1 |
|
|
/* $OpenBSD: procs.c,v 1.15 2015/01/16 06:40:20 deraadt Exp $ */ |
2 |
|
|
|
3 |
|
|
/* |
4 |
|
|
* Copyright (c) 1995 |
5 |
|
|
* A.R. Gordon (andrew.gordon@net-tel.co.uk). All rights reserved. |
6 |
|
|
* |
7 |
|
|
* Redistribution and use in source and binary forms, with or without |
8 |
|
|
* modification, are permitted provided that the following conditions |
9 |
|
|
* are met: |
10 |
|
|
* 1. Redistributions of source code must retain the above copyright |
11 |
|
|
* notice, this list of conditions and the following disclaimer. |
12 |
|
|
* 2. Redistributions in binary form must reproduce the above copyright |
13 |
|
|
* notice, this list of conditions and the following disclaimer in the |
14 |
|
|
* documentation and/or other materials provided with the distribution. |
15 |
|
|
* 3. All advertising materials mentioning features or use of this software |
16 |
|
|
* must display the following acknowledgement: |
17 |
|
|
* This product includes software developed for the FreeBSD project |
18 |
|
|
* 4. Neither the name of the author nor the names of any co-contributors |
19 |
|
|
* may be used to endorse or promote products derived from this software |
20 |
|
|
* without specific prior written permission. |
21 |
|
|
* |
22 |
|
|
* THIS SOFTWARE IS PROVIDED BY ANDREW GORDON AND CONTRIBUTORS ``AS IS'' AND |
23 |
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
24 |
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
25 |
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
26 |
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
27 |
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
28 |
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
29 |
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
30 |
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
31 |
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
32 |
|
|
* SUCH DAMAGE. |
33 |
|
|
* |
34 |
|
|
*/ |
35 |
|
|
|
36 |
|
|
#include <sys/socket.h> |
37 |
|
|
#include <netinet/in.h> |
38 |
|
|
#include <rpc/rpc.h> |
39 |
|
|
#include <rpc/pmap_clnt.h> |
40 |
|
|
#include <rpcsvc/sm_inter.h> |
41 |
|
|
#include "nlm_prot.h" |
42 |
|
|
#include <arpa/inet.h> |
43 |
|
|
#include <stdio.h> |
44 |
|
|
#include <syslog.h> |
45 |
|
|
#include <stdlib.h> |
46 |
|
|
#include <string.h> |
47 |
|
|
#include <netdb.h> |
48 |
|
|
#include <limits.h> |
49 |
|
|
|
50 |
|
|
#include "lockd.h" |
51 |
|
|
#include "lockd_lock.h" |
52 |
|
|
|
53 |
|
|
#define CLIENT_CACHE_SIZE 64 /* No. of client sockets cached */ |
54 |
|
|
#define CLIENT_CACHE_LIFETIME 120 /* In seconds */ |
55 |
|
|
|
56 |
|
|
/* log_from_addr ----------------------------------------------------------- */ |
57 |
|
|
/* |
58 |
|
|
* Purpose: Log name of function called and source address |
59 |
|
|
* Returns: Nothing |
60 |
|
|
* Notes: Extracts the source address from the transport handle |
61 |
|
|
* passed in as part of the called procedure specification |
62 |
|
|
*/ |
63 |
|
|
static void |
64 |
|
|
log_from_addr(char *fun_name, struct svc_req *req) |
65 |
|
|
{ |
66 |
|
|
struct sockaddr_in *addr; |
67 |
|
|
struct hostent *host; |
68 |
|
|
char hostname_buf[HOST_NAME_MAX+1]; |
69 |
|
|
|
70 |
|
|
addr = svc_getcaller(req->rq_xprt); |
71 |
|
|
host = gethostbyaddr((char *) &(addr->sin_addr), addr->sin_len, AF_INET); |
72 |
|
|
if (host) |
73 |
|
|
strlcpy(hostname_buf, host->h_name, sizeof(hostname_buf)); |
74 |
|
|
else |
75 |
|
|
strlcpy(hostname_buf, inet_ntoa(addr->sin_addr), |
76 |
|
|
sizeof hostname_buf); |
77 |
|
|
syslog(LOG_DEBUG, "%s from %s", fun_name, hostname_buf); |
78 |
|
|
} |
79 |
|
|
|
80 |
|
|
|
81 |
|
|
/* get_client -------------------------------------------------------------- */ |
82 |
|
|
/* |
83 |
|
|
* Purpose: Get a CLIENT* for making RPC calls to lockd on given host |
84 |
|
|
* Returns: CLIENT* pointer, from clnt_udp_create, or NULL if error |
85 |
|
|
* Notes: Creating a CLIENT* is quite expensive, involving a |
86 |
|
|
* conversation with the remote portmapper to get the |
87 |
|
|
* port number. Since a given client is quite likely |
88 |
|
|
* to make several locking requests in succession, it is |
89 |
|
|
* desirable to cache the created CLIENT*. |
90 |
|
|
* |
91 |
|
|
* Since we are using UDP rather than TCP, there is no cost |
92 |
|
|
* to the remote system in keeping these cached indefinitely. |
93 |
|
|
* Unfortunately there is a snag: if the remote system |
94 |
|
|
* reboots, the cached portmapper results will be invalid, |
95 |
|
|
* and we will never detect this since all of the xxx_msg() |
96 |
|
|
* calls return no result - we just fire off a udp packet |
97 |
|
|
* and hope for the best. |
98 |
|
|
* |
99 |
|
|
* We solve this by discarding cached values after two |
100 |
|
|
* minutes, regardless of whether they have been used |
101 |
|
|
* in the meanwhile (since a bad one might have been used |
102 |
|
|
* plenty of times, as the host keeps retrying the request |
103 |
|
|
* and we keep sending the reply back to the wrong port). |
104 |
|
|
* |
105 |
|
|
* Given that the entries will always expire in the order |
106 |
|
|
* that they were created, there is no point in a LRU |
107 |
|
|
* algorithm for when the cache gets full - entries are |
108 |
|
|
* always re-used in sequence. |
109 |
|
|
*/ |
110 |
|
|
static CLIENT *clnt_cache_ptr[CLIENT_CACHE_SIZE]; |
111 |
|
|
static long clnt_cache_time[CLIENT_CACHE_SIZE]; /* time entry created */ |
112 |
|
|
static struct in_addr clnt_cache_addr[CLIENT_CACHE_SIZE]; |
113 |
|
|
static int clnt_cache_next_to_use = 0; |
114 |
|
|
|
115 |
|
|
CLIENT * |
116 |
|
|
get_client(struct sockaddr_in *host_addr, u_long vers) |
