xref: /illumos-gate/usr/src/uts/common/fs/nfs/nfs4_srv_deleg.c (revision f44e1126d9eae71c48c5d1de51e24750c6ec20a4)
17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
5da1b9cd5Sjwahlig  * Common Development and Distribution License (the "License").
6da1b9cd5Sjwahlig  * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate  * and limitations under the License.
127c478bd9Sstevel@tonic-gate  *
137c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate  *
197c478bd9Sstevel@tonic-gate  * CDDL HEADER END
207c478bd9Sstevel@tonic-gate  */
2159927d31SYuri Pankov 
227c478bd9Sstevel@tonic-gate /*
23878aca8dSDai Ngo  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
247c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
250dfe541eSEvan Layton  */
260dfe541eSEvan Layton 
270dfe541eSEvan Layton /*
280dfe541eSEvan Layton  * Copyright 2018 Nexenta Systems, Inc.
297c478bd9Sstevel@tonic-gate  */
307c478bd9Sstevel@tonic-gate 
317c478bd9Sstevel@tonic-gate #include <sys/systm.h>
327c478bd9Sstevel@tonic-gate #include <rpc/auth.h>
337c478bd9Sstevel@tonic-gate #include <rpc/clnt.h>
347c478bd9Sstevel@tonic-gate #include <nfs/nfs4_kprot.h>
357c478bd9Sstevel@tonic-gate #include <nfs/nfs4.h>
367c478bd9Sstevel@tonic-gate #include <nfs/lm.h>
377c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h>
387c478bd9Sstevel@tonic-gate #include <sys/disp.h>
39f3b585ceSsamf #include <sys/sdt.h>
407c478bd9Sstevel@tonic-gate 
417c478bd9Sstevel@tonic-gate #include <sys/pathname.h>
427c478bd9Sstevel@tonic-gate 
437c478bd9Sstevel@tonic-gate #include <sys/strsubr.h>
447c478bd9Sstevel@tonic-gate #include <sys/ddi.h>
457c478bd9Sstevel@tonic-gate 
467c478bd9Sstevel@tonic-gate #include <sys/vnode.h>
47ed57cab9Srg137905 #include <sys/sdt.h>
487c478bd9Sstevel@tonic-gate #include <inet/common.h>
497c478bd9Sstevel@tonic-gate #include <inet/ip.h>
507c478bd9Sstevel@tonic-gate #include <inet/ip6.h>
517c478bd9Sstevel@tonic-gate 
527c478bd9Sstevel@tonic-gate #define	MAX_READ_DELEGATIONS 5
537c478bd9Sstevel@tonic-gate 
547c478bd9Sstevel@tonic-gate static int rfs4_deleg_disabled;
55878aca8dSDai Ngo static int rfs4_max_setup_cb_tries = 5;
567c478bd9Sstevel@tonic-gate 
577c478bd9Sstevel@tonic-gate #ifdef DEBUG
587c478bd9Sstevel@tonic-gate 
597c478bd9Sstevel@tonic-gate int rfs4_cb_null;
607c478bd9Sstevel@tonic-gate int rfs4_cb_debug;
617c478bd9Sstevel@tonic-gate int rfs4_deleg_debug;
627c478bd9Sstevel@tonic-gate 
637c478bd9Sstevel@tonic-gate #endif
647c478bd9Sstevel@tonic-gate 
657c478bd9Sstevel@tonic-gate static void rfs4_recall_file(rfs4_file_t *,
667c478bd9Sstevel@tonic-gate     void (*recall)(rfs4_deleg_state_t *, bool_t),
677c478bd9Sstevel@tonic-gate     bool_t, rfs4_client_t *);
687c478bd9Sstevel@tonic-gate static	void		rfs4_revoke_file(rfs4_file_t *);
697c478bd9Sstevel@tonic-gate static	void		rfs4_cb_chflush(rfs4_cbinfo_t *);
707c478bd9Sstevel@tonic-gate static	CLIENT		*rfs4_cb_getch(rfs4_cbinfo_t *);
717c478bd9Sstevel@tonic-gate static	void		rfs4_cb_freech(rfs4_cbinfo_t *, CLIENT *, bool_t);
727c478bd9Sstevel@tonic-gate static rfs4_deleg_state_t *rfs4_deleg_state(rfs4_state_t *,
737c478bd9Sstevel@tonic-gate     open_delegation_type4, int *);
747c478bd9Sstevel@tonic-gate 
757c478bd9Sstevel@tonic-gate /*
767c478bd9Sstevel@tonic-gate  * Convert a universal address to an transport specific
777c478bd9Sstevel@tonic-gate  * address using inet_pton.
