lock_driver_lockd.c 22.9 KB
Newer Older
1 2 3
/*
 * lock_driver_lockd.c: A lock driver which locks nothing
 *
4
 * Copyright (C) 2010-2011, 2014 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library;  If not, see
 * <http://www.gnu.org/licenses/>.
 *
 */

#include <config.h>

#include "lock_driver.h"
25
#include "virconf.h"
26
#include "viralloc.h"
27
#include "vircrypto.h"
28
#include "virlog.h"
29
#include "viruuid.h"
30
#include "virfile.h"
31
#include "virerror.h"
32 33 34
#include "rpc/virnetclient.h"
#include "lock_protocol.h"
#include "configmake.h"
35
#include "virstring.h"
36

37 38
#include "lock_driver_lockd.h"

39 40
#define VIR_FROM_THIS VIR_FROM_LOCKING

41 42
VIR_LOG_INIT("locking.lock_driver_lockd");

43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58
typedef struct _virLockManagerLockDaemonPrivate virLockManagerLockDaemonPrivate;
typedef virLockManagerLockDaemonPrivate *virLockManagerLockDaemonPrivatePtr;

typedef struct _virLockManagerLockDaemonResource virLockManagerLockDaemonResource;
typedef virLockManagerLockDaemonResource *virLockManagerLockDaemonResourcePtr;

typedef struct _virLockManagerLockDaemonDriver virLockManagerLockDaemonDriver;
typedef virLockManagerLockDaemonDriver *virLockManagerLockDaemonDriverPtr;

struct _virLockManagerLockDaemonResource {
    char *lockspace;
    char *name;
    unsigned int flags;
};

struct _virLockManagerLockDaemonPrivate {
59 60 61 62
    unsigned char uuid[VIR_UUID_BUFLEN];
    char *name;
    int id;
    pid_t pid;
63 64 65

    size_t nresources;
    virLockManagerLockDaemonResourcePtr resources;
66 67

    bool hasRWDisks;
68 69 70 71 72 73
};


struct _virLockManagerLockDaemonDriver {
    bool autoDiskLease;
    bool requireLeaseForDisks;
74 75

    char *fileLockSpaceDir;
76
    char *lvmLockSpaceDir;
77
    char *scsiLockSpaceDir;
78 79
};

80
static virLockManagerLockDaemonDriverPtr driver;
81 82 83

static int virLockManagerLockDaemonLoadConfig(const char *configFile)
{
J
Ján Tomko 已提交
84
    g_autoptr(virConf) conf = NULL;
85 86 87 88 89 90 91 92 93 94 95 96 97 98

    if (access(configFile, R_OK) == -1) {
        if (errno != ENOENT) {
            virReportSystemError(errno,
                                 _("Unable to access config file %s"),
                                 configFile);
            return -1;
        }
        return 0;
    }

    if (!(conf = virConfReadFile(configFile, 0)))
        return -1;

99
    if (virConfGetValueBool(conf, "auto_disk_leases", &driver->autoDiskLease) < 0)
100
        return -1;
101

102
    if (virConfGetValueString(conf, "file_lockspace_dir", &driver->fileLockSpaceDir) < 0)
103
        return -1;
104

105
    if (virConfGetValueString(conf, "lvm_lockspace_dir", &driver->lvmLockSpaceDir) < 0)
106
        return -1;
107

108
    if (virConfGetValueString(conf, "scsi_lockspace_dir", &driver->scsiLockSpaceDir) < 0)
109
        return -1;
110

111 112
    driver->requireLeaseForDisks = !driver->autoDiskLease;
    if (virConfGetValueBool(conf, "require_lease_for_disks", &driver->requireLeaseForDisks) < 0)
113
        return -1;
114

115
    return 0;
116 117 118 119 120 121 122
}


static char *virLockManagerLockDaemonPath(bool privileged)
{
    char *path;
    if (privileged) {
123
        path = g_strdup(RUNSTATEDIR "/libvirt/virtlockd-sock");
124
    } else {
125
        g_autofree char *rundir = NULL;
126 127 128 129

        if (!(rundir = virGetUserRuntimeDirectory()))
            return NULL;

