1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 3 * 4 * Copyright (c) 2008 Isilon Inc http://www.isilon.com/ 5 * Authors: Doug Rabson <dfr@rabson.org> 6 * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org> 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 */ 29 30 #include <sys/param.h> 31 #include <sys/fcntl.h> 32 #include <sys/jail.h> 33 #include <sys/kernel.h> 34 #include <sys/limits.h> 35 #include <sys/lock.h> 36 #include <sys/lockf.h> 37 #include <sys/malloc.h> 38 #include <sys/mbuf.h> 39 #include <sys/mount.h> 40 #include <sys/mutex.h> 41 #include <sys/proc.h> 42 #include <sys/socket.h> 43 #include <sys/syslog.h> 44 #include <sys/systm.h> 45 #include <sys/unistd.h> 46 #include <sys/vnode.h> 47 48 #include <nfs/nfsproto.h> 49 #include <nfsclient/nfs.h> 50 #include <nfsclient/nfsmount.h> 51 52 #include <nlm/nlm_prot.h> 53 #include <nlm/nlm.h> 54 55 /* 56 * We need to keep track of the svid values used for F_FLOCK locks. 57 */ 58 struct nlm_file_svid { 59 int ns_refs; /* thread count + 1 if active */ 60 int ns_svid; /* on-the-wire SVID for this file */ 61 struct ucred *ns_ucred; /* creds to use for lock recovery */ 62 void *ns_id; /* local struct file pointer */ 63 bool_t ns_active; /* TRUE if we own a lock */ 64 LIST_ENTRY(nlm_file_svid) ns_link; 65 }; 66 LIST_HEAD(nlm_file_svid_list, nlm_file_svid); 67 68 #define NLM_SVID_HASH_SIZE 256 69 struct nlm_file_svid_list nlm_file_svids[NLM_SVID_HASH_SIZE]; 70 71 struct mtx nlm_svid_lock; 72 static struct unrhdr *nlm_svid_allocator; 73 static volatile u_int nlm_xid = 1; 74 75 static int nlm_setlock(struct nlm_host *host, struct rpc_callextra *ext, 76 rpcvers_t vers, struct timeval *timo, int retries, 77 struct vnode *vp, int op, struct flock *fl, int flags, 78 int svid, size_t fhlen, void *fh, off_t size, bool_t reclaim); 79 static int nlm_clearlock(struct nlm_host *host, struct rpc_callextra *ext, 80 rpcvers_t vers, struct timeval *timo, int retries, 81 struct vnode *vp, int op, struct flock *fl, int flags, 82 int svid, size_t fhlen, void *fh, off_t size); 83 static int nlm_getlock(struct nlm_host *host, struct rpc_callextra *ext, 84 rpcvers_t vers, struct timeval *timo, int retries, 85 struct vnode *vp, int op, struct flock *fl, int flags, 86 int svid, size_t fhlen, void *fh, off_t size); 87 static int nlm_map_status(nlm4_stats stat); 88 static struct nlm_file_svid *nlm_find_svid(void *id); 89 static void nlm_free_svid(struct nlm_file_svid *nf); 90 static int nlm_init_lock(struct flock *fl, int flags, int svid, 91 rpcvers_t vers, size_t fhlen, void *fh, off_t size, 92 struct nlm4_lock *lock, char oh_space[32]); 93 94 static void 95 nlm_client_init(void *dummy) 96 { 97 int i; 98 99 mtx_init(&nlm_svid_lock, "NLM svid lock", NULL, MTX_DEF); 100 /* pid_max cannot be greater than PID_MAX */ 101 nlm_svid_allocator = new_unrhdr(PID_MAX + 2, INT_MAX, &nlm_svid_lock); 102 for (i = 0; i < NLM_SVID_HASH_SIZE; i++) 103 LIST_INIT(&nlm_file_svids[i]); 104 } 105 SYSINIT(nlm_client_init, SI_SUB_LOCK, SI_ORDER_FIRST, nlm_client_init, NULL); 106 107 static int 108 nlm_msg(struct thread *td, const char *server, const char *msg, int error) 109 { 110 struct proc *p; 111 112 p = td ? td->td_proc : NULL; 113 if (error) { 114 tprintf(p, LOG_INFO, "nfs server %s: %s, error %d\n", server, 115 msg, error); 116 } else { 117 tprintf(p, LOG_INFO, "nfs server %s: %s\n", server, msg); 118 } 119 return (0); 120 } 121 122 struct nlm_feedback_arg { 123 bool_t nf_printed; 124 struct nfsmount *nf_nmp; 125 }; 126 127 static void 128 nlm_down(struct nlm_feedback_arg *nf, struct thread *td, 129 const char *msg, int error) 130 { 131 struct nfsmount *nmp = nf->nf_nmp; 132 133 if (nmp == NULL) 134 return; 135 mtx_lock(&nmp->nm_mtx); 136 if (!