2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Jeremy Allison 1998 - 2001
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24 /* Oplock ipc UDP socket. */
25 static int oplock_sock
= -1;
26 uint16 global_oplock_port
= 0;
28 /* Current number of oplocks we have outstanding. */
29 static int32 exclusive_oplocks_open
= 0;
30 static int32 level_II_oplocks_open
= 0;
31 BOOL global_client_failed_oplock_break
= False
;
32 BOOL global_oplock_break
= False
;
34 extern int smb_read_error
;
36 static struct kernel_oplocks
*koplocks
;
38 static BOOL
oplock_break(SMB_DEV_T dev
, SMB_INO_T inode
, unsigned long file_id
, BOOL local
);
40 /****************************************************************************
41 Get the number of current exclusive oplocks.
42 ****************************************************************************/
44 int32
get_number_of_exclusive_open_oplocks(void)
46 return exclusive_oplocks_open
;
49 /****************************************************************************
50 Return True if an oplock message is pending.
51 ****************************************************************************/
53 BOOL
oplock_message_waiting(fd_set
*fds
)
55 if (koplocks
&& koplocks
->msg_waiting(fds
))
58 if (FD_ISSET(oplock_sock
, fds
))
64 /****************************************************************************
65 Read an oplock break message from either the oplock UDP fd or the
66 kernel (if kernel oplocks are supported).
68 If timeout is zero then *fds contains the file descriptors that
69 are ready to be read and acted upon. If timeout is non-zero then
70 *fds contains the file descriptors to be selected on for read.
71 The timeout is in milliseconds
73 ****************************************************************************/
75 BOOL
receive_local_message( char *buffer
, int buffer_len
, int timeout
)
77 struct sockaddr_in from
;
78 socklen_t fromlen
= sizeof(from
);
87 * We need to check for kernel oplocks before going into the select
88 * here, as the EINTR generated by the linux kernel oplock may have
89 * already been eaten. JRA.
92 if (koplocks
&& koplocks
->msg_waiting(&fds
)) {
93 return koplocks
->receive_message(&fds
, buffer
, buffer_len
);
96 while (timeout
> 0 && selrtn
== -1) {
98 int maxfd
= oplock_sock
;
99 time_t starttime
= time(NULL
);
102 maxfd
= setup_oplock_select_set(&fds
);
104 to
.tv_sec
= timeout
/ 1000;
105 to
.tv_usec
= (timeout
% 1000) * 1000;
107 DEBUG(5,("receive_local_message: doing select with timeout of %d ms\n", timeout
));
109 selrtn
= sys_select(maxfd
+1,&fds
,NULL
,NULL
,&to
);
111 if (selrtn
== -1 && errno
== EINTR
) {
113 /* could be a kernel oplock interrupt */
114 if (koplocks
&& koplocks
->msg_waiting(&fds
)) {
115 return koplocks
->receive_message(&fds
, buffer
, buffer_len
);
119 * Linux 2.0.x seems to have a bug in that
120 * it can return -1, EINTR with a timeout of zero.
121 * Make sure we bail out here with a read timeout
122 * if we got EINTR on a timeout of 1 or less.
126 smb_read_error
= READ_TIMEOUT
;
130 /* Not a kernel interrupt - could be a SIGUSR1 message. We must restart. */
131 /* We need to decrement the timeout here. */
132 timeout
-= ((time(NULL
) - starttime
)*1000);
136 DEBUG(5,("receive_local_message: EINTR : new timeout %d ms\n", timeout
));
142 /* something is wrong. Maybe the socket is dead? */
143 smb_read_error
= READ_ERROR
;
147 /* Did we timeout ? */
149 smb_read_error
= READ_TIMEOUT
;
154 if (koplocks
&& koplocks
->msg_waiting(&fds
)) {
155 return koplocks
->receive_message(&fds
, buffer
, buffer_len
);
158 if (!FD_ISSET(oplock_sock
, &fds
))
162 * From here down we deal with the smbd <--> smbd
163 * oplock break protocol only.
167 * Read a loopback udp message.
169 msg_len
= sys_recvfrom(oplock_sock
, &buffer
[OPBRK_CMD_HEADER_LEN
],
170 buffer_len
- OPBRK_CMD_HEADER_LEN
, 0, (struct sockaddr
*)&from
, &fromlen
);
173 DEBUG(0,("receive_local_message. Error in recvfrom. (%s).\n",strerror(errno
)));
177 /* Validate message length. */
178 if(msg_len
> (buffer_len
- OPBRK_CMD_HEADER_LEN
)) {
179 DEBUG(0,("receive_local_message: invalid msg_len (%d) max can be %d\n", msg_len
,
180 buffer_len
- OPBRK_CMD_HEADER_LEN
));
184 /* Validate message from address (must be localhost). */
185 if(from
.sin_addr
.s_addr
!= htonl(INADDR_LOOPBACK
)) {
186 DEBUG(0,("receive_local_message: invalid 'from' address \
187 (was %lx should be 127.0.0.1)\n", (long)from
.sin_addr
.s_addr
));
191 /* Setup the message header */
192 SIVAL(buffer
,OPBRK_CMD_LEN_OFFSET
,msg_len
);
193 SSVAL(buffer
,OPBRK_CMD_PORT_OFFSET
,ntohs(from
.sin_port
));
198 /****************************************************************************
199 Attempt to set an oplock on a file. Always succeeds if kernel oplocks are
200 disabled (just sets flags). Returns True if oplock set.