117 |
|
|
{ |
118 |
|
|
CLIENT *client; |
119 |
|
|
int sock_no, i; |
120 |
|
|
struct timeval retry_time, time_now; |
121 |
|
|
|
122 |
|
|
gettimeofday(&time_now, NULL); |
123 |
|
|
|
124 |
|
|
/* |
125 |
|
|
* Search for the given client in the cache, zapping any expired |
126 |
|
|
* entries that we happen to notice in passing. |
127 |
|
|
*/ |
128 |
|
|
for (i = 0; i < CLIENT_CACHE_SIZE; i++) { |
129 |
|
|
client = clnt_cache_ptr[i]; |
130 |
|
|
if (client && ((clnt_cache_time[i] + CLIENT_CACHE_LIFETIME) |
131 |
|
|
< time_now.tv_sec)) { |
132 |
|
|
/* Cache entry has expired. */ |
133 |
|
|
if (debug_level > 3) |
134 |
|
|
syslog(LOG_DEBUG, "Expired CLIENT* in cache"); |
135 |
|
|
clnt_cache_time[i] = 0L; |
136 |
|
|
clnt_destroy(client); |
137 |
|
|
clnt_cache_ptr[i] = NULL; |
138 |
|
|
client = NULL; |
139 |
|
|
} |
140 |
|
|
if (client && !memcmp(&clnt_cache_addr[i], &host_addr->sin_addr, |
141 |
|
|
sizeof(struct in_addr))) { |
142 |
|
|
/* Found it! */ |
143 |
|
|
if (debug_level > 3) |
144 |
|
|
syslog(LOG_DEBUG, "Found CLIENT* in cache"); |
145 |
|
|
return client; |
146 |
|
|
} |
147 |
|
|
} |
148 |
|
|
|
149 |
|
|
/* Not found in cache. Free the next entry if it is in use. */ |
150 |
|
|
if (clnt_cache_ptr[clnt_cache_next_to_use]) { |
151 |
|
|
clnt_destroy(clnt_cache_ptr[clnt_cache_next_to_use]); |
152 |
|
|
clnt_cache_ptr[clnt_cache_next_to_use] = NULL; |
153 |
|
|
} |
154 |
|
|
|
155 |
|
|
sock_no = RPC_ANYSOCK; |
156 |
|
|
retry_time.tv_sec = 5; |
157 |
|
|
retry_time.tv_usec = 0; |
158 |
|
|
host_addr->sin_port = 0; |
159 |
|
|
client = clntudp_create(host_addr, NLM_PROG, vers, retry_time, &sock_no); |
160 |
|
|
if (!client) { |
161 |
|
|
syslog(LOG_ERR, "%s", clnt_spcreateerror("clntudp_create")); |
162 |
|
|
syslog(LOG_ERR, "Unable to return result to %s", |
163 |
|
|
inet_ntoa(host_addr->sin_addr)); |
164 |
|
|
return NULL; |
165 |
|
|
} |
166 |
|
|
|
167 |
|
|
/* Success - update the cache entry */ |
168 |
|
|
clnt_cache_ptr[clnt_cache_next_to_use] = client; |
169 |
|
|
clnt_cache_addr[clnt_cache_next_to_use] = host_addr->sin_addr; |
170 |
|
|
clnt_cache_time[clnt_cache_next_to_use] = time_now.tv_sec; |
171 |
|
|
if (++clnt_cache_next_to_use >= CLIENT_CACHE_SIZE) |
172 |
|
|
clnt_cache_next_to_use = 0; |
173 |
|
|
|
174 |
|
|
/* |
175 |
|
|
* Disable the default timeout, so we can specify our own in calls |
176 |
|
|
* to clnt_call(). (Note that the timeout is a different concept |
177 |
|
|
* from the retry period set in clnt_udp_create() above.) |
178 |
|
|
*/ |
179 |
|
|
retry_time.tv_sec = -1; |
180 |
|
|
retry_time.tv_usec = -1; |
181 |
|
|
clnt_control(client, CLSET_TIMEOUT, (char *)(void *)&retry_time); |
182 |
|
|
|
183 |
|
|
if (debug_level > 3) |
184 |
|
|
syslog(LOG_DEBUG, "Created CLIENT* for %s", |
185 |
|
|
inet_ntoa(host_addr->sin_addr)); |
186 |
|
|
return client; |
187 |
|
|
} |
188 |
|
|
|
189 |
|
|
|
190 |
|
|
/* transmit_result --------------------------------------------------------- */ |
191 |
|
|
/* |
192 |
|
|
* Purpose: Transmit result for nlm_xxx_msg pseudo-RPCs |
193 |
|
|
* Returns: Nothing - we have no idea if the datagram got there |
194 |
|
|
* Notes: clnt_call() will always fail (with timeout) as we are |
195 |
|
|
* calling it with timeout 0 as a hack to just issue a datagram |
196 |
|
|
* without expecting a result |
197 |
|
|
*/ |
198 |
|
|
void |
199 |
|
|
transmit_result(int opcode, nlm_res *result, struct sockaddr_in *addr) |
200 |
|
|
{ |
201 |
|
|
static char dummy; |
202 |
|
|
CLIENT *cli; |
203 |
|
|
struct timeval timeo; |
204 |
|
|
int success; |
205 |
|
|
|
206 |
|
|
if ((cli = get_client(addr, NLM_VERS)) != NULL) { |
207 |
|
|
/* No timeout - not expecting response */ |
208 |
|
|
timerclear(&timeo); |
209 |
|
|
|
210 |
|
|
success = clnt_call(cli, opcode, xdr_nlm_res, |
211 |
|
|
result, xdr_void, &dummy, timeo); |
212 |
|
|
|
213 |
|
|
if (debug_level > 2) |
214 |
|
|
syslog(LOG_DEBUG, "clnt_call returns %d(%s)", |
215 |
|
|
success, clnt_sperrno(success)); |
216 |
|
|
} |
217 |
|
|
} |
218 |
|
|
/* transmit4_result --------------------------------------------------------- */ |
219 |
|
|
/* |
220 |
|
|
* Purpose: Transmit result for nlm4_xxx_msg pseudo-RPCs |
221 |
|
|
* Returns: Nothing - we have no idea if the datagram got there |
222 |
|
|
* Notes: clnt_call() will always fail (with timeout) as we are |
223 |
|
|
* calling it with timeout 0 as a hack to just issue a datagram |
224 |
|
|
* without expecting a result |
225 |
|
|
*/ |
226 |
|
|
void |
227 |
|
|
transmit4_result(int opcode, nlm4_res *result, struct sockaddr_in *addr) |
228 |
|
|
{ |
229 |
|
|
static char dummy; |
230 |
|
|
CLIENT *cli; |
231 |
|
|
struct timeval timeo; |
232 |
|
|
int success; |
233 |
|
|
|
234 |
|
|
if ((cli = get_client(addr, NLM_VERS4)) != NULL) { |
235 |
|
|
/* No timeout - not expecting response */ |
236 |
|
|
timerclear(&timeo); |
237 |
|
|
|
238 |
|
|
success = clnt_call(cli, opcode, xdr_nlm4_res, |
239 |
|
|
result, xdr_void, &dummy, timeo); |
240 |
|
|
|
241 |
|
|
if (debug_level > 2) |
242 |
|
|
syslog(LOG_DEBUG, "clnt_call returns %d(%s)", |
243 |
|
|
success, clnt_sperrno(success)); |
244 |
|
|
} |
245 |
|
|
} |
246 |
|
|
|
247 |
|
|
/* |
248 |
|
|
* converts a struct nlm_lock to struct nlm4_lock |
249 |
|
|
*/ |
250 |
|
|
static void |
251 |
|
|
nlmtonlm4(struct nlm_lock *arg, struct nlm4_lock *arg4) |
252 |
|
|
{ |
253 |
|
|
memcpy(arg4, arg, sizeof(nlm_lock)); |
254 |
|
|
arg4->l_offset = arg->l_offset; |
255 |
|
|
arg4->l_len = arg->l_len; |
256 |
|
|
} |
257 |
|
|
|
258 |
|
|
/* ------------------------------------------------------------------------- */ |