(nmp->nm_state & NFSSTA_LOCKTIMEO)) { 137 nmp->nm_state |= NFSSTA_LOCKTIMEO; 138 mtx_unlock(&nmp->nm_mtx); 139 vfs_event_signal(&nmp->nm_mountp->mnt_stat.f_fsid, 140 VQ_NOTRESPLOCK, 0); 141 } else { 142 mtx_unlock(&nmp->nm_mtx); 143 } 144 145 nf->nf_printed = TRUE; 146 nlm_msg(td, nmp->nm_mountp->mnt_stat.f_mntfromname, msg, error); 147 } 148 149 static void 150 nlm_up(struct nlm_feedback_arg *nf, struct thread *td, 151 const char *msg) 152 { 153 struct nfsmount *nmp = nf->nf_nmp; 154 155 if (!nf->nf_printed) 156 return; 157 158 nlm_msg(td, nmp->nm_mountp->mnt_stat.f_mntfromname, msg, 0); 159 160 mtx_lock(&nmp->nm_mtx); 161 if (nmp->nm_state & NFSSTA_LOCKTIMEO) { 162 nmp->nm_state &= ~NFSSTA_LOCKTIMEO; 163 mtx_unlock(&nmp->nm_mtx); 164 vfs_event_signal(&nmp->nm_mountp->mnt_stat.f_fsid, 165 VQ_NOTRESPLOCK, 1); 166 } else { 167 mtx_unlock(&nmp->nm_mtx); 168 } 169 } 170 171 static void 172 nlm_feedback(int type, int proc, void *arg) 173 { 174 struct thread *td = curthread; 175 struct nlm_feedback_arg *nf = (struct nlm_feedback_arg *) arg; 176 177 switch (type) { 178 case FEEDBACK_REXMIT2: 179 case FEEDBACK_RECONNECT: 180 nlm_down(nf, td, "lockd not responding", 0); 181 break; 182 183 case FEEDBACK_OK: 184 nlm_up(nf, td, "lockd is alive again"); 185 break; 186 } 187 } 188 189 /* 190 * nlm_advlock -- 191 * NFS advisory byte-level locks. 192 */ 193 static int 194 nlm_advlock_internal(struct vnode *vp, void *id, int op, struct flock *fl, 195 int flags, bool_t reclaim, bool_t unlock_vp) 196 { 197 struct thread *td = curthread; 198 struct nfsmount *nmp; 199 off_t size; 200 size_t fhlen; 201 union nfsfh fh; 202 struct sockaddr *sa; 203 struct sockaddr_storage ss; 204 char *servername; 205 struct timeval timo; 206 int retries; 207 rpcvers_t vers; 208 struct nlm_host *host; 209 struct rpc_callextra ext; 210 struct nlm_feedback_arg nf; 211 AUTH *auth; 212 struct ucred *cred, *cred1; 213 struct nlm_file_svid *ns; 214 int svid; 215 int error; 216 int is_v3; 217 218 ASSERT_VOP_LOCKED(vp, "nlm_advlock_1"); 219 220 servername = malloc(MNAMELEN, M_TEMP, M_WAITOK); /* XXXKIB vp locked */ 221 nmp = VFSTONFS(vp->v_mount); 222 /* 223 * Push any pending writes to the server and flush our cache 224 * so that if we are contending with another machine for a 225 * file, we get whatever they wrote and vice-versa. 226 */ 227 if (op == F_SETLK || op == F_UNLCK) 228 nmp->nm_vinvalbuf(vp, V_SAVE, td, 1); 229 230 strcpy(servername, nmp->nm_hostname); 231 nmp->nm_getinfo(vp, fh.fh_bytes, &fhlen, &ss, &is_v3, &size, &timo); 232 sa = (struct sockaddr *) &ss; 233 if (is_v3 != 0) 234 vers = NLM_VERS4; 235 else 236 vers = NLM_VERS; 237 238 if (nmp->nm_flag & NFSMNT_SOFT) 239 retries = nmp->nm_retry; 240 else 241 retries = INT_MAX; 242 243 /* 244 * We need to switch to mount-point creds so that we can send 245 * packets from a privileged port. Reference mnt_cred and 246 * switch to them before unlocking the vnode, since mount 247 * point could be unmounted right after unlock. 248 */ 249 cred = td->td_ucred; 250 td->td_ucred = vp->v_mount->mnt_cred; 251 crhold(td->td_ucred); 252 if (unlock_vp) 253 VOP_UNLOCK(vp); 254 255 host = nlm_find_host_by_name(servername, sa, vers); 256 auth = authunix_create(cred); 257 memset(&ext, 0, sizeof(ext)); 258 259 nf.nf_printed = FALSE; 260 nf.nf_nmp = nmp; 261 ext.rc_auth = auth; 262 263 ext.rc_feedback = nlm_feedback; 264 ext.rc_feedback_arg = &nf; 265 ext.rc_timers = NULL; 266 267 ns = NULL; 268 if (flags & F_FLOCK) { 269 ns = nlm_find_svid(id); 270 KASSERT(fl->l_start == 0 && fl->l_len == 0, 271 ("F_FLOCK lock requests must be whole-file locks")); 272 if (!ns->ns_ucred) { 273 /* 274 * Remember the creds used for locking in case 275 * we need to recover the lock later. 276 */ 277 ns->ns_ucred = crdup(cred); 278 } 279 svid = ns->ns_svid; 280 } else if (flags & F_REMOTE) { 281 /* 282 * If we are recovering after a server restart or 283 * trashing locks on a force unmount, use the same 284 * svid as last time. 285 */ 286 svid = fl->l_pid; 287 } else { 288 svid = ((struct proc *) id)->p_pid; 289 } 290 291 switch(op) { 292 case F_SETLK: 293 if ((flags & (F_FLOCK|F_WAIT)) == (F_FLOCK|F_WAIT) 294 && fl->l_type == F_WRLCK) { 295 /* 296 * The semantics for flock(2) require that any 297 * shared lock on the file must be released 298 * before an exclusive lock is granted. The 299 * local locking code interprets this by 300 * unlocking the file before sleeping on a 301 * blocked exclusive lock request. We 302 * approximate this by first attempting 303 * non-blocking and if that fails, we unlock 304 * the file and block. 