201 ****************************************************************************/
203 BOOL
set_file_oplock(files_struct
*fsp
, int oplock_type
)
205 if (koplocks
&& !koplocks
->set_oplock(fsp
, oplock_type
))
208 fsp
->oplock_type
= oplock_type
;
209 fsp
->sent_oplock_break
= NO_BREAK_SENT
;
210 if (oplock_type
== LEVEL_II_OPLOCK
)
211 level_II_oplocks_open
++;
213 exclusive_oplocks_open
++;
215 DEBUG(5,("set_file_oplock: granted oplock on file %s, dev = %x, inode = %.0f, file_id = %lu, \
216 tv_sec = %x, tv_usec = %x\n",
217 fsp
->fsp_name
, (unsigned int)fsp
->dev
, (double)fsp
->inode
, fsp
->file_id
,
218 (int)fsp
->open_time
.tv_sec
, (int)fsp
->open_time
.tv_usec
));
223 /****************************************************************************
224 Attempt to release an oplock on a file. Decrements oplock count.
225 ****************************************************************************/
227 void release_file_oplock(files_struct
*fsp
)
230 koplocks
->release_oplock(fsp
);
232 if (fsp
->oplock_type
== LEVEL_II_OPLOCK
)
233 level_II_oplocks_open
--;
235 exclusive_oplocks_open
--;
237 fsp
->oplock_type
= NO_OPLOCK
;
238 fsp
->sent_oplock_break
= NO_BREAK_SENT
;
240 flush_write_cache(fsp
, OPLOCK_RELEASE_FLUSH
);
243 /****************************************************************************
244 Attempt to downgrade an oplock on a file. Doesn't decrement oplock count.
245 ****************************************************************************/
247 static void downgrade_file_oplock(files_struct
*fsp
)
250 koplocks
->release_oplock(fsp
);
251 fsp
->oplock_type
= LEVEL_II_OPLOCK
;
252 exclusive_oplocks_open
--;
253 level_II_oplocks_open
++;
254 fsp
->sent_oplock_break
= NO_BREAK_SENT
;
257 /****************************************************************************
258 Remove a file oplock. Copes with level II and exclusive.
259 Locks then unlocks the share mode lock. Client can decide to go directly
260 to none even if a "break-to-level II" was sent.
261 ****************************************************************************/
263 BOOL
remove_oplock(files_struct
*fsp
, BOOL break_to_none
)
265 SMB_DEV_T dev
= fsp
->dev
;
266 SMB_INO_T inode
= fsp
->inode
;
269 /* Remove the oplock flag from the sharemode. */
270 if (lock_share_entry_fsp(fsp
) == False
) {
271 DEBUG(0,("remove_oplock: failed to lock share entry for file %s\n",
276 if (fsp
->sent_oplock_break
== EXCLUSIVE_BREAK_SENT
|| break_to_none
) {
278 * Deal with a reply when a break-to-none was sent.
281 if(remove_share_oplock(fsp
)==False
) {
282 DEBUG(0,("remove_oplock: failed to remove share oplock for file %s fnum %d, \
283 dev = %x, inode = %.0f\n", fsp
->fsp_name
, fsp
->fnum
, (unsigned int)dev
, (double)inode
));
287 release_file_oplock(fsp
);
290 * Deal with a reply when a break-to-level II was sent.
292 if(downgrade_share_oplock(fsp
)==False
) {
293 DEBUG(0,("remove_oplock: failed to downgrade share oplock for file %s fnum %d, \
294 dev = %x, inode = %.0f\n", fsp
->fsp_name
, fsp
->fnum
, (unsigned int)dev
, (double)inode
));
298 downgrade_file_oplock(fsp
);
301 unlock_share_entry_fsp(fsp
);
305 /****************************************************************************
306 Setup the listening set of file descriptors for an oplock break
307 message either from the UDP socket or from the kernel. Returns the maximum
309 ****************************************************************************/
311 int setup_oplock_select_set( fd_set
*fds
)
313 int maxfd
= oplock_sock
;
315 if(oplock_sock
== -1)
318 FD_SET(oplock_sock
,fds
);
320 if (koplocks
&& koplocks
->notification_fd
!= -1) {
321 FD_SET(koplocks
->notification_fd
, fds
);
322 maxfd
= MAX(maxfd
, koplocks
->notification_fd
);
328 /****************************************************************************
329 Process an oplock break message - whether it came from the UDP socket
331 ****************************************************************************/
333 BOOL
process_local_message(char *buffer
, int buf_size
)
341 unsigned long file_id
;
342 uint16 break_cmd_type
;
344 msg_len
= IVAL(buffer
,OPBRK_CMD_LEN_OFFSET
);
345 from_port
= SVAL(buffer
,OPBRK_CMD_PORT_OFFSET
);
347 msg_start
= &buffer
[OPBRK_CMD_HEADER_LEN
];
349 DEBUG(5,("process_local_message: Got a message of length %d from port (%d)\n",
350 msg_len
, from_port
));
353 * Pull the info out of the requesting packet.
356 break_cmd_type
= SVAL(msg_start
,OPBRK_MESSAGE_CMD_OFFSET
);
358 switch(break_cmd_type
) {
359 case KERNEL_OPLOCK_BREAK_CMD
:
361 DEBUG(0,("unexpected kernel oplock break!\n"));
364 if (!koplocks
->parse_message(msg_start
, msg_len
, &inode
, &dev
, &file_id
)) {
365 DEBUG(0,("kernel oplock break parse failure!\n"));
369 case OPLOCK_BREAK_CMD
:
370 case LEVEL_II_OPLOCK_BREAK_CMD
:
372 /* Ensure that the msg length is correct. */
373 if(msg_len
!= OPLOCK_BREAK_MSG_LEN
) {
374 DEBUG(0,("process_local_message: incorrect length for OPLOCK_BREAK_CMD (was %d, should be %d).\n",
375 (int)msg_len
, (int)OPLOCK_BREAK_MSG_LEN
));
379 memcpy((char *)&remotepid
, msg_start
+OPLOCK_BREAK_PID_OFFSET
,sizeof(remotepid
));
380 memcpy((char *)&inode
, msg_start
+OPLOCK_BREAK_INODE_OFFSET
,sizeof(inode
));
381 memcpy((char *)&dev
, msg_start
+OPLOCK_BREAK_DEV_OFFSET
,sizeof(dev
));
382 memcpy((char *)&file_id
, msg_start
+OPLOCK_BREAK_FILEID_OFFSET
,sizeof(file_id
));
384 DEBUG(5,("process_local_message: (%s) oplock break request from \
385 pid %d, port %d, dev = %x, inode = %.0f, file_id = %lu\n",
386 (break_cmd_type
== OPLOCK_BREAK_CMD
) ? "exclusive" : "level II",
387 (int)remotepid
, from_port
, (unsigned int)dev
, (double)inode
, file_id
));
391 * Keep this as a debug case - eventually we can remove it.
