adding some initiaial code to sert %a to Win2K3 (using Native LanMan string from...
[Samba.git] / source / smbd / oplock.c
blobf5c19bcf62c008299d9897817207d8e7c4d6ebf5
1 /*
2 Unix SMB/CIFS implementation.
3 oplock processing
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998 - 2001
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22 #include "includes.h"
24 /* Oplock ipc UDP socket. */
25 static int oplock_sock = -1;
26 uint16 global_oplock_port = 0;
28 /* Current number of oplocks we have outstanding. */
29 static int32 exclusive_oplocks_open = 0;
30 static int32 level_II_oplocks_open = 0;
31 BOOL global_client_failed_oplock_break = False;
32 BOOL global_oplock_break = False;
34 extern int smb_read_error;
36 static struct kernel_oplocks *koplocks;
38 static BOOL oplock_break(SMB_DEV_T dev, SMB_INO_T inode, unsigned long file_id, BOOL local);
40 /****************************************************************************
41 Get the number of current exclusive oplocks.
42 ****************************************************************************/
44 int32 get_number_of_exclusive_open_oplocks(void)
46 return exclusive_oplocks_open;
49 /****************************************************************************
50 Return True if an oplock message is pending.
51 ****************************************************************************/
53 BOOL oplock_message_waiting(fd_set *fds)
55 if (koplocks && koplocks->msg_waiting(fds))
56 return True;
58 if (FD_ISSET(oplock_sock, fds))
59 return True;
61 return False;
64 /****************************************************************************
65 Read an oplock break message from either the oplock UDP fd or the
66 kernel (if kernel oplocks are supported).
68 If timeout is zero then *fds contains the file descriptors that
69 are ready to be read and acted upon. If timeout is non-zero then
70 *fds contains the file descriptors to be selected on for read.
71 The timeout is in milliseconds
73 ****************************************************************************/
75 BOOL receive_local_message( char *buffer, int buffer_len, int timeout)
77 struct sockaddr_in from;
78 socklen_t fromlen = sizeof(from);
79 int32 msg_len = 0;
80 fd_set fds;
81 int selrtn = -1;
83 FD_ZERO(&fds);
84 smb_read_error = 0;
87 * We need to check for kernel oplocks before going into the select
88 * here, as the EINTR generated by the linux kernel oplock may have
89 * already been eaten. JRA.
92 if (koplocks && koplocks->msg_waiting(&fds)) {
93 return koplocks->receive_message(&fds, buffer, buffer_len);
96 while (timeout > 0 && selrtn == -1) {
97 struct timeval to;
98 int maxfd = oplock_sock;
99 time_t starttime = time(NULL);
101 FD_ZERO(&fds);
102 maxfd = setup_oplock_select_set(&fds);
104 to.tv_sec = timeout / 1000;
105 to.tv_usec = (timeout % 1000) * 1000;
107 DEBUG(5,("receive_local_message: doing select with timeout of %d ms\n", timeout));
109 selrtn = sys_select(maxfd+1,&fds,NULL,NULL,&to);
111 if (selrtn == -1 && errno == EINTR) {
113 /* could be a kernel oplock interrupt */
114 if (koplocks && koplocks->msg_waiting(&fds)) {
115 return koplocks->receive_message(&fds, buffer, buffer_len);
119 * Linux 2.0.x seems to have a bug in that
120 * it can return -1, EINTR with a timeout of zero.
121 * Make sure we bail out here with a read timeout
122 * if we got EINTR on a timeout of 1 or less.
125 if (timeout <= 1) {
126 smb_read_error = READ_TIMEOUT;
127 return False;
130 /* Not a kernel interrupt - could be a SIGUSR1 message. We must restart. */
131 /* We need to decrement the timeout here. */
132 timeout -= ((time(NULL) - starttime)*1000);
133 if (timeout < 0)
134 timeout = 1;
136 DEBUG(5,("receive_local_message: EINTR : new timeout %d ms\n", timeout));
137 continue;
140 /* Check if error */
141 if(selrtn == -1) {
142 /* something is wrong. Maybe the socket is dead? */
143 smb_read_error = READ_ERROR;
144 return False;
147 /* Did we timeout ? */
148 if (selrtn == 0) {
149 smb_read_error = READ_TIMEOUT;
150 return False;
154 if (koplocks && koplocks->msg_waiting(&fds)) {
155 return koplocks->receive_message(&fds, buffer, buffer_len);
158 if (!FD_ISSET(oplock_sock, &fds))
159 return False;
162 * From here down we deal with the smbd <--> smbd
163 * oplock break protocol only.
167 * Read a loopback udp message.
169 msg_len = sys_recvfrom(oplock_sock, &buffer[OPBRK_CMD_HEADER_LEN],
170 buffer_len - OPBRK_CMD_HEADER_LEN, 0, (struct sockaddr *)&from, &fromlen);
172 if(msg_len < 0) {
173 DEBUG(0,("receive_local_message. Error in recvfrom. (%s).\n",strerror(errno)));
174 return False;
177 /* Validate message length. */
178 if(msg_len > (buffer_len - OPBRK_CMD_HEADER_LEN)) {
179 DEBUG(0,("receive_local_message: invalid msg_len (%d) max can be %d\n", msg_len,
180 buffer_len - OPBRK_CMD_HEADER_LEN));
181 return False;
184 /* Validate message from address (must be localhost). */
185 if(from.sin_addr.s_addr != htonl(INADDR_LOOPBACK)) {
186 DEBUG(0,("receive_local_message: invalid 'from' address \
187 (was %lx should be 127.0.0.1)\n", (long)from.sin_addr.s_addr));
188 return False;
191 /* Setup the message header */
192 SIVAL(buffer,OPBRK_CMD_LEN_OFFSET,msg_len);
193 SSVAL(buffer,OPBRK_CMD_PORT_OFFSET,ntohs(from.sin_port));
195 return True;
198 /****************************************************************************
199 Attempt to set an oplock on a file. Always succeeds if kernel oplocks are
200 disabled (just sets flags). Returns True if oplock set.
