743 osi_Log1(afsd_logp, "CALL CreateFile FAILURE, code 0x%x", code);
2745 osi_Log0(afsd_logp, "CALL CreateFile SUCCESS");
2748 lock_ObtainWrite(&dirop.scp->dirlock);
2749 dirop.lockType = CM_DIRLOCK_WRITE;
2751 lock_ObtainWrite(&dscp->rw);
2752 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
2754 cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, CM_MERGEFLAG_DIROP);
2756 lock_ReleaseWrite(&dscp->rw);
2758 /* now try to create the file's entry, too, but be careful to
2759 * make sure that we don't merge in old info. Since we weren't locking
2760 * out any requests during the file's creation, we may have pretty old
2764 cm_SetFid(&newFid, dscp->fid.cell, dscp->fid.volume, newAFSFid.Vnode, newAFSFid.Unique);
2765 code = cm_GetSCache(&newFid, &scp, userp, reqp);
2767 lock_ObtainWrite(&scp->rw);
2768 scp->creator = userp; /* remember who created it */
2769 if (!cm_HaveCallback(scp)) {
2770 cm_MergeStatus(dscp, scp, &newFileStatus, &volSync,
2772 cm_EndCallbackGrantingCall(scp, &cbReq,
2773 &newFileCallback, 0);
2776 lock_ReleaseWrite(&scp->rw);
2781 /* make sure we end things properly */
2783 cm_EndCallbackGrantingCall(NULL, &cbReq, NULL, 0);
2785 if (scp && cm_CheckDirOpForSingleChange(&dirop)) {
2786 cm_DirCreateEntry(&dirop, namep, &newFid);
2788 cm_BPlusDirCreateEntry(&dirop, namep, &newFid);
2791 cm_EndDirOp(&dirop);
2796 long cm_FSync(cm_scache_t *scp, cm_user_t *userp, cm_req_t *reqp)
2800 code = buf_CleanVnode(scp, userp, reqp);
2802 lock_ObtainWrite(&scp->rw);
2804 if (scp->mask & (CM_SCACHEMASK_TRUNCPOS
2805 | CM_SCACHEMASK_CLIENTMODTIME
2806 | CM_SCACHEMASK_LENGTH))
2807 code = cm_StoreMini(scp, userp, reqp);
2809 if (scp->flags & (CM_SCACHEFLAG_OVERQUOTA | CM_SCACHEFLAG_OUTOFSPACE)) {
2810 code = (scp->flags & CM_SCACHEFLAG_OVERQUOTA) ? CM_ERROR_QUOTA : CM_ERROR_SPACE;
2811 scp->flags &= ~(CM_SCACHEFLAG_OVERQUOTA | CM_SCACHEFLAG_OUTOFSPACE);
2814 lock_ReleaseWrite(&scp->rw);
2819 long cm_MakeDir(cm_scache_t *dscp, char *namep, long flags, cm_attr_t *attrp,
2820 cm_user_t *userp, cm_req_t *reqp)
2825 cm_callbackRequest_t cbReq;
2828 cm_scache_t *scp = NULL;
2830 AFSStoreStatus inStatus;
2831 AFSFetchStatus updatedDirStatus;
2832 AFSFetchStatus newDirStatus;
2833 AFSCallBack newDirCallback;
2835 struct rx_connection * callp;
2838 /* can't create names with @sys in them; must expand it manually first.
2839 * return "invalid request" if they try.
2841 if (cm_ExpandSysName(namep, NULL, 0, 0)) {
2842 return CM_ERROR_ATSYS;
2845 #ifdef AFS_FREELANCE_CLIENT
2846 /* Freelance root volume does not hold subdirectories */
2847 if (cm_freelanceEnabled &&
2848 dscp->fid.cell==AFS_FAKE_ROOT_CELL_ID &&
2849 dscp->fid.volume==AFS_FAKE_ROOT_VOL_ID )
2851 return CM_ERROR_NOACCESS;
2853 #endif /* AFS_FREELANCE_CLIENT */
2855 /* before starting the RPC, mark that we're changing the directory
2856 * data, so that someone who does a chmod on the dir will wait until
2857 * our call completes.
2859 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, &dirop);
2860 lock_ObtainWrite(&dscp->rw);
2861 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
2862 lock_ReleaseWrite(&dscp->rw);
2864 cm_StartCallbackGrantingCall(NULL, &cbReq);
2866 cm_EndDirOp(&dirop);
2873 cm_StatusFromAttr(&inStatus, NULL, attrp);
2875 /* try the RPC now */
2876 osi_Log1(afsd_logp, "CALL MakeDir scp 0x%p", dscp);
2878 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
2882 dirAFSFid.Volume = dscp->fid.volume;
2883 dirAFSFid.Vnode = dscp->fid.vnode;
2884 dirAFSFid.Unique = dscp->fid.unique;
2886 callp = cm_GetRxConn(connp);
2887 code = RXAFS_MakeDir(connp->callp, &dirAFSFid, namep,
2888 &inStatus, &newAFSFid, &newDirStatus,
2889 &updatedDirStatus, &newDirCallback,
2891 rx_PutConnection(callp);
2893 } while (cm_Analyze(connp, userp, reqp,
2894 &dscp->fid, &volSync, NULL, &cbReq, code));
2895 code = cm_MapRPCError(code, reqp);
2898 osi_Log1(afsd_logp, "CALL MakeDir FAILURE, code 0x%x", code);
2900 osi_Log0(afsd_logp, "CALL MakeDir SUCCESS");
2903 lock_ObtainWrite(&dirop.scp->dirlock);
2904 dirop.lockType = CM_DIRLOCK_WRITE;
2906 lock_ObtainWrite(&dscp->rw);
2907 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
2909 cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, CM_MERGEFLAG_DIROP);
2911 lock_ReleaseWrite(&dscp->rw);
2913 /* now try to create the new dir's entry, too, but be careful to
2914 * make sure that we don't merge in old info. Since we weren't locking
2915 * out any requests during the file's creation, we may have pretty old
2919 cm_SetFid(&newFid, dscp->fid.cell, dscp->fid.volume, newAFSFid.Vnode, newAFSFid.Unique);
2920 code = cm_GetSCache(&newFid, &scp, userp, reqp);
2922 lock_ObtainWrite(&scp->rw);
2923 if (!cm_HaveCallback(scp)) {
2924 cm_MergeStatus(dscp, scp, &newDirStatus, &volSync,
2926 cm_EndCallbackGrantingCall(scp, &cbReq,
2927 &newDirCallback, 0);
2930 lock_ReleaseWrite(&scp->rw);
2931 cm_ReleaseSCache(scp);
2935 /* make sure we end things properly */
2937 cm_EndCallbackGrantingCall(NULL, &cbReq, NULL, 0);
2939 if (scp && cm_CheckDirOpForSingleChange(&dirop)) {
2940 cm_DirCreateEntry(&dirop, namep, &newFid);
2942 cm_BPlusDirCreateEntry(&dirop, namep, &newFid);
2945 cm_EndDirOp(&dirop);
2947 /* and return error code */
2951 long cm_Link(cm_scache_t *dscp, char *namep, cm_scache_t *sscp, long flags,
2952 cm_user_t *userp, cm_req_t *reqp)
2957 AFSFid existingAFSFid;
2958 AFSFetchStatus updatedDirStatus;
2959 AFSFetchStatus newLinkStatus;
2961 struct rx_connection * callp;
2964 if (dscp->fid.cell != sscp->fid.cell ||
2965 dscp->fid.volume != sscp->fid.volume) {
2966 return CM_ERROR_CROSSDEVLINK;
2969 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, &dirop);
2970 lock_ObtainWrite(&dscp->rw);
2971 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
2972 lock_ReleaseWrite(&dscp->rw);
2974 cm_EndDirOp(&dirop);
2979 /* try the RPC now */
2980 osi_Log1(afsd_logp, "CALL Link scp 0x%p", dscp);
2982 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
2985 dirAFSFid.Volume = dscp->fid.volume;
2986 dirAFSFid.Vnode = dscp->fid.vnode;
2987 dirAFSFid.Unique = dscp->fid.unique;
2989 existingAFSFid.Volume = sscp->fid.volume;
2990 existingAFSFid.Vnode = sscp->fid.vnode;
2991 existingAFSFid.Unique = sscp->fid.unique;
2993 callp = cm_GetRxConn(connp);
2994 code = RXAFS_Link(callp, &dirAFSFid, namep, &existingAFSFid,
2995 &newLinkStatus, &updatedDirStatus, &volSync);
2996 rx_PutConnection(callp);
2997 osi_Log1(afsd_logp," RXAFS_Link returns 0x%x", code);
2999 } while (cm_Analyze(connp, userp, reqp,
3000 &dscp->fid, &volSync, NULL, NULL, code));
3002 code = cm_MapRPCError(code, reqp);
3005 osi_Log1(afsd_logp, "CALL Link FAILURE, code 0x%x", code);
3007 osi_Log0(afsd_logp, "CALL Link SUCCESS");
3010 lock_ObtainWrite(&dirop.scp->dirlock);
3011 dirop.lockType = CM_DIRLOCK_WRITE;
3013 lock_ObtainWrite(&dscp->rw);
3014 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
3016 cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, CM_MERGEFLAG_DIROP);
3018 lock_ReleaseWrite(&dscp->rw);
3021 if (cm_CheckDirOpForSingleChange(&dirop)) {
3022 cm_DirCreateEntry(&dirop, namep, &sscp->fid);
3024 cm_BPlusDirCreateEntry(&dirop, namep, &sscp->fid);
3028 cm_EndDirOp(&dirop);
3033 long cm_SymLink(cm_scache_t *dscp, char *namep, char *contentsp, long flags,
3034 cm_attr_t *attrp, cm_user_t *userp, cm_req_t *reqp)
3042 AFSStoreStatus inStatus;
3043 AFSFetchStatus updatedDirStatus;
3044 AFSFetchStatus newLinkStatus;
3046 struct rx_connection * callp;
3049 /* before starting the RPC, mark that we're changing the directory data,
3050 * so that someone who does a chmod on the dir will wait until our
3053 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, &dirop);
3054 lock_ObtainWrite(&dscp->rw);
3055 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
3056 lock_ReleaseWrite(&dscp->rw);
3058 cm_EndDirOp(&dirop);
3063 cm_StatusFromAttr(&inStatus, NULL, attrp);
3065 /* try the RPC now */
3066 osi_Log1(afsd_logp, "CALL Symlink scp 0x%p", dscp);
3068 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
3072 dirAFSFid.Volume = dscp->fid.volume;
3073 dirAFSFid.Vnode = dscp->fid.vnode;
3074 dirAFSFid.Unique = dscp->fid.unique;
3076 callp = cm_GetRxConn(connp);
3077 code = RXAFS_Symlink(callp, &dirAFSFid, namep, contentsp,
3078 &inStatus, &newAFSFid, &newLinkStatus,
3079 &updatedDirStatus, &volSync);
3080 rx_PutConnection(callp);
3082 } while (cm_Analyze(connp, userp, reqp,
3083 &dscp->fid, &volSync, NULL, NULL, code));
3084 code = cm_MapRPCError(code, reqp);
3087 osi_Log1(afsd_logp, "CALL Symlink FAILURE, code 0x%x", code);
3089 osi_Log0(afsd_logp, "CALL Symlink SUCCESS");
3092 lock_ObtainWrite(&dirop.scp->dirlock);
3093 dirop.lockType = CM_DIRLOCK_WRITE;
3095 lock_ObtainWrite(&dscp->rw);
3096 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
3098 cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, CM_MERGEFLAG_DIROP);
3100 lock_ReleaseWrite(&dscp->rw);
3103 if (cm_CheckDirOpForSingleChange(&dirop)) {
3104 cm_SetFid(&newFid, dscp->fid.cell, dscp->fid.volume, newAFSFid.Vnode, newAFSFid.Unique);
3106 cm_DirCreateEntry(&dirop, namep, &newFid);
3108 cm_BPlusDirCreateEntry(&dirop, namep, &newFid);
3112 cm_EndDirOp(&dirop);
3114 /* now try to create the new dir's entry, too, but be careful to
3115 * make sure that we don't merge in old info. Since we weren't locking
3116 * out any requests during the file's creation, we may have pretty old
3120 cm_SetFid(&newFid, dscp->fid.cell, dscp->fid.volume, newAFSFid.Vnode, newAFSFid.Unique);
3121 code = cm_GetSCache(&newFid, &scp, userp, reqp);
3123 lock_ObtainWrite(&scp->rw);
3124 if (!cm_HaveCallback(scp)) {
3125 cm_MergeStatus(dscp, scp, &newLinkStatus, &volSync,
3128 lock_ReleaseWrite(&scp->rw);
3129 cm_ReleaseSCache(scp);
3133 /* and return error code */
3137 /*! \brief Remove a directory
3139 Encapsulates a call to RXAFS_RemoveDir().
3141 \param[in] dscp cm_scache_t for the directory containing the
3142 directory to be removed.