305 */ 306 error = nlm_setlock(host, &ext, vers, &timo, retries, 307 vp, F_SETLK, fl, flags & ~F_WAIT, 308 svid, fhlen, &fh.fh_bytes, size, reclaim); 309 if (error == EAGAIN) { 310 fl->l_type = F_UNLCK; 311 error = nlm_clearlock(host, &ext, vers, &timo, 312 retries, vp, F_UNLCK, fl, flags, 313 svid, fhlen, &fh.fh_bytes, size); 314 fl->l_type = F_WRLCK; 315 if (!error) { 316 mtx_lock(&nlm_svid_lock); 317 if (ns->ns_active) { 318 ns->ns_refs--; 319 ns->ns_active = FALSE; 320 } 321 mtx_unlock(&nlm_svid_lock); 322 flags |= F_WAIT; 323 error = nlm_setlock(host, &ext, vers, 324 &timo, retries, vp, F_SETLK, fl, 325 flags, svid, fhlen, &fh.fh_bytes, 326 size, reclaim); 327 } 328 } 329 } else { 330 error = nlm_setlock(host, &ext, vers, &timo, retries, 331 vp, op, fl, flags, svid, fhlen, &fh.fh_bytes, 332 size, reclaim); 333 } 334 if (!error && ns) { 335 mtx_lock(&nlm_svid_lock); 336 if (!ns->ns_active) { 337 /* 338 * Add one to the reference count to 339 * hold onto the SVID for the lifetime 340 * of the lock. Note that since 341 * F_FLOCK only supports whole-file 342 * locks, there can only be one active 343 * lock for this SVID. 344 */ 345 ns->ns_refs++; 346 ns->ns_active = TRUE; 347 } 348 mtx_unlock(&nlm_svid_lock); 349 } 350 break; 351 352 case F_UNLCK: 353 error = nlm_clearlock(host, &ext, vers, &timo, retries, 354 vp, op, fl, flags, svid, fhlen, &fh.fh_bytes, size); 355 if (!error && ns) { 356 mtx_lock(&nlm_svid_lock); 357 if (ns->ns_active) { 358 ns->ns_refs--; 359 ns->ns_active = FALSE; 360 } 361 mtx_unlock(&nlm_svid_lock); 362 } 363 break; 364 365 case F_GETLK: 366 error = nlm_getlock(host, &ext, vers, &timo, retries, 367 vp, op, fl, flags, svid, fhlen, &fh.fh_bytes, size); 368 break; 369 370 default: 371 error = EINVAL; 372 break; 373 } 374 375 if (ns) 376 nlm_free_svid(ns); 377 378 cred1 = td->td_ucred; 379 td->td_ucred = cred; 380 crfree(cred1); 381 AUTH_DESTROY(auth); 382 383 nlm_host_release(host); 384 free(servername, M_TEMP); 385 return (error); 386 } 387 388 int 389 nlm_advlock(struct vop_advlock_args *ap) 390 { 391 392 return (nlm_advlock_internal(ap->a_vp, ap->a_id, ap->a_op, ap->a_fl, 393 ap->a_flags, FALSE, TRUE)); 394 } 395 396 /* 397 * Set the creds of td to the creds of the given lock's owner. The new 398 * creds reference count will be incremented via crhold. The caller is 399 * responsible for calling crfree and restoring td's original creds. 400 */ 401 static void 402 nlm_set_creds_for_lock(struct thread *td, struct flock *fl) 403 { 404 int i; 405 struct nlm_file_svid *ns; 406 struct proc *p; 407 struct ucred *cred; 408 409 cred = NULL; 410 if (fl->l_pid > PID_MAX) { 411 /* 412 * If this was originally a F_FLOCK-style lock, we 413 * recorded the creds used when it was originally 414 * locked in the nlm_file_svid structure. 415 */ 416 mtx_lock(&nlm_svid_lock); 417 for (i = 0; i < NLM_SVID_HASH_SIZE; i++) { 418 for (ns = LIST_FIRST(&nlm_file_svids[i]); ns; 419 ns = LIST_NEXT(ns, ns_link)) { 420 if (ns->ns_svid == fl->l_pid) { 421 cred = crhold(ns->ns_ucred); 422 break; 423 } 424 } 425 } 426 mtx_unlock(&nlm_svid_lock); 427 } else { 428 /* 429 * This lock is owned by a process. Get a reference to 430 * the process creds. 431 */ 432 p = pfind(fl->l_pid); 433 if (p) { 434 cred = crhold(p->p_ucred); 435 PROC_UNLOCK(p); 436 } 437 } 438 439 /* 440 * If we can't find a cred, fall back on the recovery 441 * thread's cred. 442 */ 443 if (!cred) { 444 cred = crhold(td->td_ucred); 445 } 446 447 td->td_ucred = cred; 448 } 449 450 static int 451 nlm_reclaim_free_lock(struct vnode *vp, struct flock *fl, void *arg) 452 { 453 struct flock newfl; 454 struct thread *td = curthread; 455 struct ucred *oldcred; 456 int error; 457 458 newfl = *fl; 459 newfl.l_type = F_UNLCK; 460 461 oldcred = td->td_ucred; 462 nlm_set_creds_for_lock(td, &newfl); 463 464 error = nlm_advlock_internal(vp, NULL, F_UNLCK, &newfl, F_REMOTE, 