259 |
|
|
/* |
260 |
|
|
* Functions for Unix<->Unix locking (ie. monitored locking, with rpc.statd |
261 |
|
|
* involved to ensure reclaim of locks after a crash of the "stateless" |
262 |
|
|
* server. |
263 |
|
|
* |
264 |
|
|
* These all come in two flavours - nlm_xxx() and nlm_xxx_msg(). |
265 |
|
|
* The first are standard RPCs with argument and result. |
266 |
|
|
* The nlm_xxx_msg() calls implement exactly the same functions, but |
267 |
|
|
* use two pseudo-RPCs (one in each direction). These calls are NOT |
268 |
|
|
* standard use of the RPC protocol in that they do not return a result |
269 |
|
|
* at all (NB. this is quite different from returning a void result). |
270 |
|
|
* The effect of this is to make the nlm_xxx_msg() calls simple unacknowledged |
271 |
|
|
* datagrams, requiring higher-level code to perform retries. |
272 |
|
|
* |
273 |
|
|
* Despite the disadvantages of the nlm_xxx_msg() approach (some of which |
274 |
|
|
* are documented in the comments to get_client() above), this is the |
275 |
|
|
* interface used by all current commercial NFS implementations |
276 |
|
|
* [Solaris, SCO, AIX etc.]. This is presumed to be because these allow |
277 |
|
|
* implementations to continue using the standard RPC libraries, while |
278 |
|
|
* avoiding the block-until-result nature of the library interface. |
279 |
|
|
* |
280 |
|
|
* No client implementations have been identified so far that make use |
281 |
|
|
* of the true RPC version (early SunOS releases would be a likely candidate |
282 |
|
|
* for testing). |
283 |
|
|
*/ |
284 |
|
|
|
285 |
|
|
/* nlm_test ---------------------------------------------------------------- */ |
286 |
|
|
/* |
287 |
|
|
* Purpose: Test whether a specified lock would be granted if requested |
288 |
|
|
* Returns: nlm_granted (or error code) |
289 |
|
|
* Notes: |
290 |
|
|
*/ |
291 |
|
|
nlm_testres * |
292 |
|
|
nlm_test_1_svc(nlm_testargs *arg, struct svc_req *rqstp) |
293 |
|
|
{ |
294 |
|
|
static nlm_testres result; |
295 |
|
|
struct nlm4_lock arg4; |
296 |
|
|
struct nlm4_holder *holder; |
297 |
|
|
nlmtonlm4(&arg->alock, &arg4); |
298 |
|
|
|
299 |
|
|
if (debug_level) |
300 |
|
|
log_from_addr("nlm_test", rqstp); |
301 |
|
|
|
302 |
|
|
holder = testlock(&arg4, 0); |
303 |
|
|
/* |
304 |
|
|
* Copy the cookie from the argument into the result. Note that this |
305 |
|
|
* is slightly hazardous, as the structure contains a pointer to a |
306 |
|
|
* malloc()ed buffer that will get freed by the caller. However, the |
307 |
|
|
* main function transmits the result before freeing the argument |
308 |
|
|
* so it is in fact safe. |
309 |
|
|
*/ |
310 |
|
|
result.cookie = arg->cookie; |
311 |
|
|
if (holder == NULL) { |
312 |
|
|
result.stat.stat = nlm_granted; |
313 |
|
|
} else { |
314 |
|
|
result.stat.stat = nlm_denied; |
315 |
|
|
memcpy(&result.stat.nlm_testrply_u.holder, holder, |
316 |
|
|
sizeof(struct nlm_holder)); |
317 |
|
|
result.stat.nlm_testrply_u.holder.l_offset = |
318 |
|
|
(unsigned int)holder->l_offset; |
319 |
|
|
result.stat.nlm_testrply_u.holder.l_len = |
320 |
|
|
(unsigned int)holder->l_len; |
321 |
|
|
} |
322 |
|
|
return &result; |
323 |
|
|
} |
324 |
|
|
|
325 |
|
|
void * |
326 |
|
|
nlm_test_msg_1_svc(nlm_testargs *arg, struct svc_req *rqstp) |
327 |
|
|
{ |
328 |
|
|
nlm_testres result; |
329 |
|
|
static char dummy; |
330 |
|
|
struct sockaddr_in *addr; |
331 |
|
|
CLIENT *cli; |
332 |
|
|
int success; |
333 |
|
|
struct timeval timeo; |
334 |
|
|
struct nlm4_lock arg4; |
335 |
|
|
struct nlm4_holder *holder; |
336 |
|
|
|
337 |
|
|
nlmtonlm4(&arg->alock, &arg4); |
338 |
|
|
|
339 |
|
|
if (debug_level) |
340 |
|
|
log_from_addr("nlm_test_msg", rqstp); |
341 |
|
|
|
342 |
|
|
holder = testlock(&arg4, 0); |
343 |
|
|
|
344 |
|
|
result.cookie = arg->cookie; |
345 |
|
|
if (holder == NULL) { |
346 |
|
|
result.stat.stat = nlm_granted; |
347 |
|
|
} else { |
348 |
|
|
result.stat.stat = nlm_denied; |
349 |
|
|
memcpy(&result.stat.nlm_testrply_u.holder, holder, |
350 |
|
|
sizeof(struct nlm_holder)); |
351 |
|
|
result.stat.nlm_testrply_u.holder.l_offset = |
352 |
|
|
(unsigned int)holder->l_offset; |
353 |
|
|
result.stat.nlm_testrply_u.holder.l_len = |
354 |
|
|
(unsigned int)holder->l_len; |
355 |
|
|
} |
356 |
|
|
|
357 |
|
|
/* |
358 |
|
|
* nlm_test has different result type to the other operations, so |
359 |
|
|
* can't use transmit_result() in this case |
360 |
|
|
*/ |
361 |
|
|
addr = svc_getcaller(rqstp->rq_xprt); |
362 |
|
|
if ((cli = get_client(addr, NLM_VERS)) != NULL) { |
363 |
|
|
/* No timeout - not expecting response */ |
364 |
|
|
timerclear(&timeo); |
365 |
|
|
|
366 |
|
|
success = clnt_call(cli, NLM_TEST_RES, xdr_nlm_testres, |
367 |
|
|
&result, xdr_void, &dummy, timeo); |
368 |
|
|
|
369 |
|
|
if (debug_level > 2) |
370 |
|
|
syslog(LOG_DEBUG, "clnt_call returns %d", success); |
371 |
|
|
} |
372 |
|
|
return NULL; |
373 |
|
|
} |
374 |
|
|
|
375 |
|
|
/* nlm_lock ---------------------------------------------------------------- */ |
376 |
|
|
/* |
377 |
|
|
* Purposes: Establish a lock |
378 |
|
|
* Returns: granted, denied or blocked |
379 |
|
|
* Notes: *** grace period support missing |
380 |
|
|
*/ |
381 |
|
|
nlm_res * |
382 |
|
|
nlm_lock_1_svc(nlm_lockargs *arg, struct svc_req *rqstp) |
383 |
|
|
{ |
384 |
|
|
static nlm_res result; |
385 |
|
|
struct nlm4_lockargs arg4; |
386 |
|
|
nlmtonlm4(&arg->alock, &arg4.alock); |
387 |
|
|
arg4.cookie = arg->cookie; |
388 |
|
|
arg4.block = arg->block; |
389 |
|
|
arg4.exclusive = arg->exclusive; |
390 |
|
|
arg4.reclaim = arg->reclaim; |
391 |
|
|
arg4.state = arg->state; |