201 ****************************************************************************/
203 BOOL set_file_oplock(files_struct *fsp, int oplock_type)
205 if (koplocks && !koplocks->set_oplock(fsp, oplock_type))
206 return False;
208 fsp->oplock_type = oplock_type;
209 fsp->sent_oplock_break = NO_BREAK_SENT;
210 if (oplock_type == LEVEL_II_OPLOCK)
211 level_II_oplocks_open++;
212 else
213 exclusive_oplocks_open++;
215 DEBUG(5,("set_file_oplock: granted oplock on file %s, dev = %x, inode = %.0f, file_id = %lu, \
216 tv_sec = %x, tv_usec = %x\n",
217 fsp->fsp_name, (unsigned int)fsp->dev, (double)fsp->inode, fsp->file_id,
218 (int)fsp->open_time.tv_sec, (int)fsp->open_time.tv_usec ));
220 return True;
223 /****************************************************************************
224 Attempt to release an oplock on a file. Decrements oplock count.
225 ****************************************************************************/
227 void release_file_oplock(files_struct *fsp)
229 if (koplocks)
230 koplocks->release_oplock(fsp);
232 if (fsp->oplock_type == LEVEL_II_OPLOCK)
233 level_II_oplocks_open--;
234 else
235 exclusive_oplocks_open--;
237 fsp->oplock_type = NO_OPLOCK;
238 fsp->sent_oplock_break = NO_BREAK_SENT;
240 flush_write_cache(fsp, OPLOCK_RELEASE_FLUSH);
243 /****************************************************************************
244 Attempt to downgrade an oplock on a file. Doesn't decrement oplock count.
245 ****************************************************************************/
247 static void downgrade_file_oplock(files_struct *fsp)
249 if (koplocks)
250 koplocks->release_oplock(fsp);
251 fsp->oplock_type = LEVEL_II_OPLOCK;
252 exclusive_oplocks_open--;
253 level_II_oplocks_open++;
254 fsp->sent_oplock_break = NO_BREAK_SENT;
257 /****************************************************************************
258 Remove a file oplock. Copes with level II and exclusive.
259 Locks then unlocks the share mode lock. Client can decide to go directly
260 to none even if a "break-to-level II" was sent.
261 ****************************************************************************/
263 BOOL remove_oplock(files_struct *fsp, BOOL break_to_none)
265 SMB_DEV_T dev = fsp->dev;
266 SMB_INO_T inode = fsp->inode;
267 BOOL ret = True;
269 /* Remove the oplock flag from the sharemode. */
270 if (lock_share_entry_fsp(fsp) == False) {
271 DEBUG(0,("remove_oplock: failed to lock share entry for file %s\n",
272 fsp->fsp_name ));
273 ret = False;
276 if (fsp->sent_oplock_break == EXCLUSIVE_BREAK_SENT || break_to_none) {
278 * Deal with a reply when a break-to-none was sent.
281 if(remove_share_oplock(fsp)==False) {
282 DEBUG(0,("remove_oplock: failed to remove share oplock for file %s fnum %d, \
283 dev = %x, inode = %.0f\n", fsp->fsp_name, fsp->fnum, (unsigned int)dev, (double)inode));
284 ret = False;
287 release_file_oplock(fsp);
288 } else {
290 * Deal with a reply when a break-to-level II was sent.
292 if(downgrade_share_oplock(fsp)==False) {
293 DEBUG(0,("remove_oplock: failed to downgrade share oplock for file %s fnum %d, \
294 dev = %x, inode = %.0f\n", fsp->fsp_name, fsp->fnum, (unsigned int)dev, (double)inode));
295 ret = False;
298 downgrade_file_oplock(fsp);
301 unlock_share_entry_fsp(fsp);
302 return ret;
305 /****************************************************************************
306 Setup the listening set of file descriptors for an oplock break
307 message either from the UDP socket or from the kernel. Returns the maximum
308 fd used.
309 ****************************************************************************/
311 int setup_oplock_select_set( fd_set *fds)
313 int maxfd = oplock_sock;
315 if(oplock_sock == -1)
316 return 0;
318 FD_SET(oplock_sock,fds);
320 if (koplocks && koplocks->notification_fd != -1) {
321 FD_SET(koplocks->notification_fd, fds);
322 maxfd = MAX(maxfd, koplocks->notification_fd);
325 return maxfd;
328 /****************************************************************************
329 Process an oplock break message - whether it came from the UDP socket
330 or from the kernel.
331 ****************************************************************************/
333 BOOL process_local_message(char *buffer, int buf_size)
335 int32 msg_len;
336 uint16 from_port;
337 char *msg_start;
338 pid_t remotepid;
339 SMB_DEV_T dev;
340 SMB_INO_T inode;
341 unsigned long file_id;
342 uint16 break_cmd_type;
344 msg_len = IVAL(buffer,OPBRK_CMD_LEN_OFFSET);
345 from_port = SVAL(buffer,OPBRK_CMD_PORT_OFFSET);
347 msg_start = &buffer[OPBRK_CMD_HEADER_LEN];
349 DEBUG(5,("process_local_message: Got a message of length %d from port (%d)\n",
350 msg_len, from_port));
353 * Pull the info out of the requesting packet.
