2 * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
3 * Authors: Doug Rabson <dfr@rabson.org>
4 * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * Copyright (c) 2012, 2016 by Delphix. All rights reserved.
30 * Copyright 2013 Nexenta Systems, Inc. All rights reserved.
31 * Copyright 2014 Joyent, Inc. All rights reserved.
35 * NFS Lock Manager service functions (nlm_do_...)
36 * Called from nlm_rpc_svc.c wrappers.
38 * Source code derived from FreeBSD nlm_prot_impl.c
41 #include <sys/param.h>
42 #include <sys/systm.h>
43 #include <sys/thread.h>
44 #include <sys/fcntl.h>
45 #include <sys/flock.h>
46 #include <sys/mount.h>
49 #include <sys/share.h>
50 #include <sys/socket.h>
51 #include <sys/syscall.h>
52 #include <sys/syslog.h>
53 #include <sys/systm.h>
54 #include <sys/taskq.h>
55 #include <sys/unistd.h>
56 #include <sys/vnode.h>
58 #include <sys/queue.h>
60 #include <netinet/in.h>
64 #include <rpc/pmap_prot.h>
65 #include <rpc/pmap_clnt.h>
66 #include <rpc/rpcb_prot.h>
68 #include <rpcsvc/nlm_prot.h>
69 #include <rpcsvc/sm_inter.h>
72 #include <nfs/nfs_clnt.h>
73 #include <nfs/export.h>
74 #include <nfs/rnode.h>
78 #define NLM_IN_GRACE(g) (ddi_get_lbolt() < (g)->grace_threshold)
80 struct nlm_block_cb_data
{
81 struct nlm_host
*hostp
;
82 struct nlm_vhold
*nvp
;
87 * Invoke an asyncronous RPC callbeck
88 * (used when NLM server needs to reply to MSG NLM procedure).
90 #define NLM_INVOKE_CALLBACK(descr, rpcp, resp, callb) \
92 enum clnt_stat _stat; \
94 _stat = (*(callb))(resp, NULL, (rpcp)->nr_handle); \
95 if (_stat != RPC_SUCCESS && _stat != RPC_TIMEDOUT) { \
96 struct rpc_err _err; \
98 CLNT_GETERR((rpcp)->nr_handle, &_err); \
99 NLM_ERR("NLM: %s callback failed: " \
100 "stat %d, err %d\n", descr, _stat, \
104 _NOTE(CONSTCOND) } while (0)
106 static void nlm_block(
107 nlm4_lockargs
*lockargs
,
108 struct nlm_host
*host
,
109 struct nlm_vhold
*nvp
,
112 nlm_testargs_cb grant_cb
);
114 static vnode_t
*nlm_fh_to_vp(struct netobj
*);
115 static struct nlm_vhold
*nlm_fh_to_vhold(struct nlm_host
*, struct netobj
*);
116 static void nlm_init_shrlock(struct shrlock
*, nlm4_share
*, struct nlm_host
*);
117 static callb_cpr_t
*nlm_block_callback(flk_cb_when_t
, void *);
118 static int nlm_vop_frlock(vnode_t
*, int, flock64_t
*, int, offset_t
,
119 struct flk_callback
*, cred_t
*, caller_context_t
*);
122 * Convert a lock from network to local form, and
123 * check for valid range (no overflow).
126 nlm_init_flock(struct flock64
*fl
, struct nlm4_lock
*nl
,
127 struct nlm_host
*host
, rpcvers_t vers
, short type
)
131 bzero(fl
, sizeof (*fl
));
135 if (vers
< NLM4_VERS
) {
136 if (off
> MAX_UOFF32
|| len
> MAX_UOFF32
)
138 if (off
+ len
> MAX_UOFF32
+ 1)
142 * Check range for 64-bit client (no overflow).
143 * Again allow len == ~0 to mean lock to EOF.
145 if (len
== MAX_U_OFFSET_T
)
147 if (len
!= 0 && off
+ (len
- 1) < off
)
152 fl
->l_whence
= SEEK_SET
;
155 fl
->l_sysid
= host
->nh_sysid
;
156 fl
->l_pid
= nl
->svid
;
163 * Convert an fhandle into a vnode.
164 * Uses the file id (fh_len + fh_data) in the fhandle to get the vnode.
165 * WARNING: users of this routine must do a VN_RELE on the vnode when they
167 * This is just like nfs_fhtovp() but without the exportinfo argument.
170 lm_fhtovp(fhandle3_t
*fh
)
176 vfsp
= getvfs(&fh
->_fh3_fsid
);
180 /* LINTED E_BAD_PTR_CAST_ALIGN */
181 error
= VFS_VGET(vfsp
, &vp
, (fid_t
*)&(fh
->_fh3_len
));
183 if (error
|| vp
== NULL
)
190 * Gets vnode from client's filehandle
191 * NOTE: Holds vnode, it _must_ be explicitly
192 * released by VN_RELE().
