]> git.saurik.com Git - apple/network_cmds.git/blobdiff - rpc_lockd.tproj/lockd.c
network_cmds-176.tar.gz
[apple/network_cmds.git] / rpc_lockd.tproj / lockd.c
diff --git a/rpc_lockd.tproj/lockd.c b/rpc_lockd.tproj/lockd.c
new file mode 100644 (file)
index 0000000..f8e46db
--- /dev/null
@@ -0,0 +1,371 @@
+/*     $NetBSD: lockd.c,v 1.7 2000/08/12 18:08:44 thorpej Exp $        */
+/*     $FreeBSD: src/usr.sbin/rpc.lockd/lockd.c,v 1.13 2002/04/11 07:19:30 alfred Exp $ */
+
+/*
+ * Copyright (c) 1995
+ *     A.R. Gordon (andrew.gordon@net-tel.co.uk).  All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ *    must display the following acknowledgement:
+ *     This product includes software developed for the FreeBSD project
+ * 4. Neither the name of the author nor the names of any co-contributors
+ *    may be used to endorse or promote products derived from this software
+ *    without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY ANDREW GORDON AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ */
+
+#include <sys/cdefs.h>
+#ifndef lint
+__RCSID("$NetBSD: lockd.c,v 1.7 2000/08/12 18:08:44 thorpej Exp $");
+#endif
+
+/*
+ * main() function for NFS lock daemon.  Most of the code in this
+ * file was generated by running rpcgen /usr/include/rpcsvc/nlm_prot.x.
+ *
+ * The actual program logic is in the file lock_proc.c
+ */
+
+#include <sys/types.h>
+#include <sys/socket.h>
+
+#include <err.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <errno.h>
+#include <syslog.h>
+#include <signal.h>
+#include <string.h>
+#include <unistd.h>
+#include <fcntl.h>
+#include <sys/stat.h>
+
+#include <rpc/rpc.h>
+#include <rpc/pmap_clnt.h>
+#include <rpcsvc/sm_inter.h>
+
+#include "lockd.h"
+#include <rpcsvc/nlm_prot.h>
+
+int            debug_level = 0;        /* 0 = no debugging syslog() calls */
+int            _rpcsvcdirty = 0;
+int            waitkern = 0;           /* 1 = wait for kernel to say start */
+
+const char *pid_file = NULL;
+
+int grace_expired;
+int nsm_state;
+pid_t client_pid = -1;
+struct mon mon_host;
+
+void   init_nsm(void);
+void   nlm_prog_0(struct svc_req *, SVCXPRT *);
+void   nlm_prog_1(struct svc_req *, SVCXPRT *);
+void   nlm_prog_3(struct svc_req *, SVCXPRT *);
+void   nlm_prog_4(struct svc_req *, SVCXPRT *);
+void   usage(void);
+
+int claim_pid_file(const char *, int);
+void cleanup_pid_file(void);
+void handle_sig_cleanup(int);
+
+void sigalarm_handler(void);
+
+const char *transports[] = { "udp", "tcp", "udp6", "tcp6" };
+
+int
+main(argc, argv)
+       int argc;
+       char **argv;
+{
+       SVCXPRT *transp;
+       int ch;
+       struct sigaction sigalarm;
+       int grace_period = 30;
+       
+       while ((ch = getopt(argc, argv, "d:g:w")) != (-1)) {
+               switch (ch) {
+               case 'd':
+                       debug_level = atoi(optarg);
+                       if (!debug_level) {
+                               usage();
+                               /* NOTREACHED */
+                       }
+                       break;
+               case 'g':
+                       grace_period = atoi(optarg);
+                       if (!grace_period) {
+                               usage();
+                               /* NOTREACHED */
+                       }
+                       break;
+               case 'w':
+                       waitkern = 1;
+                       break;
+               default:
+               case '?':
+                       usage();
+                       /* NOTREACHED */
+               }
+       }
+       if (geteuid()) { /* This command allowed only to root */
+               fprintf(stderr, "Sorry. You are not superuser\n");
+               exit(1);
+        }
+
+       /*
+        * Note that it is NOT sensible to run this program from inetd - the
+        * protocol assumes that it will run immediately at boot time.