392 |
|
|
|
393 |
|
|
if (debug_level) |
394 |
|
|
log_from_addr("nlm_lock", rqstp); |
395 |
|
|
|
396 |
|
|
/* copy cookie from arg to result. See comment in nlm_test_1() */ |
397 |
|
|
result.cookie = arg->cookie; |
398 |
|
|
|
399 |
|
|
result.stat.stat = getlock(&arg4, rqstp, LOCK_MON); |
400 |
|
|
return &result; |
401 |
|
|
} |
402 |
|
|
|
403 |
|
|
void * |
404 |
|
|
nlm_lock_msg_1_svc(nlm_lockargs *arg, struct svc_req *rqstp) |
405 |
|
|
{ |
406 |
|
|
static nlm_res result; |
407 |
|
|
struct nlm4_lockargs arg4; |
408 |
|
|
|
409 |
|
|
nlmtonlm4(&arg->alock, &arg4.alock); |
410 |
|
|
arg4.cookie = arg->cookie; |
411 |
|
|
arg4.block = arg->block; |
412 |
|
|
arg4.exclusive = arg->exclusive; |
413 |
|
|
arg4.reclaim = arg->reclaim; |
414 |
|
|
arg4.state = arg->state; |
415 |
|
|
|
416 |
|
|
if (debug_level) |
417 |
|
|
log_from_addr("nlm_lock_msg", rqstp); |
418 |
|
|
|
419 |
|
|
result.cookie = arg->cookie; |
420 |
|
|
result.stat.stat = getlock(&arg4, rqstp, LOCK_ASYNC | LOCK_MON); |
421 |
|
|
transmit_result(NLM_LOCK_RES, &result, svc_getcaller(rqstp->rq_xprt)); |
422 |
|
|
|
423 |
|
|
return NULL; |
424 |
|
|
} |
425 |
|
|
|
426 |
|
|
/* nlm_cancel -------------------------------------------------------------- */ |
427 |
|
|
/* |
428 |
|
|
* Purpose: Cancel a blocked lock request |
429 |
|
|
* Returns: granted or denied |
430 |
|
|
* Notes: |
431 |
|
|
*/ |
432 |
|
|
nlm_res * |
433 |
|
|
nlm_cancel_1_svc(nlm_cancargs *arg, struct svc_req *rqstp) |
434 |
|
|
{ |
435 |
|
|
static nlm_res result; |
436 |
|
|
struct nlm4_lock arg4; |
437 |
|
|
|
438 |
|
|
nlmtonlm4(&arg->alock, &arg4); |
439 |
|
|
|
440 |
|
|
if (debug_level) |
441 |
|
|
log_from_addr("nlm_cancel", rqstp); |
442 |
|
|
|
443 |
|
|
/* copy cookie from arg to result. See comment in nlm_test_1() */ |
444 |
|
|
result.cookie = arg->cookie; |
445 |
|
|
|
446 |
|
|
/* |
447 |
|
|
* Since at present we never return 'nlm_blocked', there can never be |
448 |
|
|
* a lock to cancel, so this call always fails. |
449 |
|
|
*/ |
450 |
|
|
result.stat.stat = unlock(&arg4, LOCK_CANCEL); |
451 |
|
|
return &result; |
452 |
|
|
} |
453 |
|
|
|
454 |
|
|
void * |
455 |
|
|
nlm_cancel_msg_1_svc(nlm_cancargs *arg, struct svc_req *rqstp) |
456 |
|
|
{ |
457 |
|
|
static nlm_res result; |
458 |
|
|
struct nlm4_lock arg4; |
459 |
|
|
|
460 |
|
|
nlmtonlm4(&arg->alock, &arg4); |
461 |
|
|
|
462 |
|
|
if (debug_level) |
463 |
|
|
log_from_addr("nlm_cancel_msg", rqstp); |
464 |
|
|
|
465 |
|
|
result.cookie = arg->cookie; |
466 |
|
|
/* |
467 |
|
|
* Since at present we never return 'nlm_blocked', there can never be |
468 |
|
|
* a lock to cancel, so this call always fails. |
469 |
|
|
*/ |
470 |
|
|
result.stat.stat = unlock(&arg4, LOCK_CANCEL); |
471 |
|
|
transmit_result(NLM_CANCEL_RES, &result, svc_getcaller(rqstp->rq_xprt)); |
472 |
|
|
return NULL; |
473 |
|
|
} |
474 |
|
|
|
475 |
|
|
/* nlm_unlock -------------------------------------------------------------- */ |
476 |
|
|
/* |
477 |
|
|
* Purpose: Release an existing lock |
478 |
|
|
* Returns: Always granted, unless during grace period |
479 |
|
|
* Notes: "no such lock" error condition is ignored, as the |
480 |
|
|
* protocol uses unreliable UDP datagrams, and may well |
481 |
|
|
* re-try an unlock that has already succeeded. |
482 |
|
|
*/ |
483 |
|
|
nlm_res * |
484 |
|
|
nlm_unlock_1_svc(nlm_unlockargs *arg, struct svc_req *rqstp) |
485 |
|
|
{ |
486 |
|
|
static nlm_res result; |
487 |
|
|
struct nlm4_lock arg4; |
488 |
|
|
|
489 |
|
|
nlmtonlm4(&arg->alock, &arg4); |
490 |
|
|
|
491 |
|
|
if (debug_level) |
492 |
|
|
log_from_addr("nlm_unlock", rqstp); |
493 |
|
|
|
494 |
|
|
result.stat.stat = unlock(&arg4, 0); |
495 |
|
|
result.cookie = arg->cookie; |
496 |
|
|
|
497 |
|
|
return &result; |
498 |
|
|
} |
499 |
|
|
|
500 |
|
|
void * |
501 |
|
|
nlm_unlock_msg_1_svc(nlm_unlockargs *arg, struct svc_req *rqstp) |
502 |
|
|
{ |
503 |
|
|
static nlm_res result; |
504 |
|
|
struct nlm4_lock arg4; |
505 |
|
|
|
506 |
|
|
nlmtonlm4(&arg->alock, &arg4); |
507 |
|
|
|
508 |
|
|
if (debug_level) |
509 |
|
|
log_from_addr("nlm_unlock_msg", rqstp); |
510 |
|
|
|
511 |
|
|
result.stat.stat = unlock(&arg4, 0); |
512 |
|
|
result.cookie = arg->cookie; |
513 |
|
|
|
514 |
|
|
transmit_result(NLM_UNLOCK_RES, &result, svc_getcaller(rqstp->rq_xprt)); |
515 |
|
|
return NULL; |
516 |
|
|
} |
517 |
|
|
|
518 |
|
|
/* ------------------------------------------------------------------------- */ |
519 |
|
|
/* |
520 |
|
|
* Client-side pseudo-RPCs for results. Note that for the client there |
521 |
|
|
* are only nlm_xxx_msg() versions of each call, since the 'real RPC' |
522 |
|
|
* version returns the results in the RPC result, and so the client |
523 |
|
|
* does not normally receive incoming RPCs. |
524 |
|
|
* |
525 |
|
|
* The exception to this is nlm_granted(), which is genuinely an RPC |
526 |
|
|
* call from the server to the client - a 'call-back' in normal procedure |
527 |
|
|
* call terms. |
528 |
|
|
*/ |
529 |
|
|
|
530 |
|
|
/* nlm_granted ------------------------------------------------------------- */ |
531 |
|
|
/* |
532 |
|
|
* Purpose: Receive notification that formerly blocked lock now granted |
533 |
|
|
* Returns: always success ('granted') |
534 |
|
|
* Notes: |
535 |
|
|
*/ |
536 |
|
|
nlm_res * |
537 |
|
|
nlm_granted_1_svc(nlm_testargs *arg, struct svc_req *rqstp) |
538 |
|
|
{ |
539 |
|
|
static nlm_res result; |
540 |
|
|
|
541 |
|
|
if (debug_level) |
542 |
|
|
log_from_addr("nlm_granted", rqstp); |
543 |
|
|
|
544 |
|
|
/* copy cookie from arg to result. See comment in nlm_test_1() */ |
545 |
|
|