356 break_cmd_type = SVAL(msg_start,OPBRK_MESSAGE_CMD_OFFSET);
358 switch(break_cmd_type) {
359 case KERNEL_OPLOCK_BREAK_CMD:
360 if (!koplocks) {
361 DEBUG(0,("unexpected kernel oplock break!\n"));
362 break;
364 if (!koplocks->parse_message(msg_start, msg_len, &inode, &dev, &file_id)) {
365 DEBUG(0,("kernel oplock break parse failure!\n"));
367 break;
369 case OPLOCK_BREAK_CMD:
370 case LEVEL_II_OPLOCK_BREAK_CMD:
371 case ASYNC_LEVEL_II_OPLOCK_BREAK_CMD:
373 /* Ensure that the msg length is correct. */
374 if(msg_len != OPLOCK_BREAK_MSG_LEN) {
375 DEBUG(0,("process_local_message: incorrect length for OPLOCK_BREAK_CMD (was %d, should be %d).\n",
376 (int)msg_len, (int)OPLOCK_BREAK_MSG_LEN));
377 return False;
380 memcpy((char *)&remotepid, msg_start+OPLOCK_BREAK_PID_OFFSET,sizeof(remotepid));
381 memcpy((char *)&inode, msg_start+OPLOCK_BREAK_INODE_OFFSET,sizeof(inode));
382 memcpy((char *)&dev, msg_start+OPLOCK_BREAK_DEV_OFFSET,sizeof(dev));
383 memcpy((char *)&file_id, msg_start+OPLOCK_BREAK_FILEID_OFFSET,sizeof(file_id));
385 DEBUG(5,("process_local_message: (%s) oplock break request from \
386 pid %d, port %d, dev = %x, inode = %.0f, file_id = %lu\n",
387 (break_cmd_type == OPLOCK_BREAK_CMD) ? "exclusive" : "level II",
388 (int)remotepid, from_port, (unsigned int)dev, (double)inode, file_id));
389 break;
392 * Keep this as a debug case - eventually we can remove it.
394 case 0x8001:
395 DEBUG(0,("process_local_message: Received unsolicited break \
396 reply - dumping info.\n"));
398 if(msg_len != OPLOCK_BREAK_MSG_LEN) {
399 DEBUG(0,("process_local_message: ubr: incorrect length for reply \
400 (was %d, should be %d).\n", (int)msg_len, (int)OPLOCK_BREAK_MSG_LEN));
401 return False;
404 memcpy((char *)&inode, msg_start+OPLOCK_BREAK_INODE_OFFSET,sizeof(inode));
405 memcpy((char *)&remotepid, msg_start+OPLOCK_BREAK_PID_OFFSET,sizeof(remotepid));
406 memcpy((char *)&dev, msg_start+OPLOCK_BREAK_DEV_OFFSET,sizeof(dev));
407 memcpy((char *)&file_id, msg_start+OPLOCK_BREAK_FILEID_OFFSET,sizeof(file_id));
409 DEBUG(0,("process_local_message: unsolicited oplock break reply from \
410 pid %d, port %d, dev = %x, inode = %.0f, file_id = %lu\n",
411 (int)remotepid, from_port, (unsigned int)dev, (double)inode, file_id));
413 return False;
415 default:
416 DEBUG(0,("process_local_message: unknown UDP message command code (%x) - ignoring.\n",
417 (unsigned int)SVAL(msg_start,0)));
418 return False;
422 * Now actually process the break request.
425 if((exclusive_oplocks_open + level_II_oplocks_open) != 0) {
426 if (oplock_break(dev, inode, file_id, False) == False) {
427 DEBUG(0,("process_local_message: oplock break failed.\n"));
428 return False;
430 } else {
432 * If we have no record of any currently open oplocks,
433 * it's not an error, as a close command may have
434 * just been issued on the file that was oplocked.
435 * Just log a message and return success in this case.
437 DEBUG(3,("process_local_message: oplock break requested with no outstanding \
438 oplocks. Returning success.\n"));
442 * Do the appropriate reply - none in the kernel or async level II case.
445 if(break_cmd_type == OPLOCK_BREAK_CMD || break_cmd_type == LEVEL_II_OPLOCK_BREAK_CMD) {
446 struct sockaddr_in toaddr;
448 /* Send the message back after OR'ing in the 'REPLY' bit. */
449 SSVAL(msg_start,OPBRK_MESSAGE_CMD_OFFSET,break_cmd_type | CMD_REPLY);
451 memset((char *)&toaddr,'\0',sizeof(toaddr));
452 toaddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
453 toaddr.sin_port = htons(from_port);
454 toaddr.sin_family = AF_INET;
456 if(sys_sendto( oplock_sock, msg_start, OPLOCK_BREAK_MSG_LEN, 0,
457 (struct sockaddr *)&toaddr, sizeof(toaddr)) < 0) {
458 DEBUG(0,("process_local_message: sendto process %d failed. Errno was %s\n",
459 (int)remotepid, strerror(errno)));
460 return False;
463 DEBUG(5,("process_local_message: oplock break reply sent to \
464 pid %d, port %d, for file dev = %x, inode = %.0f, file_id = %lu\n",
465 (int)remotepid, from_port, (unsigned int)dev, (double)inode, file_id));
468 return True;
471 /****************************************************************************
472 Set up an oplock break message.
473 ****************************************************************************/
475 static void prepare_break_message(char *outbuf, files_struct *fsp, BOOL level2)
477 memset(outbuf,'\0',smb_size);
478 set_message(outbuf,8,0,True);
480 SCVAL(outbuf,smb_com,SMBlockingX);
481 SSVAL(outbuf,smb_tid,fsp->conn->cnum);
482 SSVAL(outbuf,smb_pid,0xFFFF);
483 SSVAL(outbuf,smb_uid,0);
484 SSVAL(outbuf,smb_mid,0xFFFF);
485 SCVAL(outbuf,smb_vwv0,0xFF);
486 SSVAL(outbuf,smb_vwv2,fsp->fnum);
487 SCVAL(outbuf,smb_vwv3,LOCKING_ANDX_OPLOCK_RELEASE);
488 SCVAL(outbuf,smb_vwv3+1,level2 ? OPLOCKLEVEL_II : OPLOCKLEVEL_NONE);
491 /****************************************************************************