3144 \param[in] namep Non-normalized name of the directory to be
3145 removed. This will be the name that is passed in to
3148 \param[in] normalizedNamep Normalized name used to update the local
3151 \param[in] userp cm_user_t for the request.
3153 \param[in] reqp Request tracker.
3155 long cm_RemoveDir(cm_scache_t *dscp, char *namep, char *normalizedNamep,
3156 cm_user_t *userp, cm_req_t *reqp)
3162 AFSFetchStatus updatedDirStatus;
3164 struct rx_connection * callp;
3167 /* before starting the RPC, mark that we're changing the directory data,
3168 * so that someone who does a chmod on the dir will wait until our
3171 cm_BeginDirOp(dscp, userp, reqp, CM_DIRLOCK_NONE, &dirop);
3172 lock_ObtainWrite(&dscp->rw);
3173 code = cm_SyncOp(dscp, NULL, userp, reqp, 0, CM_SCACHESYNC_STOREDATA);
3174 lock_ReleaseWrite(&dscp->rw);
3176 cm_EndDirOp(&dirop);
3181 /* try the RPC now */
3182 osi_Log1(afsd_logp, "CALL RemoveDir scp 0x%p", dscp);
3184 code = cm_ConnFromFID(&dscp->fid, userp, reqp, &connp);
3188 dirAFSFid.Volume = dscp->fid.volume;
3189 dirAFSFid.Vnode = dscp->fid.vnode;
3190 dirAFSFid.Unique = dscp->fid.unique;
3192 callp = cm_GetRxConn(connp);
3193 code = RXAFS_RemoveDir(callp, &dirAFSFid, namep,
3194 &updatedDirStatus, &volSync);
3195 rx_PutConnection(callp);
3197 } while (cm_Analyze(connp, userp, reqp,
3198 &dscp->fid, &volSync, NULL, NULL, code));
3199 code = cm_MapRPCErrorRmdir(code, reqp);
3202 osi_Log1(afsd_logp, "CALL RemoveDir FAILURE, code 0x%x", code);
3204 osi_Log0(afsd_logp, "CALL RemoveDir SUCCESS");
3207 lock_ObtainWrite(&dirop.scp->dirlock);
3208 dirop.lockType = CM_DIRLOCK_WRITE;
3210 lock_ObtainWrite(&dscp->rw);
3211 cm_SyncOpDone(dscp, NULL, CM_SCACHESYNC_STOREDATA);
3213 cm_dnlcRemove(dscp, normalizedNamep);
3214 cm_MergeStatus(NULL, dscp, &updatedDirStatus, &volSync, userp, CM_MERGEFLAG_DIROP);
3216 lock_ReleaseWrite(&dscp->rw);
3219 if (cm_CheckDirOpForSingleChange(&dirop) && normalizedNamep != NULL) {
3220 cm_DirDeleteEntry(&dirop, namep);
3222 cm_BPlusDirDeleteEntry(&dirop, normalizedNamep);
3226 cm_EndDirOp(&dirop);
3228 /* and return error code */
3232 long cm_Open(cm_scache_t *scp, int type, cm_user_t *userp)
3234 /* grab mutex on contents */
3235 lock_ObtainWrite(&scp->rw);
3237 /* reset the prefetch info */
3238 scp->prefetch.base.LowPart = 0; /* base */
3239 scp->prefetch.base.HighPart = 0;
3240 scp->prefetch.end.LowPart = 0; /* and end */
3241 scp->prefetch.end.HighPart = 0;
3243 /* release mutex on contents */
3244 lock_ReleaseWrite(&scp->rw);
3250 /*! \brief Rename a file or directory
3252 Encapsulates a RXAFS_Rename() call.
3254 \param[in] oldDscp cm_scache_t for the directory containing the old
3257 \param[in] oldNamep Non-normalized old name. This is the name that
3258 will be passed into the RXAFS_Rename().
3260 \param[in] normalizedOldNamep Normalized old name. This is used for
3261 updating local directory caches.
3263 \param[in] newDscp cm_scache_t for the directory containing the new
3266 \param[in] newNamep New name. Normalized.
3268 \param[in] userp cm_user_t for the request.
3270 \param[in,out] reqp Request tracker.
3273 long cm_Rename(cm_scache_t *oldDscp, char *oldNamep, char *normalizedOldNamep,
3274 cm_scache_t *newDscp, char *newNamep, cm_user_t *userp,
3279 AFSFid oldDirAFSFid;
3280 AFSFid newDirAFSFid;
3282 AFSFetchStatus updatedOldDirStatus;
3283 AFSFetchStatus updatedNewDirStatus;
3286 struct rx_connection * callp;
3287 cm_dirOp_t oldDirOp;
3290 cm_dirOp_t newDirOp;
3292 /* before starting the RPC, mark that we're changing the directory data,
3293 * so that someone who does a chmod on the dir will wait until our call
3294 * completes. We do this in vnode order so that we don't deadlock,
3295 * which makes the code a little verbose.
3297 if (oldDscp == newDscp) {
3298 /* check for identical names */
3299 if (strcmp(oldNamep, newNamep) == 0)
3300 return CM_ERROR_RENAME_IDENTICAL;
3303 cm_BeginDirOp(oldDscp, userp, reqp, CM_DIRLOCK_NONE, &oldDirOp);
3304 lock_ObtainWrite(&oldDscp->rw);
3305 cm_dnlcRemove(oldDscp, normalizedOldNamep);
3306 cm_dnlcRemove(oldDscp, newNamep);
3307 code = cm_SyncOp(oldDscp, NULL, userp, reqp, 0,
3308 CM_SCACHESYNC_STOREDATA);
3309 lock_ReleaseWrite(&oldDscp->rw);
3311 cm_EndDirOp(&oldDirOp);
3315 /* two distinct dir vnodes */
3317 if (oldDscp->fid.cell != newDscp->fid.cell ||
3318 oldDscp->fid.volume != newDscp->fid.volume)
3319 return CM_ERROR_CROSSDEVLINK;
3321 /* shouldn't happen that we have distinct vnodes for two
3322 * different files, but could due to deliberate attack, or
3323 * stale info. Avoid deadlocks and quit now.
3325 if (oldDscp->fid.vnode == newDscp->fid.vnode)
3326 return CM_ERROR_CROSSDEVLINK;
3328 if (oldDscp->fid.vnode < newDscp->fid.vnode) {
3329 cm_BeginDirOp(oldDscp, userp, reqp, CM_DIRLOCK_NONE, &oldDirOp);
3330 lock_ObtainWrite(&oldDscp->rw);
3331 cm_dnlcRemove(oldDscp, normalizedOldNamep);
3332 code = cm_SyncOp(oldDscp, NULL, userp, reqp, 0,
3333 CM_SCACHESYNC_STOREDATA);
3334 lock_ReleaseWrite(&oldDscp->rw);
3336 cm_EndDirOp(&oldDirOp);
3338 cm_BeginDirOp(newDscp, userp, reqp, CM_DIRLOCK_NONE, &newDirOp);
3339 lock_ObtainWrite(&newDscp->rw);
3340 cm_dnlcRemove(newDscp, newNamep);
3341 code = cm_SyncOp(newDscp, NULL, userp, reqp, 0,
3342 CM_SCACHESYNC_STOREDATA);
3343 lock_ReleaseWrite(&newDscp->rw);
3345 cm_EndDirOp(&newDirOp);
3347 /* cleanup first one */
3348 lock_ObtainWrite(&oldDscp->rw);
3349 cm_SyncOpDone(oldDscp, NULL,
3350 CM_SCACHESYNC_STOREDATA);
3351 lock_ReleaseWrite(&oldDscp->rw);
3352 cm_EndDirOp(&oldDirOp);
3357 /* lock the new vnode entry first */
3358 cm_BeginDirOp(newDscp, userp, reqp, CM_DIRLOCK_NONE, &newDirOp);
3359 lock_ObtainWrite(&newDscp->rw);
3360 cm_dnlcRemove(newDscp, newNamep);
3361 code = cm_SyncOp(newDscp, NULL, userp, reqp, 0,
3362 CM_SCACHESYNC_STOREDATA);
3363 lock_ReleaseWrite(&newDscp->rw);
3365 cm_EndDirOp(&newDirOp);
3367 cm_BeginDirOp(oldDscp, userp, reqp, CM_DIRLOCK_NONE, &oldDirOp);
3368 lock_ObtainWrite(&oldDscp->rw);
3369 cm_dnlcRemove(oldDscp, normalizedOldNamep);
3370 code = cm_SyncOp(oldDscp, NULL, userp, reqp, 0,
3371 CM_SCACHESYNC_STOREDATA);
3372 lock_ReleaseWrite(&oldDscp->rw);
3374 cm_EndDirOp(&oldDirOp);
3376 /* cleanup first one */
3377 lock_ObtainWrite(&newDscp->rw);
3378 cm_SyncOpDone(newDscp, NULL,
3379 CM_SCACHESYNC_STOREDATA);
3380 lock_ReleaseWrite(&newDscp->rw);
3381 cm_EndDirOp(&newDirOp);
3385 } /* two distinct vnodes */
3392 /* try the RPC now */
3393 osi_Log2(afsd_logp, "CALL Rename old scp 0x%p new scp 0x%p",
3396 code = cm_ConnFromFID(&oldDscp->fid, userp, reqp, &connp);
3400 oldDirAFSFid.Volume = oldDscp->fid.volume;
3401 oldDirAFSFid.Vnode = oldDscp->fid.vnode;
3402 oldDirAFSFid.Unique = oldDscp->fid.unique;
3403 newDirAFSFid.Volume = newDscp->fid.volume;
3404 newDirAFSFid.Vnode = newDscp->fid.vnode;
3405 newDirAFSFid.Unique = newDscp->fid.unique;
3407 callp = cm_GetRxConn(connp);
3408 code = RXAFS_Rename(callp, &oldDirAFSFid, oldNamep,
3409 &newDirAFSFid, newNamep,
3410 &updatedOldDirStatus, &updatedNewDirStatus,
3412 rx_PutConnection(callp);
3414 } while (cm_Analyze(connp, userp, reqp, &oldDscp->fid,
3415 &volSync, NULL, NULL, code));
3416 code = cm_MapRPCError(code, reqp);
3419 osi_Log1(afsd_logp, "CALL Rename FAILURE, code 0x%x", code);
3421 osi_Log0(afsd_logp, "CALL Rename SUCCESS");
3423 /* update the individual stat cache entries for the directories */
3425 lock_ObtainWrite(&oldDirOp.scp->dirlock);
3426 oldDirOp.lockType = CM_DIRLOCK_WRITE;
3428 lock_ObtainWrite(&oldDscp->rw);
3429 cm_SyncOpDone(oldDscp, NULL, CM_SCACHESYNC_STOREDATA);
3432 cm_MergeStatus(NULL, oldDscp, &updatedOldDirStatus, &volSync,
3433 userp, CM_MERGEFLAG_DIROP);
3434 lock_ReleaseWrite(&oldDscp->rw);
3437 if (cm_CheckDirOpForSingleChange(&oldDirOp)) {
3440 diropCode = cm_BPlusDirLookup(&oldDirOp, normalizedOldNamep, &fileFid);
3441 if (diropCode == CM_ERROR_INEXACT_MATCH)
3443 else if (diropCode == EINVAL)
3445 diropCode = cm_DirLookup(&oldDirOp, oldNamep, &fileFid);
3447 if (diropCode == 0) {
3449 diropCode = cm_DirCreateEntry(&oldDirOp, newNamep, &fileFid);
3451 cm_BPlusDirCreateEntry(&oldDirOp, newNamep, &fileFid);
3455 if (diropCode == 0) {
3456 diropCode = cm_DirDeleteEntry(&oldDirOp, oldNamep);
3458 cm_BPlusDirDeleteEntry(&oldDirOp, normalizedOldNamep);
3464 cm_EndDirOp(&oldDirOp);
3466 /* and update it for the new one, too, if necessary */
3469 lock_ObtainWrite(&newDirOp.scp->dirlock);
3470 newDirOp.lockType = CM_DIRLOCK_WRITE;
3472 lock_ObtainWrite(&newDscp->rw);
3473 cm_SyncOpDone(newDscp, NULL, CM_SCACHESYNC_STOREDATA);
3475 cm_MergeStatus(NULL, newDscp, &updatedNewDirStatus, &volSync,
3476 userp, CM_MERGEFLAG_DIROP);
3477 lock_ReleaseWrite(&newDscp->rw);
3480 /* we only make the local change if we successfully made
3481 the change in the old directory AND there was only one
3482 change in the new directory */
3483 if (diropCode == 0 && cm_CheckDirOpForSingleChange(&newDirOp)) {
3484 cm_DirCreateEntry(&newDirOp, newNamep, &fileFid);
3486 cm_BPlusDirCreateEntry(&newDirOp, newNamep, &fileFid);
3490 cm_EndDirOp(&newDirOp);
3493 /* and return error code */
3497 /* Byte range locks:
3499 The OpenAFS Windows client has to fake byte range locks given no
3500 server side support for such locks. This is implemented as keyed
3501 byte range locks on the cache manager.