195 nlm_fh_to_vp(struct netobj
*fh
)
200 * Get a vnode pointer for the given NFS file handle.
201 * Note that it could be an NFSv2 or NFSv3 handle,
202 * which means the size might vary. (don't copy)
204 if (fh
->n_len
< sizeof (fhandle_t
))
207 /* We know this is aligned (kmem_alloc) */
208 /* LINTED E_BAD_PTR_CAST_ALIGN */
209 fhp
= (fhandle3_t
*)fh
->n_bytes
;
212 * See the comment for NFS_FH3MAXDATA in uts/common/nfs/nfs.h for
213 * converting fhandles. Check the NFSv3 file handle size. The lockmgr
214 * is not used for NFS v4.
216 if (fhp
->_fh3_len
> NFS_FH3MAXDATA
|| fhp
->_fh3_len
== 0)
219 return (lm_fhtovp(fhp
));
223 * Get vhold from client's filehandle, but in contrast to
224 * The function tries to check some access rights as well.
226 * NOTE: vhold object _must_ be explicitly released by
227 * nlm_vhold_release().
229 static struct nlm_vhold
*
230 nlm_fh_to_vhold(struct nlm_host
*hostp
, struct netobj
*fh
)
233 struct nlm_vhold
*nvp
;
235 vp
= nlm_fh_to_vp(fh
);
240 nvp
= nlm_vhold_get(hostp
, vp
);
243 * Both nlm_fh_to_vp() and nlm_vhold_get()
244 * do VN_HOLD(), so we need to drop one
245 * reference on vnode.
251 /* ******************************************************************* */
254 * NLM implementation details, called from the RPC svc code.
258 * Call-back from NFS statd, used to notify that one of our
259 * hosts had a status change. The host can be either an
260 * NFS client, NFS server or both.
261 * According to NSM protocol description, the state is a
262 * number that is increases monotonically each time the
263 * state of host changes. An even number indicates that
264 * the host is down, while an odd number indicates that
267 * Here we ignore this even/odd difference of status number
268 * reported by the NSM, we launch notification handlers
269 * every time the state is changed. The reason we why do so
270 * is that client and server can talk to each other using
271 * connectionless transport and it's easy to lose packet
272 * containing NSM notification with status number update.
274 * In nlm_host_monitor(), we put the sysid in the private data
275 * that statd carries in this callback, so we can easliy find
276 * the host this call applies to.
280 nlm_do_notify1(nlm_sm_status
*argp
, void *res
, struct svc_req
*sr
)
282 struct nlm_globals
*g
;
283 struct nlm_host
*host
;
286 g
= zone_getspecific(nlm_zone_key
, curzone
);
287 bcopy(&argp
->priv
, &sysid
, sizeof (sysid
));
289 DTRACE_PROBE2(nsm__notify
, uint16_t, sysid
,
292 host
= nlm_host_find_by_sysid(g
, (sysid_t
)sysid
);
296 nlm_host_notify_server(host
, argp
->state
);
297 nlm_host_notify_client(host
, argp
->state
);
298 nlm_host_release(g
, host
);
302 * Another available call-back for NFS statd.
303 * Not currently used.
307 nlm_do_notify2(nlm_sm_status
*argp
, void *res
, struct svc_req
*sr
)
314 * NLM_TEST, NLM_TEST_MSG,
315 * NLM4_TEST, NLM4_TEST_MSG,
316 * Client inquiry about locks, non-blocking.