394 DEBUG(0,("process_local_message: Received unsolicited break \
395 reply - dumping info.\n"));
397 if(msg_len
!= OPLOCK_BREAK_MSG_LEN
) {
398 DEBUG(0,("process_local_message: ubr: incorrect length for reply \
399 (was %d, should be %d).\n", (int)msg_len
, (int)OPLOCK_BREAK_MSG_LEN
));
403 memcpy((char *)&inode
, msg_start
+OPLOCK_BREAK_INODE_OFFSET
,sizeof(inode
));
404 memcpy((char *)&remotepid
, msg_start
+OPLOCK_BREAK_PID_OFFSET
,sizeof(remotepid
));
405 memcpy((char *)&dev
, msg_start
+OPLOCK_BREAK_DEV_OFFSET
,sizeof(dev
));
406 memcpy((char *)&file_id
, msg_start
+OPLOCK_BREAK_FILEID_OFFSET
,sizeof(file_id
));
408 DEBUG(0,("process_local_message: unsolicited oplock break reply from \
409 pid %d, port %d, dev = %x, inode = %.0f, file_id = %lu\n",
410 (int)remotepid
, from_port
, (unsigned int)dev
, (double)inode
, file_id
));
415 DEBUG(0,("process_local_message: unknown UDP message command code (%x) - ignoring.\n",
416 (unsigned int)SVAL(msg_start
,0)));
421 * Now actually process the break request.
424 if((exclusive_oplocks_open
+ level_II_oplocks_open
) != 0) {
425 if (oplock_break(dev
, inode
, file_id
, False
) == False
) {
426 DEBUG(0,("process_local_message: oplock break failed.\n"));
431 * If we have no record of any currently open oplocks,
432 * it's not an error, as a close command may have
433 * just been issued on the file that was oplocked.
434 * Just log a message and return success in this case.
436 DEBUG(3,("process_local_message: oplock break requested with no outstanding \
437 oplocks. Returning success.\n"));
441 * Do the appropriate reply - none in the kernel or level II case.
444 if(SVAL(msg_start
,OPBRK_MESSAGE_CMD_OFFSET
) == OPLOCK_BREAK_CMD
) {
445 struct sockaddr_in toaddr
;
447 /* Send the message back after OR'ing in the 'REPLY' bit. */
448 SSVAL(msg_start
,OPBRK_MESSAGE_CMD_OFFSET
,OPLOCK_BREAK_CMD
| CMD_REPLY
);
450 memset((char *)&toaddr
,'\0',sizeof(toaddr
));
451 toaddr
.sin_addr
.s_addr
= htonl(INADDR_LOOPBACK
);
452 toaddr
.sin_port
= htons(from_port
);
453 toaddr
.sin_family
= AF_INET
;
455 if(sys_sendto( oplock_sock
, msg_start
, OPLOCK_BREAK_MSG_LEN
, 0,
456 (struct sockaddr
*)&toaddr
, sizeof(toaddr
)) < 0) {
457 DEBUG(0,("process_local_message: sendto process %d failed. Errno was %s\n",
458 (int)remotepid
, strerror(errno
)));
462 DEBUG(5,("process_local_message: oplock break reply sent to \
463 pid %d, port %d, for file dev = %x, inode = %.0f, file_id = %lu\n",
464 (int)remotepid
, from_port
, (unsigned int)dev
, (double)inode
, file_id
));
470 /****************************************************************************
471 Set up an oplock break message.
472 ****************************************************************************/
474 static void prepare_break_message(char *outbuf
, files_struct
*fsp
, BOOL level2
)
476 memset(outbuf
,'\0',smb_size
);
477 set_message(outbuf
,8,0,True
);
479 SCVAL(outbuf
,smb_com
,SMBlockingX
);
480 SSVAL(outbuf
,smb_tid
,fsp
->conn
->cnum
);
481 SSVAL(outbuf
,smb_pid
,0xFFFF);
482 SSVAL(outbuf
,smb_uid
,0);
483 SSVAL(outbuf
,smb_mid
,0xFFFF);
484 SCVAL(outbuf
,smb_vwv0
,0xFF);
485 SSVAL(outbuf
,smb_vwv2
,fsp
->fnum
);
486 SCVAL(outbuf
,smb_vwv3
,LOCKING_ANDX_OPLOCK_RELEASE
);
487 SCVAL(outbuf
,smb_vwv3
+1,level2
? OPLOCKLEVEL_II
: OPLOCKLEVEL_NONE
);
490 /****************************************************************************