3503 Keyed byte range locks:
3505 Each cm_scache_t structure keeps track of a list of keyed locks.
3506 The key for a lock identifies an owner of a set of locks (referred
3507 to as a client). Each key is represented by a value. The set of
3508 key values used within a specific cm_scache_t structure form a
3509 namespace that has a scope of just that cm_scache_t structure. The
3510 same key value can be used with another cm_scache_t structure and
3511 correspond to a completely different client. However it is
3512 advantageous for the SMB or IFS layer to make sure that there is a
3513 1-1 mapping between client and keys over all cm_scache_t objects.
3515 Assume a client C has key Key(C) (although, since the scope of the
3516 key is a cm_scache_t, the key can be Key(C,S), where S is the
3517 cm_scache_t. But assume a 1-1 relation between keys and clients).
3518 A byte range (O,+L) denotes byte addresses (O) through (O+L-1)
3519 inclusive (a.k.a. [O,O+L-1]). The function Key(x) is implemented
3520 through cm_generateKey() function for both SMB and IFS.
3522 The list of locks for a cm_scache_t object S is maintained in
3523 S->fileLocks. The cache manager will set a lock on the AFS file
3524 server in order to assert the locks in S->fileLocks. If only
3525 shared locks are in place for S, then the cache manager will obtain
3526 a LockRead lock, while if there are any exclusive locks, it will
3527 obtain a LockWrite lock. If the exclusive locks are all released
3528 while the shared locks remain, then the cache manager will
3529 downgrade the lock from LockWrite to LockRead. Similarly, if an
3530 exclusive lock is obtained when only shared locks exist, then the
3531 cache manager will try to upgrade the lock from LockRead to
3534 Each lock L owned by client C maintains a key L->key such that
3535 L->key == Key(C), the effective range defined by L->LOffset and
3536 L->LLength such that the range of bytes affected by the lock is
3537 (L->LOffset, +L->LLength), a type maintained in L->LockType which
3538 is either exclusive or shared.
3542 A lock exists iff it is in S->fileLocks for some cm_scache_t
3543 S. Existing locks are in one of the following states: ACTIVE,
3544 WAITLOCK, WAITUNLOCK, LOST, DELETED.
3546 The following sections describe each lock and the associated
3549 1. ACTIVE: A lock L is ACTIVE iff the cache manager has asserted
3550 the lock with the AFS file server. This type of lock can be
3551 exercised by a client to read or write to the locked region (as
3554 1.1 ACTIVE->LOST: When the AFS file server fails to extend a
3555 server lock that was required to assert the lock. Before
3556 marking the lock as lost, the cache manager checks if the file
3557 has changed on the server. If the file has not changed, then
3558 the cache manager will attempt to obtain a new server lock
3559 that is sufficient to assert the client side locks for the
3560 file. If any of these fail, the lock is marked as LOST.
3561 Otherwise, it is left as ACTIVE.
3563 1.2 ACTIVE->DELETED: Lock is released.
3565 2. WAITLOCK: A lock is in a WAITLOCK state if the cache manager
3566 grants the lock but the lock is yet to be asserted with the AFS
3567 file server. Once the file server grants the lock, the state
3568 will transition to an ACTIVE lock.
3570 2.1 WAITLOCK->ACTIVE: The server granted the lock.
3572 2.2 WAITLOCK->DELETED: Lock is abandoned, or timed out during
3575 2.3 WAITLOCK->LOST: One or more locks from this client were
3576 marked as LOST. No further locks will be granted to this
3577 client until all lost locks are removed.
3579 3. WAITUNLOCK: A lock is in a WAITUNLOCK state if the cache manager
3580 receives a request for a lock that conflicts with an existing
3581 ACTIVE or WAITLOCK lock. The lock will be placed in the queue
3582 and will be granted at such time the conflicting locks are
3583 removed, at which point the state will transition to either
3586 3.1 WAITUNLOCK->ACTIVE: The conflicting lock was removed. The
3587 current serverLock is sufficient to assert this lock, or a
3588 sufficient serverLock is obtained.
3590 3.2 WAITUNLOCK->WAITLOCK: The conflicting lock was removed,
3591 however the required serverLock is yet to be asserted with the
3594 3.3 WAITUNLOCK->DELETED: The lock is abandoned, timed out or
3597 3.5 WAITUNLOCK->LOST: One or more locks from this client were
3598 marked as LOST. No further locks will be granted to this
3599 client until all lost locks are removed.
3601 4. LOST: A lock L is LOST if the server lock that was required to
3602 assert the lock could not be obtained or if it could not be
3603 extended, or if other locks by the same client were LOST.
3604 Essentially, once a lock is LOST, the contract between the cache
3605 manager and that specific client is no longer valid.
3607 The cache manager rechecks the server lock once every minute and
3608 extends it as appropriate. If this is not done for 5 minutes,
3609 the AFS file server will release the lock (the 5 minute timeout
3610 is based on current file server code and is fairly arbitrary).
3611 Once released, the lock cannot be re-obtained without verifying
3612 that the contents of the file hasn't been modified since the
3613 time the lock was released. Re-obtaining the lock without
3614 verifying this may lead to data corruption. If the lock can not
3615 be obtained safely, then all active locks for the cm_scache_t
3618 4.1 LOST->DELETED: The lock is released.
3620 5. DELETED: The lock is no longer relevant. Eventually, it will
3621 get removed from the cm_scache_t. In the meantime, it will be
3622 treated as if it does not exist.
3624 5.1 DELETED->not exist: The lock is removed from the
3627 The following are classifications of locks based on their state.
3629 6* A lock L is ACCEPTED if it is ACTIVE or WAITLOCK. These locks
3630 have been accepted by the cache manager, but may or may not have
3631 been granted back to the client.
3633 7* A lock L is QUEUED if it is ACTIVE, WAITLOCK or WAITUNLOCK.
3635 8* A lock L is WAITING if it is WAITLOCK or WAITUNLOCK.
3639 A client C can READ range (Offset,+Length) of a file represented by
3640 cm_scache_t S iff (1):
3642 1. for all _a_ in (Offset,+Length), all of the following is true:
3644 1.1 For each ACTIVE lock L in S->fileLocks such that _a_ in
3645 (L->LOffset,+L->LLength); L->key == Key(C) OR L->LockType is
3648 1.2 For each LOST lock L in S->fileLocks such that _a_ in
3649 (L->LOffset,+L->LLength); L->LockType is shared AND L->key !=
3652 (When locks are lost on an cm_scache_t, all locks are lost. By
3653 4.2 (below), if there is an exclusive LOST lock, then there
3654 can't be any overlapping ACTIVE locks.)
3656 A client C can WRITE range (Offset,+Length) of cm_scache_t S iff (2):
3658 2. for all _a_ in (Offset,+Length), one of the following is true:
3660 2.1 Byte _a_ of S is unowned (as specified in 1.1) AND there
3661 does not exist a LOST lock L such that _a_ in
3662 (L->LOffset,+L->LLength).
3664 2.2 Byte _a_ of S is owned by C under lock L (as specified in
3665 1.2) AND L->LockType is exclusive.
3667 A client C can OBTAIN a lock L on cm_scache_t S iff (both 3 and 4):
3669 3. for all _a_ in (L->LOffset,+L->LLength), ALL of the following is
3672 3.1 If L->LockType is exclusive then there does NOT exist a
3673 ACCEPTED lock M in S->fileLocks such that _a_ in
3674 (M->LOffset,+M->LLength).
3676 (If we count all QUEUED locks then we hit cases such as
3677 cascading waiting locks where the locks later on in the queue
3678 can be granted without compromising file integrity. On the
3679 other hand if only ACCEPTED locks are considered, then locks
3680 that were received earlier may end up waiting for locks that
3681 were received later to be unlocked. The choice of ACCEPTED
3682 locks was made to mimic the Windows byte range lock
3685 3.2 If L->LockType is shared then for each ACCEPTED lock M in
3686 S->fileLocks, if _a_ in (M->LOffset,+M->LLength) then
3687 M->LockType is shared.
3689 4. For all LOST locks M in S->fileLocks, ALL of the following are true:
3691 4.1 M->key != Key(C)
3693 4.2 If M->LockType is exclusive, then (L->LOffset,+L->LLength)
3694 and (M->LOffset,+M->LLength) do not intersect.
3696 (Note: If a client loses a lock, it loses all locks.
3697 Subsequently, it will not be allowed to obtain any more locks
3698 until all existing LOST locks that belong to the client are
3699 released. Once all locks are released by a single client,
3700 there exists no further contract between the client and AFS
3701 about the contents of the file, hence the client can then
3702 proceed to obtain new locks and establish a new contract.
3704 This doesn't quite work as you think it should, because most
3705 applications aren't built to deal with losing locks they
3706 thought they once had. For now, we don't have a good
3707 solution to lost locks.
3709 Also, for consistency reasons, we have to hold off on
3710 granting locks that overlap exclusive LOST locks.)
3712 A client C can only unlock locks L in S->fileLocks which have
3715 The representation and invariants are as follows:
3717 - Each cm_scache_t structure keeps:
3719 - A queue of byte-range locks (cm_scache_t::fileLocks) which
3720 are of type cm_file_lock_t.
3722 - A record of the highest server-side lock that has been
3723 obtained for this object (cm_scache_t::serverLock), which is
3724 one of (-1), LockRead, LockWrite.
3726 - A count of ACCEPTED exclusive and shared locks that are in the
3727 queue (cm_scache_t::sharedLocks and
3728 cm_scache_t::exclusiveLocks)
3730 - Each cm_file_lock_t structure keeps:
3732 - The type of lock (cm_file_lock_t::LockType)
3734 - The key associated with the lock (cm_file_lock_t::key)
3736 - The offset and length of the lock (cm_file_lock_t::LOffset
3737 and cm_file_lock_t::LLength)
3739 - The state of the lock.