465 FALSE, FALSE); 466 467 crfree(td->td_ucred); 468 td->td_ucred = oldcred; 469 470 return (error); 471 } 472 473 int 474 nlm_reclaim(struct vop_reclaim_args *ap) 475 { 476 477 nlm_cancel_wait(ap->a_vp); 478 lf_iteratelocks_vnode(ap->a_vp, nlm_reclaim_free_lock, NULL); 479 return (0); 480 } 481 482 struct nlm_recovery_context { 483 struct nlm_host *nr_host; /* host we are recovering */ 484 int nr_state; /* remote NSM state for recovery */ 485 }; 486 487 static int 488 nlm_client_recover_lock(struct vnode *vp, struct flock *fl, void *arg) 489 { 490 struct nlm_recovery_context *nr = (struct nlm_recovery_context *) arg; 491 struct thread *td = curthread; 492 struct ucred *oldcred; 493 int state, error; 494 495 /* 496 * If the remote NSM state changes during recovery, the host 497 * must have rebooted a second time. In that case, we must 498 * restart the recovery. 499 */ 500 state = nlm_host_get_state(nr->nr_host); 501 if (nr->nr_state != state) 502 return (ERESTART); 503 504 error = vn_lock(vp, LK_SHARED); 505 if (error) 506 return (error); 507 508 oldcred = td->td_ucred; 509 nlm_set_creds_for_lock(td, fl); 510 511 error = nlm_advlock_internal(vp, NULL, F_SETLK, fl, F_REMOTE, 512 TRUE, TRUE); 513 514 crfree(td->td_ucred); 515 td->td_ucred = oldcred; 516 517 return (error); 518 } 519 520 void 521 nlm_client_recovery(struct nlm_host *host) 522 { 523 struct nlm_recovery_context nr; 524 int sysid, error; 525 526 sysid = NLM_SYSID_CLIENT | nlm_host_get_sysid(host); 527 do { 528 nr.nr_host = host; 529 nr.nr_state = nlm_host_get_state(host); 530 error = lf_iteratelocks_sysid(sysid, 531 nlm_client_recover_lock, &nr); 532 } while (error == ERESTART); 533 } 534 535 static void 536 nlm_convert_to_nlm_lock(struct nlm_lock *dst, struct nlm4_lock *src) 537 { 538 539 dst->caller_name = src->caller_name; 540 dst->fh = src->fh; 541 dst->oh = src->oh; 542 dst->svid = src->svid; 543 dst->l_offset = src->l_offset; 544 dst->l_len = src->l_len; 545 } 546 547 static void 548 nlm_convert_to_nlm4_holder(struct nlm4_holder *dst, struct nlm_holder *src) 549 { 550 551 dst->exclusive = src->exclusive; 552 dst->svid = src->svid; 553 dst->oh = src->oh; 554 dst->l_offset = src->l_offset; 555 dst->l_len = src->l_len; 556 } 557 558 static void 559 nlm_convert_to_nlm4_res(struct nlm4_res *dst, struct nlm_res *src) 560 { 561 dst->cookie = src->cookie; 562 dst->stat.stat = (enum nlm4_stats) src->stat.stat; 563 } 564 565 static enum clnt_stat 566 nlm_test_rpc(rpcvers_t vers, nlm4_testargs *args, nlm4_testres *res, CLIENT *client, 567 struct rpc_callextra *ext, struct timeval timo) 568 { 569 if (vers == NLM_VERS4) { 570 return nlm4_test_4(args, res, client, ext, timo); 571 } else { 572 nlm_testargs args1; 573 nlm_testres res1; 574 enum clnt_stat stat; 575 576 args1.cookie = args->cookie; 577 args1.exclusive = args->exclusive; 578 nlm_convert_to_nlm_lock(&args1.alock, &args->alock); 579 memset(&res1, 0, sizeof(res1)); 580 581 stat = nlm_test_1(&args1, &res1, client, ext, timo); 582 583 if (stat == RPC_SUCCESS) { 584 res->cookie = res1.cookie; 585 res->stat.stat = (enum nlm4_stats) res1.stat.stat; 586 if (res1.stat.stat == nlm_denied) 587 nlm_convert_to_nlm4_holder( 588 &res->stat.nlm4_testrply_u.holder, 589 &res1.stat.nlm_testrply_u.holder); 590 } 591 592 return (stat); 593 } 594 } 595 596 static enum clnt_stat 597 nlm_lock_rpc(rpcvers_t vers, nlm4_lockargs *args, nlm4_res *res, CLIENT *client, 598 struct rpc_callextra *ext, struct timeval timo) 599 { 600 if (vers == NLM_VERS4) { 601 return nlm4_lock_4(args, res, client, ext, timo); 602 } else { 603 nlm_lockargs args1; 604 nlm_res res1; 605 enum clnt_stat stat; 606 607 args1.cookie = args->cookie; 608 args1.block = args->block; 609 args1.exclusive = args->exclusive; 610 nlm_convert_to_nlm_lock(&args1.alock, &args->alock); 611 args1.reclaim = args->reclaim; 612 args1.state = args->state; 613 memset(&res1, 0, sizeof(res1)); 614 615 stat = nlm_lock_1(&args1, &res1, client, ext, timo); 616 617 if (stat == RPC_SUCCESS) { 618 nlm_convert_to_nlm4_res(res, &res1); 619 } 620 621 return (stat); 622 } 623 } 624 625 static enum clnt_stat 626 nlm_cancel_rpc(rpcvers_t vers, nlm4_cancargs *args, nlm4_res *res, CLIENT *client, 627 struct rpc_callextra *ext, struct timeval timo) 628 { 629 if (vers == NLM_VERS4) { 630 return nlm4_cancel_4(args, res, client, ext, timo); 631 } else { 632 nlm_cancargs args1; 633 nlm_res res1; 634 enum clnt_stat stat; 635 636 args1.cookie = args->cookie; 637 args1.block = args->block; 638 args1.exclusive = args->exclusive; 639 nlm_convert_to_nlm_lock(&args1.alock, &args->alock); 640 memset(&res1, 0, sizeof(res1)); 641 642 stat = nlm_cancel_1(&args1, &res1, client, ext, timo); 643 644 if (stat == RPC_SUCCESS) { 645 nlm_convert_to_nlm4_res(res, &res1); 646 } 647 648 return (stat); 649 } 650 } 651 652 static enum clnt_stat 653 nlm_unlock_rpc(rpcvers_t vers, nlm4_unlockargs *args, nlm4_res *res, CLIENT *client, 654 struct rpc_callextra *ext, struct timeval timo) 655 { 656 if (vers == NLM_VERS4) { 657 return nlm4_unlock_4(args, res, client, ext, timo); 658 } else { 659 nlm_unlockargs args1; 660 nlm_res res1; 661 enum clnt_stat stat; 662 663 args1.cookie = args->cookie; 664 nlm_convert_to_nlm_lock(&args1.alock, &args->alock); 665 memset(&res1, 0, sizeof(res1)); 666 667 stat = nlm_unlock_1(&args1, &res1, client, ext, timo); 668 669 if (stat == RPC_SUCCESS) { 670 nlm_convert_to_nlm4_res(res, &res1); 671 } 672 673 return (stat); 674 } 675 } 676 677 /* 678 * Called after a lock request (set or clear) succeeded. We record the 679 * details in the local lock manager. Note that since the remote 680 * server has granted the lock, we can be sure that it doesn't 681 * conflict with any other locks we have in the local lock manager. 682 * 683 * Since it is possible that host may also make NLM client requests to 684 * our NLM server, we use a different sysid value to record our own 685 * client locks. 686 * 687 * Note that since it is possible for us to receive replies from the 688 * server in a different order than the locks were granted (e.g. if 689 * many local threads are contending for the same lock), we must use a 690 * blocking operation when registering with the local lock manager. 691 * We expect that any actual wait will be rare and short hence we 692 * ignore signals for this. 693 */ 694 static void 695 nlm_record_lock(struct vnode *vp, int op, struct flock *fl, 696 int svid, int sysid, off_t size) 697 { 698 struct vop_advlockasync_args a; 699 struct flock newfl; 700 struct proc *p; 701 int error, stops_deferred; 702 703 a.a_vp = vp; 704 a.a_id = NULL; 705 a.a_op = op; 706 a.a_fl = &newfl; 707 a.a_flags = F_REMOTE|F_WAIT|F_NOINTR; 708 a.a_task = NULL; 709 a.a_cookiep = NULL; 710 newfl.l_start = fl->l_start; 711 newfl.l_len = fl->l_len; 712 newfl.l_type = fl->l_type; 713 newfl.l_whence = fl->l_whence; 714 newfl.l_pid = svid; 715 newfl.l_sysid = NLM_SYSID_CLIENT | sysid; 716 717 for (;;) { 718 error = lf_advlockasync(&a, &vp->v_lockf, size); 719 if (error == EDEADLK) { 720 /* 721 * Locks are associated with the processes and 722 * not with threads. Suppose we have two 723 * threads A1 A2 in one process, A1 locked 724 * file f1, A2 is locking file f2, and A1 is 725 * unlocking f1. Then remote server may 726 * already unlocked f1, while local still not 727 * yet scheduled A1 to make the call to local 728 * advlock manager. The process B owns lock on 729 * f2 and issued the lock on f1. Remote would 730 * grant B the request on f1, but local would 731 * return EDEADLK. 732 */ 733 pause("nlmdlk", 1); 734 p = curproc; 735 stops_deferred = sigdeferstop(SIGDEFERSTOP_OFF); 736 PROC_LOCK(p); 737 thread_suspend_check(0); 738 PROC_UNLOCK(p); 739 sigallowstop(stops_deferred); 740 } else if (error == EINTR) { 741 /* 742 * lf_purgelocks() might wake up the lock 743 * waiter and removed our lock graph edges. 744 * There is no sense in re-trying recording 745 * the lock to the local manager after 746 * reclaim. 