result.cookie = arg->cookie; |
546 |
|
|
|
547 |
|
|
result.stat.stat = nlm_granted; |
548 |
|
|
return &result; |
549 |
|
|
} |
550 |
|
|
|
551 |
|
|
void * |
552 |
|
|
nlm_granted_msg_1_svc(nlm_testargs *arg, struct svc_req *rqstp) |
553 |
|
|
{ |
554 |
|
|
static nlm_res result; |
555 |
|
|
|
556 |
|
|
if (debug_level) |
557 |
|
|
log_from_addr("nlm_granted_msg", rqstp); |
558 |
|
|
|
559 |
|
|
result.cookie = arg->cookie; |
560 |
|
|
result.stat.stat = nlm_granted; |
561 |
|
|
transmit_result(NLM_GRANTED_RES, &result, svc_getcaller(rqstp->rq_xprt)); |
562 |
|
|
return NULL; |
563 |
|
|
} |
564 |
|
|
|
565 |
|
|
/* nlm_test_res ------------------------------------------------------------ */ |
566 |
|
|
/* |
567 |
|
|
* Purpose: Accept result from earlier nlm_test_msg() call |
568 |
|
|
* Returns: Nothing |
569 |
|
|
*/ |
570 |
|
|
void * |
571 |
|
|
/*ARGSUSED*/ |
572 |
|
|
nlm_test_res_1_svc(nlm_testres *arg, struct svc_req *rqstp) |
573 |
|
|
{ |
574 |
|
|
if (debug_level) |
575 |
|
|
log_from_addr("nlm_test_res", rqstp); |
576 |
|
|
return NULL; |
577 |
|
|
} |
578 |
|
|
|
579 |
|
|
/* nlm_lock_res ------------------------------------------------------------ */ |
580 |
|
|
/* |
581 |
|
|
* Purpose: Accept result from earlier nlm_lock_msg() call |
582 |
|
|
* Returns: Nothing |
583 |
|
|
*/ |
584 |
|
|
void * |
585 |
|
|
/*ARGSUSED*/ |
586 |
|
|
nlm_lock_res_1_svc(nlm_res *arg, struct svc_req *rqstp) |
587 |
|
|
{ |
588 |
|
|
if (debug_level) |
589 |
|
|
log_from_addr("nlm_lock_res", rqstp); |
590 |
|
|
|
591 |
|
|
return NULL; |
592 |
|
|
} |
593 |
|
|
|
594 |
|
|
/* nlm_cancel_res ---------------------------------------------------------- */ |
595 |
|
|
/* |
596 |
|
|
* Purpose: Accept result from earlier nlm_cancel_msg() call |
597 |
|
|
* Returns: Nothing |
598 |
|
|
*/ |
599 |
|
|
void * |
600 |
|
|
/*ARGSUSED*/ |
601 |
|
|
nlm_cancel_res_1_svc(nlm_res *arg, struct svc_req *rqstp) |
602 |
|
|
{ |
603 |
|
|
if (debug_level) |
604 |
|
|
log_from_addr("nlm_cancel_res", rqstp); |
605 |
|
|
return NULL; |
606 |
|
|
} |
607 |
|
|
|
608 |
|
|
/* nlm_unlock_res ---------------------------------------------------------- */ |
609 |
|
|
/* |
610 |
|
|
* Purpose: Accept result from earlier nlm_unlock_msg() call |
611 |
|
|
* Returns: Nothing |
612 |
|
|
*/ |
613 |
|
|
void * |
614 |
|
|
/*ARGSUSED*/ |
615 |
|
|
nlm_unlock_res_1_svc(nlm_res *arg, struct svc_req *rqstp) |
616 |
|
|
{ |
617 |
|
|
if (debug_level) |
618 |
|
|
log_from_addr("nlm_unlock_res", rqstp); |
619 |
|
|
return NULL; |
620 |
|
|
} |
621 |
|
|
|
622 |
|
|
/* nlm_granted_res --------------------------------------------------------- */ |
623 |
|
|
/* |
624 |
|
|
* Purpose: Accept result from earlier nlm_granted_msg() call |
625 |
|
|
* Returns: Nothing |
626 |
|
|
*/ |
627 |
|
|
void * |
628 |
|
|
/*ARGSUSED*/ |
629 |
|
|
nlm_granted_res_1_svc(nlm_res *arg, struct svc_req *rqstp) |
630 |
|
|
{ |
631 |
|
|
if (debug_level) |
632 |
|
|
log_from_addr("nlm_granted_res", rqstp); |
633 |
|
|
return NULL; |
634 |
|
|
} |
635 |
|
|
|
636 |
|
|
/* ------------------------------------------------------------------------- */ |
637 |
|
|
/* |
638 |
|
|
* Calls for PCNFS locking (aka non-monitored locking, no involvement |
639 |
|
|
* of rpc.statd). |
640 |
|
|
* |
641 |
|
|
* These are all genuine RPCs - no nlm_xxx_msg() nonsense here. |
642 |
|
|
*/ |
643 |
|
|
|
644 |
|
|
/* nlm_share --------------------------------------------------------------- */ |
645 |
|
|
/* |
646 |
|
|
* Purpose: Establish a DOS-style lock |
647 |
|
|
* Returns: success or failure |
648 |
|
|
* Notes: Blocking locks are not supported - client is expected |
649 |
|
|
* to retry if required. |
650 |
|
|
*/ |
651 |
|
|
nlm_shareres * |
652 |
|
|
nlm_share_3_svc(nlm_shareargs *arg, struct svc_req *rqstp) |
653 |
|
|
{ |
654 |
|
|
static nlm_shareres result; |
655 |
|
|
|
656 |
|
|
if (debug_level) |
657 |
|
|
log_from_addr("nlm_share", rqstp); |
658 |
|
|
|
659 |
|
|
result.cookie = arg->cookie; |
660 |
|
|
result.stat = nlm_granted; |
661 |
|
|
result.sequence = 1234356; /* X/Open says this field is ignored? */ |
662 |
|
|
return &result; |
663 |
|
|
} |
664 |
|
|
|
665 |
|
|
/* nlm_unshare ------------------------------------------------------------ */ |
666 |
|
|
/* |
667 |
|
|
* Purpose: Release a DOS-style lock |
668 |
|
|
* Returns: nlm_granted, unless in grace period |
669 |
|
|
* Notes: |
670 |
|
|
*/ |
671 |
|
|
nlm_shareres * |
672 |
|
|
nlm_unshare_3_svc(nlm_shareargs *arg, struct svc_req *rqstp) |
673 |
|
|
{ |
674 |
|
|
static nlm_shareres result; |
675 |
|
|
|
676 |
|
|
if (debug_level) |
677 |
|
|
log_from_addr("nlm_unshare", rqstp); |
678 |
|
|
|
679 |
|
|
result.cookie = arg->cookie; |
680 |
|
|
result.stat = nlm_granted; |
681 |
|
|
result.sequence = 1234356; /* X/Open says this field is ignored? */ |
682 |
|
|
return &result; |
683 |
|
|
} |
684 |
|
|
|
685 |
|
|
/* nlm_nm_lock ------------------------------------------------------------ */ |
686 |
|
|
/* |
687 |
|
|
* Purpose: non-monitored version of nlm_lock() |
688 |
|
|
* Returns: as for nlm_lock() |
689 |
|
|
* Notes: These locks are in the same style as the standard nlm_lock, |
690 |
|
|
* but the rpc.statd should not be called to establish a |
691 |
|
|
* monitor for the client machine, since that machine is |
692 |
|
|
* declared not to be running a rpc.statd, and so would not |
693 |
|
|
* respond to the statd protocol. |
694 |
|
|
*/ |
695 |
|
|
nlm_res * |
696 |
|
|
nlm_nm_lock_3_svc(nlm_lockargs *arg, struct svc_req *rqstp) |
697 |
|
|
{ |
698 |
|
|
static nlm_res result; |
699 |
|
|
|
700 |
|
|
if (debug_level) |
701 |
|
|
log_from_addr("nlm_nm_lock", rqstp); |