130
        path = g_strdup_printf("%s/virtlockd-sock", rundir);
131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148
    }
    return path;
}


static int
virLockManagerLockDaemonConnectionRegister(virLockManagerPtr lock,
                                           virNetClientPtr client,
                                           virNetClientProgramPtr program,
                                           int *counter)
{
    virLockManagerLockDaemonPrivatePtr priv = lock->privateData;
    virLockSpaceProtocolRegisterArgs args;
    int rv = -1;

    memset(&args, 0, sizeof(args));

    args.flags = 0;
149 150 151 152
    memcpy(args.owner.uuid, priv->uuid, VIR_UUID_BUFLEN);
    args.owner.name = priv->name;
    args.owner.id = priv->id;
    args.owner.pid = priv->pid;
153 154 155 156 157 158 159 160 161 162 163 164

    if (virNetClientProgramCall(program,
                                client,
                                (*counter)++,
                                VIR_LOCK_SPACE_PROTOCOL_PROC_REGISTER,
                                0, NULL, NULL, NULL,
                                (xdrproc_t)xdr_virLockSpaceProtocolRegisterArgs, (char*)&args,
                                (xdrproc_t)xdr_void, NULL) < 0)
        goto cleanup;

    rv = 0;

165
 cleanup:
166 167 168 169 170
    return rv;
}


static int
J
Ján Tomko 已提交
171
virLockManagerLockDaemonConnectionRestrict(virLockManagerPtr lock G_GNUC_UNUSED,
172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193
                                           virNetClientPtr client,
                                           virNetClientProgramPtr program,
                                           int *counter)
{
    virLockSpaceProtocolRestrictArgs args;
    int rv = -1;

    memset(&args, 0, sizeof(args));

    args.flags = 0;

    if (virNetClientProgramCall(program,
                                client,
                                (*counter)++,
                                VIR_LOCK_SPACE_PROTOCOL_PROC_RESTRICT,
                                0, NULL, NULL, NULL,
                                (xdrproc_t)xdr_virLockSpaceProtocolRestrictArgs, (char*)&args,
                                (xdrproc_t)xdr_void, NULL) < 0)
        goto cleanup;

    rv = 0;

194
 cleanup:
195 196 197 198 199 200 201 202 203
    return rv;
}


static virNetClientPtr virLockManagerLockDaemonConnectionNew(bool privileged,
                                                             virNetClientProgramPtr *prog)
{
    virNetClientPtr client = NULL;
    char *lockdpath;
M
Michal Privoznik 已提交
204
    char *daemonPath = NULL;
205 206 207 208 209 210

    *prog = NULL;

    if (!(lockdpath = virLockManagerLockDaemonPath(privileged)))
        goto error;

211 212 213
    if (!privileged &&
        !(daemonPath = virFileFindResourceFull("virtlockd",
                                               NULL, NULL,
214
                                               abs_top_builddir "/src",
215 216 217
                                               SBINDIR,
                                               "VIRTLOCKD_PATH")))
        goto error;
218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233

    if (!(client = virNetClientNewUNIX(lockdpath,
                                       daemonPath != NULL,
                                       daemonPath)))
        goto error;

    if (!(*prog = virNetClientProgramNew(VIR_LOCK_SPACE_PROTOCOL_PROGRAM,
                                         VIR_LOCK_SPACE_PROTOCOL_PROGRAM_VERSION,
                                         NULL,
                                         0,
                                         NULL)))
        goto error;

    if (virNetClientAddProgram(client, *prog) < 0)
        goto error;

234
    VIR_FREE(daemonPath);
235 236 237 238
    VIR_FREE(lockdpath);

    return client;

239
 error:
240
    VIR_FREE(daemonPath);
241 242 243 244 245 246 247 248 249 250 251 252 253 254 255
    VIR_FREE(lockdpath);
    virNetClientClose(client);
    virObjectUnref(client);
    virObjectUnref(*prog);
    return NULL;
}


static virNetClientPtr
virLockManagerLockDaemonConnect(virLockManagerPtr lock,
                                virNetClientProgramPtr *program,
                                int *counter)
{
    virNetClientPtr client;

256
    if (!(client = virLockManagerLockDaemonConnectionNew(geteuid() == 0, program)))
257 258 259 260 261 262 263 264 265 266
        return NULL;

    if (virLockManagerLockDaemonConnectionRegister(lock,
                                                   client,
                                                   *program,
                                                   counter) < 0)
        goto error;

    return client;

267
 error:
268 269 270 271 272 273
    virNetClientClose(client);
    virObjectUnref(client);
    return NULL;
}


