source: vendor/current/source3/lib/g_lock.c

Last change on this file was 988, checked in by Silvan Scherrer, 9 years ago

Samba Server: update vendor to version 4.4.3

File size: 13.5 KB
Line 
1/*
2 Unix SMB/CIFS implementation.
3 global locks based on dbwrap and messaging
4 Copyright (C) 2009 by Volker Lendecke
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
18*/
19
20#include "includes.h"
21#include "system/filesys.h"
22#include "dbwrap/dbwrap.h"
23#include "dbwrap/dbwrap_open.h"
24#include "dbwrap/dbwrap_watch.h"
25#include "g_lock.h"
26#include "util_tdb.h"
27#include "ctdbd_conn.h"
28#include "../lib/util/select.h"
29#include "../lib/util/tevent_ntstatus.h"
30#include "system/select.h"
31#include "messages.h"
32#include "serverid.h"
33
34struct g_lock_ctx {
35 struct db_context *db;
36 struct messaging_context *msg;
37};
38
39/*
40 * The "g_lock.tdb" file contains records, indexed by the 0-terminated
41 * lockname. The record contains an array of "struct g_lock_rec"
42 * structures.
43 */
44
45struct g_lock_rec {
46 enum g_lock_type lock_type;
47 struct server_id pid;
48};
49
50struct g_lock_ctx *g_lock_ctx_init(TALLOC_CTX *mem_ctx,
51 struct messaging_context *msg)
52{
53 struct g_lock_ctx *result;
54 char *db_path;
55
56 result = talloc(mem_ctx, struct g_lock_ctx);
57 if (result == NULL) {
58 return NULL;
59 }
60 result->msg = msg;
61
62 db_path = lock_path("g_lock.tdb");
63 if (db_path == NULL) {
64 TALLOC_FREE(result);
65 return NULL;
66 }
67
68 result->db = db_open(result, db_path, 0,
69 TDB_CLEAR_IF_FIRST|TDB_INCOMPATIBLE_HASH,
70 O_RDWR|O_CREAT, 0600,
71 DBWRAP_LOCK_ORDER_2,
72 DBWRAP_FLAG_NONE);
73 TALLOC_FREE(db_path);
74 if (result->db == NULL) {
75 DEBUG(1, ("g_lock_init: Could not open g_lock.tdb\n"));
76 TALLOC_FREE(result);
77 return NULL;
78 }
79 dbwrap_watch_db(result->db, msg);
80 return result;
81}
82
83static bool g_lock_conflicts(enum g_lock_type l1, enum g_lock_type l2)
84{
85 /*
86 * Only tested write locks so far. Very likely this routine
87 * needs to be fixed for read locks....
88 */
89 if ((l1 == G_LOCK_READ) && (l2 == G_LOCK_READ)) {
90 return false;
91 }
92 return true;
93}
94
95static bool g_lock_parse(TALLOC_CTX *mem_ctx, TDB_DATA data,
96 unsigned *pnum_locks, struct g_lock_rec **plocks)
97{
98 unsigned num_locks;
99 struct g_lock_rec *locks;
100
101 if ((data.dsize % sizeof(struct g_lock_rec)) != 0) {
102 DEBUG(1, ("invalid lock record length %d\n", (int)data.dsize));
103 return false;
104 }
105 num_locks = data.dsize / sizeof(struct g_lock_rec);
106 locks = talloc_memdup(mem_ctx, data.dptr, data.dsize);
107 if (locks == NULL) {
108 DEBUG(1, ("talloc_memdup failed\n"));
109 return false;
110 }
111 *plocks = locks;
112 *pnum_locks = num_locks;
113 return true;
114}
115
116static NTSTATUS g_lock_trylock(struct db_record *rec, struct server_id self,
117 enum g_lock_type type)
118{
119 TDB_DATA data;
120 unsigned i, num_locks;
121 struct g_lock_rec *locks, *tmp;