702 |
|
|
|
703 |
|
|
/* copy cookie from arg to result. See comment in nlm_test_1() */ |
704 |
|
|
result.cookie = arg->cookie; |
705 |
|
|
result.stat.stat = nlm_granted; |
706 |
|
|
return &result; |
707 |
|
|
} |
708 |
|
|
|
709 |
|
|
/* nlm_free_all ------------------------------------------------------------ */ |
710 |
|
|
/* |
711 |
|
|
* Purpose: Release all locks held by a named client |
712 |
|
|
* Returns: Nothing |
713 |
|
|
* Notes: Potential denial of service security problem here - the |
714 |
|
|
* locks to be released are specified by a host name, independent |
715 |
|
|
* of the address from which the request has arrived. |
716 |
|
|
* Should probably be rejected if the named host has been |
717 |
|
|
* using monitored locks. |
718 |
|
|
*/ |
719 |
|
|
void * |
720 |
|
|
/*ARGSUSED*/ |
721 |
|
|
nlm_free_all_3_svc(nlm_notify *arg, struct svc_req *rqstp) |
722 |
|
|
{ |
723 |
|
|
static char dummy; |
724 |
|
|
|
725 |
|
|
if (debug_level) |
726 |
|
|
log_from_addr("nlm_free_all", rqstp); |
727 |
|
|
return &dummy; |
728 |
|
|
} |
729 |
|
|
|
730 |
|
|
/* calls for nlm version 4 (NFSv3) */ |
731 |
|
|
/* nlm_test ---------------------------------------------------------------- */ |
732 |
|
|
/* |
733 |
|
|
* Purpose: Test whether a specified lock would be granted if requested |
734 |
|
|
* Returns: nlm_granted (or error code) |
735 |
|
|
* Notes: |
736 |
|
|
*/ |
737 |
|
|
nlm4_testres * |
738 |
|
|
nlm4_test_4_svc(nlm4_testargs *arg, struct svc_req *rqstp) |
739 |
|
|
{ |
740 |
|
|
static nlm4_testres result; |
741 |
|
|
struct nlm4_holder *holder; |
742 |
|
|
|
743 |
|
|
if (debug_level) |
744 |
|
|
log_from_addr("nlm4_test", rqstp); |
745 |
|
|
|
746 |
|
|
holder = testlock(&arg->alock, LOCK_V4); |
747 |
|
|
|
748 |
|
|
/* |
749 |
|
|
* Copy the cookie from the argument into the result. Note that this |
750 |
|
|
* is slightly hazardous, as the structure contains a pointer to a |
751 |
|
|
* malloc()ed buffer that will get freed by the caller. However, the |
752 |
|
|
* main function transmits the result before freeing the argument |
753 |
|
|
* so it is in fact safe. |
754 |
|
|
*/ |
755 |
|
|
result.cookie = arg->cookie; |
756 |
|
|
if (holder == NULL) { |
757 |
|
|
result.stat.stat = nlm4_granted; |
758 |
|
|
} else { |
759 |
|
|
result.stat.stat = nlm4_denied; |
760 |
|
|
memcpy(&result.stat.nlm4_testrply_u.holder, holder, |
761 |
|
|
sizeof(struct nlm4_holder)); |
762 |
|
|
} |
763 |
|
|
return &result; |
764 |
|
|
} |
765 |
|
|
|
766 |
|
|
void * |
767 |
|
|
nlm4_test_msg_4_svc(nlm4_testargs *arg, struct svc_req *rqstp) |
768 |
|
|
{ |
769 |
|
|
nlm4_testres result; |
770 |
|
|
static char dummy; |
771 |
|
|
struct sockaddr_in *addr; |
772 |
|
|
CLIENT *cli; |
773 |
|
|
int success; |
774 |
|
|
struct timeval timeo; |
775 |
|
|
struct nlm4_holder *holder; |
776 |
|
|
|
777 |
|
|
if (debug_level) |
778 |
|
|
log_from_addr("nlm4_test_msg", rqstp); |
779 |
|
|
|
780 |
|
|
holder = testlock(&arg->alock, LOCK_V4); |
781 |
|
|
|
782 |
|
|
result.cookie = arg->cookie; |
783 |
|
|
if (holder == NULL) { |
784 |
|
|
result.stat.stat = nlm4_granted; |
785 |
|
|
} else { |
786 |
|
|
result.stat.stat = nlm4_denied; |
787 |
|
|
memcpy(&result.stat.nlm4_testrply_u.holder, holder, |
788 |
|
|
sizeof(struct nlm4_holder)); |
789 |
|
|
} |
790 |
|
|
|
791 |
|
|
/* |
792 |
|
|
* nlm_test has different result type to the other operations, so |
793 |
|
|
* can't use transmit4_result() in this case |
794 |
|
|
*/ |
795 |
|
|
addr = svc_getcaller(rqstp->rq_xprt); |
796 |
|
|
if ((cli = get_client(addr, NLM_VERS4)) != NULL) { |
797 |
|
|
/* No timeout - not expecting response */ |
798 |
|
|
timerclear(&timeo); |
799 |
|
|
|
800 |
|
|
success = clnt_call(cli, NLM4_TEST_RES, xdr_nlm4_testres, |
801 |
|
|
&result, xdr_void, &dummy, timeo); |
802 |
|
|
|
803 |
|
|
if (debug_level > 2) |
804 |
|
|
syslog(LOG_DEBUG, "clnt_call returns %d", success); |
805 |
|
|
} |
806 |
|
|
return NULL; |
807 |
|
|
} |
808 |
|
|
|
809 |
|
|
/* nlm_lock ---------------------------------------------------------------- */ |
810 |
|
|
/* |
811 |
|
|
* Purposes: Establish a lock |
812 |
|
|
* Returns: granted, denied or blocked |
813 |
|
|
* Notes: *** grace period support missing |
814 |
|
|
*/ |
815 |
|
|
nlm4_res * |
816 |
|
|
nlm4_lock_4_svc(nlm4_lockargs *arg, struct svc_req *rqstp) |
817 |
|
|
{ |
818 |
|
|
static nlm4_res result; |
819 |
|
|
|
820 |
|
|
if (debug_level) |
821 |
|
|
log_from_addr("nlm4_lock", rqstp); |
822 |
|
|
|
823 |
|
|
/* copy cookie from arg to result. See comment in nlm_test_4() */ |
824 |
|
|
result.cookie = arg->cookie; |
825 |
|
|
|
826 |
|
|
result.stat.stat = getlock(arg, rqstp, LOCK_MON | LOCK_V4); |
827 |
|
|
return &result; |
828 |
|
|
} |
829 |
|
|
|
830 |
|
|
void * |
831 |
|
|
nlm4_lock_msg_4_svc(nlm4_lockargs *arg, struct svc_req *rqstp) |
832 |
|
|
{ |
833 |
|
|
static nlm4_res result; |
834 |
|
|
|
835 |
|
|
if (debug_level) |
836 |
|
|
log_from_addr("nlm4_lock_msg", rqstp); |
837 |
|
|
|
838 |
|
|
result.cookie = arg->cookie; |
839 |
|
|
result.stat.stat = getlock(arg, rqstp, LOCK_MON | LOCK_ASYNC | LOCK_V4); |
840 |
|
|
transmit4_result(NLM4_LOCK_RES, &result, svc_getcaller(rqstp->rq_xprt)); |
841 |
|
|
|
842 |
|
|
return NULL; |
843 |
|
|
} |
844 |
|
|
|
845 |
|
|
/* nlm_cancel -------------------------------------------------------------- */ |
846 |
|
|
/* |
847 |
|
|
* Purpose: Cancel a blocked lock request |
848 |
|
|
* Returns: granted or denied |
849 |
|
|
* Notes: |
850 |
|
|
*/ |
851 |
|
|
nlm4_res * |
852 |
|
|
nlm4_cancel_4_svc(nlm4_cancargs *arg, struct svc_req *rqstp) |
853 |
|
|
{ |
854 |