747 */ 748 error = 0; 749 break; 750 } else 751 break; 752 } 753 KASSERT(error == 0 || error == ENOENT, 754 ("Failed to register NFS lock locally - error=%d", error)); 755 } 756 757 static int 758 nlm_setlock(struct nlm_host *host, struct rpc_callextra *ext, 759 rpcvers_t vers, struct timeval *timo, int retries, 760 struct vnode *vp, int op, struct flock *fl, int flags, 761 int svid, size_t fhlen, void *fh, off_t size, bool_t reclaim) 762 { 763 struct nlm4_lockargs args; 764 char oh_space[32]; 765 struct nlm4_res res; 766 u_int xid; 767 CLIENT *client; 768 enum clnt_stat stat; 769 int retry, block, exclusive; 770 void *wait_handle = NULL; 771 int error; 772 773 memset(&args, 0, sizeof(args)); 774 memset(&res, 0, sizeof(res)); 775 776 block = (flags & F_WAIT) ? TRUE : FALSE; 777 exclusive = (fl->l_type == F_WRLCK); 778 779 error = nlm_init_lock(fl, flags, svid, vers, fhlen, fh, size, 780 &args.alock, oh_space); 781 if (error) 782 return (error); 783 args.block = block; 784 args.exclusive = exclusive; 785 args.reclaim = reclaim; 786 args.state = nlm_nsm_state; 787 788 retry = 5*hz; 789 for (;;) { 790 client = nlm_host_get_rpc(host, FALSE); 791 if (!client) 792 return (ENOLCK); /* XXX retry? */ 793 794 if (block) 795 wait_handle = nlm_register_wait_lock(&args.alock, vp); 796 797 xid = atomic_fetchadd_int(&nlm_xid, 1); 798 args.cookie.n_len = sizeof(xid); 799 args.cookie.n_bytes = (char*) &xid; 800 801 stat = nlm_lock_rpc(vers, &args, &res, client, ext, *timo); 802 803 CLNT_RELEASE(client); 804 805 if (stat != RPC_SUCCESS) { 806 if (block) 807 nlm_deregister_wait_lock(wait_handle); 808 if (retries) { 809 retries--; 810 continue; 811 } 812 return (EINVAL); 813 } 814 815 /* 816 * Free res.cookie. 817 */ 818 xdr_free((xdrproc_t) xdr_nlm4_res, &res); 819 820 if (block && res.stat.stat != nlm4_blocked) 821 nlm_deregister_wait_lock(wait_handle); 822 823 if (res.stat.stat == nlm4_denied_grace_period) { 824 /* 825 * The server has recently rebooted and is 826 * giving old clients a change to reclaim 827 * their locks. Wait for a few seconds and try 828 * again. 829 */ 830 error = tsleep(&args, PCATCH, "nlmgrace", retry); 831 if (error && error != EWOULDBLOCK) 832 return (error); 833 retry = 2*retry; 834 if (retry > 30*hz) 835 retry = 30*hz; 836 continue; 837 } 838 839 if (block && res.stat.stat == nlm4_blocked) { 840 /* 841 * The server should call us back with a 842 * granted message when the lock succeeds. In 843 * order to deal with broken servers, lost 844 * granted messages and server reboots, we 845 * will also re-try every few seconds. 846 */ 847 error = nlm_wait_lock(wait_handle, retry); 848 if (error == EWOULDBLOCK) { 849 retry = 2*retry; 850 if (retry > 30*hz) 851 retry = 30*hz; 852 continue; 853 } 854 if (error) { 855 /* 856 * We need to call the server to 857 * cancel our lock request. 858 */ 859 nlm4_cancargs cancel; 860 861 memset(&cancel, 0, sizeof(cancel)); 862 863 xid = atomic_fetchadd_int(&nlm_xid, 1); 864 cancel.cookie.n_len = sizeof(xid); 865 cancel.cookie.n_bytes = (char*) &xid; 866 cancel.block = block; 867 cancel.exclusive = exclusive; 868 cancel.alock = args.alock; 869 870 do { 871 client = nlm_host_get_rpc(host, FALSE); 872 if (!client) 873 /* XXX retry? */ 874 return (ENOLCK); 875 876 stat = nlm_cancel_rpc(vers, &cancel, 877 &res, client, ext, *timo); 878 879 CLNT_RELEASE(client); 880 881 if (stat != RPC_SUCCESS) { 882 /* 883 * We need to cope 884 * with temporary 885 * network partitions 886 * as well as server 887 * reboots. This means 888 * we have to keep 889 * trying to cancel 890 * until the server 891 * wakes up again. 892 */ 893 pause("nlmcancel", 10*hz); 894 } 895 } while (stat != RPC_SUCCESS); 896 897 /* 898 * Free res.cookie. 899 */ 900 xdr_free((xdrproc_t) xdr_nlm4_res, &res); 901 902 switch (res.stat.stat) { 903 case nlm_denied: 904 /* 905 * There was nothing 906 * to cancel. We are 907 * going to go ahead 908 * and assume we got 909 * the lock. 910 */ 911 error = 0; 912 break; 913 914 case nlm4_denied_grace_period: 915 /* 916 * The server has 917 * recently rebooted - 918 * treat this as a 919 * successful 920 * cancellation. 921 */ 922 break; 923 924 case nlm4_granted: 925 /* 926 * We managed to 927 * cancel. 