492 Function to do the waiting before sending a local break.
493 ****************************************************************************/
495 static void wait_before_sending_break(BOOL local_request)
497 extern struct timeval smb_last_time;
499 if(local_request) {
500 struct timeval cur_tv;
501 long wait_left = (long)lp_oplock_break_wait_time();
503 if (wait_left == 0)
504 return;
506 GetTimeOfDay(&cur_tv);
508 wait_left -= ((cur_tv.tv_sec - smb_last_time.tv_sec)*1000) +
509 ((cur_tv.tv_usec - smb_last_time.tv_usec)/1000);
511 if(wait_left > 0) {
512 wait_left = MIN(wait_left, 1000);
513 sys_usleep(wait_left * 1000);
518 /****************************************************************************
519 Ensure that we have a valid oplock.
520 ****************************************************************************/
522 static files_struct *initial_break_processing(SMB_DEV_T dev, SMB_INO_T inode, unsigned long file_id)
524 files_struct *fsp = NULL;
526 if( DEBUGLVL( 3 ) ) {
527 dbgtext( "initial_break_processing: called for dev = %x, inode = %.0f file_id = %lu\n",
528 (unsigned int)dev, (double)inode, file_id);
529 dbgtext( "Current oplocks_open (exclusive = %d, levelII = %d)\n",
530 exclusive_oplocks_open, level_II_oplocks_open );
534 * We need to search the file open table for the
535 * entry containing this dev and inode, and ensure
536 * we have an oplock on it.
539 fsp = file_find_dif(dev, inode, file_id);
541 if(fsp == NULL) {
542 /* The file could have been closed in the meantime - return success. */
543 if( DEBUGLVL( 3 ) ) {
544 dbgtext( "initial_break_processing: cannot find open file with " );
545 dbgtext( "dev = %x, inode = %.0f file_id = %lu", (unsigned int)dev,
546 (double)inode, file_id);
547 dbgtext( "allowing break to succeed.\n" );
549 return NULL;
552 /* Ensure we have an oplock on the file */
555 * There is a potential race condition in that an oplock could
556 * have been broken due to another udp request, and yet there are
557 * still oplock break messages being sent in the udp message
558 * queue for this file. So return true if we don't have an oplock,
559 * as we may have just freed it.
562 if(fsp->oplock_type == NO_OPLOCK) {
563 if( DEBUGLVL( 3 ) ) {
564 dbgtext( "initial_break_processing: file %s ", fsp->fsp_name );
565 dbgtext( "(dev = %x, inode = %.0f, file_id = %lu) has no oplock.\n",
566 (unsigned int)dev, (double)inode, fsp->file_id );
567 dbgtext( "Allowing break to succeed regardless.\n" );
569 return NULL;
572 return fsp;
575 /****************************************************************************
576 Process a level II oplock break directly.
577 ****************************************************************************/
579 BOOL oplock_break_level2(files_struct *fsp, BOOL local_request, int token)
581 extern uint32 global_client_caps;
582 char outbuf[128];
583 BOOL got_lock = False;
584 SMB_DEV_T dev = fsp->dev;
585 SMB_INO_T inode = fsp->inode;
588 * We can have a level II oplock even if the client is not
589 * level II oplock aware. In this case just remove the
590 * flags and don't send the break-to-none message to
591 * the client.
594 if (global_client_caps & CAP_LEVEL_II_OPLOCKS) {
596 * If we are sending an oplock break due to an SMB sent
597 * by our own client we ensure that we wait at leat
598 * lp_oplock_break_wait_time() milliseconds before sending
599 * the packet. Sending the packet sooner can break Win9x
600 * and has reported to cause problems on NT. JRA.
603 wait_before_sending_break(local_request);
605 /* Prepare the SMBlockingX message. */
607 prepare_break_message( outbuf, fsp, False);
608 if (!send_smb(smbd_server_fd(), outbuf))
609 exit_server("oplock_break_level2: send_smb failed.");
613 * Now we must update the shared memory structure to tell
614 * everyone else we no longer have a level II oplock on
615 * this open file. If local_request is true then token is
616 * the existing lock on the shared memory area.
619 if(!local_request && lock_share_entry_fsp(fsp) == False) {
620 DEBUG(0,("oplock_break_level2: unable to lock share entry for file %s\n", fsp->fsp_name ));
621 } else {
622 got_lock = True;
625 if(remove_share_oplock(fsp)==False) {
626 DEBUG(0,("oplock_break_level2: unable to remove level II oplock for file %s\n", fsp->fsp_name ));
629 if (!local_request && got_lock)
630 unlock_share_entry_fsp(fsp);
632 fsp->oplock_type = NO_OPLOCK;
633 level_II_oplocks_open--;
635 if(level_II_oplocks_open < 0) {
636 DEBUG(0,("oplock_break_level2: level_II_oplocks_open < 0 (%d). PANIC ERROR\n",
637 level_II_oplocks_open));
638 abort();
641 if( DEBUGLVL( 3 ) ) {
642 dbgtext( "oplock_break_level2: returning success for " );
643 dbgtext( "dev = %x, inode = %.0f, file_id = %lu\n", (unsigned int)dev, (double)inode, fsp->file_id );
644 dbgtext( "Current level II oplocks_open = %d\n", level_II_oplocks_open );
647 return True;
650 /****************************************************************************
651 Process an oplock break directly.
652 ****************************************************************************/
654 static BOOL oplock_break(SMB_DEV_T dev, SMB_INO_T inode, unsigned long file_id, BOOL local_request)
656 extern uint32 global_client_caps;
657 extern struct current_user current_user;
658 char *inbuf = NULL;
659 char *outbuf = NULL;
660 files_struct *fsp = NULL;
661 time_t start_time;
662 BOOL shutdown_server = False;
663 BOOL oplock_timeout = False;
664 connection_struct *saved_user_conn;
665 connection_struct *saved_fsp_conn;
666 int saved_vuid;
667 pstring saved_dir;
668 int timeout = (OPLOCK_BREAK_TIMEOUT * 1000);
669 pstring file_name;
670 BOOL using_levelII;
672 if((fsp = initial_break_processing(dev, inode, file_id)) == NULL)
673 return True;
676 * Deal with a level II oplock going break to none separately.