|
|
static nlm4_res result; |
855 |
|
|
|
856 |
|
|
if (debug_level) |
857 |
|
|
log_from_addr("nlm4_cancel", rqstp); |
858 |
|
|
|
859 |
|
|
/* copy cookie from arg to result. See comment in nlm_test_1() */ |
860 |
|
|
result.cookie = arg->cookie; |
861 |
|
|
|
862 |
|
|
/* |
863 |
|
|
* Since at present we never return 'nlm_blocked', there can never be |
864 |
|
|
* a lock to cancel, so this call always fails. |
865 |
|
|
*/ |
866 |
|
|
result.stat.stat = unlock(&arg->alock, LOCK_CANCEL); |
867 |
|
|
return &result; |
868 |
|
|
} |
869 |
|
|
|
870 |
|
|
void * |
871 |
|
|
nlm4_cancel_msg_4_svc(nlm4_cancargs *arg, struct svc_req *rqstp) |
872 |
|
|
{ |
873 |
|
|
static nlm4_res result; |
874 |
|
|
|
875 |
|
|
if (debug_level) |
876 |
|
|
log_from_addr("nlm4_cancel_msg", rqstp); |
877 |
|
|
|
878 |
|
|
result.cookie = arg->cookie; |
879 |
|
|
/* |
880 |
|
|
* Since at present we never return 'nlm_blocked', there can never be |
881 |
|
|
* a lock to cancel, so this call always fails. |
882 |
|
|
*/ |
883 |
|
|
result.stat.stat = unlock(&arg->alock, LOCK_CANCEL | LOCK_V4); |
884 |
|
|
transmit4_result(NLM4_CANCEL_RES, &result, svc_getcaller(rqstp->rq_xprt)); |
885 |
|
|
|
886 |
|
|
return NULL; |
887 |
|
|
} |
888 |
|
|
|
889 |
|
|
/* nlm_unlock -------------------------------------------------------------- */ |
890 |
|
|
/* |
891 |
|
|
* Purpose: Release an existing lock |
892 |
|
|
* Returns: Always granted, unless during grace period |
893 |
|
|
* Notes: "no such lock" error condition is ignored, as the |
894 |
|
|
* protocol uses unreliable UDP datagrams, and may well |
895 |
|
|
* re-try an unlock that has already succeeded. |
896 |
|
|
*/ |
897 |
|
|
nlm4_res * |
898 |
|
|
nlm4_unlock_4_svc(nlm4_unlockargs *arg, struct svc_req *rqstp) |
899 |
|
|
{ |
900 |
|
|
static nlm4_res result; |
901 |
|
|
|
902 |
|
|
if (debug_level) |
903 |
|
|
log_from_addr("nlm4_unlock", rqstp); |
904 |
|
|
|
905 |
|
|
result.stat.stat = unlock(&arg->alock, LOCK_V4); |
906 |
|
|
result.cookie = arg->cookie; |
907 |
|
|
|
908 |
|
|
return &result; |
909 |
|
|
} |
910 |
|
|
|
911 |
|
|
void * |
912 |
|
|
nlm4_unlock_msg_4_svc(nlm4_unlockargs *arg, struct svc_req *rqstp) |
913 |
|
|
{ |
914 |
|
|
static nlm4_res result; |
915 |
|
|
|
916 |
|
|
if (debug_level) |
917 |
|
|
log_from_addr("nlm4_unlock_msg", rqstp); |
918 |
|
|
|
919 |
|
|
result.stat.stat = unlock(&arg->alock, LOCK_V4); |
920 |
|
|
result.cookie = arg->cookie; |
921 |
|
|
|
922 |
|
|
transmit4_result(NLM4_UNLOCK_RES, &result, svc_getcaller(rqstp->rq_xprt)); |
923 |
|
|
return NULL; |
924 |
|
|
} |
925 |
|
|
|
926 |
|
|
/* ------------------------------------------------------------------------- */ |
927 |
|
|
/* |
928 |
|
|
* Client-side pseudo-RPCs for results. Note that for the client there |
929 |
|
|
* are only nlm_xxx_msg() versions of each call, since the 'real RPC' |
930 |
|
|
* version returns the results in the RPC result, and so the client |
931 |
|
|
* does not normally receive incoming RPCs. |
932 |
|
|
* |
933 |
|
|
* The exception to this is nlm_granted(), which is genuinely an RPC |
934 |
|
|
* call from the server to the client - a 'call-back' in normal procedure |
935 |
|
|
* call terms. |
936 |
|
|
*/ |
937 |
|
|
|
938 |
|
|
/* nlm_granted ------------------------------------------------------------- */ |
939 |
|
|
/* |
940 |
|
|
* Purpose: Receive notification that formerly blocked lock now granted |
941 |
|
|
* Returns: always success ('granted') |
942 |
|
|
* Notes: |
943 |
|
|
*/ |
944 |
|
|
nlm4_res * |
945 |
|
|
nlm4_granted_4_svc(nlm4_testargs *arg, struct svc_req *rqstp) |
946 |
|
|
{ |
947 |
|
|
static nlm4_res result; |
948 |
|
|
|
949 |
|
|
if (debug_level) |
950 |
|
|
log_from_addr("nlm4_granted", rqstp); |
951 |
|
|
|
952 |
|
|
/* copy cookie from arg to result. See comment in nlm_test_1() */ |
953 |
|
|
result.cookie = arg->cookie; |
954 |
|
|
|
955 |
|
|
result.stat.stat = nlm4_granted; |
956 |
|
|
return &result; |
957 |
|
|
} |
958 |
|
|
|
959 |
|
|
void * |
960 |
|
|
nlm4_granted_msg_4_svc(nlm4_testargs *arg, struct svc_req *rqstp) |
961 |
|
|
{ |
962 |
|
|
static nlm4_res result; |
963 |
|
|
|
964 |
|
|
if (debug_level) |
965 |
|
|
log_from_addr("nlm4_granted_msg", rqstp); |
966 |
|
|
|
967 |
|
|
result.cookie = arg->cookie; |
968 |
|
|
result.stat.stat = nlm4_granted; |
969 |
|
|
transmit4_result(NLM4_GRANTED_RES, &result, svc_getcaller(rqstp->rq_xprt)); |
970 |
|
|
return NULL; |
971 |
|
|
} |
972 |
|
|
|
973 |
|
|
/* nlm_test_res ------------------------------------------------------------ */ |
974 |
|
|
/* |
975 |
|
|
* Purpose: Accept result from earlier nlm_test_msg() call |
976 |
|
|
* Returns: Nothing |
977 |
|
|
*/ |
978 |
|
|
void * |
979 |
|
|
/*ARGSUSED*/ |
980 |
|
|
nlm4_test_res_4_svc(nlm4_testres *arg, struct svc_req *rqstp) |
981 |
|
|
{ |
982 |
|
|
if (debug_level) |
983 |
|
|
log_from_addr("nlm4_test_res", rqstp); |
984 |
|
|
return NULL; |
985 |
|
|
} |
986 |
|
|
|
987 |
|
|
/* nlm_lock_res ------------------------------------------------------------ */ |
988 |
|
|
/* |
989 |
|
|
* Purpose: Accept result from earlier nlm_lock_msg() call |
990 |
|
|
* Returns: Nothing |
991 |
|
|
*/ |
992 |
|
|
void * |
993 |
|
|
/*ARGSUSED*/ |
994 |
|
|
nlm4_lock_res_4_svc(nlm4_res *arg, struct svc_req *rqstp) |
995 |
|
|
{ |
996 |
|
|
if (debug_level) |
997 |
|
|
log_from_addr("nlm4_lock_res", rqstp); |
998 |
|
|
|
999 |
|
|
return NULL; |
1000 |
|
|
} |
1001 |
|
|
|
1002 |
|
|
/* nlm_cancel_res ---------------------------------------------------------- */ |
1003 |
|
|
/* |
1004 |
|
|
* Purpose: Accept result from earlier nlm_cancel_msg() call |
1005 |
|
|