928 */ 929 break; 930 931 default: 932 /* 933 * Broken server 934 * implementation - 935 * can't really do 936 * anything here. 937 */ 938 break; 939 } 940 } 941 } else { 942 error = nlm_map_status(res.stat.stat); 943 } 944 945 if (!error && !reclaim) { 946 nlm_record_lock(vp, op, fl, args.alock.svid, 947 nlm_host_get_sysid(host), size); 948 nlm_host_monitor(host, 0); 949 } 950 951 return (error); 952 } 953 } 954 955 static int 956 nlm_clearlock(struct nlm_host *host, struct rpc_callextra *ext, 957 rpcvers_t vers, struct timeval *timo, int retries, 958 struct vnode *vp, int op, struct flock *fl, int flags, 959 int svid, size_t fhlen, void *fh, off_t size) 960 { 961 struct nlm4_unlockargs args; 962 char oh_space[32]; 963 struct nlm4_res res; 964 u_int xid; 965 CLIENT *client; 966 enum clnt_stat stat; 967 int error; 968 969 memset(&args, 0, sizeof(args)); 970 memset(&res, 0, sizeof(res)); 971 972 error = nlm_init_lock(fl, flags, svid, vers, fhlen, fh, size, 973 &args.alock, oh_space); 974 if (error) 975 return (error); 976 977 for (;;) { 978 client = nlm_host_get_rpc(host, FALSE); 979 if (!client) 980 return (ENOLCK); /* XXX retry? */ 981 982 xid = atomic_fetchadd_int(&nlm_xid, 1); 983 args.cookie.n_len = sizeof(xid); 984 args.cookie.n_bytes = (char*) &xid; 985 986 stat = nlm_unlock_rpc(vers, &args, &res, client, ext, *timo); 987 988 CLNT_RELEASE(client); 989 990 if (stat != RPC_SUCCESS) { 991 if (retries) { 992 retries--; 993 continue; 994 } 995 return (EINVAL); 996 } 997 998 /* 999 * Free res.cookie. 1000 */ 1001 xdr_free((xdrproc_t) xdr_nlm4_res, &res); 1002 1003 if (res.stat.stat == nlm4_denied_grace_period) { 1004 /* 1005 * The server has recently rebooted and is 1006 * giving old clients a change to reclaim 1007 * their locks. Wait for a few seconds and try 1008 * again. 1009 */ 1010 error = tsleep(&args, PCATCH, "nlmgrace", 5*hz); 1011 if (error && error != EWOULDBLOCK) 1012 return (error); 1013 continue; 1014 } 1015 1016 /* 1017 * If we are being called via nlm_reclaim (which will 1018 * use the F_REMOTE flag), don't record the lock 1019 * operation in the local lock manager since the vnode 1020 * is going away. 1021 */ 1022 if (!(flags & F_REMOTE)) 1023 nlm_record_lock(vp, op, fl, args.alock.svid, 1024 nlm_host_get_sysid(host), size); 1025 1026 return (0); 1027 } 1028 } 1029 1030 static int 1031 nlm_getlock(struct nlm_host *host, struct rpc_callextra *ext, 1032 rpcvers_t vers, struct timeval *timo, int retries, 1033 struct vnode *vp, int op, struct flock *fl, int flags, 1034 int svid, size_t fhlen, void *fh, off_t size) 1035 { 1036 struct nlm4_testargs args; 1037 char oh_space[32]; 1038 struct nlm4_testres res; 1039 u_int xid; 1040 CLIENT *client; 1041 enum clnt_stat stat; 1042 int exclusive; 1043 int error; 1044 1045 KASSERT(!(flags & F_FLOCK), ("unexpected F_FLOCK for F_GETLK")); 1046 1047 memset(&args, 0, sizeof(args)); 1048 memset(&res, 0, sizeof(res)); 1049 1050 exclusive = (fl->l_type == F_WRLCK); 1051 1052 error = nlm_init_lock(fl, flags, svid, vers, fhlen, fh, size, 1053 &args.alock, oh_space); 1054 if (error) 1055 return (error); 1056 args.exclusive = exclusive; 1057 1058 for (;;) { 1059 client = nlm_host_get_rpc(host, FALSE); 1060 if (!client) 1061 return (ENOLCK); /* XXX retry? */ 1062 1063 xid = atomic_fetchadd_int(&nlm_xid, 1); 1064 args.cookie.n_len = sizeof(xid); 1065 args.cookie.n_bytes = (char*) &xid; 1066 1067 stat = nlm_test_rpc(vers, &args, &res, client, ext, *timo); 1068 1069 CLNT_RELEASE(client); 1070 1071 if (stat != RPC_SUCCESS) { 1072 if (retries) { 1073 retries--; 1074 continue; 1075 } 1076 return (EINVAL); 1077 } 1078 1079 if (res.stat.stat == nlm4_denied_grace_period) { 1080 /* 1081 * The server has recently rebooted and is 1082 * giving old clients a change to reclaim 1083 * their locks. Wait for a few seconds and try 1084 * again. 