122 NTSTATUS status;
123 bool modified = false;
124
125 data = dbwrap_record_get_value(rec);
126
127 if (!g_lock_parse(talloc_tos(), data, &num_locks, &locks)) {
128 return NT_STATUS_INTERNAL_ERROR;
129 }
130
131 for (i=0; i<num_locks; i++) {
132 if (serverid_equal(&self, &locks[i].pid)) {
133 status = NT_STATUS_INTERNAL_ERROR;
134 goto done;
135 }
136 if (g_lock_conflicts(type, locks[i].lock_type)) {
137 struct server_id pid = locks[i].pid;
138
139 /*
140 * As the serverid_exists might recurse into
141 * the g_lock code, we use
142 * SERVERID_UNIQUE_ID_NOT_TO_VERIFY to avoid the loop
143 */
144 pid.unique_id = SERVERID_UNIQUE_ID_NOT_TO_VERIFY;
145
146 if (serverid_exists(&pid)) {
147 status = NT_STATUS_LOCK_NOT_GRANTED;
148 goto done;
149 }
150
151 /*
152 * Delete stale conflicting entry
153 */
154 locks[i] = locks[num_locks-1];
155 num_locks -= 1;
156 modified = true;
157 }
158 }
159
160 tmp = talloc_realloc(talloc_tos(), locks, struct g_lock_rec,
161 num_locks+1);
162 if (tmp == NULL) {
163 status = NT_STATUS_NO_MEMORY;
164 goto done;
165 }
166 locks = tmp;
167
168 ZERO_STRUCT(locks[num_locks]);
169 locks[num_locks].pid = self;
170 locks[num_locks].lock_type = type;
171 num_locks += 1;
172 modified = true;
173
174 status = NT_STATUS_OK;
175done:
176 if (modified) {
177 NTSTATUS store_status;
178
179 data = make_tdb_data((uint8_t *)locks, num_locks * sizeof(*locks));
180 store_status = dbwrap_record_store(rec, data, 0);
181 if (!NT_STATUS_IS_OK(store_status)) {
182 DEBUG(1, ("rec->store failed: %s\n",
183 nt_errstr(store_status)));
184 status = store_status;
185 }
186 }
187 TALLOC_FREE(locks);
188 return status;
189}
190
191struct g_lock_lock_state {
192 struct tevent_context *ev;
193 struct g_lock_ctx *ctx;
194 const char *name;
195 enum g_lock_type type;
196};
197
198static void g_lock_lock_retry(struct tevent_req *subreq);
199
200struct tevent_req *g_lock_lock_send(TALLOC_CTX *mem_ctx,
201 struct tevent_context *ev,
202 struct g_lock_ctx *ctx,
203 const char *name,
204 enum g_lock_type type)
205{
206 struct tevent_req *req, *subreq;
207 struct g_lock_lock_state *state;
208 struct db_record *rec;
209 struct server_id self;
210 NTSTATUS status;
211
212 req = tevent_req_create(mem_ctx, &state, struct g_lock_lock_state);
213 if (req == NULL) {
214 return NULL;
215 }
216 state->ev = ev;
217 state->ctx = ctx;
218 state->name = name;
219 state->type = type;
220
221 rec = dbwrap_fetch_locked(ctx->db, talloc_tos(),
222 string_term_tdb_data(state->name));
223 if (rec == NULL) {
224 DEBUG(10, ("fetch_locked(\"%s\") failed\n", name));
225 tevent_req_nterror(req, NT_STATUS_LOCK_NOT_GRANTED);
226 return tevent_req_post(req, ev);
227 }
228
229 self = messaging_server_id(state->ctx->msg);
230
231 status = g_lock_trylock(rec, self, state->type);
232 if (NT_STATUS_IS_OK(status)) {
233 TALLOC_FREE(rec);
234 tevent_req_done(req);
235 return tevent_req_post(req, ev);
236 }
237 if (!NT_STATUS_EQUAL(status, NT_STATUS_LOCK_NOT_GRANTED)) {