679 if (LEVEL_II_OPLOCK_TYPE(fsp->oplock_type))
680 return oplock_break_level2(fsp, local_request, -1);
682 /* Mark the oplock break as sent - we don't want to send twice! */
683 if (fsp->sent_oplock_break) {
684 if( DEBUGLVL( 0 ) ) {
685 dbgtext( "oplock_break: ERROR: oplock_break already sent for " );
686 dbgtext( "file %s ", fsp->fsp_name);
687 dbgtext( "(dev = %x, inode = %.0f, file_id = %lu)\n", (unsigned int)dev, (double)inode, fsp->file_id );
691 * We have to fail the open here as we cannot send another oplock break on
692 * this file whilst we are awaiting a response from the client - neither
693 * can we allow another open to succeed while we are waiting for the client.
695 return False;
698 if(global_oplock_break) {
699 DEBUG(0,("ABORT : ABORT : recursion in oplock_break !!!!!\n"));
700 abort();
704 * Now comes the horrid part. We must send an oplock break to the client,
705 * and then process incoming messages until we get a close or oplock release.
706 * At this point we know we need a new inbuf/outbuf buffer pair.
707 * We cannot use these staticaly as we may recurse into here due to
708 * messages crossing on the wire.
711 if((inbuf = (char *)malloc(BUFFER_SIZE + LARGE_WRITEX_HDR_SIZE + SAFETY_MARGIN))==NULL) {
712 DEBUG(0,("oplock_break: malloc fail for input buffer.\n"));
713 return False;
716 if((outbuf = (char *)malloc(BUFFER_SIZE + LARGE_WRITEX_HDR_SIZE + SAFETY_MARGIN))==NULL) {
717 DEBUG(0,("oplock_break: malloc fail for output buffer.\n"));
718 SAFE_FREE(inbuf);
719 return False;
723 * If we are sending an oplock break due to an SMB sent
724 * by our own client we ensure that we wait at leat
725 * lp_oplock_break_wait_time() milliseconds before sending
726 * the packet. Sending the packet sooner can break Win9x
727 * and has reported to cause problems on NT. JRA.
730 wait_before_sending_break(local_request);
732 /* Prepare the SMBlockingX message. */
734 if ((global_client_caps & CAP_LEVEL_II_OPLOCKS) &&
735 !koplocks && /* NOTE: we force levelII off for kernel oplocks - this will change when it is supported */
736 lp_level2_oplocks(SNUM(fsp->conn))) {
737 using_levelII = True;
738 } else {
739 using_levelII = False;
742 prepare_break_message( outbuf, fsp, using_levelII);
743 /* Remember if we just sent a break to level II on this file. */
744 fsp->sent_oplock_break = using_levelII? LEVEL_II_BREAK_SENT:EXCLUSIVE_BREAK_SENT;
746 if (!send_smb(smbd_server_fd(), outbuf))
747 exit_server("oplock_break: send_smb failed.");
749 /* We need this in case a readraw crosses on the wire. */
750 global_oplock_break = True;
752 /* Process incoming messages. */
755 * JRA - If we don't get a break from the client in OPLOCK_BREAK_TIMEOUT
756 * seconds we should just die....
759 start_time = time(NULL);
762 * Save the information we need to re-become the
763 * user, then unbecome the user whilst we're doing this.
765 saved_user_conn = current_user.conn;
766 saved_vuid = current_user.vuid;
767 saved_fsp_conn = fsp->conn;
768 change_to_root_user();
769 vfs_GetWd(saved_fsp_conn,saved_dir);
770 /* Save the chain fnum. */
771 file_chain_save();
774 * From Charles Hoch <hoch@exemplary.com>. If the break processing
775 * code closes the file (as it often does), then the fsp pointer here
776 * points to free()'d memory. We *must* revalidate fsp each time
777 * around the loop.
780 pstrcpy(file_name, fsp->fsp_name);
782 while((fsp = initial_break_processing(dev, inode, file_id)) &&
783 OPEN_FSP(fsp) && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
784 if(receive_smb(smbd_server_fd(),inbuf, timeout) == False) {
786 * Die if we got an error.
789 if (smb_read_error == READ_EOF) {
790 DEBUG( 0, ( "oplock_break: end of file from client\n" ) );
791 shutdown_server = True;
792 } else if (smb_read_error == READ_ERROR) {
793 DEBUG( 0, ("oplock_break: receive_smb error (%s)\n", strerror(errno)) );
794 shutdown_server = True;
795 } else if (smb_read_error == READ_TIMEOUT) {
796 DEBUG( 0, ( "oplock_break: receive_smb timed out after %d seconds.\n", OPLOCK_BREAK_TIMEOUT ) );
797 oplock_timeout = True;
800 DEBUGADD( 0, ( "oplock_break failed for file %s ", file_name ) );
801 DEBUGADD( 0, ( "(dev = %x, inode = %.0f, file_id = %lu).\n",
802 (unsigned int)dev, (double)inode, file_id));
804 break;
808 * There are certain SMB requests that we shouldn't allow
809 * to recurse. opens, renames and deletes are the obvious
810 * ones. This is handled in the switch_message() function.
811 * If global_oplock_break is set they will push the packet onto
812 * the pending smb queue and return -1 (no reply).
813 * JRA.
816 process_smb(inbuf, outbuf);
819 * Die if we go over the time limit.