+        */
+       if (debug_level != 99 && daemon(0, 0)) {
+               err(1, "cannot fork");
+               /* NOTREACHED */
+       }
+
+       /* Install signal handler to remove any pid file */
+       signal(SIGINT, handle_sig_cleanup);
+       signal(SIGTERM, handle_sig_cleanup);
+       signal(SIGHUP, handle_sig_cleanup);
+       signal(SIGQUIT, handle_sig_cleanup);
+
+       if (claim_pid_file("/var/run/lockd.pid", 0) < 0)
+               errx(1, "cannot claim pid file");
+
+       if (waitkern) {
+               struct timespec ts;
+               /* wait for kernel to get first lock request */
+               client_kern_wait();
+               /* start statd now, in case it isn't already */
+               system("rpc.statd");
+               /* sleep a little to give statd/portmap a chance to start */
+               /* (better to sleep 100ms than to timeout on portmap calls) */
+               ts.tv_sec = 0;
+               ts.tv_nsec = 100*1000*1000;
+               nanosleep(&ts, NULL);
+       }
+
+       openlog("rpc.lockd", 0, LOG_DAEMON);
+       if (debug_level)
+               syslog(LOG_INFO, "Starting, debug level %d", debug_level);
+       else
+               syslog(LOG_INFO, "Starting");
+
+       (void)pmap_unset(NLM_PROG, NLM_SM);
+       (void)pmap_unset(NLM_PROG, NLM_VERS);
+       (void)pmap_unset(NLM_PROG, NLM_VERSX);
+       (void)pmap_unset(NLM_PROG, NLM_VERS4);
+
+       transp = svcudp_create(RPC_ANYSOCK);
+       if (transp == NULL)
+               errx(1, "cannot create udp service");
+       if (!svc_register(transp, NLM_PROG, NLM_VERS, nlm_prog_1, IPPROTO_UDP))
+               errx(1, "unable to register (NLM_PROG, NLM_VERS, udp)");
+       if (!svc_register(transp, NLM_PROG, NLM_VERSX, nlm_prog_3, IPPROTO_UDP))
+               errx(1, "unable to register (NLM_PROG, NLM_VERSX, udp)");
+       if (!svc_register(transp, NLM_PROG, NLM_VERS4, nlm_prog_4, IPPROTO_UDP))
+               errx(1, "unable to register (NLM_PROG, NLM_VERS4, udp)");
+        
+       transp = svctcp_create(RPC_ANYSOCK, 0, 0);
+       if (transp == NULL)
+               errx(1, "cannot create tcp service");
+       if (!svc_register(transp, NLM_PROG, NLM_VERS, nlm_prog_1, IPPROTO_TCP))
+               errx(1, "unable to register (NLM_PROG, NLM_VERS, tcp)");
+       if (!svc_register(transp, NLM_PROG, NLM_VERSX, nlm_prog_3, IPPROTO_TCP))  
+               errx(1, "unable to register (NLM_PROG, NLM_VERSX, tcp)");
+       if (!svc_register(transp, NLM_PROG, NLM_VERS4, nlm_prog_4, IPPROTO_TCP))   
+               errx(1, "unable to register (NLM_PROG, NLM_VERS4, tcp)");
+
+       sigalarm.sa_handler = (sig_t) sigalarm_handler;
+       sigemptyset(&sigalarm.sa_mask);
+       sigalarm.sa_flags = SA_RESETHAND; /* should only happen once */
+       sigalarm.sa_flags |= SA_RESTART;
+       if (sigaction(SIGALRM, &sigalarm, NULL) != 0) {
+               syslog(LOG_WARNING, "sigaction(SIGALRM) failed: %s",
+                   strerror(errno));
+               exit(1);
+       }
+       grace_expired = 0;
+       alarm(grace_period);
+
+       init_nsm();
+
+       client_pid = client_request();
+
+       svc_run();              /* Should never return */
+       exit(1);
+}
+
+void
+sigalarm_handler(void)
+{
+
+       grace_expired = 1;
+}
+
+void
+usage()
+{
+       errx(1, "usage: rpc.lockd [-d <debuglevel>] [-g <grace period>] [-w]");
+}
+
+/*
+ * init_nsm --
+ *     Reset the NSM state-of-the-world and acquire its state.