491 Function to do the waiting before sending a local break.
492 ****************************************************************************/
494 static void wait_before_sending_break(BOOL local_request
)
496 extern struct timeval smb_last_time
;
499 struct timeval cur_tv
;
500 long wait_left
= (long)lp_oplock_break_wait_time();
505 GetTimeOfDay(&cur_tv
);
507 wait_left
-= ((cur_tv
.tv_sec
- smb_last_time
.tv_sec
)*1000) +
508 ((cur_tv
.tv_usec
- smb_last_time
.tv_usec
)/1000);
511 wait_left
= MIN(wait_left
, 1000);
512 sys_usleep(wait_left
* 1000);
517 /****************************************************************************
518 Ensure that we have a valid oplock.
519 ****************************************************************************/
521 static files_struct
*initial_break_processing(SMB_DEV_T dev
, SMB_INO_T inode
, unsigned long file_id
)
523 files_struct
*fsp
= NULL
;
525 if( DEBUGLVL( 3 ) ) {
526 dbgtext( "initial_break_processing: called for dev = %x, inode = %.0f file_id = %lu\n",
527 (unsigned int)dev
, (double)inode
, file_id
);
528 dbgtext( "Current oplocks_open (exclusive = %d, levelII = %d)\n",
529 exclusive_oplocks_open
, level_II_oplocks_open
);
533 * We need to search the file open table for the
534 * entry containing this dev and inode, and ensure
535 * we have an oplock on it.
538 fsp
= file_find_dif(dev
, inode
, file_id
);
541 /* The file could have been closed in the meantime - return success. */
542 if( DEBUGLVL( 3 ) ) {
543 dbgtext( "initial_break_processing: cannot find open file with " );
544 dbgtext( "dev = %x, inode = %.0f file_id = %lu", (unsigned int)dev
,
545 (double)inode
, file_id
);
546 dbgtext( "allowing break to succeed.\n" );
551 /* Ensure we have an oplock on the file */
554 * There is a potential race condition in that an oplock could
555 * have been broken due to another udp request, and yet there are
556 * still oplock break messages being sent in the udp message
557 * queue for this file. So return true if we don't have an oplock,
558 * as we may have just freed it.
561 if(fsp
->oplock_type
== NO_OPLOCK
) {
562 if( DEBUGLVL( 3 ) ) {
563 dbgtext( "initial_break_processing: file %s ", fsp
->fsp_name
);
564 dbgtext( "(dev = %x, inode = %.0f, file_id = %lu) has no oplock.\n",
565 (unsigned int)dev
, (double)inode
, fsp
->file_id
);
566 dbgtext( "Allowing break to succeed regardless.\n" );
574 /****************************************************************************
575 Process a level II oplock break directly.
576 ****************************************************************************/
578 BOOL
oplock_break_level2(files_struct
*fsp
, BOOL local_request
, int token
)
580 extern uint32 global_client_caps
;
582 BOOL got_lock
= False
;
583 SMB_DEV_T dev
= fsp
->dev
;
584 SMB_INO_T inode
= fsp
->inode
;
587 * We can have a level II oplock even if the client is not
588 * level II oplock aware. In this case just remove the
589 * flags and don't send the break-to-none message to
593 if (global_client_caps
& CAP_LEVEL_II_OPLOCKS
) {
595 * If we are sending an oplock break due to an SMB sent
596 * by our own client we ensure that we wait at leat
597 * lp_oplock_break_wait_time() milliseconds before sending
598 * the packet. Sending the packet sooner can break Win9x
599 * and has reported to cause problems on NT. JRA.
602 wait_before_sending_break(local_request
);
604 /* Prepare the SMBlockingX message. */
606 prepare_break_message( outbuf
, fsp
, False
);
607 if (!send_smb(smbd_server_fd(), outbuf
))
608 exit_server("oplock_break_level2: send_smb failed.");
612 * Now we must update the shared memory structure to tell
613 * everyone else we no longer have a level II oplock on
614 * this open file. If local_request is true then token is
615 * the existing lock on the shared memory area.
618 if(!local_request
&& lock_share_entry_fsp(fsp
) == False
) {
619 DEBUG(0,("oplock_break_level2: unable to lock share entry for file %s\n", fsp
->fsp_name
));
624 if(remove_share_oplock(fsp
)==False
) {
625 DEBUG(0,("oplock_break_level2: unable to remove level II oplock for file %s\n", fsp
->fsp_name
));
628 if (!local_request
&& got_lock
)
629 unlock_share_entry_fsp(fsp
);
631 fsp
->oplock_type
= NO_OPLOCK
;
632 level_II_oplocks_open
--;
634 if(level_II_oplocks_open
< 0) {
635 DEBUG(0,("oplock_break_level2: level_II_oplocks_open < 0 (%d). PANIC ERROR\n",
636 level_II_oplocks_open
));
640 if( DEBUGLVL( 3 ) ) {
641 dbgtext( "oplock_break_level2: returning success for " );
642 dbgtext( "dev = %x, inode = %.0f, file_id = %lu\n", (unsigned int)dev
, (double)inode
, fsp
->file_id
);
643 dbgtext( "Current level II oplocks_open = %d\n", level_II_oplocks_open
);
649 /****************************************************************************
650 Process an oplock break directly.
651 ****************************************************************************/
653 static BOOL
oplock_break(SMB_DEV_T dev
, SMB_INO_T inode
, unsigned long file_id
, BOOL local_request
)
655 extern uint32 global_client_caps
;
656 extern struct current_user current_user
;
659 files_struct
*fsp
= NULL
;
661 BOOL shutdown_server
= False
;
662 BOOL oplock_timeout
= False
;
663 connection_struct
*saved_user_conn
;
664 connection_struct
*saved_fsp_conn
;
667 int timeout
= (OPLOCK_BREAK_TIMEOUT
* 1000);
671 if((fsp
= initial_break_processing(dev
, inode
, file_id
)) == NULL
)
675 * Deal with a level II oplock going break to none separately.
