2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afs/param.h>
28 osi_rwlock_t cm_connLock;
30 long RDRtimeout = CM_CONN_DEFAULTRDRTIMEOUT;
31 long ConnDeadtimeout = CM_CONN_CONNDEADTIME;
32 long HardDeadtimeout = CM_CONN_HARDDEADTIME;
34 #define LANMAN_WKS_PARAM_KEY "SYSTEM\\CurrentControlSet\\Services\\lanmanworkstation\\parameters"
35 #define LANMAN_WKS_SESSION_TIMEOUT "SessTimeout"
37 afs_int32 cryptall = 0;
39 void cm_PutConn(cm_conn_t *connp)
41 lock_ObtainWrite(&cm_connLock);
42 osi_assert(connp->refCount-- > 0);
43 lock_ReleaseWrite(&cm_connLock);
46 void cm_InitConn(void)
48 static osi_once_t once;
53 if (osi_Once(&once)) {
54 lock_InitializeRWLock(&cm_connLock, "connection global lock");
56 /* keisa - read timeout value for lanmanworkstation service.
58 * http://support.microsoft.com:80/support/kb/articles/Q102/0/67.asp&NoWebContent=1
59 * the SessTimeout is a minimum timeout not a maximum timeout. Therefore,
60 * I believe that the default should not be short. Instead, we should wait until
61 * RX times out before reporting a timeout to the SMB client.
63 code = RegOpenKeyEx(HKEY_LOCAL_MACHINE, LANMAN_WKS_PARAM_KEY,
64 0, KEY_QUERY_VALUE, &parmKey);
65 if (code == ERROR_SUCCESS)
67 DWORD dummyLen = sizeof(sessTimeout);
68 code = RegQueryValueEx(parmKey, LANMAN_WKS_SESSION_TIMEOUT, NULL, NULL,
69 (BYTE *) &sessTimeout, &dummyLen);
70 if (code == ERROR_SUCCESS)
72 afsi_log("lanmanworkstation : SessTimeout %d", sessTimeout);
73 RDRtimeout = sessTimeout;
74 if ( ConnDeadtimeout < RDRtimeout + 15 ) {
75 ConnDeadtimeout = RDRtimeout + 15;
76 afsi_log("ConnDeadTimeout increased to %d", ConnDeadtimeout);
78 if ( HardDeadtimeout < 2 * ConnDeadtimeout ) {
79 HardDeadtimeout = 2 * ConnDeadtimeout;
80 afsi_log("HardDeadTimeout increased to %d", HardDeadtimeout);
89 void cm_InitReq(cm_req_t *reqp)
91 memset((char *)reqp, 0, sizeof(cm_req_t));
93 reqp->startTime = GetCurrentTime();
95 gettimeofday(&reqp->startTime, NULL);
100 long cm_GetServerList(struct cm_fid *fidp, struct cm_user *userp,
101 struct cm_req *reqp, cm_serverRef_t **serverspp)
104 cm_volume_t *volp = NULL;
105 cm_serverRef_t *serversp = NULL;
106 cm_serverRef_t *newServersp = NULL;
107 cm_cell_t *cellp = NULL;
114 cellp = cm_FindCellByID(fidp->cell);
115 if (!cellp) return CM_ERROR_NOSUCHCELL;
117 code = cm_GetVolumeByID(cellp, fidp->volume, userp, reqp, &volp);
118 if (code) return code;
120 lock_ObtainMutex(&volp->mx);
121 if (fidp->volume == volp->rwID)
122 serversp = volp->rwServersp;
123 else if (fidp->volume == volp->roID)
124 serversp = volp->roServersp;
125 else if (fidp->volume == volp->bkID)
126 serversp = volp->bkServersp;
130 /* make a copy of the server list because by the time the
131 caller tries to use it, it might have been freed.
132 Preserve server order. */
134 cm_serverRef_t ** nl;
135 cm_serverRef_t * tref;
139 lock_ObtainWrite(&cm_serverLock);
142 tref = malloc(sizeof(cm_serverRef_t));
144 tref->server = serversp->server;
145 tref->status = serversp->status;
147 tref->server->refCount++;
152 serversp = serversp->next;
154 lock_ReleaseWrite(&cm_serverLock);
156 lock_ReleaseMutex(&volp->mx);
159 *serverspp = newServersp;
164 * Analyze the error return from an RPC. Determine whether or not to retry,
165 * and if we're going to retry, determine whether failover is appropriate,
166 * and whether timed backoff is appropriate.