319 nlm_do_test(nlm4_testargs
*argp
, nlm4_testres
*resp
,
320 struct svc_req
*sr
, nlm_testres_cb cb
)
322 struct nlm_globals
*g
;
323 struct nlm_host
*host
;
324 struct nlm4_holder
*lh
;
325 struct nlm_owner_handle
*oh
;
326 nlm_rpc_t
*rpcp
= NULL
;
334 nlm_copy_netobj(&resp
->cookie
, &argp
->cookie
);
336 name
= argp
->alock
.caller_name
;
337 netid
= svc_getnetid(sr
->rq_xprt
);
338 addr
= svc_getrpccaller(sr
->rq_xprt
);
340 g
= zone_getspecific(nlm_zone_key
, curzone
);
341 host
= nlm_host_findcreate(g
, name
, netid
, addr
);
343 resp
->stat
.stat
= nlm4_denied_nolocks
;
347 error
= nlm_host_get_rpc(host
, sr
->rq_vers
, &rpcp
);
349 resp
->stat
.stat
= nlm4_denied_nolocks
;
354 vp
= nlm_fh_to_vp(&argp
->alock
.fh
);
356 resp
->stat
.stat
= nlm4_stale_fh
;
360 if (NLM_IN_GRACE(g
)) {
361 resp
->stat
.stat
= nlm4_denied_grace_period
;
365 /* Convert to local form. */
366 error
= nlm_init_flock(&fl
, &argp
->alock
, host
, sr
->rq_vers
,
367 (argp
->exclusive
) ? F_WRLCK
: F_RDLCK
);
369 resp
->stat
.stat
= nlm4_failed
;
373 /* BSD: VOP_ADVLOCK(nv->nv_vp, NULL, F_GETLK, &fl, F_REMOTE); */
374 error
= nlm_vop_frlock(vp
, F_GETLK
, &fl
,
375 F_REMOTELOCK
| FREAD
| FWRITE
,
376 (u_offset_t
)0, NULL
, CRED(), NULL
);
378 resp
->stat
.stat
= nlm4_failed
;
382 if (fl
.l_type
== F_UNLCK
) {
383 resp
->stat
.stat
= nlm4_granted
;
386 resp
->stat
.stat
= nlm4_denied
;
389 * This lock "test" fails due to a conflicting lock.
391 * If this is a v1 client, make sure the conflicting
392 * lock range we report can be expressed with 32-bit
393 * offsets. The lock range requested was expressed
394 * as 32-bit offset and length, so at least part of
395 * the conflicting lock should lie below MAX_UOFF32.
396 * If the conflicting lock extends past that, we'll
397 * trim the range to end at MAX_UOFF32 so this lock
398 * can be represented in a 32-bit response. Check
399 * the start also (paranoid, but a low cost check).
401 if (sr
->rq_vers
< NLM4_VERS
) {
403 if (fl
.l_start
> MAX_UOFF32
)
404 fl
.l_start
= MAX_UOFF32
;
405 maxlen
= MAX_UOFF32
+ 1 - fl
.l_start
;
406 if (fl
.l_len
> maxlen
)
411 * Build the nlm4_holder result structure.
413 * Note that lh->oh is freed via xdr_free,
414 * xdr_nlm4_holder, xdr_netobj, xdr_bytes.
416 oh
= kmem_zalloc(sizeof (*oh
), KM_SLEEP
);
417 oh
->oh_sysid
= (sysid_t
)fl
.l_sysid
;
418 lh
= &resp
->stat
.nlm4_testrply_u
.holder
;
419 lh
->exclusive
= (fl
.l_type
== F_WRLCK
);
421 lh
->oh
.n_len
= sizeof (*oh
);
422 lh
->oh
.n_bytes
= (void *)oh
;
423 lh
->l_offset
= fl
.l_start
;
424 lh
->l_len
= fl
.l_len
;
428 * If we have a callback function, use that to
429 * deliver the response via another RPC call.
431 if (cb
!= NULL
&& rpcp
!= NULL
)
432 NLM_INVOKE_CALLBACK("test", rpcp
, resp
, cb
);
437 nlm_host_rele_rpc(host
, rpcp
);
439 nlm_host_release(g
, host
);
443 * NLM_LOCK, NLM_LOCK_MSG, NLM_NM_LOCK
444 * NLM4_LOCK, NLM4_LOCK_MSG, NLM4_NM_LOCK
446 * Client request to set a lock, possibly blocking.
448 * If the lock needs to block, we return status blocked to
449 * this RPC call, and then later call back the client with
450 * a "granted" callback. Tricky aspects of this include:
451 * sending a reply before this function returns, and then
452 * borrowing this thread from the RPC service pool for the
453 * wait on the lock and doing the later granted callback.
455 * We also have to keep a list of locks (pending + granted)
456 * both to handle retransmitted requests, and to keep the
457 * vnodes for those locks active.
460 nlm_do_lock(nlm4_lockargs
*argp
, nlm4_res
*resp
, struct svc_req
*sr
,
461 nlm_reply_cb reply_cb
, nlm_res_cb res_cb
, nlm_testargs_cb grant_cb
)
463 struct nlm_globals
*g
;
465 struct nlm_host
*host
= NULL
;
467 struct nlm_vhold
*nvp
= NULL
;
468 nlm_rpc_t
*rpcp
= NULL
;
472 bool_t do_blocking
= FALSE
;
473 bool_t do_mon_req
= FALSE
;
474 enum nlm4_stats status
;
476 nlm_copy_netobj(&resp
->cookie
, &argp
->cookie
);
478 name
= argp
->alock
.caller_name
;
479 netid
= svc_getnetid(sr
->rq_xprt
);
480 addr
= svc_getrpccaller(sr
->rq_xprt
);
482 g
= zone_getspecific(nlm_zone_key
, curzone
);
483 host
= nlm_host_findcreate(g
, name
, netid
, addr
);
485 DTRACE_PROBE4(no__host
, struct nlm_globals
*, g
,
486 char *, name
, char *, netid
, struct netbuf
*, addr
);
487 status
= nlm4_denied_nolocks
;
491 DTRACE_PROBE3(start
, struct nlm_globals
*, g
,
492 struct nlm_host
*, host
, nlm4_lockargs
*, argp
);
495 * If we may need to do _msg_ call needing an RPC
496 * callback, get the RPC client handle now,
497 * so we know if we can bind to the NLM service on
500 * Note: host object carries transport type.