787c478bd9Sstevel@tonic-gate  */
797c478bd9Sstevel@tonic-gate static int
uaddr2sockaddr(int af,char * ua,void * ap,in_port_t * pp)807c478bd9Sstevel@tonic-gate uaddr2sockaddr(int af, char *ua, void *ap, in_port_t *pp)
817c478bd9Sstevel@tonic-gate {
827c478bd9Sstevel@tonic-gate 	int dots = 0, i, j, len, k;
837c478bd9Sstevel@tonic-gate 	unsigned char c;
847c478bd9Sstevel@tonic-gate 	in_port_t port = 0;
857c478bd9Sstevel@tonic-gate 
867c478bd9Sstevel@tonic-gate 	len = strlen(ua);
877c478bd9Sstevel@tonic-gate 
887c478bd9Sstevel@tonic-gate 	for (i = len-1; i >= 0; i--) {
897c478bd9Sstevel@tonic-gate 
907c478bd9Sstevel@tonic-gate 		if (ua[i] == '.')
917c478bd9Sstevel@tonic-gate 			dots++;
927c478bd9Sstevel@tonic-gate 
937c478bd9Sstevel@tonic-gate 		if (dots == 2) {
947c478bd9Sstevel@tonic-gate 
957c478bd9Sstevel@tonic-gate 			ua[i] = '\0';
967c478bd9Sstevel@tonic-gate 			/*
977c478bd9Sstevel@tonic-gate 			 * We use k to remember were to stick '.' back, since
987c478bd9Sstevel@tonic-gate 			 * ua was kmem_allocateded from the pool len+1.
997c478bd9Sstevel@tonic-gate 			 */
1007c478bd9Sstevel@tonic-gate 			k = i;
1017c478bd9Sstevel@tonic-gate 			if (inet_pton(af, ua, ap) == 1) {
1027c478bd9Sstevel@tonic-gate 
1037c478bd9Sstevel@tonic-gate 				c = 0;
1047c478bd9Sstevel@tonic-gate 
1057c478bd9Sstevel@tonic-gate 				for (j = i+1; j < len; j++) {
1067c478bd9Sstevel@tonic-gate 					if (ua[j] == '.') {
1077c478bd9Sstevel@tonic-gate 						port = c << 8;
1087c478bd9Sstevel@tonic-gate 						c = 0;
1097c478bd9Sstevel@tonic-gate 					} else if (ua[j] >= '0' &&
1107c478bd9Sstevel@tonic-gate 					    ua[j] <= '9') {
1117c478bd9Sstevel@tonic-gate 						c *= 10;
1127c478bd9Sstevel@tonic-gate 						c += ua[j] - '0';
1137c478bd9Sstevel@tonic-gate 					} else {
1147c478bd9Sstevel@tonic-gate 						ua[k] = '.';
1157c478bd9Sstevel@tonic-gate 						return (EINVAL);
1167c478bd9Sstevel@tonic-gate 					}
1177c478bd9Sstevel@tonic-gate 				}
1187c478bd9Sstevel@tonic-gate 				port += c;
1197c478bd9Sstevel@tonic-gate 
1207c478bd9Sstevel@tonic-gate 				*pp = htons(port);
1217c478bd9Sstevel@tonic-gate 
1227c478bd9Sstevel@tonic-gate 				ua[k] = '.';
1237c478bd9Sstevel@tonic-gate 				return (0);
1247c478bd9Sstevel@tonic-gate 			} else {
1257c478bd9Sstevel@tonic-gate 				ua[k] = '.';
1267c478bd9Sstevel@tonic-gate 				return (EINVAL);
1277c478bd9Sstevel@tonic-gate 			}
1287c478bd9Sstevel@tonic-gate 		}
1297c478bd9Sstevel@tonic-gate 	}
1307c478bd9Sstevel@tonic-gate 
1317c478bd9Sstevel@tonic-gate 	return (EINVAL);
1327c478bd9Sstevel@tonic-gate }
1337c478bd9Sstevel@tonic-gate 
1347c478bd9Sstevel@tonic-gate /*
1357c478bd9Sstevel@tonic-gate  * Update the delegation policy with the
1367c478bd9Sstevel@tonic-gate  * value of "new_policy"
1377c478bd9Sstevel@tonic-gate  */
1387c478bd9Sstevel@tonic-gate void
rfs4_set_deleg_policy(nfs4_srv_t * nsrv4,srv_deleg_policy_t new_policy)1390dfe541eSEvan Layton rfs4_set_deleg_policy(nfs4_srv_t *nsrv4, srv_deleg_policy_t new_policy)
1407c478bd9Sstevel@tonic-gate {
1410dfe541eSEvan Layton 	rw_enter(&nsrv4->deleg_policy_lock, RW_WRITER);