274 275 276 277 278 279 280 281 282 283 284
static int virLockManagerLockDaemonSetupLockspace(const char *path)
{
    virNetClientPtr client;
    virNetClientProgramPtr program = NULL;
    virLockSpaceProtocolCreateLockSpaceArgs args;
    int rv = -1;
    int counter = 0;

    memset(&args, 0, sizeof(args));
    args.path = (char*)path;

285
    if (!(client = virLockManagerLockDaemonConnectionNew(geteuid() == 0, &program)))
286 287 288 289 290 291 292 293 294
        return -1;

    if (virNetClientProgramCall(program,
                                client,
                                counter++,
                                VIR_LOCK_SPACE_PROTOCOL_PROC_CREATE_LOCKSPACE,
                                0, NULL, NULL, NULL,
                                (xdrproc_t)xdr_virLockSpaceProtocolCreateLockSpaceArgs, (char*)&args,
                                (xdrproc_t)xdr_void, NULL) < 0) {
295
        if (virGetLastErrorCode() == VIR_ERR_OPERATION_INVALID) {
296 297 298 299 300 301 302 303 304 305
            /* The lockspace already exists */
            virResetLastError();
            rv = 0;
        } else {
            goto cleanup;
        }
    }

    rv = 0;

306
 cleanup:
307 308 309 310 311 312 313
    virObjectUnref(program);
    virNetClientClose(client);
    virObjectUnref(client);
    return rv;
}


314 315 316 317 318 319
static int virLockManagerLockDaemonDeinit(void);

static int virLockManagerLockDaemonInit(unsigned int version,
                                        const char *configFile,
                                        unsigned int flags)
{
320
    VIR_DEBUG("version=%u configFile=%s flags=0x%x", version, NULLSTR(configFile), flags);
321 322 323 324 325 326

    virCheckFlags(0, -1);

    if (driver)
        return 0;

327
    if (VIR_ALLOC(driver) < 0)
328 329 330 331 332
        return -1;

    driver->requireLeaseForDisks = true;
    driver->autoDiskLease = true;

333
    if (virLockManagerLockDaemonLoadConfig(configFile) < 0)
334 335
        goto error;

336 337 338 339 340
    if (driver->autoDiskLease) {
        if (driver->fileLockSpaceDir &&
            virLockManagerLockDaemonSetupLockspace(driver->fileLockSpaceDir) < 0)
            goto error;

341 342 343
        if (driver->lvmLockSpaceDir &&
            virLockManagerLockDaemonSetupLockspace(driver->lvmLockSpaceDir) < 0)
            goto error;
344 345 346 347

        if (driver->scsiLockSpaceDir &&
            virLockManagerLockDaemonSetupLockspace(driver->scsiLockSpaceDir) < 0)
            goto error;
348
    }
349

350 351
    return 0;

352
 error:
353 354 355 356 357 358 359 360 361
    virLockManagerLockDaemonDeinit();
    return -1;
}

static int virLockManagerLockDaemonDeinit(void)
{
    if (!driver)
        return 0;

362 363
    VIR_FREE(driver->scsiLockSpaceDir);
    VIR_FREE(driver->lvmLockSpaceDir);
364
    VIR_FREE(driver->fileLockSpaceDir);
365 366 367 368 369
    VIR_FREE(driver);

    return 0;
}

370 371
static void
virLockManagerLockDaemonPrivateFree(virLockManagerLockDaemonPrivatePtr priv)
372 373 374 375 376 377
{
    size_t i;

    if (!priv)
        return;

378
    for (i = 0; i < priv->nresources; i++) {
379 380 381 382 383
        VIR_FREE(priv->resources[i].lockspace);
        VIR_FREE(priv->resources[i].name);
    }
    VIR_FREE(priv->resources);

384
    VIR_FREE(priv->name);
385 386 387
    VIR_FREE(priv);
}

388 389 390 391 392 393 394 395 396
static void virLockManagerLockDaemonFree(virLockManagerPtr lock)
{
    if (!lock)
        return;

    virLockManagerLockDaemonPrivateFree(lock->privateData);
    lock->privateData = NULL;
}

397 398 399 400 401 402 403

static int virLockManagerLockDaemonNew(virLockManagerPtr lock,
                                       unsigned int type,
                                       size_t nparams,
                                       virLockManagerParamPtr params,
                                       unsigned int flags)
{
404
    virLockManagerLockDaemonPrivatePtr priv = NULL;
405
    size_t i;
406
    int ret = -1;
407