168 * If the error code is from cm_Conn() or friends, it will be a CM_ERROR code.
169 * Otherwise it will be an RPC code. This may be a UNIX code (e.g. EDQUOT), or
170 * it may be an RX code, or it may be a special code (e.g. VNOVOL), or it may
171 * be a security code (e.g. RXKADEXPIRED).
173 * If the error code is from cm_Conn() or friends, connp will be NULL.
175 * For VLDB calls, fidp will be NULL.
177 * volSyncp and/or cbrp may also be NULL.
180 cm_Analyze(cm_conn_t *connp, cm_user_t *userp, cm_req_t *reqp,
182 AFSVolSync *volSyncp, cm_callbackRequest_t *cbrp, long errorCode)
184 cm_server_t *serverp;
185 cm_serverRef_t *serversp, *tsrp;
190 osi_Log2(afsd_logp, "cm_Analyze connp 0x%x, code %d",
191 (long) connp, errorCode);
193 /* no locking required, since connp->serverp never changes after
195 dead_session = (userp->cellInfop == NULL);
197 serverp = connp->serverp;
199 /* Update callback pointer */
200 if (cbrp && errorCode == 0) cbrp->serverp = connp->serverp;
202 /* If not allowed to retry, don't */
203 if (reqp->flags & CM_REQ_NORETRY)
206 /* if timeout - check that it did not exceed the SMB timeout
208 if (errorCode == CM_ERROR_TIMEDOUT)
210 long timeUsed, timeLeft;
211 /* timeleft - get if from reqp the same way as cmXonnByMServers does */
213 timeUsed = (GetCurrentTime() - reqp->startTime) / 1000;
215 gettimeofday(&now, NULL);
216 timeUsed = sub_time(now, reqp->startTime) / 1000;
219 /* leave 5 seconds margin for sleep */
220 timeLeft = RDRtimeout - timeUsed;
224 cm_CheckServers(CM_FLAG_CHECKDOWNSERVERS, NULL);
229 /* if all servers are offline, mark them non-busy and start over */
230 if (errorCode == CM_ERROR_ALLOFFLINE) {
231 osi_Log0(afsd_logp, "cm_Analyze passed CM_ERROR_ALLOFFLINE.");
233 /* cm_ForceUpdateVolume marks all servers as non_busy */
234 /* No it doesn't and it won't do anything if all of the
235 * the servers are marked as DOWN. So clear the DOWN
236 * flag and reset the busy state as well.
238 cm_GetServerList(fidp, userp, reqp, &serversp);
240 lock_ObtainWrite(&cm_serverLock);
241 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
242 tsrp->server->flags &= ~CM_SERVERFLAG_DOWN;
243 if (tsrp->status == busy)
244 tsrp->status = not_busy;
246 lock_ReleaseWrite(&cm_serverLock);
250 cm_FreeServerList(&serversp);
252 if (fidp != NULL) /* Not a VLDB call */
253 cm_ForceUpdateVolume(fidp, userp, reqp);
256 /* if all servers are busy, mark them non-busy and start over */
257 if (errorCode == CM_ERROR_ALLBUSY) {
258 cm_GetServerList(fidp, userp, reqp, &serversp);
259 lock_ObtainWrite(&cm_serverLock);
260 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
261 if (tsrp->status == busy)
262 tsrp->status = not_busy;
264 lock_ReleaseWrite(&cm_serverLock);
265 cm_FreeServerList(&serversp);
270 /* special codes: VBUSY and VRESTARTING */
271 if (errorCode == VBUSY || errorCode == VRESTARTING) {
272 cm_GetServerList(fidp, userp, reqp, &serversp);
273 lock_ObtainWrite(&cm_serverLock);
274 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
275 if (tsrp->server == serverp
276 && tsrp->status == not_busy) {
281 lock_ReleaseWrite(&cm_serverLock);
282 cm_FreeServerList(&serversp);
286 /* special codes: missing volumes */