1085 */ 1086 xdr_free((xdrproc_t) xdr_nlm4_testres, &res); 1087 error = tsleep(&args, PCATCH, "nlmgrace", 5*hz); 1088 if (error && error != EWOULDBLOCK) 1089 return (error); 1090 continue; 1091 } 1092 1093 if (res.stat.stat == nlm4_denied) { 1094 struct nlm4_holder *h = 1095 &res.stat.nlm4_testrply_u.holder; 1096 fl->l_start = h->l_offset; 1097 fl->l_len = h->l_len; 1098 fl->l_pid = h->svid; 1099 if (h->exclusive) 1100 fl->l_type = F_WRLCK; 1101 else 1102 fl->l_type = F_RDLCK; 1103 fl->l_whence = SEEK_SET; 1104 fl->l_sysid = 0; 1105 } else { 1106 fl->l_type = F_UNLCK; 1107 } 1108 1109 xdr_free((xdrproc_t) xdr_nlm4_testres, &res); 1110 1111 return (0); 1112 } 1113 } 1114 1115 static int 1116 nlm_map_status(nlm4_stats stat) 1117 { 1118 switch (stat) { 1119 case nlm4_granted: 1120 return (0); 1121 1122 case nlm4_denied: 1123 return (EAGAIN); 1124 1125 case nlm4_denied_nolocks: 1126 return (ENOLCK); 1127 1128 case nlm4_deadlck: 1129 return (EDEADLK); 1130 1131 case nlm4_rofs: 1132 return (EROFS); 1133 1134 case nlm4_stale_fh: 1135 return (ESTALE); 1136 1137 case nlm4_fbig: 1138 return (EFBIG); 1139 1140 case nlm4_failed: 1141 return (EACCES); 1142 1143 default: 1144 return (EINVAL); 1145 } 1146 } 1147 1148 static struct nlm_file_svid * 1149 nlm_find_svid(void *id) 1150 { 1151 struct nlm_file_svid *ns, *newns; 1152 int h; 1153 1154 h = (((uintptr_t) id) >> 7) % NLM_SVID_HASH_SIZE; 1155 1156 mtx_lock(&nlm_svid_lock); 1157 LIST_FOREACH(ns, &nlm_file_svids[h], ns_link) { 1158 if (ns->ns_id == id) { 1159 ns->ns_refs++; 1160 break; 1161 } 1162 } 1163 mtx_unlock(&nlm_svid_lock); 1164 if (!ns) { 1165 int svid = alloc_unr(nlm_svid_allocator); 1166 newns = malloc(sizeof(struct nlm_file_svid), M_NLM, 1167 M_WAITOK); 1168 newns->ns_refs = 1; 1169 newns->ns_id = id; 1170 newns->ns_svid = svid; 1171 newns->ns_ucred = NULL; 1172 newns->ns_active = FALSE; 1173 1174 /* 1175 * We need to check for a race with some other 1176 * thread allocating a svid for this file. 1177 */ 1178 mtx_lock(&nlm_svid_lock); 1179 LIST_FOREACH(ns, &nlm_file_svids[h], ns_link) { 1180 if (ns->ns_id == id) { 1181 ns->ns_refs++; 1182 break; 1183 } 1184 } 1185 if (ns) { 1186 mtx_unlock(&nlm_svid_lock); 1187 free_unr(nlm_svid_allocator, newns->ns_svid); 1188 free(newns, M_NLM); 1189 } else { 1190 LIST_INSERT_HEAD(&nlm_file_svids[h], newns, 1191 ns_link); 1192 ns = newns; 1193 mtx_unlock(&nlm_svid_lock); 1194 } 1195 } 1196 1197 return (ns); 1198 } 1199 1200 static void 1201 nlm_free_svid(struct nlm_file_svid *ns) 1202 { 1203 1204 mtx_lock(&nlm_svid_lock); 1205 ns->ns_refs--; 1206 if (!ns->ns_refs) { 1207 KASSERT(!ns->ns_active, ("Freeing active SVID")); 1208 LIST_REMOVE(ns, ns_link); 1209 mtx_unlock(&nlm_svid_lock); 1210 free_unr(nlm_svid_allocator, ns->ns_svid); 1211 if (ns->ns_ucred) 1212 crfree(ns->ns_ucred); 1213 free(ns, M_NLM); 1214 } else { 1215 mtx_unlock(&nlm_svid_lock); 1216 } 1217 } 1218 1219 static int 1220 nlm_init_lock(struct flock *fl, int flags, int svid, 1221 rpcvers_t vers, size_t fhlen, void *fh, off_t size, 1222 struct nlm4_lock *lock, char oh_space[32]) 1223 { 1224 size_t oh_len; 1225 off_t start, len; 1226 1227 if (fl->l_whence == SEEK_END) { 1228 if (size > OFF_MAX 1229 || (fl->l_start > 0 && size > OFF_MAX - fl->l_start)) 1230 return (EOVERFLOW); 1231 start = size + fl->l_start; 1232 } else if (fl->l_whence == SEEK_SET || fl->l_whence == SEEK_CUR) { 1233 start = fl->l_start; 1234 } else { 1235 return (EINVAL); 1236 } 1237 if (start < 0) 1238 return (EINVAL); 1239 if (fl->l_len < 0) { 1240 len = -fl->l_len; 1241 start -= len; 1242 if (start < 0) 1243 return (EINVAL); 1244 } else { 1245 len = fl->l_len; 1246 } 1247 1248 if (vers == NLM_VERS) { 1249 /* 1250 * Enforce range limits on V1 locks 1251 */ 1252 if (start > 0xffffffffLL || len > 0xffffffffLL) 1253 return (EOVERFLOW); 1254 } 1255 1256 snprintf(oh_space, 32, "%d@", svid); 1257 oh_len = strlen(oh_space); 1258 getcredhostname(NULL, oh_space + oh_len, 32 - oh_len); 1259 oh_len = strlen(oh_space); 1260 1261 memset(lock, 0, sizeof(*lock)); 1262 lock->caller_name = prison0.pr_hostname; 1263 lock->fh.n_len = fhlen; 1264 lock->fh.n_bytes = fh; 1265 lock->oh.n_len = oh_len; 1266 lock->oh.n_bytes = oh_space; 1267 lock->svid = svid; 1268 lock->l_offset = start; 1269 lock->l_len = len; 1270 1271 return (0); 1272 } 1273