408
    virCheckFlags(VIR_LOCK_MANAGER_NEW_STARTED, -1);
409

410
    if (VIR_ALLOC(priv) < 0)
411 412
        return -1;

413
    switch (type) {
414
    case VIR_LOCK_MANAGER_OBJECT_TYPE_DOMAIN:
415
        for (i = 0; i < nparams; i++) {
416
            if (STREQ(params[i].key, "uuid")) {
417
                memcpy(priv->uuid, params[i].value.uuid, VIR_UUID_BUFLEN);
418
            } else if (STREQ(params[i].key, "name")) {
419
                priv->name = g_strdup(params[i].value.str);
420
            } else if (STREQ(params[i].key, "id")) {
421
                priv->id = params[i].value.iv;
422
            } else if (STREQ(params[i].key, "pid")) {
423
                priv->pid = params[i].value.iv;
424 425
            } else if (STREQ(params[i].key, "uri")) {
                /* ignored */
426 427
            } else {
                virReportError(VIR_ERR_INTERNAL_ERROR,
428
                               _("Unexpected parameter %s for object"),
429
                               params[i].key);
430
                goto cleanup;
431 432
            }
        }
433
        if (priv->id == 0) {
434 435
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Missing ID parameter for domain object"));
436
            goto cleanup;
437
        }
438
        if (priv->pid == 0)
J
Jim Fehlig 已提交
439
            VIR_DEBUG("Missing PID parameter for domain object");
440
        if (!priv->name) {
441 442
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Missing name parameter for domain object"));
443
            goto cleanup;
444
        }
445
        if (!virUUIDIsValid(priv->uuid)) {
446 447
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Missing UUID parameter for domain object"));
448
            goto cleanup;
449 450 451 452 453 454 455
        }
        break;

    default:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Unknown lock manager object type %d"),
                       type);
456
        goto cleanup;
457 458
    }

459
    lock->privateData = g_steal_pointer(&priv);
460 461 462 463
    ret = 0;
 cleanup:
    virLockManagerLockDaemonPrivateFree(priv);
    return ret;
464 465 466 467 468 469 470 471 472 473 474
}


static int virLockManagerLockDaemonAddResource(virLockManagerPtr lock,
                                               unsigned int type,
                                               const char *name,
                                               size_t nparams,
                                               virLockManagerParamPtr params,
                                               unsigned int flags)
{
    virLockManagerLockDaemonPrivatePtr priv = lock->privateData;
475
    char *newName = NULL;
476
    char *newLockspace = NULL;
477
    bool autoCreate = false;
478
    int ret = -1;
479 480 481 482 483 484 485

    virCheckFlags(VIR_LOCK_MANAGER_RESOURCE_READONLY |
                  VIR_LOCK_MANAGER_RESOURCE_SHARED, -1);

    if (flags & VIR_LOCK_MANAGER_RESOURCE_READONLY)
        return 0;

486 487 488 489 490 491 492 493 494 495 496 497 498
    switch (type) {
    case VIR_LOCK_MANAGER_RESOURCE_TYPE_DISK:
        if (params || nparams) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unexpected parameters for disk resource"));
            goto cleanup;
        }
        if (!driver->autoDiskLease) {
            if (!(flags & (VIR_LOCK_MANAGER_RESOURCE_SHARED |
                           VIR_LOCK_MANAGER_RESOURCE_READONLY)))
                priv->hasRWDisks = true;
            return 0;
        }
499

500 501 502 503 504 505 506
        /* XXX we should somehow pass in TYPE=BLOCK info
         * from the domain_lock code, instead of assuming /dev
         */
        if (STRPREFIX(name, "/dev") &&
            driver->lvmLockSpaceDir) {
            VIR_DEBUG("Trying to find an LVM UUID for %s", name);
            if (virStorageFileGetLVMKey(name, &newName) < 0)
507
                goto cleanup;
508

509 510
            if (newName) {
                VIR_DEBUG("Got an LVM UUID %s for %s", newName, name);
511
                newLockspace = g_strdup(driver->lvmLockSpaceDir);
512 513
                autoCreate = true;
                break;
514
            }
515 516 517
            virResetLastError();
            /* Fallback to generic non-block code */
        }
518

519 520 521
        if (STRPREFIX(name, "/dev") &&
            driver->scsiLockSpaceDir) {
            VIR_DEBUG("Trying to find an SCSI ID for %s", name);
522
            if (virStorageFileGetSCSIKey(name, &newName, false) < 0)
523
                goto cleanup;
524