* Returns: Nothing |
1006 |
|
|
*/ |
1007 |
|
|
void * |
1008 |
|
|
/*ARGSUSED*/ |
1009 |
|
|
nlm4_cancel_res_4_svc(nlm4_res *arg, struct svc_req *rqstp) |
1010 |
|
|
{ |
1011 |
|
|
if (debug_level) |
1012 |
|
|
log_from_addr("nlm4_cancel_res", rqstp); |
1013 |
|
|
return NULL; |
1014 |
|
|
} |
1015 |
|
|
|
1016 |
|
|
/* nlm_unlock_res ---------------------------------------------------------- */ |
1017 |
|
|
/* |
1018 |
|
|
* Purpose: Accept result from earlier nlm_unlock_msg() call |
1019 |
|
|
* Returns: Nothing |
1020 |
|
|
*/ |
1021 |
|
|
void * |
1022 |
|
|
/*ARGSUSED*/ |
1023 |
|
|
nlm4_unlock_res_4_svc(nlm4_res *arg, struct svc_req *rqstp) |
1024 |
|
|
{ |
1025 |
|
|
if (debug_level) |
1026 |
|
|
log_from_addr("nlm4_unlock_res", rqstp); |
1027 |
|
|
return NULL; |
1028 |
|
|
} |
1029 |
|
|
|
1030 |
|
|
/* nlm_granted_res --------------------------------------------------------- */ |
1031 |
|
|
/* |
1032 |
|
|
* Purpose: Accept result from earlier nlm_granted_msg() call |
1033 |
|
|
* Returns: Nothing |
1034 |
|
|
*/ |
1035 |
|
|
void * |
1036 |
|
|
/*ARGSUSED*/ |
1037 |
|
|
nlm4_granted_res_4_svc(nlm4_res *arg, struct svc_req *rqstp) |
1038 |
|
|
{ |
1039 |
|
|
if (debug_level) |
1040 |
|
|
log_from_addr("nlm4_granted_res", rqstp); |
1041 |
|
|
return NULL; |
1042 |
|
|
} |
1043 |
|
|
|
1044 |
|
|
/* ------------------------------------------------------------------------- */ |
1045 |
|
|
/* |
1046 |
|
|
* Calls for PCNFS locking (aka non-monitored locking, no involvement |
1047 |
|
|
* of rpc.statd). |
1048 |
|
|
* |
1049 |
|
|
* These are all genuine RPCs - no nlm_xxx_msg() nonsense here. |
1050 |
|
|
*/ |
1051 |
|
|
|
1052 |
|
|
/* nlm_share --------------------------------------------------------------- */ |
1053 |
|
|
/* |
1054 |
|
|
* Purpose: Establish a DOS-style lock |
1055 |
|
|
* Returns: success or failure |
1056 |
|
|
* Notes: Blocking locks are not supported - client is expected |
1057 |
|
|
* to retry if required. |
1058 |
|
|
*/ |
1059 |
|
|
nlm4_shareres * |
1060 |
|
|
nlm4_share_4_svc(nlm4_shareargs *arg, struct svc_req *rqstp) |
1061 |
|
|
{ |
1062 |
|
|
static nlm4_shareres result; |
1063 |
|
|
|
1064 |
|
|
if (debug_level) |
1065 |
|
|
log_from_addr("nlm4_share", rqstp); |
1066 |
|
|
|
1067 |
|
|
result.cookie = arg->cookie; |
1068 |
|
|
result.stat = nlm4_granted; |
1069 |
|
|
result.sequence = 1234356; /* X/Open says this field is ignored? */ |
1070 |
|
|
return &result; |
1071 |
|
|
} |
1072 |
|
|
|
1073 |
|
|
/* nlm4_unshare ------------------------------------------------------------ */ |
1074 |
|
|
/* |
1075 |
|
|
* Purpose: Release a DOS-style lock |
1076 |
|
|
* Returns: nlm_granted, unless in grace period |
1077 |
|
|
* Notes: |
1078 |
|
|
*/ |
1079 |
|
|
nlm4_shareres * |
1080 |
|
|
nlm4_unshare_4_svc(nlm4_shareargs *arg, struct svc_req *rqstp) |
1081 |
|
|
{ |
1082 |
|
|
static nlm4_shareres result; |
1083 |
|
|
|
1084 |
|
|
if (debug_level) |
1085 |
|
|
log_from_addr("nlm_unshare", rqstp); |
1086 |
|
|
|
1087 |
|
|
result.cookie = arg->cookie; |
1088 |
|
|
result.stat = nlm4_granted; |
1089 |
|
|
result.sequence = 1234356; /* X/Open says this field is ignored? */ |
1090 |
|
|
return &result; |
1091 |
|
|
} |
1092 |
|
|
|
1093 |
|
|
/* nlm4_nm_lock ------------------------------------------------------------ */ |
1094 |
|
|
/* |
1095 |
|
|
* Purpose: non-monitored version of nlm4_lock() |
1096 |
|
|
* Returns: as for nlm4_lock() |
1097 |
|
|
* Notes: These locks are in the same style as the standard nlm4_lock, |
1098 |
|
|
* but the rpc.statd should not be called to establish a |
1099 |
|
|
* monitor for the client machine, since that machine is |
1100 |
|
|
* declared not to be running a rpc.statd, and so would not |
1101 |
|
|
* respond to the statd protocol. |
1102 |
|
|
*/ |
1103 |
|
|
nlm4_res * |
1104 |
|
|
nlm4_nm_lock_4_svc(nlm4_lockargs *arg, struct svc_req *rqstp) |
1105 |
|
|
{ |
1106 |
|
|
static nlm4_res result; |
1107 |
|
|
|
1108 |
|
|
if (debug_level) |
1109 |
|
|
log_from_addr("nlm4_nm_lock", rqstp); |
1110 |
|
|
|
1111 |
|
|
/* copy cookie from arg to result. See comment in nlm4_test_1() */ |
1112 |
|
|
result.cookie = arg->cookie; |
1113 |
|
|
result.stat.stat = nlm4_granted; |
1114 |
|
|
return &result; |
1115 |
|
|
} |
1116 |
|
|
|
1117 |
|
|
/* nlm4_free_all ------------------------------------------------------------ */ |
1118 |
|
|
/* |
1119 |
|
|
* Purpose: Release all locks held by a named client |
1120 |
|
|
* Returns: Nothing |
1121 |
|
|
* Notes: Potential denial of service security problem here - the |
1122 |
|
|
* locks to be released are specified by a host name, independent |
1123 |
|
|
* of the address from which the request has arrived. |
1124 |
|
|
* Should probably be rejected if the named host has been |
1125 |
|
|
* using monitored locks. |
1126 |
|
|
*/ |
1127 |
|
|
void * |
1128 |
|
|
/*ARGSUSED*/ |
1129 |
|
|
nlm4_free_all_4_svc(nlm_notify *arg, struct svc_req *rqstp) |
1130 |
|
|
{ |
1131 |
|
|
static char dummy; |
1132 |
|
|
|
1133 |
|
|
if (debug_level) |
1134 |
|
|
log_from_addr("nlm4_free_all", rqstp); |
1135 |
|
|
return &dummy; |
1136 |
|
|
} |
1137 |
|
|
|
1138 |
|
|
/* nlm_sm_notify --------------------------------------------------------- */ |
1139 |
|
|
/* |
1140 |
|
|
* Purpose: called by rpc.statd when a monitored host state changes. |
1141 |
|
|
* Returns: Nothing |
1142 |
|
|
*/ |
1143 |
|
|
void * |
1144 |
|
|
/*ARGSUSED*/ |
1145 |
|
|
nlm_sm_notify_0_svc(struct nlm_sm_status *arg, struct svc_req *rqstp) |
1146 |
|
|
{ |
1147 |
|
|
static char dummy; |
1148 |
|
|
notify(arg->mon_name, arg->state); |
1149 |
|
|
return &dummy; |
1150 |
|
|
} |