3741 - Time of issuance or last successful extension
3743 Semantic invariants:
3745 I1. The number of ACCEPTED locks in S->fileLocks are
3746 (S->sharedLocks + S->exclusiveLocks)
3748 External invariants:
3750 I3. S->serverLock is the lock that we have asserted with the
3751 AFS file server for this cm_scache_t.
3753 I4. S->serverLock == LockRead iff there is at least one ACTIVE
3754 shared lock, but no ACTIVE exclusive locks.
3756 I5. S->serverLock == LockWrite iff there is at least one ACTIVE
3759 I6. If L is a LOST lock, then for each lock M in S->fileLocks,
3760 M->key == L->key IMPLIES M is LOST or DELETED.
3765 #define IS_LOCK_ACTIVE(lockp) (((lockp)->flags & (CM_FILELOCK_FLAG_DELETED|CM_FILELOCK_FLAG_WAITLOCK|CM_FILELOCK_FLAG_WAITUNLOCK|CM_FILELOCK_FLAG_LOST)) == 0)
3767 #define IS_LOCK_WAITLOCK(lockp) (((lockp)->flags & (CM_FILELOCK_FLAG_DELETED|CM_FILELOCK_FLAG_WAITLOCK|CM_FILELOCK_FLAG_WAITUNLOCK|CM_FILELOCK_FLAG_LOST)) == CM_FILELOCK_FLAG_WAITLOCK)
3769 #define IS_LOCK_WAITUNLOCK(lockp) (((lockp)->flags & (CM_FILELOCK_FLAG_DELETED|CM_FILELOCK_FLAG_WAITLOCK|CM_FILELOCK_FLAG_WAITUNLOCK|CM_FILELOCK_FLAG_LOST)) == CM_FILELOCK_FLAG_WAITUNLOCK)
3771 #define IS_LOCK_LOST(lockp) (((lockp)->flags & (CM_FILELOCK_FLAG_DELETED|CM_FILELOCK_FLAG_LOST)) == CM_FILELOCK_FLAG_LOST)
3773 #define IS_LOCK_DELETED(lockp) (((lockp)->flags & CM_FILELOCK_FLAG_DELETED) == CM_FILELOCK_FLAG_DELETED)
3776 #define IS_LOCK_ACCEPTED(lockp) (IS_LOCK_ACTIVE(lockp) || IS_LOCK_WAITLOCK(lockp))
3779 #define IS_LOCK_CLIENTONLY(lockp) ((((lockp)->scp->flags & CM_SCACHEFLAG_RO) == CM_SCACHEFLAG_RO) || (((lockp)->flags & CM_FILELOCK_FLAG_CLIENTONLY) == CM_FILELOCK_FLAG_CLIENTONLY))
3782 #define INTERSECT_RANGE(r1,r2) (((r2).offset+(r2).length) > (r1).offset && ((r1).offset +(r1).length) > (r2).offset)
3785 #define CONTAINS_RANGE(r1,r2) (((r2).offset+(r2).length) <= ((r1).offset+(r1).length) && (r1).offset <= (r2).offset)
3787 #if defined(VICED_CAPABILITY_USE_BYTE_RANGE_LOCKS) && !defined(LOCK_TESTING)
3788 #define SCP_SUPPORTS_BRLOCKS(scp) ((scp)->cbServerp && ((scp)->cbServerp->capabilities & VICED_CAPABILITY_USE_BYTE_RANGE_LOCKS))
3790 #define SCP_SUPPORTS_BRLOCKS(scp) (1)
3793 #define SERVERLOCKS_ENABLED(scp) (!((scp)->flags & CM_SCACHEFLAG_RO) && cm_enableServerLocks && SCP_SUPPORTS_BRLOCKS(scp))
3795 #if defined(VICED_CAPABILITY_WRITELOCKACL)
3796 #define SCP_SUPPORTS_WRITELOCKACL(scp) ((scp)->cbServerp && ((scp->cbServerp->capabilities & VICED_CAPABILITY_WRITELOCKACL)))
3798 #define SCP_SUPPORTS_WRITELOCKACL(scp) (0)
3800 /* This should really be defined in any build that this code is being
3802 #error VICED_CAPABILITY_WRITELOCKACL not defined.
3805 static void cm_LockRangeSubtract(cm_range_t * pos, const cm_range_t * neg)
3807 afs_int64 int_begin;
3810 int_begin = MAX(pos->offset, neg->offset);
3811 int_end = MIN(pos->offset+pos->length, neg->offset+neg->length);
3813 if (int_begin < int_end) {
3814 if (int_begin == pos->offset) {
3815 pos->length = pos->offset + pos->length - int_end;
3816 pos->offset = int_end;
3817 } else if (int_end == pos->offset + pos->length) {
3818 pos->length = int_begin - pos->offset;
3821 /* We only subtract ranges if the resulting range is
3822 contiguous. If we try to support non-contigous ranges, we
3823 aren't actually improving performance. */
3827 /* Called with scp->rw held. Returns 0 if all is clear to read the
3828 specified range by the client identified by key.
3830 long cm_LockCheckRead(cm_scache_t *scp,
3831 LARGE_INTEGER LOffset,
3832 LARGE_INTEGER LLength,
3835 #ifndef ADVISORY_LOCKS
3837 cm_file_lock_t *fileLock;
3841 int substract_ranges = FALSE;
3843 range.offset = LOffset.QuadPart;
3844 range.length = LLength.QuadPart;
3848 1. for all _a_ in (Offset,+Length), all of the following is true:
3850 1.1 For each ACTIVE lock L in S->fileLocks such that _a_ in
3851 (L->LOffset,+L->LLength); L->key == Key(C) OR L->LockType is
3854 1.2 For each LOST lock L in S->fileLocks such that _a_ in
3855 (L->LOffset,+L->LLength); L->LockType is shared AND L->key !=
3860 lock_ObtainRead(&cm_scacheLock);
3862 for (q = scp->fileLocksH; q && range.length > 0; q = osi_QNext(q)) {
3864 (cm_file_lock_t *)((char *) q - offsetof(cm_file_lock_t, fileq));
3866 if (INTERSECT_RANGE(range, fileLock->range)) {
3867 if (IS_LOCK_ACTIVE(fileLock)) {
3868 if (fileLock->key == key) {
3870 /* If there is an active lock for this client, it
3871 is safe to substract ranges.*/
3872 cm_LockRangeSubtract(&range, &fileLock->range);
3873 substract_ranges = TRUE;
3875 if (fileLock->lockType != LockRead) {
3876 code = CM_ERROR_LOCK_CONFLICT;
3880 /* even if the entire range is locked for reading,
3881 we still can't grant the lock at this point
3882 because the client may have lost locks. That
3883 is, unless we have already seen an active lock
3884 belonging to the client, in which case there
3885 can't be any lost locks for this client. */
3886 if (substract_ranges)
3887 cm_LockRangeSubtract(&range, &fileLock->range);
3889 } else if (IS_LOCK_LOST(fileLock) &&
3890 (fileLock->key == key || fileLock->lockType == LockWrite)) {
3891 code = CM_ERROR_BADFD;
3897 lock_ReleaseRead(&cm_scacheLock);
3899 osi_Log4(afsd_logp, "cm_LockCheckRead scp 0x%x offset %d length %d code 0x%x",
3900 scp, (unsigned long)LOffset.QuadPart, (unsigned long)LLength.QuadPart, code);
3911 /* Called with scp->rw held. Returns 0 if all is clear to write the
3912 specified range by the client identified by key.
3914 long cm_LockCheckWrite(cm_scache_t *scp,
3915 LARGE_INTEGER LOffset,
3916 LARGE_INTEGER LLength,
3919 #ifndef ADVISORY_LOCKS
3921 cm_file_lock_t *fileLock;
3926 range.offset = LOffset.QuadPart;
3927 range.length = LLength.QuadPart;
3930 A client C can WRITE range (Offset,+Length) of cm_scache_t S iff (2):
3932 2. for all _a_ in (Offset,+Length), one of the following is true:
3934 2.1 Byte _a_ of S is unowned AND there does not exist a LOST
3935 lock L such that _a_ in (L->LOffset,+L->LLength).
3937 2.2 Byte _a_ of S is owned by C under lock L AND L->LockType is
3941 lock_ObtainRead(&cm_scacheLock);
3943 for (q = scp->fileLocksH; q && range.length > 0; q = osi_QNext(q)) {
3945 (cm_file_lock_t *)((char *) q - offsetof(cm_file_lock_t, fileq));
3947 if (INTERSECT_RANGE(range, fileLock->range)) {
3948 if (IS_LOCK_ACTIVE(fileLock)) {
3949 if (fileLock->key == key) {
3950 if (fileLock->lockType == LockWrite) {
3952 /* if there is an active lock for this client, it
3953 is safe to substract ranges */
3954 cm_LockRangeSubtract(&range, &fileLock->range);
3956 code = CM_ERROR_LOCK_CONFLICT;
3960 code = CM_ERROR_LOCK_CONFLICT;
3963 } else if (IS_LOCK_LOST(fileLock)) {
3964 code = CM_ERROR_BADFD;
3970 lock_ReleaseRead(&cm_scacheLock);
3972 osi_Log4(afsd_logp, "cm_LockCheckWrite scp 0x%x offset %d length %d code 0x%x",
3973 scp, (unsigned long)LOffset.QuadPart, (unsigned long)LLength.QuadPart, code);
3984 /* Called with cm_scacheLock write locked */
3985 static cm_file_lock_t * cm_GetFileLock(void) {
3988 l = (cm_file_lock_t *) cm_freeFileLocks;
3990 osi_QRemove(&cm_freeFileLocks, &l->q);
3992 l = malloc(sizeof(cm_file_lock_t));
3993 osi_assertx(l, "null cm_file_lock_t");
3996 memset(l, 0, sizeof(cm_file_lock_t));
4001 /* Called with cm_scacheLock write locked */
4002 static void cm_PutFileLock(cm_file_lock_t *l) {
4003 osi_QAdd(&cm_freeFileLocks, &l->q);
4006 /* called with scp->rw held. May release it during processing, but
4007 leaves it held on exit. */
4008 long cm_IntSetLock(cm_scache_t * scp, cm_user_t * userp, int lockType,
4014 struct rx_connection * callp;
4016 afs_uint32 reqflags = reqp->flags;
4018 tfid.Volume = scp->fid.volume;
4019 tfid.Vnode = scp->fid.vnode;
4020 tfid.Unique = scp->fid.unique;
4023 osi_Log2(afsd_logp, "CALL SetLock scp 0x%p for lock %d", scp, lockType);
4025 reqp->flags |= CM_REQ_NORETRY;
4026 lock_ReleaseWrite(&scp->rw);
4029 code = cm_ConnFromFID(&cfid, userp, reqp, &connp);
4033 callp = cm_GetRxConn(connp);
4034 code = RXAFS_SetLock(callp, &tfid, lockType,
4036 rx_PutConnection(callp);
4038 } while (cm_Analyze(connp, userp, reqp, &cfid, &volSync,
4041 code = cm_MapRPCError(code, reqp);
4043 osi_Log1(afsd_logp, "CALL SetLock FAILURE, code 0x%x", code);
4045 osi_Log0(afsd_logp, "CALL SetLock SUCCESS");
4048 lock_ObtainWrite(&scp->rw);
4049 reqp->flags = reqflags;
4053 /* called with scp->rw held. Releases it during processing */
4054 long cm_IntReleaseLock(cm_scache_t * scp, cm_user_t * userp,
4060 struct rx_connection * callp;
4063 tfid.Volume = scp->fid.volume;
4064 tfid.Vnode = scp->fid.vnode;
4065 tfid.Unique = scp->fid.unique;
4068 lock_ReleaseWrite(&scp->rw);
4070 osi_Log1(afsd_logp, "CALL ReleaseLock scp 0x%p", scp);
4073 code = cm_ConnFromFID(&cfid, userp, reqp, &connp);
4077 callp = cm_GetRxConn(connp);
4078 code = RXAFS_ReleaseLock(callp, &tfid, &volSync);
4079 rx_PutConnection(callp);
4081 } while (cm_Analyze(connp, userp, reqp, &cfid, &volSync,
4083 code = cm_MapRPCError(code, reqp);
4086 "CALL ReleaseLock FAILURE, code 0x%x", code);
4089 "CALL ReleaseLock SUCCESS");
4091 lock_ObtainWrite(&scp->rw);
4096 /* called with scp->rw held. May release it during processing, but
4097 will exit with lock held.