1420dfe541eSEvan Layton 	nsrv4->nfs4_deleg_policy = new_policy;
1430dfe541eSEvan Layton 	rw_exit(&nsrv4->deleg_policy_lock);
1447c478bd9Sstevel@tonic-gate }
1457c478bd9Sstevel@tonic-gate 
1467c478bd9Sstevel@tonic-gate void
rfs4_hold_deleg_policy(nfs4_srv_t * nsrv4)1470dfe541eSEvan Layton rfs4_hold_deleg_policy(nfs4_srv_t *nsrv4)
1487c478bd9Sstevel@tonic-gate {
1490dfe541eSEvan Layton 	rw_enter(&nsrv4->deleg_policy_lock, RW_READER);
1507c478bd9Sstevel@tonic-gate }
1517c478bd9Sstevel@tonic-gate 
1527c478bd9Sstevel@tonic-gate void
rfs4_rele_deleg_policy(nfs4_srv_t * nsrv4)1530dfe541eSEvan Layton rfs4_rele_deleg_policy(nfs4_srv_t *nsrv4)
1547c478bd9Sstevel@tonic-gate {
1550dfe541eSEvan Layton 	rw_exit(&nsrv4->deleg_policy_lock);
1560dfe541eSEvan Layton }
1570dfe541eSEvan Layton 
1580dfe541eSEvan Layton srv_deleg_policy_t
nfs4_get_deleg_policy()1590dfe541eSEvan Layton nfs4_get_deleg_policy()
1600dfe541eSEvan Layton {
1610dfe541eSEvan Layton 	nfs4_srv_t *nsrv4 = nfs4_get_srv();
1620dfe541eSEvan Layton 	return (nsrv4->nfs4_deleg_policy);
1637c478bd9Sstevel@tonic-gate }
1647c478bd9Sstevel@tonic-gate 
1657c478bd9Sstevel@tonic-gate 
1667c478bd9Sstevel@tonic-gate /*
1677c478bd9Sstevel@tonic-gate  * This free function is to be used when the client struct is being
1687c478bd9Sstevel@tonic-gate  * released and nothing at all is needed of the callback info any
1697c478bd9Sstevel@tonic-gate  * longer.
1707c478bd9Sstevel@tonic-gate  */
1717c478bd9Sstevel@tonic-gate void
rfs4_cbinfo_free(rfs4_cbinfo_t * cbp)1727c478bd9Sstevel@tonic-gate rfs4_cbinfo_free(rfs4_cbinfo_t *cbp)
1737c478bd9Sstevel@tonic-gate {
1747c478bd9Sstevel@tonic-gate 	char *addr = cbp->cb_callback.cb_location.r_addr;
1757c478bd9Sstevel@tonic-gate 	char *netid = cbp->cb_callback.cb_location.r_netid;
1767c478bd9Sstevel@tonic-gate 
1777c478bd9Sstevel@tonic-gate 	/* Free old address if any */
1787c478bd9Sstevel@tonic-gate 
1797c478bd9Sstevel@tonic-gate 	if (addr)
1807c478bd9Sstevel@tonic-gate 		kmem_free(addr, strlen(addr) + 1);
1817c478bd9Sstevel@tonic-gate 	if (netid)
1827c478bd9Sstevel@tonic-gate 		kmem_free(netid, strlen(netid) + 1);
1837c478bd9Sstevel@tonic-gate 
1847c478bd9Sstevel@tonic-gate 	addr = cbp->cb_newer.cb_callback.cb_location.r_addr;
1857c478bd9Sstevel@tonic-gate 	netid = cbp->cb_newer.cb_callback.cb_location.r_netid;
1867c478bd9Sstevel@tonic-gate 
1877c478bd9Sstevel@tonic-gate 	if (addr)
1887c478bd9Sstevel@tonic-gate 		kmem_free(addr, strlen(addr) + 1);
1897c478bd9Sstevel@tonic-gate 	if (netid)
1907c478bd9Sstevel@tonic-gate 		kmem_free(netid, strlen(netid) + 1);
1917c478bd9Sstevel@tonic-gate 
1927c478bd9Sstevel@tonic-gate 	if (cbp->cb_chc_free) {
1937c478bd9Sstevel@tonic-gate 		rfs4_cb_chflush(cbp);
1947c478bd9Sstevel@tonic-gate 	}
1957c478bd9Sstevel@tonic-gate }
1967c478bd9Sstevel@tonic-gate 
1977c478bd9Sstevel@tonic-gate /*
1987c478bd9Sstevel@tonic-gate  * The server uses this to check the callback path supplied by the
1997c478bd9Sstevel@tonic-gate  * client.  The callback connection is marked "in progress" while this
2007c478bd9Sstevel@tonic-gate  * work is going on and then eventually marked either OK or FAILED.