238 TALLOC_FREE(rec);
239 tevent_req_nterror(req, status);
240 return tevent_req_post(req, ev);
241 }
242 subreq = dbwrap_record_watch_send(state, state->ev, rec,
243 state->ctx->msg);
244 TALLOC_FREE(rec);
245 if (tevent_req_nomem(subreq, req)) {
246 return tevent_req_post(req, ev);
247 }
248 if (!tevent_req_set_endtime(
249 subreq, state->ev,
250 timeval_current_ofs(5 + sys_random() % 5, 0))) {
251 tevent_req_oom(req);
252 return tevent_req_post(req, ev);
253 }
254 tevent_req_set_callback(subreq, g_lock_lock_retry, req);
255 return req;
256}
257
258static void g_lock_lock_retry(struct tevent_req *subreq)
259{
260 struct tevent_req *req = tevent_req_callback_data(
261 subreq, struct tevent_req);
262 struct g_lock_lock_state *state = tevent_req_data(
263 req, struct g_lock_lock_state);
264 struct server_id self = messaging_server_id(state->ctx->msg);
265 struct db_record *rec;
266 NTSTATUS status;
267
268 status = dbwrap_record_watch_recv(subreq, talloc_tos(), &rec);
269 TALLOC_FREE(subreq);
270
271 if (NT_STATUS_EQUAL(status, NT_STATUS_IO_TIMEOUT)) {
272 rec = dbwrap_fetch_locked(
273 state->ctx->db, talloc_tos(),
274 string_term_tdb_data(state->name));
275 if (rec == NULL) {
276 status = map_nt_error_from_unix(errno);
277 } else {
278 status = NT_STATUS_OK;
279 }
280 }
281
282 if (tevent_req_nterror(req, status)) {
283 return;
284 }
285 status = g_lock_trylock(rec, self, state->type);
286 if (NT_STATUS_IS_OK(status)) {
287 TALLOC_FREE(rec);
288 tevent_req_done(req);
289 return;
290 }
291 if (!NT_STATUS_EQUAL(status, NT_STATUS_LOCK_NOT_GRANTED)) {
292 TALLOC_FREE(rec);
293 tevent_req_nterror(req, status);
294 return;
295 }
296 subreq = dbwrap_record_watch_send(state, state->ev, rec,
297 state->ctx->msg);
298 TALLOC_FREE(rec);
299 if (tevent_req_nomem(subreq, req)) {
300 return;
301 }
302 if (!tevent_req_set_endtime(
303 subreq, state->ev,
304 timeval_current_ofs(5 + sys_random() % 5, 0))) {
305 tevent_req_oom(req);
306 return;
307 }
308 tevent_req_set_callback(subreq, g_lock_lock_retry, req);
309 return;
310
311}
312
313NTSTATUS g_lock_lock_recv(struct tevent_req *req)
314{
315 return tevent_req_simple_recv_ntstatus(req);
316}
317
318NTSTATUS g_lock_lock(struct g_lock_ctx *ctx, const char *name,
319 enum g_lock_type type, struct timeval timeout)
320{
321 TALLOC_CTX *frame = talloc_stackframe();
322 struct tevent_context *ev;
323 struct tevent_req *req;
324 struct timeval end;
325 NTSTATUS status = NT_STATUS_NO_MEMORY;
326
327 ev = samba_tevent_context_init(frame);
328 if (ev == NULL) {
329 goto fail;
330 }
331 req = g_lock_lock_send(frame, ev, ctx, name, type);
332 if (req == NULL) {
333 goto fail;
334 }
335 end = timeval_current_ofs(timeout.tv_sec, timeout.tv_usec);
336 if (!tevent_req_set_endtime(req, ev, end)) {
337 goto fail;
338 }
339 if (!tevent_req_poll_ntstatus(req, ev, &status)) {
340 goto fail;
341 }
342 status = g_lock_lock_recv(req);
343 fail:
344 TALLOC_FREE(frame);
345 return status;
346}
347
348NTSTATUS g_lock_unlock(struct g_lock_ctx *ctx, const char *name)
349{
350 struct server_id self = messaging_server_id(ctx->msg);
351 struct db_record *rec = NULL;
352 struct g_lock_rec *locks = NULL;
353 unsigned i, num_locks;
354 NTSTATUS status;
355 TDB_DATA value;
356
357 rec = dbwrap_fetch_locked(ctx->db, talloc_tos(),
358 string_term_tdb_data(name));
359 if (rec == NULL) {
360 DEBUG(10, ("fetch_locked(\"%s\") failed\n", name));
361 status = NT_STATUS_INTERNAL_ERROR;
362 goto done;
363 }
364
365 value = dbwrap_record_get_value(rec);
366
367 if (!g_lock_parse(talloc_tos(), value, &num_locks, &locks)) {
368 DEBUG(10, ("g_lock_parse for %s failed\n", name));
369 status = NT_STATUS_FILE_INVALID;
370 goto done;
371 }
372 for (i=0; i<num_locks; i++) {
373 if (serverid_equal(&self, &locks[i].pid)) {
374 break;
375 }
376 }
377 if (i == num_locks) {
378 DEBUG(10, ("g_lock_force_unlock: Lock not found\n"));
379 status = NT_STATUS_NOT_FOUND;
380 goto done;
381 }
382
383 locks[i] = locks[num_locks-1];
384 num_locks -= 1;
385
386 if (num_locks == 0) {
387 status = dbwrap_record_delete(rec);
388 } else {
389 TDB_DATA data;
390 data = make_tdb_data((uint8_t *)locks,
391 sizeof(struct g_lock_rec) * num_locks);
392 status = dbwrap_record_store(rec, data, 0);
393 }
394 if (!NT_STATUS_IS_OK(status)) {
395 DEBUG(1, ("g_lock_force_unlock: Could not store record: %s\n",
396 nt_errstr(status)));
397 goto done;
398 }
399
400 status = NT_STATUS_OK;
401done:
402 TALLOC_FREE(rec);
403 TALLOC_FREE(locks);
404 return status;
405}
406
407struct g_lock_locks_state {
408 int (*fn)(const char *name, void *private_data);
409 void *private_data;
410};
411
412static int g_lock_locks_fn(struct db_record *rec, void *priv)
413{
414 TDB_DATA key;
415 struct g_lock_locks_state *state = (struct g_lock_locks_state *)priv;
416
417 key = dbwrap_record_get_key(rec);
418 if ((key.dsize == 0) || (key.dptr[key.dsize-1] != 0)) {
419 DEBUG(1, ("invalid key in g_lock.tdb, ignoring\n"));
420 return 0;
421 }
422 return state->fn((char *)key.dptr, state->private_data);
423}
424
425int g_lock_locks(struct g_lock_ctx *ctx,
426 int (*fn)(const char *name, void *private_data),
427 void *private_data)
428{
429 struct g_lock_locks_state state;
430 NTSTATUS status;
431 int count;
432
433 state.fn = fn;
434 state.private_data = private_data;
435
436 status = dbwrap_traverse_read(ctx->db, g_lock_locks_fn, &state, &count);
437 if (!NT_STATUS_IS_OK(status)) {
438 return -1;
439 } else {
440 return count;
441 }
442}
443
444NTSTATUS g_lock_dump(struct g_lock_ctx *ctx, const char *name,
445 int (*fn)(struct server_id pid,
446 enum g_lock_type lock_type,
447 void *private_data),
448 void *private_data)
449{
450 TDB_DATA data;
451 unsigned i, num_locks;
452 struct g_lock_rec *locks = NULL;
453 bool ret;
454 NTSTATUS status;
455
456 status = dbwrap_fetch_bystring(ctx->db, talloc_tos(), name, &data);
457 if (!NT_STATUS_IS_OK(status)) {