4101 - 0 if the user has permission to get the specified lock for the scp
4103 - CM_ERROR_NOACCESS if not
4105 Any other error from cm_SyncOp will be sent down untranslated.
4107 If CM_ERROR_NOACCESS is returned and lock_type is LockRead, then
4108 phas_insert (if non-NULL) will receive a boolean value indicating
4109 whether the user has INSERT permission or not.
4111 long cm_LockCheckPerms(cm_scache_t * scp,
4118 long code = 0, code2 = 0;
4120 /* lock permissions are slightly tricky because of the 'i' bit.
4121 If the user has PRSFS_LOCK, she can read-lock the file. If the
4122 user has PRSFS_WRITE, she can write-lock the file. However, if
4123 the user has PRSFS_INSERT, then she can write-lock new files,
4124 but not old ones. Since we don't have information about
4125 whether a file is new or not, we assume that if the user owns
4126 the scp, then she has the permissions that are granted by
4129 osi_Log3(afsd_logp, "cm_LockCheckPerms for scp[0x%p] type[%d] user[0x%p]",
4130 scp, lock_type, userp);
4132 if (lock_type == LockRead)
4133 rights |= PRSFS_LOCK;
4134 else if (lock_type == LockWrite)
4135 rights |= PRSFS_WRITE | PRSFS_LOCK;
4138 osi_assertx(FALSE, "invalid lock type");
4143 *phas_insert = FALSE;
4145 code = cm_SyncOp(scp, NULL, userp, reqp, rights,
4146 CM_SCACHESYNC_GETSTATUS |
4147 CM_SCACHESYNC_NEEDCALLBACK);
4149 if (phas_insert && scp->creator == userp) {
4151 /* If this file was created by the user, then we check for
4152 PRSFS_INSERT. If the file server is recent enough, then
4153 this should be sufficient for her to get a write-lock (but
4154 not necessarily a read-lock). VICED_CAPABILITY_WRITELOCKACL
4155 indicates whether a file server supports getting write
4156 locks when the user only has PRSFS_INSERT.
4158 If the file was not created by the user we skip the check
4159 because the INSERT bit will not apply to this user even
4163 code2 = cm_SyncOp(scp, NULL, userp, reqp, PRSFS_INSERT,
4164 CM_SCACHESYNC_GETSTATUS |
4165 CM_SCACHESYNC_NEEDCALLBACK);
4167 if (code2 == CM_ERROR_NOACCESS) {
4168 osi_Log0(afsd_logp, "cm_LockCheckPerms user has no INSERT bits");
4170 *phas_insert = TRUE;
4171 osi_Log0(afsd_logp, "cm_LockCheckPerms user has INSERT bits");
4175 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_NEEDCALLBACK | CM_SCACHESYNC_GETSTATUS);
4177 osi_Log1(afsd_logp, "cm_LockCheckPerms returning code %d", code);
4182 /* called with scp->rw held */
4183 long cm_Lock(cm_scache_t *scp, unsigned char sLockType,
4184 LARGE_INTEGER LOffset, LARGE_INTEGER LLength,
4186 int allowWait, cm_user_t *userp, cm_req_t *reqp,
4187 cm_file_lock_t **lockpp)
4190 int Which = ((sLockType & LOCKING_ANDX_SHARED_LOCK) ? LockRead : LockWrite);
4191 cm_file_lock_t *fileLock;
4194 int wait_unlock = FALSE;
4195 int force_client_lock = FALSE;
4197 osi_Log4(afsd_logp, "cm_Lock scp 0x%x type 0x%x offset %d length %d",
4198 scp, sLockType, (unsigned long)LOffset.QuadPart, (unsigned long)LLength.QuadPart);
4199 osi_Log3(afsd_logp, "... allowWait %d key 0x%x:%x", allowWait,
4200 (unsigned long)(key >> 32), (unsigned long)(key & 0xffffffff));
4203 A client C can OBTAIN a lock L on cm_scache_t S iff (both 3 and 4):
4205 3. for all _a_ in (L->LOffset,+L->LLength), ALL of the following is
4208 3.1 If L->LockType is exclusive then there does NOT exist a
4209 ACCEPTED lock M in S->fileLocks such that _a_ in
4210 (M->LOffset,+M->LLength).
4212 3.2 If L->LockType is shared then for each ACCEPTED lock M in
4213 S->fileLocks, if _a_ in (M->LOffset,+M->LLength) then
4214 M->LockType is shared.
4216 4. For all LOST locks M in S->fileLocks, ALL of the following are true:
4218 4.1 M->key != Key(C)
4220 4.2 If M->LockType is exclusive, then (L->LOffset,+L->LLength)
4221 and (M->LOffset,+M->LLength) do not intersect.
4224 range.offset = LOffset.QuadPart;
4225 range.length = LLength.QuadPart;
4227 lock_ObtainRead(&cm_scacheLock);
4229 for (q = scp->fileLocksH; q; q = osi_QNext(q)) {
4231 (cm_file_lock_t *)((char *) q - offsetof(cm_file_lock_t, fileq));
4233 if (IS_LOCK_LOST(fileLock)) {
4234 if (fileLock->key == key) {
4235 code = CM_ERROR_BADFD;
4237 } else if (fileLock->lockType == LockWrite && INTERSECT_RANGE(range, fileLock->range)) {
4238 code = CM_ERROR_WOULDBLOCK;
4244 /* we don't need to check for deleted locks here since deleted
4245 locks are dequeued from scp->fileLocks */
4246 if (IS_LOCK_ACCEPTED(fileLock) &&
4247 INTERSECT_RANGE(range, fileLock->range)) {
4249 if ((sLockType & LOCKING_ANDX_SHARED_LOCK) == 0 ||
4250 fileLock->lockType != LockRead) {
4252 code = CM_ERROR_WOULDBLOCK;
4258 lock_ReleaseRead(&cm_scacheLock);
4260 if (code == 0 && SERVERLOCKS_ENABLED(scp)) {
4261 if (Which == scp->serverLock ||
4262 (Which == LockRead && scp->serverLock == LockWrite)) {
4266 /* we already have the lock we need */
4267 osi_Log3(afsd_logp, " we already have the correct lock. exclusives[%d], shared[%d], serverLock[%d]",
4268 scp->exclusiveLocks, scp->sharedLocks, (int)(signed char) scp->serverLock);
4270 code = cm_LockCheckPerms(scp, Which, userp, reqp, &has_insert);
4272 /* special case: if we don't have permission to read-lock
4273 the file, then we force a clientside lock. This is to
4274 compensate for applications that obtain a read-lock for
4275 reading files off of directories that don't grant
4276 read-locks to the user. */
4277 if (code == CM_ERROR_NOACCESS && Which == LockRead) {
4279 if (has_insert && SCP_SUPPORTS_WRITELOCKACL(scp)) {
4280 osi_Log0(afsd_logp, " User has no read-lock perms, but has INSERT perms.");
4283 osi_Log0(afsd_logp, " User has no read-lock perms. Forcing client-side lock");
4284 force_client_lock = TRUE;
4288 } else if ((scp->exclusiveLocks > 0) ||
4289 (scp->sharedLocks > 0 && scp->serverLock != LockRead)) {
4292 /* We are already waiting for some other lock. We should
4293 wait for the daemon to catch up instead of generating a
4294 flood of SetLock calls. */
4295 osi_Log3(afsd_logp, " already waiting for other lock. exclusives[%d], shared[%d], serverLock[%d]",
4296 scp->exclusiveLocks, scp->sharedLocks, (int)(signed char) scp->serverLock);
4298 /* see if we have permission to create the lock in the
4300 code = cm_LockCheckPerms(scp, Which, userp, reqp, &has_insert);
4302 code = CM_ERROR_WOULDBLOCK;
4303 else if (code == CM_ERROR_NOACCESS && Which == LockRead) {
4305 if (has_insert && SCP_SUPPORTS_WRITELOCKACL(scp)) {
4307 " User has no read-lock perms, but has INSERT perms.");
4308 code = CM_ERROR_WOULDBLOCK;
4311 " User has no read-lock perms. Forcing client-side lock");
4312 force_client_lock = TRUE;
4316 /* leave any other codes as-is */
4320 int check_data_version = FALSE;
4323 /* first check if we have permission to elevate or obtain
4325 code = cm_LockCheckPerms(scp, Which, userp, reqp, &has_insert);
4327 if (code == CM_ERROR_NOACCESS && Which == LockRead &&
4328 (!has_insert || !SCP_SUPPORTS_WRITELOCKACL(scp))) {
4329 osi_Log0(afsd_logp, " User has no read-lock perms. Forcing client-side lock");
4330 force_client_lock = TRUE;
4335 /* has_insert => (Which == LockRead, code == CM_ERROR_NOACCESS) */
4337 if (scp->serverLock == LockRead && Which == LockWrite) {
4339 /* We want to escalate the lock to a LockWrite.