2017c478bd9Sstevel@tonic-gate  * This work can be done as part of a separate thread and at the end
2027c478bd9Sstevel@tonic-gate  * of this the thread will exit or it may be done such that the caller
2037c478bd9Sstevel@tonic-gate  * will continue with other work.
2047c478bd9Sstevel@tonic-gate  */
2057c478bd9Sstevel@tonic-gate static void
rfs4_do_cb_null(rfs4_client_t * cp)2067c478bd9Sstevel@tonic-gate rfs4_do_cb_null(rfs4_client_t *cp)
2077c478bd9Sstevel@tonic-gate {
2087c478bd9Sstevel@tonic-gate 	struct timeval tv;
2097c478bd9Sstevel@tonic-gate 	CLIENT *ch;
2107c478bd9Sstevel@tonic-gate 	rfs4_cbstate_t newstate;
211d216dff5SRobert Mastors 	rfs4_cbinfo_t *cbp = &cp->rc_cbinfo;
2127c478bd9Sstevel@tonic-gate 
2137c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
2147c478bd9Sstevel@tonic-gate 	/* If another thread is doing CB_NULL RPC then return */
2157c478bd9Sstevel@tonic-gate 	if (cbp->cb_nullcaller == TRUE) {
2167c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
2177c478bd9Sstevel@tonic-gate 		rfs4_client_rele(cp);
2180dfe541eSEvan Layton 		zthread_exit();
2197c478bd9Sstevel@tonic-gate 	}
2207c478bd9Sstevel@tonic-gate 
2217c478bd9Sstevel@tonic-gate 	/* Mark the cbinfo as having a thread in the NULL callback */
2227c478bd9Sstevel@tonic-gate 	cbp->cb_nullcaller = TRUE;
2237c478bd9Sstevel@tonic-gate 
2247c478bd9Sstevel@tonic-gate 	/*
2257c478bd9Sstevel@tonic-gate 	 * Are there other threads still using the cbinfo client
2267c478bd9Sstevel@tonic-gate 	 * handles?  If so, this thread must wait before going and
2277c478bd9Sstevel@tonic-gate 	 * mucking aroiund with the callback information
2287c478bd9Sstevel@tonic-gate 	 */
229a31a5cfdSsamf 	while (cbp->cb_refcnt != 0)
2307c478bd9Sstevel@tonic-gate 		cv_wait(cbp->cb_cv_nullcaller, cbp->cb_lock);
2317c478bd9Sstevel@tonic-gate 
2327c478bd9Sstevel@tonic-gate 	/*
2337c478bd9Sstevel@tonic-gate 	 * This thread itself may find that new callback info has
2347c478bd9Sstevel@tonic-gate 	 * arrived and is set up to handle this case and redrive the
2357c478bd9Sstevel@tonic-gate 	 * call to the client's callback server.