822 if((time(NULL) - start_time) > OPLOCK_BREAK_TIMEOUT) {
823 if( DEBUGLVL( 0 ) ) {
824 dbgtext( "oplock_break: no break received from client " );
825 dbgtext( "within %d seconds.\n", OPLOCK_BREAK_TIMEOUT );
826 dbgtext( "oplock_break failed for file %s ", fsp->fsp_name );
827 dbgtext( "(dev = %x, inode = %.0f, file_id = %lu).\n",
828 (unsigned int)dev, (double)inode, file_id );
830 oplock_timeout = True;
831 break;
836 * Go back to being the user who requested the oplock
837 * break.
839 if((saved_user_conn != NULL) && (saved_vuid != UID_FIELD_INVALID) && !change_to_user(saved_user_conn, saved_vuid)) {
840 DEBUG( 0, ( "oplock_break: unable to re-become user!" ) );
841 DEBUGADD( 0, ( "Shutting down server\n" ) );
842 close(oplock_sock);
843 exit_server("unable to re-become user");
846 /* Including the directory. */
847 vfs_ChDir(saved_fsp_conn,saved_dir);
849 /* Restore the chain fnum. */
850 file_chain_restore();
852 /* Free the buffers we've been using to recurse. */
853 SAFE_FREE(inbuf);
854 SAFE_FREE(outbuf);
856 /* We need this in case a readraw crossed on the wire. */
857 if(global_oplock_break)
858 global_oplock_break = False;
861 * If the client timed out then clear the oplock (or go to level II)
862 * and continue. This seems to be what NT does and is better than dropping
863 * the connection.
866 if(oplock_timeout && (fsp = initial_break_processing(dev, inode, file_id)) &&
867 OPEN_FSP(fsp) && EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type)) {
868 DEBUG(0,("oplock_break: client failure in oplock break in file %s\n", fsp->fsp_name));
869 remove_oplock(fsp,True);
870 #if FASCIST_OPLOCK_BACKOFF
871 global_client_failed_oplock_break = True; /* Never grant this client an oplock again. */
872 #endif
876 * If the client had an error we must die.
879 if(shutdown_server) {
880 DEBUG( 0, ( "oplock_break: client failure in break - " ) );
881 DEBUGADD( 0, ( "shutting down this smbd.\n" ) );
882 close(oplock_sock);
883 exit_server("oplock break failure");
886 /* Santity check - remove this later. JRA */
887 if(exclusive_oplocks_open < 0) {
888 DEBUG(0,("oplock_break: exclusive_oplocks_open < 0 (%d). PANIC ERROR\n", exclusive_oplocks_open));
889 abort();
892 if( DEBUGLVL( 3 ) ) {
893 dbgtext( "oplock_break: returning success for " );
894 dbgtext( "dev = %x, inode = %.0f, file_id = %lu\n", (unsigned int)dev, (double)inode, file_id );
895 dbgtext( "Current exclusive_oplocks_open = %d\n", exclusive_oplocks_open );
898 return True;
901 /****************************************************************************
902 Send an oplock break message to another smbd process. If the oplock is held
903 by the local smbd then call the oplock break function directly.
904 ****************************************************************************/
906 BOOL request_oplock_break(share_mode_entry *share_entry, BOOL async)
908 char op_break_msg[OPLOCK_BREAK_MSG_LEN];
909 struct sockaddr_in addr_out;
910 pid_t pid = sys_getpid();
911 time_t start_time;
912 int time_left;
913 SMB_DEV_T dev = share_entry->dev;
914 SMB_INO_T inode = share_entry->inode;
915 unsigned long file_id = share_entry->share_file_id;
916 uint16 break_cmd_type;
918 if(pid == share_entry->pid) {
919 /* We are breaking our own oplock, make sure it's us. */
920 if(share_entry->op_port != global_oplock_port) {
921 DEBUG(0,("request_oplock_break: corrupt share mode entry - pid = %d, port = %d \
922 should be %d\n", (int)pid, share_entry->op_port, global_oplock_port));
923 return False;
926 DEBUG(5,("request_oplock_break: breaking our own oplock\n"));
928 #if 1 /* JRA PARANOIA TEST.... */
930 files_struct *fsp = file_find_dif(dev, inode, file_id);
931 if (!fsp) {
932 DEBUG(0,("request_oplock_break: PANIC : breaking our own oplock requested for \
933 dev = %x, inode = %.0f, file_id = %lu and no fsp found !\n",
934 (unsigned int)dev, (double)inode, file_id ));
935 smb_panic("request_oplock_break: no fsp found for our own oplock\n");
938 #endif /* END JRA PARANOIA TEST... */
940 /* Call oplock break direct. */
941 return oplock_break(dev, inode, file_id, True);
944 /* We need to send a OPLOCK_BREAK_CMD message to the port in the share mode entry. */
946 if (LEVEL_II_OPLOCK_TYPE(share_entry->op_type)) {
947 break_cmd_type = async ? ASYNC_LEVEL_II_OPLOCK_BREAK_CMD : LEVEL_II_OPLOCK_BREAK_CMD;
948 } else {
949 break_cmd_type = OPLOCK_BREAK_CMD;
952 SSVAL(op_break_msg,OPBRK_MESSAGE_CMD_OFFSET,break_cmd_type);
953 memcpy(op_break_msg+OPLOCK_BREAK_PID_OFFSET,(char *)&pid,sizeof(pid));
954 memcpy(op_break_msg+OPLOCK_BREAK_DEV_OFFSET,(char *)&dev,sizeof(dev));
955 memcpy(op_break_msg+OPLOCK_BREAK_INODE_OFFSET,(char *)&inode,sizeof(inode));
956 memcpy(op_break_msg+OPLOCK_BREAK_FILEID_OFFSET,(char *)&file_id,sizeof(file_id));
958 /* Set the address and port. */
959 memset((char *)&addr_out,'\0',sizeof(addr_out));
960 addr_out.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
961 addr_out.sin_port = htons( share_entry->op_port );
962 addr_out.sin_family = AF_INET;
964 if( DEBUGLVL( 3 ) ) {
965 dbgtext( "request_oplock_break: sending a %s oplock break message to ", async ? "asynchronous" : "synchronous" );
966 dbgtext( "pid %d on port %d ", (int)share_entry->pid, share_entry->op_port );
967 dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
968 (unsigned int)dev, (double)inode, file_id );
971 if(sys_sendto(oplock_sock,op_break_msg,OPLOCK_BREAK_MSG_LEN,0,
972 (struct sockaddr *)&addr_out,sizeof(addr_out)) < 0) {
973 if( DEBUGLVL( 0 ) ) {
974 dbgtext( "request_oplock_break: failed when sending a oplock " );
975 dbgtext( "break message to pid %d ", (int)share_entry->pid );
976 dbgtext( "on port %d ", share_entry->op_port );
977 dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
978 (unsigned int)dev, (double)inode, file_id );
979 dbgtext( "Error was %s\n", strerror(errno) );
981 return False;
985 * If we just sent a message to a level II oplock share entry in async mode then
986 * we are done and may return.