501 * One client using multiple transports gets
502 * separate sysids for each of its transports.
504 if (res_cb
!= NULL
|| (grant_cb
!= NULL
&& argp
->block
== TRUE
)) {
505 error
= nlm_host_get_rpc(host
, sr
->rq_vers
, &rpcp
);
507 status
= nlm4_denied_nolocks
;
513 * During the "grace period", only allow reclaim.
515 if (argp
->reclaim
== 0 && NLM_IN_GRACE(g
)) {
516 status
= nlm4_denied_grace_period
;
521 * Check whether we missed host shutdown event
523 if (nlm_host_get_state(host
) != argp
->state
)
524 nlm_host_notify_server(host
, argp
->state
);
527 * Get a hold on the vnode for a lock operation.
528 * Only lock() and share() need vhold objects.
530 nvp
= nlm_fh_to_vhold(host
, &argp
->alock
.fh
);
532 status
= nlm4_stale_fh
;
536 /* Convert to local form. */
537 error
= nlm_init_flock(&fl
, &argp
->alock
, host
, sr
->rq_vers
,
538 (argp
->exclusive
) ? F_WRLCK
: F_RDLCK
);
540 status
= nlm4_failed
;
545 * Try to lock non-blocking first. If we succeed
546 * getting the lock, we can reply with the granted
547 * status directly and avoid the complications of
548 * making the "granted" RPC callback later.
550 * This also let's us find out now about some
551 * possible errors like EROFS, etc.
553 flags
= F_REMOTELOCK
| FREAD
| FWRITE
;
554 error
= nlm_vop_frlock(nvp
->nv_vp
, F_SETLK
, &fl
, flags
,
555 (u_offset_t
)0, NULL
, CRED(), NULL
);
557 DTRACE_PROBE3(setlk__res
, struct flock64
*, &fl
,
558 int, flags
, int, error
);
562 /* Got it without waiting! */
563 status
= nlm4_granted
;
567 /* EINPROGRESS too? */
569 /* We did not get the lock. Should we block? */
570 if (argp
->block
== FALSE
|| grant_cb
== NULL
) {
571 status
= nlm4_denied
;
575 * Should block. Try to reserve this thread
576 * so we can use it to wait for the lock and
577 * later send the granted message. If this
578 * reservation fails, say "no resources".
580 if (!svc_reserve_thread(sr
->rq_xprt
)) {
581 status
= nlm4_denied_nolocks
;
585 * OK, can detach this thread, so this call
586 * will block below (after we reply).
588 status
= nlm4_blocked
;
594 /* Failed for lack of resources. */
595 status
= nlm4_denied_nolocks
;
599 /* read-only file system */
609 /* dead lock condition */
610 status
= nlm4_deadlck
;
614 status
= nlm4_denied
;
619 resp
->stat
.stat
= status
;
622 * We get one of two function pointers; one for a
623 * normal RPC reply, and another for doing an RPC
624 * "callback" _res reply for a _msg function.
625 * Use either of those to send the reply now.
627 * If sending this reply fails, just leave the
628 * lock in the list for retransmitted requests.
629 * Cleanup is via unlock or host rele (statmon).
631 if (reply_cb
!= NULL
) {
632 /* i.e. nlm_lock_1_reply */
633 if (!(*reply_cb
)(sr
->rq_xprt
, resp
))
634 svcerr_systemerr(sr
->rq_xprt
);
636 if (res_cb
!= NULL
&& rpcp
!= NULL
)
637 NLM_INVOKE_CALLBACK("lock", rpcp
, resp
, res_cb
);
640 * The reply has been sent to the client.
641 * Start monitoring this client (maybe).
643 * Note that the non-monitored (NM) calls pass grant_cb=NULL
644 * indicating that the client doesn't support RPC callbacks.
645 * No monitoring for these (lame) clients.
647 if (do_mon_req
&& grant_cb
!= NULL
)
648 nlm_host_monitor(g
, host
, argp
->state
);
652 * We need to block on this lock, and when that
653 * completes, do the granted RPC call. Note that
654 * we "reserved" this thread above, so we can now
655 * "detach" it from the RPC SVC pool, allowing it
656 * to block indefinitely if needed.