525 526
            if (newName) {
                VIR_DEBUG("Got an SCSI ID %s for %s", newName, name);
527
                newLockspace = g_strdup(driver->scsiLockSpaceDir);
528
                autoCreate = true;
529
                break;
530
            }
531 532 533
            virResetLastError();
            /* Fallback to generic non-block code */
        }
534

535
        if (driver->fileLockSpaceDir) {
536
            newLockspace = g_strdup(driver->fileLockSpaceDir);
537 538 539 540 541
            if (virCryptoHashString(VIR_CRYPTO_HASH_SHA256, name, &newName) < 0)
                goto cleanup;
            autoCreate = true;
            VIR_DEBUG("Using indirect lease %s for %s", newName, name);
        } else {
542 543
            newLockspace = g_strdup("");
            newName = g_strdup(name);
544 545
            VIR_DEBUG("Using direct lease for %s", name);
        }
546

547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572
        break;
    case VIR_LOCK_MANAGER_RESOURCE_TYPE_LEASE: {
        size_t i;
        char *path = NULL;
        char *lockspace = NULL;
        for (i = 0; i < nparams; i++) {
            if (STREQ(params[i].key, "offset")) {
                if (params[i].value.ul != 0) {
                    virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                                   _("Offset must be zero for this lock manager"));
                    goto cleanup;
                }
            } else if (STREQ(params[i].key, "lockspace")) {
                lockspace = params[i].value.str;
            } else if (STREQ(params[i].key, "path")) {
                path = params[i].value.str;
            } else {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("Unexpected parameter %s for lease resource"),
                               params[i].key);
                goto cleanup;
            }
        }
        if (!path || !lockspace) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Missing path or lockspace for lease resource"));
573
            goto cleanup;
574
        }
575
        newLockspace = g_strdup_printf("%s/%s", path, lockspace);
576
        newName = g_strdup(name);
577

578
    }   break;
579 580 581 582
    default:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Unknown lock manager object type %d"),
                       type);
583
        goto cleanup;
584 585 586
    }

    if (VIR_EXPAND_N(priv->resources, priv->nresources, 1) < 0)
587
        goto cleanup;
588

589 590
    priv->resources[priv->nresources-1].lockspace = g_steal_pointer(&newLockspace);
    priv->resources[priv->nresources-1].name = g_steal_pointer(&newName);
591 592 593 594 595 596 597 598

    if (flags & VIR_LOCK_MANAGER_RESOURCE_SHARED)
        priv->resources[priv->nresources-1].flags |=
            VIR_LOCK_SPACE_PROTOCOL_ACQUIRE_RESOURCE_SHARED;

    if (autoCreate)
        priv->resources[priv->nresources-1].flags |=
            VIR_LOCK_SPACE_PROTOCOL_ACQUIRE_RESOURCE_AUTOCREATE;
599

600 601
    ret = 0;
 cleanup:
602
    VIR_FREE(newLockspace);
603
    VIR_FREE(newName);
604
    return ret;
605 606 607 608
}


static int virLockManagerLockDaemonAcquire(virLockManagerPtr lock,
J
Ján Tomko 已提交
609
                                           const char *state G_GNUC_UNUSED,
610
                                           unsigned int flags,
J
Ján Tomko 已提交
611
                                           virDomainLockFailureAction action G_GNUC_UNUSED,
612 613 614 615 616 617 618 619 620
                                           int *fd)
{
    virNetClientPtr client = NULL;
    virNetClientProgramPtr program = NULL;
    int counter = 0;
    int rv = -1;
    virLockManagerLockDaemonPrivatePtr priv = lock->privateData;

    virCheckFlags(VIR_LOCK_MANAGER_ACQUIRE_REGISTER_ONLY |
621
                  VIR_LOCK_MANAGER_ACQUIRE_RESTRICT, -1);
622

623
    if (priv->nresources == 0 &&
624
        priv->hasRWDisks &&
625 626 627 628 629 630 631 632 633 634 635 636 637 638
        driver->requireLeaseForDisks) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Read/write, exclusive access, disks were present, but no leases specified"));
        return -1;
    }

    if (!(client = virLockManagerLockDaemonConnect(lock, &program, &counter)))
        goto cleanup;

    if (fd &&
        (*fd = virNetClientDupFD(client, false)) < 0)
        goto cleanup;

    if (!(flags & VIR_LOCK_MANAGER_ACQUIRE_REGISTER_ONLY)) {
639
        size_t i;
640
        for (i = 0; i < priv->nresources; i++) {
641 642 643 644
            virLockSpaceProtocolAcquireResourceArgs args;

            memset(&args, 0, sizeof(args));