678 if (LEVEL_II_OPLOCK_TYPE(fsp
->oplock_type
))
679 return oplock_break_level2(fsp
, local_request
, -1);
681 /* Mark the oplock break as sent - we don't want to send twice! */
682 if (fsp
->sent_oplock_break
) {
683 if( DEBUGLVL( 0 ) ) {
684 dbgtext( "oplock_break: ERROR: oplock_break already sent for " );
685 dbgtext( "file %s ", fsp
->fsp_name
);
686 dbgtext( "(dev = %x, inode = %.0f, file_id = %lu)\n", (unsigned int)dev
, (double)inode
, fsp
->file_id
);
690 * We have to fail the open here as we cannot send another oplock break on
691 * this file whilst we are awaiting a response from the client - neither
692 * can we allow another open to succeed while we are waiting for the client.
697 if(global_oplock_break
) {
698 DEBUG(0,("ABORT : ABORT : recursion in oplock_break !!!!!\n"));
703 * Now comes the horrid part. We must send an oplock break to the client,
704 * and then process incoming messages until we get a close or oplock release.
705 * At this point we know we need a new inbuf/outbuf buffer pair.
706 * We cannot use these staticaly as we may recurse into here due to
707 * messages crossing on the wire.
710 if((inbuf
= (char *)malloc(BUFFER_SIZE
+ LARGE_WRITEX_HDR_SIZE
+ SAFETY_MARGIN
))==NULL
) {
711 DEBUG(0,("oplock_break: malloc fail for input buffer.\n"));
715 if((outbuf
= (char *)malloc(BUFFER_SIZE
+ LARGE_WRITEX_HDR_SIZE
+ SAFETY_MARGIN
))==NULL
) {
716 DEBUG(0,("oplock_break: malloc fail for output buffer.\n"));
722 * If we are sending an oplock break due to an SMB sent
723 * by our own client we ensure that we wait at leat
724 * lp_oplock_break_wait_time() milliseconds before sending
725 * the packet. Sending the packet sooner can break Win9x
726 * and has reported to cause problems on NT. JRA.
729 wait_before_sending_break(local_request
);
731 /* Prepare the SMBlockingX message. */
733 if ((global_client_caps
& CAP_LEVEL_II_OPLOCKS
) &&
734 !koplocks
&& /* NOTE: we force levelII off for kernel oplocks - this will change when it is supported */
735 lp_level2_oplocks(SNUM(fsp
->conn
))) {
736 using_levelII
= True
;
738 using_levelII
= False
;
741 prepare_break_message( outbuf
, fsp
, using_levelII
);
742 /* Remember if we just sent a break to level II on this file. */
743 fsp
->sent_oplock_break
= using_levelII
? LEVEL_II_BREAK_SENT
:EXCLUSIVE_BREAK_SENT
;
745 if (!send_smb(smbd_server_fd(), outbuf
))
746 exit_server("oplock_break: send_smb failed.");
748 /* We need this in case a readraw crosses on the wire. */
749 global_oplock_break
= True
;
751 /* Process incoming messages. */
754 * JRA - If we don't get a break from the client in OPLOCK_BREAK_TIMEOUT
755 * seconds we should just die....
758 start_time
= time(NULL
);
761 * Save the information we need to re-become the
762 * user, then unbecome the user whilst we're doing this.
764 saved_user_conn
= current_user
.conn
;
765 saved_vuid
= current_user
.vuid
;
766 saved_fsp_conn
= fsp
->conn
;
767 change_to_root_user();
768 vfs_GetWd(saved_fsp_conn
,saved_dir
);
769 /* Save the chain fnum. */
773 * From Charles Hoch <hoch@exemplary.com>. If the break processing
774 * code closes the file (as it often does), then the fsp pointer here
775 * points to free()'d memory. We *must* revalidate fsp each time
779 pstrcpy(file_name
, fsp
->fsp_name
);
781 while((fsp
= initial_break_processing(dev
, inode
, file_id
)) &&
782 OPEN_FSP(fsp
) && EXCLUSIVE_OPLOCK_TYPE(fsp
->oplock_type
)) {
783 if(receive_smb(smbd_server_fd(),inbuf
, timeout
) == False
) {
785 * Die if we got an error.
788 if (smb_read_error
== READ_EOF
) {
789 DEBUG( 0, ( "oplock_break: end of file from client\n" ) );
790 shutdown_server
= True
;
791 } else if (smb_read_error
== READ_ERROR
) {
792 DEBUG( 0, ("oplock_break: receive_smb error (%s)\n", strerror(errno
)) );
793 shutdown_server
= True
;
794 } else if (smb_read_error
== READ_TIMEOUT
) {
795 DEBUG( 0, ( "oplock_break: receive_smb timed out after %d seconds.\n", OPLOCK_BREAK_TIMEOUT
) );
796 oplock_timeout
= True
;
799 DEBUGADD( 0, ( "oplock_break failed for file %s ", file_name
) );
800 DEBUGADD( 0, ( "(dev = %x, inode = %.0f, file_id = %lu).\n",
801 (unsigned int)dev
, (double)inode
, file_id
));
807 * There are certain SMB requests that we shouldn't allow
808 * to recurse. opens, renames and deletes are the obvious
809 * ones. This is handled in the switch_message() function.
810 * If global_oplock_break is set they will push the packet onto
811 * the pending smb queue and return -1 (no reply).
815 process_smb(inbuf
, outbuf
);
818 * Die if we go over the time limit.