989 if (LEVEL_II_OPLOCK_TYPE(share_entry->op_type) && async) {
990 DEBUG(3,("request_oplock_break: sent async break message to level II entry.\n"));
991 return True;
995 * Now we must await the oplock broken message coming back
996 * from the target smbd process. Timeout if it fails to
997 * return in (OPLOCK_BREAK_TIMEOUT + OPLOCK_BREAK_TIMEOUT_FUDGEFACTOR) seconds.
998 * While we get messages that aren't ours, loop.
1001 start_time = time(NULL);
1002 time_left = OPLOCK_BREAK_TIMEOUT+OPLOCK_BREAK_TIMEOUT_FUDGEFACTOR;
1004 while(time_left >= 0) {
1005 char op_break_reply[OPBRK_CMD_HEADER_LEN+OPLOCK_BREAK_MSG_LEN];
1006 uint16 reply_from_port;
1007 char *reply_msg_start;
1009 if(receive_local_message(op_break_reply, sizeof(op_break_reply),
1010 time_left ? time_left * 1000 : 1) == False) {
1011 if(smb_read_error == READ_TIMEOUT) {
1012 if( DEBUGLVL( 0 ) ) {
1013 dbgtext( "request_oplock_break: no response received to oplock " );
1014 dbgtext( "break request to pid %d ", (int)share_entry->pid );
1015 dbgtext( "on port %d ", share_entry->op_port );
1016 dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
1017 (unsigned int)dev, (double)inode, file_id );
1021 * This is a hack to make handling of failing clients more robust.
1022 * If a oplock break response message is not received in the timeout
1023 * period we may assume that the smbd servicing that client holding
1024 * the oplock has died and the client changes were lost anyway, so
1025 * we should continue to try and open the file.
1027 break;
1028 } else {
1029 if( DEBUGLVL( 0 ) ) {
1030 dbgtext( "request_oplock_break: error in response received " );
1031 dbgtext( "to oplock break request to pid %d ", (int)share_entry->pid );
1032 dbgtext( "on port %d ", share_entry->op_port );
1033 dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
1034 (unsigned int)dev, (double)inode, file_id );
1035 dbgtext( "Error was (%s).\n", strerror(errno) );
1038 return False;
1041 reply_from_port = SVAL(op_break_reply,OPBRK_CMD_PORT_OFFSET);
1042 reply_msg_start = &op_break_reply[OPBRK_CMD_HEADER_LEN];
1045 * Test to see if this is the reply we are awaiting (ie. the one we sent with the CMD_REPLY flag OR'ed in).
1047 if((SVAL(reply_msg_start,OPBRK_MESSAGE_CMD_OFFSET) & CMD_REPLY) &&
1048 ((SVAL(reply_msg_start,OPBRK_MESSAGE_CMD_OFFSET) & ~CMD_REPLY) == break_cmd_type) &&
1049 (reply_from_port == share_entry->op_port) &&
1050 (memcmp(&reply_msg_start[OPLOCK_BREAK_PID_OFFSET], &op_break_msg[OPLOCK_BREAK_PID_OFFSET],
1051 OPLOCK_BREAK_MSG_LEN - OPLOCK_BREAK_PID_OFFSET) == 0)) {
1054 * This is the reply we've been waiting for.
1056 break;
1057 } else {
1059 * This is another message - a break request.
1060 * Note that both kernel oplock break requests
1061 * and UDP inter-smbd oplock break requests will
1062 * be processed here.
1064 * Process it to prevent potential deadlock.
1065 * Note that the code in switch_message() prevents
1066 * us from recursing into here as any SMB requests
1067 * we might process that would cause another oplock
1068 * break request to be made will be queued.
1069 * JRA.
1072 process_local_message(op_break_reply, sizeof(op_break_reply));
1075 time_left -= (time(NULL) - start_time);
1078 DEBUG(3,("request_oplock_break: broke oplock.\n"));
1080 return True;
1083 /****************************************************************************
1084 Attempt to break an oplock on a file (if oplocked).
1085 Returns True if the file was closed as a result of
1086 the oplock break, False otherwise.
1087 Used as a last ditch attempt to free a space in the
1088 file table when we have run out.
1089 ****************************************************************************/
1091 BOOL attempt_close_oplocked_file(files_struct *fsp)
1093 DEBUG(5,("attempt_close_oplocked_file: checking file %s.\n", fsp->fsp_name));
1095 if (EXCLUSIVE_OPLOCK_TYPE(fsp->oplock_type) && !fsp->sent_oplock_break && (fsp->fd != -1)) {
1096 /* Try and break the oplock. */
1097 if (oplock_break(fsp->dev, fsp->inode, fsp->file_id, True)) {
1098 if(file_find_fsp(fsp) == NULL) /* Did the oplock break close the file ? */
1099 return True;
1103 return False;
1106 /****************************************************************************
1107 This function is called on any file modification or lock request. If a file
1108 is level 2 oplocked then it must tell all other level 2 holders to break to none.