+ */
+void
+init_nsm(void)
+{
+       enum clnt_stat ret;
+       my_id id;
+       sm_stat stat;
+       char name[] = "NFS NLM";
+       char localhost[] = "localhost";
+       int attempt = 0;
+
+       /*
+        * !!!
+        * The my_id structure isn't used by the SM_UNMON_ALL call, as far
+        * as I know.  Leave it empty for now.
+        */
+       memset(&id, 0, sizeof(id));
+       id.my_name = name;
+
+       /*
+        * !!!
+        * The statd program must already be registered when lockd runs.
+        * If we have a problem contacting statd, pause and try again a
+        * number of times in case statd is just slow in coming up.
+        */
+       do {
+               ret = callrpc("localhost", SM_PROG, SM_VERS, SM_UNMON_ALL,
+                   xdr_my_id, &id, xdr_sm_stat, &stat);
+               if (ret) {
+                       warnx("%lu %s", SM_PROG, clnt_sperrno(ret));
+                       if (++attempt < 20) {
+                               sleep(attempt);
+                               continue;
+                       }
+               }
+               break;
+       } while (1);
+
+       if (ret != 0) {
+               errx(1, "%lu %s", SM_PROG, clnt_sperrno(ret));
+       }
+
+       nsm_state = stat.state;
+
+       /* setup constant data for SM_MON calls */
+       mon_host.mon_id.my_id.my_name = localhost;
+       mon_host.mon_id.my_id.my_prog = NLM_PROG;
+       mon_host.mon_id.my_id.my_vers = NLM_SM;
+       mon_host.mon_id.my_id.my_proc = NLM_SM_NOTIFY;  /* bsdi addition */
+}
+
+/*
+ * claim_pid_file
+ *
+ * Purpose:    take ownership of and store pid in given pid_file
+ * Returns:    0 on success or -1 on failure
+ * Notes:      force parameter requests that current owner (if any) of
+ *             pid file be terminated.
+ */
+int
+claim_pid_file(const char *name, int force)
+{
+       int pidfd, rv, retried = 0;
+       FILE *pidfile;
+
+try_again:
+
+       /* attempt exclusive open of pid file */
+       pidfd = open(name, O_EXCL|O_CREAT|O_WRONLY,
+                    S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH);
+       if (pidfd < 0) {
+               char buf[16];
+               pid_t pid;
+               if (retried)
+                       return -1;
+               bzero(buf, 16);
+               retried = 1;
+               /* pid file busy, check validity */
+               pidfd = open(name, O_RDONLY);
+               if (pidfd < 0)
+                       goto try_again;
+               rv = read(pidfd, buf, 15);
+               close(pidfd);
+               if (rv <= 0)
+                       goto try_again;
+               pid = atoi(buf);
+               if (pid <= 0)
+                       goto try_again;
+               rv = kill(pid, force ? SIGKILL : 0);
+               /* if can't signal, assume stale pid file */
+               if ((rv < 0) || force)
+                       unlink(name);
+               goto try_again;
+       }
+       pid_file = name;
+       atexit(cleanup_pid_file);
+
+       pidfile = fdopen(pidfd, "w");
+       if (pidfile) {
+               fchmod(pidfd, S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH);
+               fprintf(pidfile, "%d\n", getpid());
+               fclose(pidfile);
+       } else
+               perror("fdopen");
+       close(pidfd);
+       return 0;
+}
+
+/*
+ * cleanup_pid_file
+ *
+ * Purpose:    delete any pid_file that has been claimed
+ * Returns:    Nothing
+ */
+void
+cleanup_pid_file(void)
+{
+       if (pid_file) {
+               unlink(pid_file);
+               pid_file = NULL;
+       }
+}
+
+/*
+ * handle_sig_cleanup
+ *
+ * Purpose:    on signal, kill client child and do pid file cleanup
+ * Returns:    Nothing
+ */
+void
+handle_sig_cleanup(int sig __unused)
+{
+       if (client_pid != -1)
+               kill(client_pid, SIGTERM);
+       cleanup_pid_file();
+       exit(1);
+}
+