4340 * Unfortunately that's not really possible without
4341 * letting go of the current lock. But for now we do
4345 " attempting to UPGRADE from LockRead to LockWrite.");
4347 " dataVersion on scp: %I64d", scp->dataVersion);
4349 /* we assume at this point (because scp->serverLock
4350 was valid) that we had a valid server lock. */
4351 scp->lockDataVersion = scp->dataVersion;
4352 check_data_version = TRUE;
4354 code = cm_IntReleaseLock(scp, userp, reqp);
4357 /* We couldn't release the lock */
4360 scp->serverLock = -1;
4364 /* We need to obtain a server lock of type Which in order
4365 * to assert this file lock */
4366 #ifndef AGGRESSIVE_LOCKS
4369 newLock = LockWrite;
4372 code = cm_IntSetLock(scp, userp, newLock, reqp);
4374 #ifdef AGGRESSIVE_LOCKS
4375 if ((code == CM_ERROR_WOULDBLOCK ||
4376 code == CM_ERROR_NOACCESS) && newLock != Which) {
4377 /* we wanted LockRead. We tried LockWrite. Now try
4382 osi_assertx(newLock == LockRead, "lock type not read");
4384 code = cm_IntSetLock(scp, userp, newLock, reqp);
4388 if (code == CM_ERROR_NOACCESS) {
4389 if (Which == LockRead) {
4390 if (has_insert && SCP_SUPPORTS_WRITELOCKACL(scp)) {
4392 /* We requested a read-lock, but we have permission to
4393 * get a write-lock. Try that */
4395 tcode = cm_LockCheckPerms(scp, LockWrite, userp, reqp, NULL);
4398 newLock = LockWrite;
4400 osi_Log0(afsd_logp, " User has 'i' perms and the request was for a LockRead. Trying to get a LockWrite instead");
4402 code = cm_IntSetLock(scp, userp, newLock, reqp);
4405 osi_Log0(afsd_logp, " User has no read-lock perms. Forcing client-side lock");
4406 force_client_lock = TRUE;
4408 } else if (Which == LockWrite &&
4409 scp->creator == userp && !SCP_SUPPORTS_WRITELOCKACL(scp)) {
4412 /* Special case: if the lock request was for a
4413 * LockWrite and the user owns the file and we weren't
4414 * allowed to obtain the serverlock, we either lost a
4415 * race (the permissions changed from under us), or we
4416 * have 'i' bits, but we aren't allowed to lock the
4419 /* check if we lost a race... */
4420 tcode = cm_LockCheckPerms(scp, Which, userp, reqp, NULL);
4423 osi_Log0(afsd_logp, " User has 'i' perms but can't obtain write locks. Using client-side locks.");
4424 force_client_lock = TRUE;
4429 if (code == 0 && check_data_version &&
4430 scp->dataVersion != scp->lockDataVersion) {
4431 /* We lost a race. Although we successfully obtained
4432 * a lock, someone modified the file in between. The
4433 * locks have all been technically lost. */
4436 " Data version mismatch while upgrading lock.");
4438 " Data versions before=%I64d, after=%I64d",
4439 scp->lockDataVersion,
4442 " Releasing stale lock for scp 0x%x", scp);
4444 code = cm_IntReleaseLock(scp, userp, reqp);
4446 scp->serverLock = -1;
4448 code = CM_ERROR_INVAL;
4449 } else if (code == 0) {
4450 scp->serverLock = newLock;
4451 scp->lockDataVersion = scp->dataVersion;
4455 (scp->sharedLocks > 0 || scp->exclusiveLocks > 0) &&
4456 scp->serverLock == -1) {
4457 /* Oops. We lost the lock. */
4458 cm_LockMarkSCacheLost(scp);
4461 } else if (code == 0) { /* server locks not enabled */
4463 " Skipping server lock for scp");
4468 if (code != 0 && !force_client_lock) {
4469 /* Special case error translations
4471 Applications don't expect certain errors from a
4472 LockFile/UnlockFile call. We need to translate some error
4473 code to codes that apps expect and handle. */
4475 /* We shouldn't actually need to handle this case since we
4476 simulate locks for RO scps anyway. */
4477 if (code == CM_ERROR_READONLY) {
4478 osi_Log0(afsd_logp, " Reinterpreting CM_ERROR_READONLY as CM_ERROR_NOACCESS");
4479 code = CM_ERROR_NOACCESS;
4483 if (code == 0 || (code == CM_ERROR_WOULDBLOCK && allowWait) ||
4484 force_client_lock) {
4486 /* clear the error if we are forcing a client lock, so we
4487 don't get confused later. */
4488 if (force_client_lock && code != CM_ERROR_WOULDBLOCK)
4491 lock_ObtainWrite(&cm_scacheLock);
4492 fileLock = cm_GetFileLock();
4493 lock_ReleaseWrite(&cm_scacheLock);
4495 fileLock->fid = scp->fid;
4497 fileLock->key = key;
4498 fileLock->lockType = Which;
4500 fileLock->userp = userp;
4501 fileLock->range = range;
4502 fileLock->flags = (code == 0 ? 0 :
4504 CM_FILELOCK_FLAG_WAITUNLOCK :
4505 CM_FILELOCK_FLAG_WAITLOCK));
4507 if (force_client_lock || !SERVERLOCKS_ENABLED(scp))
4508 fileLock->flags |= CM_FILELOCK_FLAG_CLIENTONLY;
4510 fileLock->lastUpdate = (code == 0 && !force_client_lock) ? time(NULL) : 0;
4512 lock_ObtainWrite(&cm_scacheLock);
4513 osi_QAddT(&scp->fileLocksH, &scp->fileLocksT, &fileLock->fileq);
4514 cm_HoldSCacheNoLock(scp);
4515 fileLock->scp = scp;
4516 osi_QAdd(&cm_allFileLocks, &fileLock->q);
4517 lock_ReleaseWrite(&cm_scacheLock);
4523 if (IS_LOCK_CLIENTONLY(fileLock)) {
4525 } else if (IS_LOCK_ACCEPTED(fileLock)) {
4526 if (Which == LockRead)
4529 scp->exclusiveLocks++;
4533 "cm_Lock Lock added 0x%p flags 0x%x to scp [0x%p]",
4534 fileLock, fileLock->flags, scp);
4536 " exclusives[%d] shared[%d] client[%d] serverLock[%d]",
4537 scp->exclusiveLocks, scp->sharedLocks, scp->clientLocks,
4538 (int)(signed char) scp->serverLock);
4541 "cm_Lock Rejecting lock (code = 0x%x)", code);
4547 static int cm_KeyEquals(cm_key_t k1, cm_key_t k2, int flags);
4549 /* Called with scp->rw held */
4550 long cm_UnlockByKey(cm_scache_t * scp,
4557 cm_file_lock_t *fileLock;
4558 osi_queue_t *q, *qn;
4561 osi_Log4(afsd_logp, "cm_UnlockByKey scp 0x%p key 0x%x:%x flags=0x%x",
4563 (unsigned long)(key >> 32),
4564 (unsigned long)(key & 0xffffffff),
4567 lock_ObtainWrite(&cm_scacheLock);
4569 for (q = scp->fileLocksH; q; q = qn) {
4572 fileLock = (cm_file_lock_t *)
4573 ((char *) q - offsetof(cm_file_lock_t, fileq));
4576 osi_Log4(afsd_logp, " Checking lock[0x%x] range[%d,+%d] type[%d]",
4578 (unsigned long) fileLock->range.offset,
4579 (unsigned long) fileLock->range.length,
4580 fileLock->lockType);
4581 osi_Log3(afsd_logp, " key[0x%x:%x] flags[0x%x]",
4582 (unsigned long)(fileLock->key >> 32),
4583 (unsigned long)(fileLock->key & 0xffffffff),
4586 if (cm_FidCmp(&fileLock->fid, &fileLock->scp->fid)) {
4587 osi_Log0(afsd_logp, "!!fileLock->fid != scp->fid");
4588 osi_Log4(afsd_logp, " fileLock->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
4590 fileLock->fid.volume,
4591 fileLock->fid.vnode,
4592 fileLock->fid.unique);
4593 osi_Log4(afsd_logp, " scp->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
4594 fileLock->scp->fid.cell,
4595 fileLock->scp->fid.volume,
4596 fileLock->scp->fid.vnode,
4597 fileLock->scp->fid.unique);
4598 osi_assertx(FALSE, "invalid fid value");
4602 if (!IS_LOCK_DELETED(fileLock) &&
4603 cm_KeyEquals(fileLock->key, key, flags)) {
4604 osi_Log3(afsd_logp, "...Unlock range [%d,+%d] type %d",
4605 fileLock->range.offset,
4606 fileLock->range.length,
4607 fileLock->lockType);
4609 if (scp->fileLocksT == q)
4610 scp->fileLocksT = osi_QPrev(q);
4611 osi_QRemoveHT(&scp->fileLocksH, &scp->fileLocksT, q);
4613 if (IS_LOCK_CLIENTONLY(fileLock)) {
4615 } else if (IS_LOCK_ACCEPTED(fileLock)) {
4616 if (fileLock->lockType == LockRead)
4619 scp->exclusiveLocks--;
4622 fileLock->flags |= CM_FILELOCK_FLAG_DELETED;
4624 cm_ReleaseUser(fileLock->userp);
4625 cm_ReleaseSCacheNoLock(scp);
4627 fileLock->userp = NULL;
4628 fileLock->scp = NULL;
4634 lock_ReleaseWrite(&cm_scacheLock);
4636 if (n_unlocks == 0) {
4637 osi_Log0(afsd_logp, "cm_UnlockByKey no locks found");
4638 osi_Log3(afsd_logp, " Leaving scp with exclusives[%d], shared[%d], serverLock[%d]",
4639 scp->exclusiveLocks, scp->sharedLocks, (int)(signed char) scp->serverLock);
4644 osi_Log1(afsd_logp, "cm_UnlockByKey done with %d locks", n_unlocks);
4646 osi_assertx(scp->sharedLocks >= 0, "scp->sharedLocks < 0");
4647 osi_assertx(scp->exclusiveLocks >= 0, "scp->exclusiveLocks < 0");
4648 osi_assertx(scp->clientLocks >= 0, "scp->clientLocks < 0");
4650 if (!SERVERLOCKS_ENABLED(scp)) {
4651 osi_Log0(afsd_logp, " Skipping server lock for scp");
4655 /* Ideally we would go through the rest of the locks to determine
4656 * if one or more locks that were formerly in WAITUNLOCK can now
4657 * be put to ACTIVE or WAITLOCK and update scp->exclusiveLocks and
4658 * scp->sharedLocks accordingly. However, the retrying of locks
4659 * in that manner is done cm_RetryLock() manually.
4662 if (scp->serverLock == LockWrite &&
4663 scp->exclusiveLocks == 0 &&
4664 scp->sharedLocks > 0) {
4666 /* The serverLock should be downgraded to LockRead */
4667 osi_Log0(afsd_logp, " DOWNGRADE lock from LockWrite to LockRead");
4669 /* since scp->serverLock looked sane, we are going to assume
4670 that we have a valid server lock. */
4671 scp->lockDataVersion = scp->dataVersion;
4672 osi_Log1(afsd_logp, " dataVersion on scp = %I64d", scp->dataVersion);
4674 code = cm_IntReleaseLock(scp, userp, reqp);
4677 /* so we couldn't release it. Just let the lock be for now */
4681 scp->serverLock = -1;
4684 code = cm_IntSetLock(scp, userp, LockRead, reqp);
4686 if (code == 0 && scp->lockDataVersion == scp->dataVersion) {
4687 scp->serverLock = LockRead;
4688 } else if (code == 0 && scp->lockDataVersion != scp->dataVersion) {
4689 /* We lost a race condition. Although we have a valid
4690 lock on the file, the data has changed and essentially
4691 we have lost the lock we had during the transition. */
4693 osi_Log0(afsd_logp, "Data version mismatch during lock downgrade");
4694 osi_Log2(afsd_logp, " Data versions before=%I64d, after=%I64d",
4695 scp->lockDataVersion,
4698 code = cm_IntReleaseLock(scp, userp, reqp);
4700 code = CM_ERROR_INVAL;
4701 scp->serverLock = -1;
4705 (scp->sharedLocks > 0 || scp->exclusiveLocks > 0) &&
4706 (scp->serverLock == -1)) {
4708 cm_LockMarkSCacheLost(scp);
4711 /* failure here has no bearing on the return value of
4715 } else if (scp->serverLock != (-1) &&
4716 scp->exclusiveLocks == 0 &&
4717 scp->sharedLocks == 0) {
4718 /* The serverLock should be released entirely */
4720 code = cm_IntReleaseLock(scp, userp, reqp);
4723 scp->serverLock = (-1);
4728 osi_Log1(afsd_logp, "cm_UnlockByKey code 0x%x", code);
4729 osi_Log4(afsd_logp, " Leaving scp with excl[%d], shared[%d], client[%d], serverLock[%d]",
4730 scp->exclusiveLocks, scp->sharedLocks, scp->clientLocks,
4731 (int)(signed char) scp->serverLock);
4736 long cm_Unlock(cm_scache_t *scp,
4737 unsigned char sLockType,
4738 LARGE_INTEGER LOffset, LARGE_INTEGER LLength,
4744 int Which = ((sLockType & LOCKING_ANDX_SHARED_LOCK) ? LockRead : LockWrite);
4745 cm_file_lock_t *fileLock;
4747 int release_userp = FALSE;
4749 osi_Log4(afsd_logp, "cm_Unlock scp 0x%p type 0x%x offset %d length %d",
4750 scp, sLockType, (unsigned long)LOffset.QuadPart, (unsigned long)LLength.QuadPart);
4751 osi_Log2(afsd_logp, "... key 0x%x:%x",
4752 (unsigned long) (key >> 32), (unsigned long) (key & 0xffffffff));
4754 lock_ObtainRead(&cm_scacheLock);
4756 for (q = scp->fileLocksH; q; q = osi_QNext(q)) {
4757 fileLock = (cm_file_lock_t *)
4758 ((char *) q - offsetof(cm_file_lock_t, fileq));
4761 if (cm_FidCmp(&fileLock->fid, &fileLock->scp->fid)) {
4762 osi_Log0(afsd_logp, "!!fileLock->fid != scp->fid");
4763 osi_Log4(afsd_logp, " fileLock->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
4765 fileLock->fid.volume,
4766 fileLock->fid.vnode,
4767 fileLock->fid.unique);
4768 osi_Log4(afsd_logp, " scp->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
4769 fileLock->scp->fid.cell,
4770 fileLock->scp->fid.volume,
4771 fileLock->scp->fid.vnode,
4772 fileLock->scp->fid.unique);
4773 osi_assertx(FALSE, "invalid fid value");
4776 if (!IS_LOCK_DELETED(fileLock) &&
4777 fileLock->key == key &&
4778 fileLock->range.offset == LOffset.QuadPart &&
4779 fileLock->range.length == LLength.QuadPart) {
4785 osi_Log0(afsd_logp, "cm_Unlock lock not found; failure");
4787 lock_ReleaseRead(&cm_scacheLock);
4789 /* The lock didn't exist anyway. *shrug* */
4790 return CM_ERROR_RANGE_NOT_LOCKED;
4793 /* discard lock record */
4794 lock_ConvertRToW(&cm_scacheLock);
4795 if (scp->fileLocksT == q)
4796 scp->fileLocksT = osi_QPrev(q);
4797 osi_QRemoveHT(&scp->fileLocksH, &scp->fileLocksT, q);
4800 * Don't delete it here; let the daemon delete it, to simplify
4801 * the daemon's traversal of the list.