658 ASSERT(rpcp
!= NULL
);
659 (void) svc_detach_thread(sr
->rq_xprt
);
660 nlm_block(argp
, host
, nvp
, rpcp
, &fl
, grant_cb
);
663 DTRACE_PROBE3(lock__end
, struct nlm_globals
*, g
,
664 struct nlm_host
*, host
, nlm4_res
*, resp
);
667 nlm_host_rele_rpc(host
, rpcp
);
669 nlm_vhold_release(host
, nvp
);
670 nlm_host_release(g
, host
);
674 * Helper for nlm_do_lock(), partly for observability,
675 * (we'll see a call blocked in this function) and
676 * because nlm_do_lock() was getting quite long.
679 nlm_block(nlm4_lockargs
*lockargs
,
680 struct nlm_host
*host
,
681 struct nlm_vhold
*nvp
,
684 nlm_testargs_cb grant_cb
)
688 flk_callback_t flk_cb
;
689 struct nlm_block_cb_data cb_data
;
692 * Keep a list of blocked locks on nh_pending, and use it
693 * to cancel these threads in nlm_destroy_client_pending.
695 * Check to see if this lock is already in the list
696 * and if not, add an entry for it. Allocate first,
697 * then if we don't insert, free the new one.
698 * Caller already has vp held.
701 error
= nlm_slreq_register(host
, nvp
, flp
);
704 * Sleeping lock request with given fl is already
705 * registered by someone else. This means that
706 * some other thread is handling the request, let
709 ASSERT(error
== EEXIST
);
713 cb_data
.hostp
= host
;
716 flk_init_callback(&flk_cb
, nlm_block_callback
, &cb_data
);
718 /* BSD: VOP_ADVLOCK(vp, NULL, F_SETLK, fl, F_REMOTE); */
719 error
= nlm_vop_frlock(nvp
->nv_vp
, F_SETLKW
, flp
,
720 F_REMOTELOCK
| FREAD
| FWRITE
,
721 (u_offset_t
)0, &flk_cb
, CRED(), NULL
);
725 * We failed getting the lock, but have no way to
726 * tell the client about that. Let 'em time out.
728 (void) nlm_slreq_unregister(host
, nvp
, flp
);
733 * Do the "granted" call-back to the client.
735 args
.cookie
= lockargs
->cookie
;
736 args
.exclusive
= lockargs
->exclusive
;
737 args
.alock
= lockargs
->alock
;
739 NLM_INVOKE_CALLBACK("grant", rpcp
, &args
, grant_cb
);
743 * The function that is used as flk callback when NLM server
744 * sets new sleeping lock. The function unregisters NLM
745 * sleeping lock request (nlm_slreq) associated with the
746 * sleeping lock _before_ lock becomes active. It prevents
747 * potential race condition between nlm_block() and
751 nlm_block_callback(flk_cb_when_t when
, void *data
)
753 struct nlm_block_cb_data
*cb_data
;
755 cb_data
= (struct nlm_block_cb_data
*)data
;
756 if (when
== FLK_AFTER_SLEEP
) {
757 (void) nlm_slreq_unregister(cb_data
->hostp
,
758 cb_data
->nvp
, cb_data
->flp
);
765 * NLM_CANCEL, NLM_CANCEL_MSG,
766 * NLM4_CANCEL, NLM4_CANCEL_MSG,
767 * Client gives up waiting for a blocking lock.
770 nlm_do_cancel(nlm4_cancargs
*argp
, nlm4_res
*resp
,
771 struct svc_req
*sr
, nlm_res_cb cb
)
773 struct nlm_globals
*g
;
774 struct nlm_host
*host
;
776 struct nlm_vhold
*nvp
= NULL
;
777 nlm_rpc_t
*rpcp
= NULL
;
783 nlm_copy_netobj(&resp
->cookie
, &argp
->cookie
);
784 netid
= svc_getnetid(sr
->rq_xprt
);
785 addr
= svc_getrpccaller(sr
->rq_xprt
);
786 name
= argp
->alock
.caller_name
;
788 g
= zone_getspecific(nlm_zone_key
, curzone
);
789 host
= nlm_host_findcreate(g
, name
, netid
, addr
);
791 resp
->stat
.stat
= nlm4_denied_nolocks
;
795 error
= nlm_host_get_rpc(host
, sr
->rq_vers
, &rpcp
);
797 resp
->stat
.stat
= nlm4_denied_nolocks
;
802 DTRACE_PROBE3(start
, struct nlm_globals
*, g
,
803 struct nlm_host
*, host
, nlm4_cancargs
*, argp
);
805 if (NLM_IN_GRACE(g
)) {
806 resp
->stat
.stat
= nlm4_denied_grace_period
;
810 nvp
= nlm_fh_to_vhold(host
, &argp
->alock
.fh
);
812 resp
->stat
.stat
= nlm4_stale_fh
;
816 /* Convert to local form. */
817 error
= nlm_init_flock(&fl
, &argp
->alock
, host
, sr
->rq_vers
,
818 (argp
->exclusive
) ? F_WRLCK
: F_RDLCK
);
820 resp
->stat
.stat
= nlm4_failed
;
824 error
= nlm_slreq_unregister(host
, nvp
, &fl
);
827 * There's no sleeping lock request corresponding
828 * to the lock. Then requested sleeping lock
831 resp
->stat
.stat
= nlm4_denied
;
836 error
= nlm_vop_frlock(nvp
->nv_vp
, F_SETLK
, &fl
,
837 F_REMOTELOCK
| FREAD
| FWRITE
,
838 (u_offset_t
)0, NULL
, CRED(), NULL
);
840 resp
->stat
.stat
= (error
== 0) ?