287 if (errorCode == VNOVOL || errorCode == VMOVED || errorCode == VOFFLINE
288 || errorCode == VSALVAGE || errorCode == VNOSERVICE) {
289 /* Log server being offline for this volume */
290 osi_Log4(afsd_logp, "cm_Analyze found server %d.%d.%d.%d marked offline for a volume",
291 ((serverp->addr.sin_addr.s_addr & 0xff)),
292 ((serverp->addr.sin_addr.s_addr & 0xff00)>> 8),
293 ((serverp->addr.sin_addr.s_addr & 0xff0000)>> 16),
294 ((serverp->addr.sin_addr.s_addr & 0xff000000)>> 24));
295 /* Create Event Log message */
300 h = RegisterEventSource(NULL, AFS_DAEMON_EVENT_NAME);
301 sprintf(s, "cm_Analyze: Server %d.%d.%d.%d reported volume %d as missing.",
302 ((serverp->addr.sin_addr.s_addr & 0xff)),
303 ((serverp->addr.sin_addr.s_addr & 0xff00)>> 8),
304 ((serverp->addr.sin_addr.s_addr & 0xff0000)>> 16),
305 ((serverp->addr.sin_addr.s_addr & 0xff000000)>> 24),
308 ReportEvent(h, EVENTLOG_WARNING_TYPE, 0, 1009, NULL,
310 DeregisterEventSource(h);
313 /* Mark server offline for this volume */
314 cm_GetServerList(fidp, userp, reqp, &serversp);
315 for (tsrp = serversp; tsrp; tsrp=tsrp->next) {
316 if (tsrp->server == serverp)
317 tsrp->status = offline;
319 cm_FreeServerList(&serversp);
324 if (errorCode == RX_CALL_TIMEOUT) {
325 /* server took longer than hardDeadTime
326 * don't mark server as down but don't retry
327 * this is to prevent the SMB session from timing out
328 * In addition, we log an event to the event log
334 h = RegisterEventSource(NULL, AFS_DAEMON_EVENT_NAME);
335 sprintf(s, "cm_Analyze: HardDeadTime exceeded.");
337 ReportEvent(h, EVENTLOG_WARNING_TYPE, 0, 1009, NULL,
339 DeregisterEventSource(h);
343 osi_Log0(afsd_logp, "cm_Analyze: hardDeadTime exceeded");
345 else if (errorCode >= -64 && errorCode < 0) {
346 /* mark server as down */
347 lock_ObtainMutex(&serverp->mx);
348 serverp->flags |= CM_SERVERFLAG_DOWN;
349 lock_ReleaseMutex(&serverp->mx);
353 if (errorCode == RXKADEXPIRED && !dead_session) {
354 lock_ObtainMutex(&userp->mx);
355 ucellp = cm_GetUCell(userp, serverp->cellp);
356 if (ucellp->ticketp) {
357 free(ucellp->ticketp);
358 ucellp->ticketp = NULL;
360 ucellp->flags &= ~CM_UCELLFLAG_RXKAD;
362 lock_ReleaseMutex(&userp->mx);
366 if (retry && dead_session)
370 /* drop this on the way out */
374 /* retry until we fail to find a connection */
378 long cm_ConnByMServers(cm_serverRef_t *serversp, cm_user_t *usersp,
379 cm_req_t *reqp, cm_conn_t **connpp)
382 cm_serverRef_t *tsrp;
385 int someBusy = 0, someOffline = 0, allBusy = 1, allDown = 1;
386 long timeUsed, timeLeft, hardTimeLeft;
394 timeUsed = (GetCurrentTime() - reqp->startTime) / 1000;
396 gettimeofday(&now, NULL);
397 timeUsed = sub_time(now, reqp->startTime) / 1000;
400 /* leave 5 seconds margin of safety */
401 timeLeft = ConnDeadtimeout - timeUsed - 5;
402 hardTimeLeft = HardDeadtimeout - timeUsed - 5;
404 lock_ObtainWrite(&cm_serverLock);
406 for(tsrp = serversp; tsrp; tsrp=tsrp->next) {
409 lock_ReleaseWrite(&cm_serverLock);
410 if (!(tsp->flags & CM_SERVERFLAG_DOWN)) {
412 if (tsrp->status == busy)
414 else if (tsrp->status == offline)
418 code = cm_ConnByServer(tsp, usersp, connpp);
421 /* Set RPC timeout */
422 if (timeLeft > ConnDeadtimeout)