4804 if (IS_LOCK_CLIENTONLY(fileLock)) {
4806 } else if (IS_LOCK_ACCEPTED(fileLock)) {
4807 if (fileLock->lockType == LockRead)
4810 scp->exclusiveLocks--;
4813 fileLock->flags |= CM_FILELOCK_FLAG_DELETED;
4814 if (userp != NULL) {
4815 cm_ReleaseUser(fileLock->userp);
4817 userp = fileLock->userp;
4818 release_userp = TRUE;
4820 fileLock->userp = NULL;
4821 cm_ReleaseSCacheNoLock(scp);
4822 fileLock->scp = NULL;
4823 lock_ReleaseWrite(&cm_scacheLock);
4825 if (!SERVERLOCKS_ENABLED(scp)) {
4826 osi_Log0(afsd_logp, " Skipping server locks for scp");
4830 /* Ideally we would go through the rest of the locks to determine
4831 * if one or more locks that were formerly in WAITUNLOCK can now
4832 * be put to ACTIVE or WAITLOCK and update scp->exclusiveLocks and
4833 * scp->sharedLocks accordingly. However, the retrying of locks
4834 * in that manner is done cm_RetryLock() manually.
4837 if (scp->serverLock == LockWrite &&
4838 scp->exclusiveLocks == 0 &&
4839 scp->sharedLocks > 0) {
4841 /* The serverLock should be downgraded to LockRead */
4842 osi_Log0(afsd_logp, " DOWNGRADE lock from LockWrite to LockRead");
4844 /* Since we already had a lock, we assume that there is a
4845 valid server lock. */
4846 scp->lockDataVersion = scp->dataVersion;
4847 osi_Log1(afsd_logp, " dataVersion on scp is %I64d", scp->dataVersion);
4849 /* before we downgrade, make sure that we have enough
4850 permissions to get the read lock. */
4851 code = cm_LockCheckPerms(scp, LockRead, userp, reqp, NULL);
4854 osi_Log0(afsd_logp, " SKIPPING downgrade because user doesn't have perms to get downgraded lock");
4860 code = cm_IntReleaseLock(scp, userp, reqp);
4863 /* so we couldn't release it. Just let the lock be for now */
4867 scp->serverLock = -1;
4870 code = cm_IntSetLock(scp, userp, LockRead, reqp);
4872 if (code == 0 && scp->lockDataVersion == scp->dataVersion) {
4873 scp->serverLock = LockRead;
4874 } else if (code == 0 && scp->lockDataVersion != scp->dataVersion) {
4875 /* Lost a race. We obtained a new lock, but that is
4876 meaningless since someone modified the file
4880 "Data version mismatch while downgrading lock");
4882 " Data versions before=%I64d, after=%I64d",
4883 scp->lockDataVersion,
4886 code = cm_IntReleaseLock(scp, userp, reqp);
4888 scp->serverLock = -1;
4889 code = CM_ERROR_INVAL;
4893 (scp->sharedLocks > 0 || scp->exclusiveLocks > 0) &&
4894 (scp->serverLock == -1)) {
4896 cm_LockMarkSCacheLost(scp);
4899 /* failure here has no bearing on the return value of
4903 } else if (scp->serverLock != (-1) &&
4904 scp->exclusiveLocks == 0 &&
4905 scp->sharedLocks == 0) {
4906 /* The serverLock should be released entirely */
4908 code = cm_IntReleaseLock(scp, userp, reqp);
4911 scp->serverLock = (-1);
4916 cm_ReleaseUser(userp);
4920 osi_Log1(afsd_logp, "cm_Unlock code 0x%x", code);
4921 osi_Log4(afsd_logp, " leaving scp with excl[%d], shared[%d], client[%d], serverLock[%d]",
4922 scp->exclusiveLocks, scp->sharedLocks, scp->clientLocks,
4923 (int)(signed char) scp->serverLock);
4928 /* called with scp->rw held */
4929 void cm_LockMarkSCacheLost(cm_scache_t * scp)
4931 cm_file_lock_t *fileLock;
4934 osi_Log1(afsd_logp, "cm_LockMarkSCacheLost scp 0x%x", scp);
4936 /* cm_scacheLock needed because we are modifying fileLock->flags */
4937 lock_ObtainWrite(&cm_scacheLock);
4939 for (q = scp->fileLocksH; q; q = osi_QNext(q)) {
4941 (cm_file_lock_t *)((char *) q - offsetof(cm_file_lock_t, fileq));
4943 if (IS_LOCK_ACTIVE(fileLock) &&
4944 !IS_LOCK_CLIENTONLY(fileLock)) {
4945 if (fileLock->lockType == LockRead)
4948 scp->exclusiveLocks--;
4950 fileLock->flags |= CM_FILELOCK_FLAG_LOST;
4954 scp->serverLock = -1;
4955 scp->lockDataVersion = -1;
4956 lock_ReleaseWrite(&cm_scacheLock);
4959 /* Called with no relevant locks held */
4960 void cm_CheckLocks()
4962 osi_queue_t *q, *nq;
4963 cm_file_lock_t *fileLock;
4969 struct rx_connection * callp;
4974 lock_ObtainWrite(&cm_scacheLock);
4976 cm_lockRefreshCycle++;
4978 osi_Log1(afsd_logp, "cm_CheckLocks starting lock check cycle %d", cm_lockRefreshCycle);
4980 for (q = cm_allFileLocks; q; q = nq) {
4981 fileLock = (cm_file_lock_t *) q;
4985 if (IS_LOCK_DELETED(fileLock)) {
4987 osi_QRemove(&cm_allFileLocks, q);
4988 cm_PutFileLock(fileLock);
4990 } else if (IS_LOCK_ACTIVE(fileLock) && !IS_LOCK_CLIENTONLY(fileLock)) {
4992 /* Server locks must have been enabled for us to have
4993 received an active non-client-only lock. */
4994 osi_assertx(cm_enableServerLocks, "!cm_enableServerLocks");
4996 scp = fileLock->scp;
4997 osi_assertx(scp != NULL, "null cm_scache_t");
4999 cm_HoldSCacheNoLock(scp);
5002 if (cm_FidCmp(&fileLock->fid, &fileLock->scp->fid)) {
5003 osi_Log0(afsd_logp, "!!fileLock->fid != scp->fid");
5004 osi_Log4(afsd_logp, " fileLock->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
5006 fileLock->fid.volume,
5007 fileLock->fid.vnode,
5008 fileLock->fid.unique);
5009 osi_Log4(afsd_logp, " scp->fid(cell=[%d], volume=[%d], vnode=[%d], unique=[%d]",
5010 fileLock->scp->fid.cell,
5011 fileLock->scp->fid.volume,
5012 fileLock->scp->fid.vnode,
5013 fileLock->scp->fid.unique);
5014 osi_assertx(FALSE, "invalid fid");
5017 /* Server locks are extended once per scp per refresh
5019 if (scp->lastRefreshCycle != cm_lockRefreshCycle) {
5021 int scp_done = FALSE;
5023 osi_Log1(afsd_logp, "cm_CheckLocks Updating scp 0x%x", scp);
5025 lock_ReleaseWrite(&cm_scacheLock);
5026 lock_ObtainWrite(&scp->rw);
5028 /* did the lock change while we weren't holding the lock? */
5029 if (!IS_LOCK_ACTIVE(fileLock))
5030 goto post_syncopdone;
5032 code = cm_SyncOp(scp, NULL, fileLock->userp, &req, 0,
5033 CM_SCACHESYNC_NEEDCALLBACK
5034 | CM_SCACHESYNC_GETSTATUS
5035 | CM_SCACHESYNC_LOCK);
5039 "cm_CheckLocks SyncOp failure code 0x%x", code);
5040 goto post_syncopdone;
5043 /* cm_SyncOp releases scp->rw during which the lock
5044 may get released. */
5045 if (!IS_LOCK_ACTIVE(fileLock))
5046 goto pre_syncopdone;
5048 if (scp->serverLock != -1 && !(scp->flags & CM_SCACHEFLAG_DELETED)) {
5052 tfid.Volume = scp->fid.volume;
5053 tfid.Vnode = scp->fid.vnode;
5054 tfid.Unique = scp->fid.unique;
5056 userp = fileLock->userp;
5058 osi_Log3(afsd_logp, "CALL ExtendLock lock 0x%p for scp=0x%p with lock %d",
5061 (int) scp->serverLock);
5063 lock_ReleaseWrite(&scp->rw);
5066 code = cm_ConnFromFID(&cfid, userp,
5071 callp = cm_GetRxConn(connp);
5072 code = RXAFS_ExtendLock(callp, &tfid,
5074 rx_PutConnection(callp);
5076 osi_Log1(afsd_logp, " ExtendLock returns %d", code);
5078 } while (cm_Analyze(connp, userp, &req,
5079 &cfid, &volSync, NULL, NULL,
5082 code = cm_MapRPCError(code, &req);
5084 lock_ObtainWrite(&scp->rw);
5087 osi_Log1(afsd_logp, "CALL ExtendLock FAILURE, code 0x%x", code);
5089 osi_Log0(afsd_logp, "CALL ExtendLock SUCCESS");
5090 scp->lockDataVersion = scp->dataVersion;
5093 if ((code == EINVAL || code == CM_ERROR_INVAL) &&
5094 scp->lockDataVersion == scp->dataVersion) {
5098 (scp->exclusiveLocks > 0) ? LockWrite: LockRead;
5100 /* we might still have a chance to obtain a
5103 code = cm_IntSetLock(scp, userp, lockType, &req);
5106 code = CM_ERROR_INVAL;
5107 } else if (scp->lockDataVersion != scp->dataVersion) {
5109 /* now check if we still have the file at
5110 the right data version. */
5112 "Data version mismatch on scp 0x%p",
5115 " Data versions: before=%I64d, after=%I64d",
5116 scp->lockDataVersion,
5119 code = cm_IntReleaseLock(scp, userp, &req);
5121 code = CM_ERROR_INVAL;
5125 if (code == EINVAL || code == CM_ERROR_INVAL ||
5126 code == CM_ERROR_BADFD) {
5127 cm_LockMarkSCacheLost(scp);
5131 /* interestingly, we have found an active lock
5132 belonging to an scache that has no
5134 cm_LockMarkSCacheLost(scp);
5141 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_LOCK);
5144 lock_ReleaseWrite(&scp->rw);
5146 lock_ObtainWrite(&cm_scacheLock);
5149 fileLock->lastUpdate = time(NULL);
5153 scp->lastRefreshCycle = cm_lockRefreshCycle;
5156 /* we have already refreshed the locks on this scp */
5157 fileLock->lastUpdate = time(NULL);
5160 cm_ReleaseSCacheNoLock(scp);
5162 } else if (IS_LOCK_ACTIVE(fileLock) && IS_LOCK_CLIENTONLY(fileLock)) {
5163 /* TODO: Check callbacks */
5167 lock_ReleaseWrite(&cm_scacheLock);
5168 osi_Log1(afsd_logp, "cm_CheckLocks completes lock check cycle %d", cm_lockRefreshCycle);
5171 /* NOT called with scp->rw held. */
5172 long cm_RetryLock(cm_file_lock_t *oldFileLock, int client_is_dead)
5175 cm_scache_t *scp = NULL;
5176 cm_file_lock_t *fileLock;
5180 int force_client_lock = FALSE;
5181 int has_insert = FALSE;
5182 int check_data_version = FALSE;