821 if((time(NULL
) - start_time
) > OPLOCK_BREAK_TIMEOUT
) {
822 if( DEBUGLVL( 0 ) ) {
823 dbgtext( "oplock_break: no break received from client " );
824 dbgtext( "within %d seconds.\n", OPLOCK_BREAK_TIMEOUT
);
825 dbgtext( "oplock_break failed for file %s ", fsp
->fsp_name
);
826 dbgtext( "(dev = %x, inode = %.0f, file_id = %lu).\n",
827 (unsigned int)dev
, (double)inode
, file_id
);
829 oplock_timeout
= True
;
835 * Go back to being the user who requested the oplock
838 if((saved_user_conn
!= NULL
) && (saved_vuid
!= UID_FIELD_INVALID
) && !change_to_user(saved_user_conn
, saved_vuid
)) {
839 DEBUG( 0, ( "oplock_break: unable to re-become user!" ) );
840 DEBUGADD( 0, ( "Shutting down server\n" ) );
842 exit_server("unable to re-become user");
845 /* Including the directory. */
846 vfs_ChDir(saved_fsp_conn
,saved_dir
);
848 /* Restore the chain fnum. */
849 file_chain_restore();
851 /* Free the buffers we've been using to recurse. */
855 /* We need this in case a readraw crossed on the wire. */
856 if(global_oplock_break
)
857 global_oplock_break
= False
;
860 * If the client timed out then clear the oplock (or go to level II)
861 * and continue. This seems to be what NT does and is better than dropping
865 if(oplock_timeout
&& (fsp
= initial_break_processing(dev
, inode
, file_id
)) &&
866 OPEN_FSP(fsp
) && EXCLUSIVE_OPLOCK_TYPE(fsp
->oplock_type
)) {
867 DEBUG(0,("oplock_break: client failure in oplock break in file %s\n", fsp
->fsp_name
));
868 remove_oplock(fsp
,True
);
869 #if FASCIST_OPLOCK_BACKOFF
870 global_client_failed_oplock_break
= True
; /* Never grant this client an oplock again. */
875 * If the client had an error we must die.
878 if(shutdown_server
) {
879 DEBUG( 0, ( "oplock_break: client failure in break - " ) );
880 DEBUGADD( 0, ( "shutting down this smbd.\n" ) );
882 exit_server("oplock break failure");
885 /* Santity check - remove this later. JRA */
886 if(exclusive_oplocks_open
< 0) {
887 DEBUG(0,("oplock_break: exclusive_oplocks_open < 0 (%d). PANIC ERROR\n", exclusive_oplocks_open
));
891 if( DEBUGLVL( 3 ) ) {
892 dbgtext( "oplock_break: returning success for " );
893 dbgtext( "dev = %x, inode = %.0f, file_id = %lu\n", (unsigned int)dev
, (double)inode
, file_id
);
894 dbgtext( "Current exclusive_oplocks_open = %d\n", exclusive_oplocks_open
);
900 /****************************************************************************
901 Send an oplock break message to another smbd process. If the oplock is held
902 by the local smbd then call the oplock break function directly.
903 ****************************************************************************/
905 BOOL
request_oplock_break(share_mode_entry
*share_entry
)
907 char op_break_msg
[OPLOCK_BREAK_MSG_LEN
];
908 struct sockaddr_in addr_out
;
909 pid_t pid
= sys_getpid();
912 SMB_DEV_T dev
= share_entry
->dev
;
913 SMB_INO_T inode
= share_entry
->inode
;
914 unsigned long file_id
= share_entry
->share_file_id
;
916 if(pid
== share_entry
->pid
) {
917 /* We are breaking our own oplock, make sure it's us. */
918 if(share_entry
->op_port
!= global_oplock_port
) {
919 DEBUG(0,("request_oplock_break: corrupt share mode entry - pid = %d, port = %d \
920 should be %d\n", (int)pid
, share_entry
->op_port
, global_oplock_port
));
924 DEBUG(5,("request_oplock_break: breaking our own oplock\n"));
926 #if 1 /* JRA PARANOIA TEST.... */
928 files_struct
*fsp
= file_find_dif(dev
, inode
, file_id
);
930 DEBUG(0,("request_oplock_break: PANIC : breaking our own oplock requested for \
931 dev = %x, inode = %.0f, file_id = %lu and no fsp found !\n",
932 (unsigned int)dev
, (double)inode
, file_id
));
933 smb_panic("request_oplock_break: no fsp found for our own oplock\n");
936 #endif /* END JRA PARANOIA TEST... */
938 /* Call oplock break direct. */
939 return oplock_break(dev
, inode
, file_id
, True
);
942 /* We need to send a OPLOCK_BREAK_CMD message to the port in the share mode entry. */
944 if (LEVEL_II_OPLOCK_TYPE(share_entry
->op_type
)) {
945 SSVAL(op_break_msg
,OPBRK_MESSAGE_CMD_OFFSET
,LEVEL_II_OPLOCK_BREAK_CMD
);
947 SSVAL(op_break_msg
,OPBRK_MESSAGE_CMD_OFFSET
,OPLOCK_BREAK_CMD
);
950 memcpy(op_break_msg
+OPLOCK_BREAK_PID_OFFSET
,(char *)&pid
,sizeof(pid
));
951 memcpy(op_break_msg
+OPLOCK_BREAK_DEV_OFFSET
,(char *)&dev
,sizeof(dev
));
952 memcpy(op_break_msg
+OPLOCK_BREAK_INODE_OFFSET
,(char *)&inode
,sizeof(inode
));
953 memcpy(op_break_msg
+OPLOCK_BREAK_FILEID_OFFSET
,(char *)&file_id
,sizeof(file_id
));
955 /* Set the address and port. */
956 memset((char *)&addr_out
,'\0',sizeof(addr_out
));
957 addr_out
.sin_addr
.s_addr
= htonl(INADDR_LOOPBACK
);
958 addr_out
.sin_port
= htons( share_entry
->op_port
);
959 addr_out
.sin_family
= AF_INET
;
961 if( DEBUGLVL( 3 ) ) {
962 dbgtext( "request_oplock_break: sending a oplock break message to " );
963 dbgtext( "pid %d on port %d ", (int)share_entry
->pid
, share_entry
->op_port
);
964 dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
965 (unsigned int)dev
, (double)inode
, file_id
);
968 if(sys_sendto(oplock_sock
,op_break_msg
,OPLOCK_BREAK_MSG_LEN
,0,
969 (struct sockaddr
*)&addr_out
,sizeof(addr_out
)) < 0) {
970 if( DEBUGLVL( 0 ) ) {
971 dbgtext( "request_oplock_break: failed when sending a oplock " );
972 dbgtext( "break message to pid %d ", (int)share_entry
->pid
);
973 dbgtext( "on port %d ", share_entry
->op_port
);
974 dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
975 (unsigned int)dev
, (double)inode
, file_id
);
976 dbgtext( "Error was %s\n", strerror(errno
) );
982 * If we just sent a message to a level II oplock share entry then
983 * we are done and may return.