841 nlm4_granted
: nlm4_denied
;
845 * If we have a callback function, use that to
846 * deliver the response via another RPC call.
848 if (cb
!= NULL
&& rpcp
!= NULL
)
849 NLM_INVOKE_CALLBACK("cancel", rpcp
, resp
, cb
);
851 DTRACE_PROBE3(cancel__end
, struct nlm_globals
*, g
,
852 struct nlm_host
*, host
, nlm4_res
*, resp
);
855 nlm_host_rele_rpc(host
, rpcp
);
857 nlm_vhold_release(host
, nvp
);
858 nlm_host_release(g
, host
);
862 * NLM_UNLOCK, NLM_UNLOCK_MSG,
863 * NLM4_UNLOCK, NLM4_UNLOCK_MSG,
864 * Client removes one of their locks.
867 nlm_do_unlock(nlm4_unlockargs
*argp
, nlm4_res
*resp
,
868 struct svc_req
*sr
, nlm_res_cb cb
)
870 struct nlm_globals
*g
;
871 struct nlm_host
*host
;
873 nlm_rpc_t
*rpcp
= NULL
;
880 nlm_copy_netobj(&resp
->cookie
, &argp
->cookie
);
882 netid
= svc_getnetid(sr
->rq_xprt
);
883 addr
= svc_getrpccaller(sr
->rq_xprt
);
884 name
= argp
->alock
.caller_name
;
887 * NLM_UNLOCK operation doesn't have an error code
888 * denoting that operation failed, so we always
889 * return nlm4_granted except when the server is
892 resp
->stat
.stat
= nlm4_granted
;
894 g
= zone_getspecific(nlm_zone_key
, curzone
);
895 host
= nlm_host_findcreate(g
, name
, netid
, addr
);
900 error
= nlm_host_get_rpc(host
, sr
->rq_vers
, &rpcp
);
905 DTRACE_PROBE3(start
, struct nlm_globals
*, g
,
906 struct nlm_host
*, host
, nlm4_unlockargs
*, argp
);
908 if (NLM_IN_GRACE(g
)) {
909 resp
->stat
.stat
= nlm4_denied_grace_period
;
913 vp
= nlm_fh_to_vp(&argp
->alock
.fh
);
917 /* Convert to local form. */
918 error
= nlm_init_flock(&fl
, &argp
->alock
, host
, sr
->rq_vers
, F_UNLCK
);
922 /* BSD: VOP_ADVLOCK(nv->nv_vp, NULL, F_UNLCK, &fl, F_REMOTE); */
923 error
= nlm_vop_frlock(vp
, F_SETLK
, &fl
,
924 F_REMOTELOCK
| FREAD
| FWRITE
,
925 (u_offset_t
)0, NULL
, CRED(), NULL
);
927 DTRACE_PROBE1(unlock__res
, int, error
);
930 * If we have a callback function, use that to
931 * deliver the response via another RPC call.
933 if (cb
!= NULL
&& rpcp
!= NULL
)
934 NLM_INVOKE_CALLBACK("unlock", rpcp
, resp
, cb
);
936 DTRACE_PROBE3(unlock__end
, struct nlm_globals
*, g
,
937 struct nlm_host
*, host
, nlm4_res
*, resp
);
942 nlm_host_rele_rpc(host
, rpcp
);
944 nlm_host_release(g
, host
);
948 * NLM_GRANTED, NLM_GRANTED_MSG,
949 * NLM4_GRANTED, NLM4_GRANTED_MSG,
951 * This service routine is special. It's the only one that's
952 * really part of our NLM _client_ support, used by _servers_
953 * to "call back" when a blocking lock from this NLM client
954 * is granted by the server. In this case, we _know_ there is
955 * already an nlm_host allocated and held by the client code.