645
            args.path = priv->resources[i].lockspace;
646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665
            args.name = priv->resources[i].name;
            args.flags = priv->resources[i].flags;

            if (virNetClientProgramCall(program,
                                        client,
                                        counter++,
                                        VIR_LOCK_SPACE_PROTOCOL_PROC_ACQUIRE_RESOURCE,
                                        0, NULL, NULL, NULL,
                                        (xdrproc_t)xdr_virLockSpaceProtocolAcquireResourceArgs, &args,
                                        (xdrproc_t)xdr_void, NULL) < 0)
                goto cleanup;
        }
    }

    if ((flags & VIR_LOCK_MANAGER_ACQUIRE_RESTRICT) &&
        virLockManagerLockDaemonConnectionRestrict(lock, client, program, &counter) < 0)
        goto cleanup;

    rv = 0;

666
 cleanup:
667 668
    if (rv != 0 && fd)
        VIR_FORCE_CLOSE(*fd);
669 670 671 672 673 674 675 676 677 678 679 680 681 682 683
    virNetClientClose(client);
    virObjectUnref(client);
    virObjectUnref(program);

    return rv;
}

static int virLockManagerLockDaemonRelease(virLockManagerPtr lock,
                                           char **state,
                                           unsigned int flags)
{
    virNetClientPtr client = NULL;
    virNetClientProgramPtr program = NULL;
    int counter = 0;
    int rv = -1;
684 685
    size_t i;
    virLockManagerLockDaemonPrivatePtr priv = lock->privateData;
686

687
    virCheckFlags(0, -1);
688 689 690 691 692 693 694

    if (state)
        *state = NULL;

    if (!(client = virLockManagerLockDaemonConnect(lock, &program, &counter)))
        goto cleanup;

695
    for (i = 0; i < priv->nresources; i++) {
696 697 698
        virLockSpaceProtocolReleaseResourceArgs args;

        memset(&args, 0, sizeof(args));
699

700 701 702 703 704 705 706
        if (priv->resources[i].lockspace)
            args.path = priv->resources[i].lockspace;
        args.name = priv->resources[i].name;
        args.flags = priv->resources[i].flags;

        args.flags &=
            ~(VIR_LOCK_SPACE_PROTOCOL_ACQUIRE_RESOURCE_SHARED |
707
              VIR_LOCK_SPACE_PROTOCOL_ACQUIRE_RESOURCE_AUTOCREATE);
708 709 710 711 712 713 714 715

        if (virNetClientProgramCall(program,
                                    client,
                                    counter++,
                                    VIR_LOCK_SPACE_PROTOCOL_PROC_RELEASE_RESOURCE,
                                    0, NULL, NULL, NULL,
                                    (xdrproc_t)xdr_virLockSpaceProtocolReleaseResourceArgs, &args,
                                    (xdrproc_t)xdr_void, NULL) < 0)
716 717
            goto cleanup;
    }
718 719 720

    rv = 0;

721
 cleanup:
722 723 724 725 726 727 728 729
    virNetClientClose(client);
    virObjectUnref(client);
    virObjectUnref(program);

    return rv;
}


J
Ján Tomko 已提交
730
static int virLockManagerLockDaemonInquire(virLockManagerPtr lock G_GNUC_UNUSED,
731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759
                                           char **state,
                                           unsigned int flags)
{
    virCheckFlags(0, -1);

    if (state)
        *state = NULL;

    return 0;
}

virLockDriver virLockDriverImpl =
{
    .version = VIR_LOCK_MANAGER_VERSION,
    .flags = 0,

    .drvInit = virLockManagerLockDaemonInit,
    .drvDeinit = virLockManagerLockDaemonDeinit,

    .drvNew = virLockManagerLockDaemonNew,
    .drvFree = virLockManagerLockDaemonFree,

    .drvAddResource = virLockManagerLockDaemonAddResource,

    .drvAcquire = virLockManagerLockDaemonAcquire,
    .drvRelease = virLockManagerLockDaemonRelease,

    .drvInquire = virLockManagerLockDaemonInquire,
};