5186 if (client_is_dead) {
5187 code = CM_ERROR_TIMEDOUT;
5191 lock_ObtainRead(&cm_scacheLock);
5193 osi_Log2(afsd_logp, "cm_RetryLock checking lock %p (scp=%p)", oldFileLock, oldFileLock->scp);
5194 osi_Log4(afsd_logp, " offset(%x:%x) length(%x:%x)",
5195 (unsigned)(oldFileLock->range.offset >> 32),
5196 (unsigned)(oldFileLock->range.offset & 0xffffffff),
5197 (unsigned)(oldFileLock->range.length >> 32),
5198 (unsigned)(oldFileLock->range.length & 0xffffffff));
5199 osi_Log3(afsd_logp, " key(%x:%x) flags=%x",
5200 (unsigned)(oldFileLock->key >> 32),
5201 (unsigned)(oldFileLock->key & 0xffffffff),
5202 (unsigned)(oldFileLock->flags));
5204 /* if the lock has already been granted, then we have nothing to do */
5205 if (IS_LOCK_ACTIVE(oldFileLock)) {
5206 lock_ReleaseRead(&cm_scacheLock);
5207 osi_Log0(afsd_logp, "cm_RetryLock lock already granted");
5211 /* we can't do anything with lost or deleted locks at the moment. */
5212 if (IS_LOCK_LOST(oldFileLock) || IS_LOCK_DELETED(oldFileLock)) {
5213 code = CM_ERROR_BADFD;
5214 osi_Log0(afsd_logp, "cm_RetryLock lock is lost or deleted");
5215 lock_ReleaseRead(&cm_scacheLock);
5219 scp = oldFileLock->scp;
5221 osi_assertx(scp != NULL, "null cm_scache_t");
5223 lock_ReleaseRead(&cm_scacheLock);
5224 lock_ObtainWrite(&scp->rw);
5226 code = cm_LockCheckPerms(scp, oldFileLock->lockType,
5230 if (code == CM_ERROR_NOACCESS && oldFileLock->lockType == LockRead) {
5231 if (!has_insert || !SCP_SUPPORTS_WRITELOCKACL(scp)) {
5232 force_client_lock = TRUE;
5236 lock_ReleaseWrite(&scp->rw);
5240 lock_ObtainWrite(&cm_scacheLock);
5242 /* Check if we already have a sufficient server lock to allow this
5243 lock to go through. */
5244 if (IS_LOCK_WAITLOCK(oldFileLock) &&
5245 (!SERVERLOCKS_ENABLED(scp) ||
5246 scp->serverLock == oldFileLock->lockType ||
5247 scp->serverLock == LockWrite)) {
5249 oldFileLock->flags &= ~CM_FILELOCK_FLAG_WAITLOCK;
5251 if (SERVERLOCKS_ENABLED(scp)) {
5252 osi_Log1(afsd_logp, "cm_RetryLock Server lock (%d) is sufficient for lock. Granting",
5253 (int) scp->serverLock);
5255 osi_Log0(afsd_logp, "cm_RetryLock skipping server lock for scp");
5258 lock_ReleaseWrite(&cm_scacheLock);
5259 lock_ReleaseWrite(&scp->rw);
5264 if (IS_LOCK_WAITUNLOCK(oldFileLock)) {
5266 /* check if the conflicting locks have dissappeared already */
5267 for (q = scp->fileLocksH; q; q = osi_QNext(q)) {
5269 fileLock = (cm_file_lock_t *)
5270 ((char *) q - offsetof(cm_file_lock_t, fileq));
5272 if (IS_LOCK_LOST(fileLock)) {
5273 if (fileLock->key == oldFileLock->key) {
5274 code = CM_ERROR_BADFD;
5275 oldFileLock->flags |= CM_FILELOCK_FLAG_LOST;
5276 osi_Log1(afsd_logp, " found lost lock %p for same key. Marking lock as lost",
5279 } else if (fileLock->lockType == LockWrite &&
5280 INTERSECT_RANGE(oldFileLock->range, fileLock->range)) {
5281 osi_Log1(afsd_logp, " found conflicting LOST lock %p", fileLock);
5282 code = CM_ERROR_WOULDBLOCK;
5287 if (IS_LOCK_ACCEPTED(fileLock) &&
5288 INTERSECT_RANGE(oldFileLock->range, fileLock->range)) {
5290 if (oldFileLock->lockType != LockRead ||
5291 fileLock->lockType != LockRead) {
5293 osi_Log1(afsd_logp, " found conflicting lock %p", fileLock);
5294 code = CM_ERROR_WOULDBLOCK;
5302 lock_ReleaseWrite(&cm_scacheLock);
5303 lock_ReleaseWrite(&scp->rw);
5308 /* when we get here, the lock is either a WAITUNLOCK or WAITLOCK.
5309 If it is WAITUNLOCK, then we didn't find any conflicting lock
5310 but we haven't verfied whether the serverLock is sufficient to
5311 assert it. If it is WAITLOCK, then the serverLock is
5312 insufficient to assert it. Eitherway, we are ready to accept
5313 the lock as either ACTIVE or WAITLOCK depending on the
5316 /* First, promote the WAITUNLOCK to a WAITLOCK */
5317 if (IS_LOCK_WAITUNLOCK(oldFileLock)) {
5318 if (oldFileLock->lockType == LockRead)
5321 scp->exclusiveLocks++;
5323 oldFileLock->flags &= ~CM_FILELOCK_FLAG_WAITUNLOCK;
5324 oldFileLock->flags |= CM_FILELOCK_FLAG_WAITLOCK;
5327 osi_assertx(IS_LOCK_WAITLOCK(oldFileLock), "!IS_LOCK_WAITLOCK");
5329 if (force_client_lock ||
5330 !SERVERLOCKS_ENABLED(scp) ||
5331 scp->serverLock == oldFileLock->lockType ||
5332 (oldFileLock->lockType == LockRead &&
5333 scp->serverLock == LockWrite)) {
5335 oldFileLock->flags &= ~CM_FILELOCK_FLAG_WAITLOCK;
5337 if ((force_client_lock ||
5338 !SERVERLOCKS_ENABLED(scp)) &&
5339 !IS_LOCK_CLIENTONLY(oldFileLock)) {
5341 oldFileLock->flags |= CM_FILELOCK_FLAG_CLIENTONLY;
5343 if (oldFileLock->lockType == LockRead)
5346 scp->exclusiveLocks--;
5351 lock_ReleaseWrite(&cm_scacheLock);
5352 lock_ReleaseWrite(&scp->rw);
5359 code = cm_SyncOp(scp, NULL, oldFileLock->userp, &req, 0,
5360 CM_SCACHESYNC_NEEDCALLBACK
5361 | CM_SCACHESYNC_GETSTATUS
5362 | CM_SCACHESYNC_LOCK);
5364 osi_Log1(afsd_logp, "cm_RetryLock SyncOp failure code 0x%x", code);
5365 lock_ReleaseWrite(&cm_scacheLock);
5366 goto post_syncopdone;
5369 if (!IS_LOCK_WAITLOCK(oldFileLock))
5370 goto pre_syncopdone;
5372 userp = oldFileLock->userp;
5374 #ifndef AGGRESSIVE_LOCKS
5375 newLock = oldFileLock->lockType;
5377 newLock = LockWrite;
5381 /* if has_insert is non-zero, then:
5382 - the lock a LockRead
5383 - we don't have permission to get a LockRead
5384 - we do have permission to get a LockWrite
5385 - the server supports VICED_CAPABILITY_WRITELOCKACL
5388 newLock = LockWrite;
5391 lock_ReleaseWrite(&cm_scacheLock);
5393 /* when we get here, either we have a read-lock and want a
5394 write-lock or we don't have any locks and we want some
5397 if (scp->serverLock == LockRead) {
5399 osi_assertx(newLock == LockWrite, "!LockWrite");
5401 osi_Log0(afsd_logp, " Attempting to UPGRADE from LockRead to LockWrite");
5403 scp->lockDataVersion = scp->dataVersion;
5404 check_data_version = TRUE;
5406 code = cm_IntReleaseLock(scp, userp, &req);
5409 goto pre_syncopdone;
5411 scp->serverLock = -1;
5414 code = cm_IntSetLock(scp, userp, newLock, &req);
5417 if (scp->dataVersion != scp->lockDataVersion) {
5418 /* we lost a race. too bad */
5421 " Data version mismatch while upgrading lock.");
5423 " Data versions before=%I64d, after=%I64d",
5424 scp->lockDataVersion,
5427 " Releasing stale lock for scp 0x%x", scp);
5429 code = cm_IntReleaseLock(scp, userp, &req);
5431 scp->serverLock = -1;
5433 code = CM_ERROR_INVAL;
5435 cm_LockMarkSCacheLost(scp);
5437 scp->serverLock = newLock;
5442 cm_SyncOpDone(scp, NULL, CM_SCACHESYNC_LOCK);
5448 if (code != 0 && code != CM_ERROR_WOULDBLOCK) {
5449 lock_ObtainWrite(&cm_scacheLock);
5450 if (scp->fileLocksT == &oldFileLock->fileq)
5451 scp->fileLocksT = osi_QPrev(&oldFileLock->fileq);
5452 osi_QRemoveHT(&scp->fileLocksH, &scp->fileLocksT, &oldFileLock->fileq);
5453 lock_ReleaseWrite(&cm_scacheLock);
5455 lock_ReleaseWrite(&scp->rw);
5458 lock_ObtainWrite(&cm_scacheLock);
5460 oldFileLock->flags &= ~CM_FILELOCK_FLAG_WAITLOCK;
5461 } else if (code != CM_ERROR_WOULDBLOCK) {
5462 oldFileLock->flags |= CM_FILELOCK_FLAG_DELETED;
5463 cm_ReleaseUser(oldFileLock->userp);
5464 oldFileLock->userp = NULL;
5465 if (oldFileLock->scp) {
5466 cm_ReleaseSCacheNoLock(oldFileLock->scp);
5467 oldFileLock->scp = NULL;
5470 lock_ReleaseWrite(&cm_scacheLock);
5475 cm_key_t cm_GenerateKey(unsigned int session_id, unsigned long process_id, unsigned int file_id)
5478 osi_assertx((process_id & 0xffffffff) == process_id, "unexpected process_id");
5479 osi_assertx((session_id & 0xffff) == session_id, "unexpected session_id");
5480 osi_assertx((file_id & 0xffff) == file_id, "unexpected file_id");
5484 (((cm_key_t) (process_id & 0xffffffff)) << 32) |
5485 (((cm_key_t) (session_id & 0xffff)) << 16) |
5486 (((cm_key_t) (file_id & 0xffff)));
5489 static int cm_KeyEquals(cm_key_t k1, cm_key_t k2, int flags)
5491 if (flags & CM_UNLOCK_BY_FID) {
5492 return ((k1 & 0xffffffff) == (k2 & 0xffffffff));
5498 void cm_ReleaseAllLocks(void)
5504 cm_file_lock_t *fileLock;
5507 for (i = 0; i < cm_data.scacheHashTableSize; i++)
5509 for ( scp = cm_data.scacheHashTablep[i]; scp; scp = scp->nextp ) {
5510 while (scp->fileLocksH != NULL) {
5511 lock_ObtainWrite(&scp->rw);
5512 lock_ObtainWrite(&cm_scacheLock);
5513 if (!scp->fileLocksH) {
5514 lock_ReleaseWrite(&cm_scacheLock);
5515 lock_ReleaseWrite(&scp->rw);
5518 fileLock = (cm_file_lock_t *)((char *) scp->fileLocksH - offsetof(cm_file_lock_t, fileq));
5519 userp = fileLock->userp;
5521 key = fileLock->key;
5522 cm_HoldSCacheNoLock(scp);
5523 lock_ReleaseWrite(&cm_scacheLock);
5524 cm_UnlockByKey(scp, key, 0, userp, &req);
5525 cm_ReleaseSCache(scp);
5526 cm_ReleaseUser(userp);
5527 lock_ReleaseWrite(&scp->rw);