956 * We want to find that nlm_host here.
958 * Over in nlm_call_lock(), the client encoded the sysid for this
959 * server in the "owner handle" netbuf sent with our lock request.
960 * We can now use that to find the nlm_host object we used there.
961 * (NB: The owner handle is opaque to the server.)
964 nlm_do_granted(nlm4_testargs
*argp
, nlm4_res
*resp
,
965 struct svc_req
*sr
, nlm_res_cb cb
)
967 struct nlm_globals
*g
;
968 struct nlm_owner_handle
*oh
;
969 struct nlm_host
*host
;
970 nlm_rpc_t
*rpcp
= NULL
;
973 nlm_copy_netobj(&resp
->cookie
, &argp
->cookie
);
974 resp
->stat
.stat
= nlm4_denied
;
976 g
= zone_getspecific(nlm_zone_key
, curzone
);
977 oh
= (void *) argp
->alock
.oh
.n_bytes
;
981 host
= nlm_host_find_by_sysid(g
, oh
->oh_sysid
);
986 error
= nlm_host_get_rpc(host
, sr
->rq_vers
, &rpcp
);
991 if (NLM_IN_GRACE(g
)) {
992 resp
->stat
.stat
= nlm4_denied_grace_period
;
996 error
= nlm_slock_grant(g
, host
, &argp
->alock
);
998 resp
->stat
.stat
= nlm4_granted
;
1002 * If we have a callback function, use that to
1003 * deliver the response via another RPC call.
1005 if (cb
!= NULL
&& rpcp
!= NULL
)
1006 NLM_INVOKE_CALLBACK("do_granted", rpcp
, resp
, cb
);
1009 nlm_host_rele_rpc(host
, rpcp
);
1011 nlm_host_release(g
, host
);
1015 * NLM_FREE_ALL, NLM4_FREE_ALL
1017 * Destroy all lock state for the calling client.
1020 nlm_do_free_all(nlm4_notify
*argp
, void *res
, struct svc_req
*sr
)
1022 struct nlm_globals
*g
;
1023 struct nlm_host_list host_list
;
1024 struct nlm_host
*hostp
;
1026 TAILQ_INIT(&host_list
);
1027 g
= zone_getspecific(nlm_zone_key
, curzone
);
1029 /* Serialize calls to clean locks. */
1030 mutex_enter(&g
->clean_lock
);
1033 * Find all hosts that have the given node name and put them on a
1036 mutex_enter(&g
->lock
);
1037 for (hostp
= avl_first(&g
->nlm_hosts_tree
); hostp
!= NULL
;
1038 hostp
= AVL_NEXT(&g
->nlm_hosts_tree
, hostp
)) {
1039 if (strcasecmp(hostp
->nh_name
, argp
->name
) == 0) {
1041 * If needed take the host out of the idle list since
1042 * we are taking a reference.
1044 if (hostp
->nh_flags
& NLM_NH_INIDLE
) {
1045 TAILQ_REMOVE(&g
->nlm_idle_hosts
, hostp
,
1047 hostp
->nh_flags
&= ~NLM_NH_INIDLE
;
1051 TAILQ_INSERT_TAIL(&host_list
, hostp
, nh_link
);
1054 mutex_exit(&g
->lock
);
1056 /* Free locks for all hosts on the local list. */
1057 while (!TAILQ_EMPTY(&host_list
)) {
1058 hostp
= TAILQ_FIRST(&host_list
);
1059 TAILQ_REMOVE(&host_list
, hostp
, nh_link
);
1062 * Note that this does not do client-side cleanup.
1063 * We want to do that ONLY if statd tells us the
1064 * server has restarted.