986 if (LEVEL_II_OPLOCK_TYPE(share_entry
->op_type
)) {
987 DEBUG(3,("request_oplock_break: sent break message to level II entry.\n"));
992 * Now we must await the oplock broken message coming back
993 * from the target smbd process. Timeout if it fails to
994 * return in (OPLOCK_BREAK_TIMEOUT + OPLOCK_BREAK_TIMEOUT_FUDGEFACTOR) seconds.
995 * While we get messages that aren't ours, loop.
998 start_time
= time(NULL
);
999 time_left
= OPLOCK_BREAK_TIMEOUT
+OPLOCK_BREAK_TIMEOUT_FUDGEFACTOR
;
1001 while(time_left
>= 0) {
1002 char op_break_reply
[OPBRK_CMD_HEADER_LEN
+OPLOCK_BREAK_MSG_LEN
];
1003 uint16 reply_from_port
;
1004 char *reply_msg_start
;
1006 if(receive_local_message(op_break_reply
, sizeof(op_break_reply
),
1007 time_left
? time_left
* 1000 : 1) == False
) {
1008 if(smb_read_error
== READ_TIMEOUT
) {
1009 if( DEBUGLVL( 0 ) ) {
1010 dbgtext( "request_oplock_break: no response received to oplock " );
1011 dbgtext( "break request to pid %d ", (int)share_entry
->pid
);
1012 dbgtext( "on port %d ", share_entry
->op_port
);
1013 dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
1014 (unsigned int)dev
, (double)inode
, file_id
);
1018 * This is a hack to make handling of failing clients more robust.
1019 * If a oplock break response message is not received in the timeout
1020 * period we may assume that the smbd servicing that client holding
1021 * the oplock has died and the client changes were lost anyway, so
1022 * we should continue to try and open the file.
1026 if( DEBUGLVL( 0 ) ) {
1027 dbgtext( "request_oplock_break: error in response received " );
1028 dbgtext( "to oplock break request to pid %d ", (int)share_entry
->pid
);
1029 dbgtext( "on port %d ", share_entry
->op_port
);
1030 dbgtext( "for dev = %x, inode = %.0f, file_id = %lu\n",
1031 (unsigned int)dev
, (double)inode
, file_id
);
1032 dbgtext( "Error was (%s).\n", strerror(errno
) );
1038 reply_from_port
= SVAL(op_break_reply
,OPBRK_CMD_PORT_OFFSET
);
1039 reply_msg_start
= &op_break_reply
[OPBRK_CMD_HEADER_LEN
];
1042 * Test to see if this is the reply we are awaiting.
1044 if((SVAL(reply_msg_start
,OPBRK_MESSAGE_CMD_OFFSET
) & CMD_REPLY
) &&
1045 ((SVAL(reply_msg_start
,OPBRK_MESSAGE_CMD_OFFSET
) & ~CMD_REPLY
) == OPLOCK_BREAK_CMD
) &&
1046 (reply_from_port
== share_entry
->op_port
) &&
1047 (memcmp(&reply_msg_start
[OPLOCK_BREAK_PID_OFFSET
], &op_break_msg
[OPLOCK_BREAK_PID_OFFSET
],
1048 OPLOCK_BREAK_MSG_LEN
- OPLOCK_BREAK_PID_OFFSET
) == 0)) {
1051 * This is the reply we've been waiting for.
1056 * This is another message - a break request.
1057 * Note that both kernel oplock break requests
1058 * and UDP inter-smbd oplock break requests will
1059 * be processed here.
1061 * Process it to prevent potential deadlock.
1062 * Note that the code in switch_message() prevents
1063 * us from recursing into here as any SMB requests
1064 * we might process that would cause another oplock
1065 * break request to be made will be queued.
1069 process_local_message(op_break_reply
, sizeof(op_break_reply
));
1072 time_left
-= (time(NULL
) - start_time
);
1075 DEBUG(3,("request_oplock_break: broke oplock.\n"));
1080 /****************************************************************************
1081 Attempt to break an oplock on a file (if oplocked).
1082 Returns True if the file was closed as a result of
1083 the oplock break, False otherwise.
1084 Used as a last ditch attempt to free a space in the
1085 file table when we have run out.
1086 ****************************************************************************/
1088 BOOL
attempt_close_oplocked_file(files_struct
*fsp
)
1090 DEBUG(5,("attempt_close_oplocked_file: checking file %s.\n", fsp
->fsp_name
));
1092 if (EXCLUSIVE_OPLOCK_TYPE(fsp
->oplock_type
) && !fsp
->sent_oplock_break
&& (fsp
->fd
!= -1)) {
1093 /* Try and break the oplock. */
1094 if (oplock_break(fsp
->dev
, fsp
->inode
, fsp
->file_id
, True
)) {
1095 if(file_find_fsp(fsp
) == NULL
) /* Did the oplock break close the file ? */
1103 /****************************************************************************
1104 This function is called on any file modification or lock request. If a file
1105 is level 2 oplocked then it must tell all other level 2 holders to break to none.