423 timeLeft = ConnDeadtimeout;
425 if (hardTimeLeft > HardDeadtimeout)
426 hardTimeLeft = HardDeadtimeout;
428 lock_ObtainMutex(&(*connpp)->mx);
429 rx_SetConnDeadTime((*connpp)->callp,
431 rx_SetConnHardDeadTime((*connpp)->callp,
432 (u_short) hardTimeLeft);
433 lock_ReleaseMutex(&(*connpp)->mx);
441 lock_ObtainWrite(&cm_serverLock);
442 osi_assert(tsp->refCount-- > 0);
445 lock_ReleaseWrite(&cm_serverLock);
446 if (firstError == 0) {
447 if (serversp == NULL)
448 firstError = CM_ERROR_NOSUCHVOLUME;
450 firstError = CM_ERROR_ALLOFFLINE;
452 firstError = CM_ERROR_ALLBUSY;
454 firstError = CM_ERROR_TIMEDOUT;
456 osi_Log1(afsd_logp, "cm_ConnByMServers returning %x", firstError);
460 /* called with a held server to GC all bad connections hanging off of the server */
461 void cm_GCConnections(cm_server_t *serverp)
467 lock_ObtainWrite(&cm_connLock);
468 lcpp = &serverp->connsp;
469 for(tcp = *lcpp; tcp; tcp = *lcpp) {
471 if (userp && tcp->refCount == 0 && (userp->vcRefs == 0)) {
472 /* do the deletion of this guy */
473 cm_ReleaseUser(userp);
475 rx_DestroyConnection(tcp->callp);
476 lock_FinalizeMutex(&tcp->mx);
480 /* just advance to the next */
484 lock_ReleaseWrite(&cm_connLock);
487 static void cm_NewRXConnection(cm_conn_t *tcp, cm_ucell_t *ucellp,
488 cm_server_t *serverp)
493 struct rx_securityClass *secObjp;
496 if (serverp->type == CM_SERVER_VLDB) {
501 osi_assert(serverp->type == CM_SERVER_FILE);
505 if (ucellp->flags & CM_UCELLFLAG_RXKAD) {
509 tcp->cryptlevel = rxkad_crypt;
513 secObjp = rxkad_NewClientSecurityObject(level,
514 &ucellp->sessionKey, ucellp->kvno,
515 ucellp->ticketLen, ucellp->ticketp);
520 secObjp = rxnull_NewClientSecurityObject();
522 osi_assert(secObjp != NULL);
523 tcp->callp = rx_NewConnection(serverp->addr.sin_addr.s_addr,
528 rx_SetConnDeadTime(tcp->callp, ConnDeadtimeout);
529 rx_SetConnHardDeadTime(tcp->callp, HardDeadtimeout);
530 tcp->ucgen = ucellp->gen;
532 rxs_Release(secObjp); /* Decrement the initial refCount */
535 long cm_ConnByServer(cm_server_t *serverp, cm_user_t *userp, cm_conn_t **connpp)
540 lock_ObtainMutex(&userp->mx);
541 lock_ObtainWrite(&cm_connLock);
542 for(tcp = serverp->connsp; tcp; tcp=tcp->nextp) {
543 if (tcp->userp == userp) break;
545 /* find ucell structure */
546 ucellp = cm_GetUCell(userp, serverp->cellp);
548 tcp = malloc(sizeof(*tcp));
549 memset(tcp, 0, sizeof(*tcp));
550 tcp->nextp = serverp->connsp;
551 serverp->connsp = tcp;
554 lock_InitializeMutex(&tcp->mx, "cm_conn_t mutex");
555 tcp->serverp = serverp;
556 tcp->cryptlevel = rxkad_clear;
557 cm_NewRXConnection(tcp, ucellp, serverp);
561 if ((tcp->ucgen < ucellp->gen) || (tcp->cryptlevel != cryptall))
563 rx_DestroyConnection(tcp->callp);
564 cm_NewRXConnection(tcp, ucellp, serverp);
568 lock_ReleaseWrite(&cm_connLock);
569 lock_ReleaseMutex(&userp->mx);
571 /* return this pointer to our caller */
572 osi_Log1(afsd_logp, "cm_ConnByServer returning conn 0x%x", (long) tcp);
578 long cm_Conn(struct cm_fid *fidp, struct cm_user *userp, cm_req_t *reqp,
583 cm_serverRef_t *serversp;
585 code = cm_GetServerList(fidp, userp, reqp, &serversp);
591 code = cm_ConnByMServers(serversp, userp, reqp, connpp);
592 cm_FreeServerList(&serversp);