1066 nlm_host_notify_server(hostp
, argp
->state
);
1067 nlm_host_release(g
, hostp
);
1070 mutex_exit(&g
->clean_lock
);
1077 nlm_init_shrlock(struct shrlock
*shr
,
1078 nlm4_share
*nshare
, struct nlm_host
*host
)
1081 switch (nshare
->access
) {
1087 shr
->s_access
= F_RDACC
;
1090 shr
->s_access
= F_WRACC
;
1093 shr
->s_access
= F_RWACC
;
1097 switch (nshare
->mode
) {
1100 shr
->s_deny
= F_NODNY
;
1103 shr
->s_deny
= F_RDDNY
;
1106 shr
->s_deny
= F_WRDNY
;
1109 shr
->s_deny
= F_RWDNY
;
1113 shr
->s_sysid
= host
->nh_sysid
;
1115 shr
->s_own_len
= nshare
->oh
.n_len
;
1116 shr
->s_owner
= nshare
->oh
.n_bytes
;
1120 * NLM_SHARE, NLM4_SHARE
1122 * Request a DOS-style share reservation
1125 nlm_do_share(nlm4_shareargs
*argp
, nlm4_shareres
*resp
, struct svc_req
*sr
)
1127 struct nlm_globals
*g
;
1128 struct nlm_host
*host
;
1129 struct netbuf
*addr
;
1130 struct nlm_vhold
*nvp
= NULL
;
1136 nlm_copy_netobj(&resp
->cookie
, &argp
->cookie
);
1138 name
= argp
->share
.caller_name
;
1139 netid
= svc_getnetid(sr
->rq_xprt
);
1140 addr
= svc_getrpccaller(sr
->rq_xprt
);
1142 g
= zone_getspecific(nlm_zone_key
, curzone
);
1143 host
= nlm_host_findcreate(g
, name
, netid
, addr
);
1145 resp
->stat
= nlm4_denied_nolocks
;
1149 DTRACE_PROBE3(share__start
, struct nlm_globals
*, g
,
1150 struct nlm_host
*, host
, nlm4_shareargs
*, argp
);
1152 if (argp
->reclaim
== 0 && NLM_IN_GRACE(g
)) {
1153 resp
->stat
= nlm4_denied_grace_period
;
1158 * Get holded vnode when on lock operation.
1159 * Only lock() and share() need vhold objects.
1161 nvp
= nlm_fh_to_vhold(host
, &argp
->share
.fh
);
1163 resp
->stat
= nlm4_stale_fh
;
1167 /* Convert to local form. */
1168 nlm_init_shrlock(&shr
, &argp
->share
, host
);
1169 error
= VOP_SHRLOCK(nvp
->nv_vp
, F_SHARE
, &shr
,
1170 FREAD
| FWRITE
, CRED(), NULL
);
1173 resp
->stat
= nlm4_granted
;
1174 nlm_host_monitor(g
, host
, 0);
1176 resp
->stat
= nlm4_denied
;
1180 DTRACE_PROBE3(share__end
, struct nlm_globals
*, g
,
1181 struct nlm_host
*, host
, nlm4_shareres
*, resp
);
1183 nlm_vhold_release(host
, nvp
);
1184 nlm_host_release(g
, host
);
1188 * NLM_UNSHARE, NLM4_UNSHARE
1190 * Release a DOS-style share reservation
1193 nlm_do_unshare(nlm4_shareargs
*argp
, nlm4_shareres
*resp
, struct svc_req
*sr
)
1195 struct nlm_globals
*g
;
1196 struct nlm_host
*host
;
1197 struct netbuf
*addr
;
1203 nlm_copy_netobj(&resp
->cookie
, &argp
->cookie
);
1205 netid
= svc_getnetid(sr
->rq_xprt
);
1206 addr
= svc_getrpccaller(sr
->rq_xprt
);
1208 g
= zone_getspecific(nlm_zone_key
, curzone
);
1209 host
= nlm_host_find(g
, netid
, addr
);
1211 resp
->stat
= nlm4_denied_nolocks
;
1215 DTRACE_PROBE3(unshare__start
, struct nlm_globals
*, g
,
1216 struct nlm_host
*, host
, nlm4_shareargs
*, argp
);
1218 if (NLM_IN_GRACE(g
)) {
1219 resp
->stat
= nlm4_denied_grace_period
;
1223 vp
= nlm_fh_to_vp(&argp
->share
.fh
);
1225 resp
->stat
= nlm4_stale_fh
;
1229 /* Convert to local form. */
1230 nlm_init_shrlock(&shr
, &argp
->share
, host
);
1231 error
= VOP_SHRLOCK(vp
, F_UNSHARE
, &shr
,
1232 FREAD
| FWRITE
, CRED(), NULL
);
1235 resp
->stat
= nlm4_granted
;
1238 DTRACE_PROBE3(unshare__end
, struct nlm_globals
*, g
,
1239 struct nlm_host
*, host
, nlm4_shareres
*, resp
);
1244 nlm_host_release(g
, host
);
1248 * NLM wrapper to VOP_FRLOCK that checks the validity of the lock before
1249 * invoking the vnode operation.
1252 nlm_vop_frlock(vnode_t
*vp
, int cmd
, flock64_t
*bfp
, int flag
, offset_t offset
,
1253 struct flk_callback
*flk_cbp
, cred_t
*cr
, caller_context_t
*ct
)
1255 if (bfp
->l_len
!= 0 && bfp
->l_start
+ (bfp
->l_len
- 1) < bfp
->l_start
) {
1259 return (VOP_FRLOCK(vp
, cmd
, bfp
, flag
, offset
, flk_cbp
, cr
, ct
));