1106 ****************************************************************************/
1108 void release_level_2_oplocks_on_change(files_struct
*fsp
)
1110 share_mode_entry
*share_list
= NULL
;
1111 pid_t pid
= sys_getpid();
1113 int num_share_modes
= 0;
1117 * If this file is level II oplocked then we need
1118 * to grab the shared memory lock and inform all
1119 * other files with a level II lock that they need
1120 * to flush their read caches. We keep the lock over
1121 * the shared memory area whilst doing this.
1124 if (!LEVEL_II_OPLOCK_TYPE(fsp
->oplock_type
))
1127 if (lock_share_entry_fsp(fsp
) == False
) {
1128 DEBUG(0,("release_level_2_oplocks_on_change: failed to lock share mode entry for file %s.\n", fsp
->fsp_name
));
1131 num_share_modes
= get_share_modes(fsp
->conn
, fsp
->dev
, fsp
->inode
, &share_list
);
1133 DEBUG(10,("release_level_2_oplocks_on_change: num_share_modes = %d\n",
1136 for(i
= 0; i
< num_share_modes
; i
++) {
1137 share_mode_entry
*share_entry
= &share_list
[i
];
1140 * As there could have been multiple writes waiting at the lock_share_entry
1141 * gate we may not be the first to enter. Hence the state of the op_types
1142 * in the share mode entries may be partly NO_OPLOCK and partly LEVEL_II
1143 * oplock. It will do no harm to re-send break messages to those smbd's
1144 * that are still waiting their turn to remove their LEVEL_II state, and
1145 * also no harm to ignore existing NO_OPLOCK states. JRA.
1148 DEBUG(10,("release_level_2_oplocks_on_change: share_entry[%i]->op_type == %d\n",
1149 i
, share_entry
->op_type
));
1151 if (share_entry
->op_type
== NO_OPLOCK
)
1155 if (EXCLUSIVE_OPLOCK_TYPE(share_entry
->op_type
)) {
1156 DEBUG(0,("release_level_2_oplocks_on_change: PANIC. share mode entry %d is an exlusive oplock !\n", i
));
1157 unlock_share_entry(fsp
->conn
, fsp
->dev
, fsp
->inode
);
1162 * Check if this is a file we have open (including the
1163 * file we've been called to do write_file on. If so
1164 * then break it directly without releasing the lock.
1167 if (pid
== share_entry
->pid
) {
1168 files_struct
*new_fsp
= file_find_dif(share_entry
->dev
, share_entry
->inode
, share_entry
->share_file_id
);
1170 /* Paranoia check... */
1171 if(new_fsp
== NULL
) {
1172 DEBUG(0,("release_level_2_oplocks_on_change: PANIC. share mode entry %d is not a local file !\n", i
));
1173 unlock_share_entry(fsp
->conn
, fsp
->dev
, fsp
->inode
);
1177 DEBUG(10,("release_level_2_oplocks_on_change: breaking our own oplock.\n"));
1179 oplock_break_level2(new_fsp
, True
, token
);
1184 * This is a remote file and so we send an asynchronous
1188 DEBUG(10,("release_level_2_oplocks_on_change: breaking remote oplock.\n"));
1189 request_oplock_break(share_entry
);
1193 SAFE_FREE(share_list
);
1194 unlock_share_entry_fsp(fsp
);
1196 /* Paranoia check... */
1197 if (LEVEL_II_OPLOCK_TYPE(fsp
->oplock_type
)) {
1198 DEBUG(0,("release_level_2_oplocks_on_change: PANIC. File %s still has a level II oplock.\n", fsp
->fsp_name
));
1199 smb_panic("release_level_2_oplocks_on_change");
1203 /****************************************************************************
1204 setup oplocks for this process
1205 ****************************************************************************/
1207 BOOL
init_oplocks(void)
1209 struct sockaddr_in sock_name
;
1210 socklen_t len
= sizeof(sock_name
);
1212 DEBUG(3,("open_oplock_ipc: opening loopback UDP socket.\n"));
1214 /* Open a lookback UDP socket on a random port. */
1215 oplock_sock
= open_socket_in(SOCK_DGRAM
, 0, 0, htonl(INADDR_LOOPBACK
),False
);
1216 if (oplock_sock
== -1) {
1217 DEBUG(0,("open_oplock_ipc: Failed to get local UDP socket for \
1218 address %lx. Error was %s\n", (long)htonl(INADDR_LOOPBACK
), strerror(errno
)));
1219 global_oplock_port
= 0;
1223 /* Find out the transient UDP port we have been allocated. */
1224 if(getsockname(oplock_sock
, (struct sockaddr
*)&sock_name
, &len
)<0) {
1225 DEBUG(0,("open_oplock_ipc: Failed to get local UDP port. Error was %s\n",
1229 global_oplock_port
= 0;
1232 global_oplock_port
= ntohs(sock_name
.sin_port
);
1234 if (lp_kernel_oplocks()) {
1235 #if HAVE_KERNEL_OPLOCKS_IRIX
1236 koplocks
= irix_init_kernel_oplocks();
1237 #elif HAVE_KERNEL_OPLOCKS_LINUX
1238 koplocks
= linux_init_kernel_oplocks();
1242 DEBUG(3,("open_oplock ipc: pid = %d, global_oplock_port = %u\n",
1243 (int)sys_getpid(), global_oplock_port
));