458 return status;
459 }
460
461 if ((data.dsize == 0) || (data.dptr == NULL)) {
462 return NT_STATUS_OK;
463 }
464
465 ret = g_lock_parse(talloc_tos(), data, &num_locks, &locks);
466
467 TALLOC_FREE(data.dptr);
468
469 if (!ret) {
470 DEBUG(10, ("g_lock_parse for %s failed\n", name));
471 return NT_STATUS_INTERNAL_ERROR;
472 }
473
474 for (i=0; i<num_locks; i++) {
475 if (fn(locks[i].pid, locks[i].lock_type, private_data) != 0) {
476 break;
477 }
478 }
479 TALLOC_FREE(locks);
480 return NT_STATUS_OK;
481}
482
483struct g_lock_get_state {
484 bool found;
485 struct server_id *pid;
486};
487
488static int g_lock_get_fn(struct server_id pid, enum g_lock_type lock_type,
489 void *priv)
490{
491 struct g_lock_get_state *state = (struct g_lock_get_state *)priv;
492 state->found = true;
493 *state->pid = pid;
494 return 1;
495}
496
497NTSTATUS g_lock_get(struct g_lock_ctx *ctx, const char *name,
498 struct server_id *pid)
499{
500 struct g_lock_get_state state;
501 NTSTATUS status;
502
503 state.found = false;
504 state.pid = pid;
505
506 status = g_lock_dump(ctx, name, g_lock_get_fn, &state);
507 if (!NT_STATUS_IS_OK(status)) {
508 return status;
509 }
510 if (!state.found) {
511 return NT_STATUS_NOT_FOUND;
512 }
513 return NT_STATUS_OK;
514}
515
516static bool g_lock_init_all(TALLOC_CTX *mem_ctx,
517 struct tevent_context **pev,
518 struct messaging_context **pmsg,
519 struct g_lock_ctx **pg_ctx)
520{
521 struct tevent_context *ev = NULL;
522 struct messaging_context *msg = NULL;
523 struct g_lock_ctx *g_ctx = NULL;
524
525 ev = samba_tevent_context_init(mem_ctx);
526 if (ev == NULL) {
527 d_fprintf(stderr, "ERROR: could not init event context\n");
528 goto fail;
529 }
530 msg = messaging_init(mem_ctx, ev);
531 if (msg == NULL) {
532 d_fprintf(stderr, "ERROR: could not init messaging context\n");
533 goto fail;
534 }
535 g_ctx = g_lock_ctx_init(mem_ctx, msg);
536 if (g_ctx == NULL) {
537 d_fprintf(stderr, "ERROR: could not init g_lock context\n");
538 goto fail;
539 }
540
541 *pev = ev;
542 *pmsg = msg;
543 *pg_ctx = g_ctx;
544 return true;
545fail:
546 TALLOC_FREE(g_ctx);
547 TALLOC_FREE(msg);
548 TALLOC_FREE(ev);
549 return false;
550}
551
552NTSTATUS g_lock_do(const char *name, enum g_lock_type lock_type,
553 struct timeval timeout,
554 void (*fn)(void *private_data), void *private_data)
555{
556 struct tevent_context *ev = NULL;
557 struct messaging_context *msg = NULL;
558 struct g_lock_ctx *g_ctx = NULL;
559 NTSTATUS status;
560
561 if (!g_lock_init_all(talloc_tos(), &ev, &msg, &g_ctx)) {
562 status = NT_STATUS_ACCESS_DENIED;
563 goto done;
564 }
565
566 status = g_lock_lock(g_ctx, name, lock_type, timeout);
567 if (!NT_STATUS_IS_OK(status)) {
568 goto done;
569 }
570 fn(private_data);
571 g_lock_unlock(g_ctx, name);
572
573done:
574 TALLOC_FREE(g_ctx);
575 TALLOC_FREE(msg);
576 TALLOC_FREE(ev);
577 return status;
578}
Note: See TracBrowser for help on using the repository browser.