1109 ****************************************************************************/
1111 void release_level_2_oplocks_on_change(files_struct *fsp)
1113 share_mode_entry *share_list = NULL;
1114 pid_t pid = sys_getpid();
1115 int token = -1;
1116 int num_share_modes = 0;
1117 int i;
1120 * If this file is level II oplocked then we need
1121 * to grab the shared memory lock and inform all
1122 * other files with a level II lock that they need
1123 * to flush their read caches. We keep the lock over
1124 * the shared memory area whilst doing this.
1127 if (!LEVEL_II_OPLOCK_TYPE(fsp->oplock_type))
1128 return;
1130 if (lock_share_entry_fsp(fsp) == False) {
1131 DEBUG(0,("release_level_2_oplocks_on_change: failed to lock share mode entry for file %s.\n", fsp->fsp_name ));
1134 num_share_modes = get_share_modes(fsp->conn, fsp->dev, fsp->inode, &share_list);
1136 DEBUG(10,("release_level_2_oplocks_on_change: num_share_modes = %d\n",
1137 num_share_modes ));
1139 for(i = 0; i < num_share_modes; i++) {
1140 share_mode_entry *share_entry = &share_list[i];
1143 * As there could have been multiple writes waiting at the lock_share_entry
1144 * gate we may not be the first to enter. Hence the state of the op_types
1145 * in the share mode entries may be partly NO_OPLOCK and partly LEVEL_II
1146 * oplock. It will do no harm to re-send break messages to those smbd's
1147 * that are still waiting their turn to remove their LEVEL_II state, and
1148 * also no harm to ignore existing NO_OPLOCK states. JRA.
1151 DEBUG(10,("release_level_2_oplocks_on_change: share_entry[%i]->op_type == %d\n",
1152 i, share_entry->op_type ));
1154 if (share_entry->op_type == NO_OPLOCK)
1155 continue;
1157 /* Paranoia .... */
1158 if (EXCLUSIVE_OPLOCK_TYPE(share_entry->op_type)) {
1159 DEBUG(0,("release_level_2_oplocks_on_change: PANIC. share mode entry %d is an exlusive oplock !\n", i ));
1160 unlock_share_entry(fsp->conn, fsp->dev, fsp->inode);
1161 abort();
1165 * Check if this is a file we have open (including the
1166 * file we've been called to do write_file on. If so
1167 * then break it directly without releasing the lock.
1170 if (pid == share_entry->pid) {
1171 files_struct *new_fsp = file_find_dif(share_entry->dev, share_entry->inode, share_entry->share_file_id);
1173 /* Paranoia check... */
1174 if(new_fsp == NULL) {
1175 DEBUG(0,("release_level_2_oplocks_on_change: PANIC. share mode entry %d is not a local file !\n", i ));
1176 unlock_share_entry(fsp->conn, fsp->dev, fsp->inode);
1177 abort();
1180 DEBUG(10,("release_level_2_oplocks_on_change: breaking our own oplock.\n"));
1182 oplock_break_level2(new_fsp, True, token);
1184 } else {
1187 * This is a remote file and so we send an asynchronous
1188 * message.
1191 DEBUG(10,("release_level_2_oplocks_on_change: breaking remote oplock (async).\n"));
1192 request_oplock_break(share_entry, True);
1196 SAFE_FREE(share_list);
1197 unlock_share_entry_fsp(fsp);
1199 /* Paranoia check... */
1200 if (LEVEL_II_OPLOCK_TYPE(fsp->oplock_type)) {
1201 DEBUG(0,("release_level_2_oplocks_on_change: PANIC. File %s still has a level II oplock.\n", fsp->fsp_name));
1202 smb_panic("release_level_2_oplocks_on_change");
1206 /****************************************************************************
1207 setup oplocks for this process
1208 ****************************************************************************/
1210 BOOL init_oplocks(void)
1212 struct sockaddr_in sock_name;
1213 socklen_t len = sizeof(sock_name);
1215 DEBUG(3,("open_oplock_ipc: opening loopback UDP socket.\n"));
1217 /* Open a lookback UDP socket on a random port. */
1218 oplock_sock = open_socket_in(SOCK_DGRAM, 0, 0, htonl(INADDR_LOOPBACK),False);
1219 if (oplock_sock == -1) {
1220 DEBUG(0,("open_oplock_ipc: Failed to get local UDP socket for \
1221 address %lx. Error was %s\n", (long)htonl(INADDR_LOOPBACK), strerror(errno)));
1222 global_oplock_port = 0;
1223 return(False);
1226 /* Find out the transient UDP port we have been allocated. */
1227 if(getsockname(oplock_sock, (struct sockaddr *)&sock_name, &len)<0) {
1228 DEBUG(0,("open_oplock_ipc: Failed to get local UDP port. Error was %s\n",
1229 strerror(errno)));
1230 close(oplock_sock);
1231 oplock_sock = -1;
1232 global_oplock_port = 0;
1233 return False;
1235 global_oplock_port = ntohs(sock_name.sin_port);
1237 if (lp_kernel_oplocks()) {
1238 #if HAVE_KERNEL_OPLOCKS_IRIX
1239 koplocks = irix_init_kernel_oplocks();
1240 #elif HAVE_KERNEL_OPLOCKS_LINUX
1241 koplocks = linux_init_kernel_oplocks();
1242 #endif
1245 DEBUG(3,("open_oplock ipc: pid = %d, global_oplock_port = %u\n",
1246 (int)sys_getpid(), global_oplock_port));
1248 return True;