2367c478bd9Sstevel@tonic-gate 	 */
2377c478bd9Sstevel@tonic-gate retry:
2387c478bd9Sstevel@tonic-gate 	if (cbp->cb_newer.cb_new == TRUE &&
2397c478bd9Sstevel@tonic-gate 	    cbp->cb_newer.cb_confirmed == TRUE) {
2407c478bd9Sstevel@tonic-gate 		char *addr = cbp->cb_callback.cb_location.r_addr;
2417c478bd9Sstevel@tonic-gate 		char *netid = cbp->cb_callback.cb_location.r_netid;
2427c478bd9Sstevel@tonic-gate 
2437c478bd9Sstevel@tonic-gate 		/*
2447c478bd9Sstevel@tonic-gate 		 * Free the old stuff if it exists; may be the first
2457c478bd9Sstevel@tonic-gate 		 * time through this path
2467c478bd9Sstevel@tonic-gate 		 */
2477c478bd9Sstevel@tonic-gate 		if (addr)
2487c478bd9Sstevel@tonic-gate 			kmem_free(addr, strlen(addr) + 1);
2497c478bd9Sstevel@tonic-gate 		if (netid)
2507c478bd9Sstevel@tonic-gate 			kmem_free(netid, strlen(netid) + 1);
2517c478bd9Sstevel@tonic-gate 
2527c478bd9Sstevel@tonic-gate 		/* Move over the addr/netid */
2537c478bd9Sstevel@tonic-gate 		cbp->cb_callback.cb_location.r_addr =
2547c478bd9Sstevel@tonic-gate 		    cbp->cb_newer.cb_callback.cb_location.r_addr;
2557c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_callback.cb_location.r_addr = NULL;
2567c478bd9Sstevel@tonic-gate 		cbp->cb_callback.cb_location.r_netid =
2577c478bd9Sstevel@tonic-gate 		    cbp->cb_newer.cb_callback.cb_location.r_netid;
2587c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_callback.cb_location.r_netid = NULL;
2597c478bd9Sstevel@tonic-gate 
2607c478bd9Sstevel@tonic-gate 		/* Get the program number */
2617c478bd9Sstevel@tonic-gate 		cbp->cb_callback.cb_program =
2627c478bd9Sstevel@tonic-gate 		    cbp->cb_newer.cb_callback.cb_program;
2637c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_callback.cb_program = 0;
2647c478bd9Sstevel@tonic-gate 
2657c478bd9Sstevel@tonic-gate 		/* Don't forget the protocol's "cb_ident" field */
2667c478bd9Sstevel@tonic-gate 		cbp->cb_ident = cbp->cb_newer.cb_ident;
2677c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_ident = 0;
2687c478bd9Sstevel@tonic-gate 
2697c478bd9Sstevel@tonic-gate 		/* no longer new */
2707c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_new = FALSE;
2717c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_confirmed = FALSE;
2727c478bd9Sstevel@tonic-gate 
2737c478bd9Sstevel@tonic-gate 		/* get rid of the old client handles that may exist */
2747c478bd9Sstevel@tonic-gate 		rfs4_cb_chflush(cbp);
2757c478bd9Sstevel@tonic-gate 
2767c478bd9Sstevel@tonic-gate 		cbp->cb_state = CB_NONE;
2777c478bd9Sstevel@tonic-gate 		cbp->cb_timefailed = 0; /* reset the clock */
2787c478bd9Sstevel@tonic-gate 		cbp->cb_notified_of_cb_path_down = TRUE;
2797c478bd9Sstevel@tonic-gate 	}
2807c478bd9Sstevel@tonic-gate 
2817c478bd9Sstevel@tonic-gate 	if (cbp->cb_state != CB_NONE) {
2827c478bd9Sstevel@tonic-gate 		cv_broadcast(cbp->cb_cv);	/* let the others know */
2837c478bd9Sstevel@tonic-gate 		cbp->cb_nullcaller = FALSE;
2847c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
2857c478bd9Sstevel@tonic-gate 		rfs4_client_rele(cp);
2860dfe541eSEvan Layton 		zthread_exit();
2877c478bd9Sstevel@tonic-gate 	}
2887c478bd9Sstevel@tonic-gate 
2897c478bd9Sstevel@tonic-gate 	/* mark rfs4_client_t as CALLBACK NULL in progress */
2907c478bd9Sstevel@tonic-gate 	cbp->cb_state = CB_INPROG;
2917c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
2927c478bd9Sstevel@tonic-gate 
2937c478bd9Sstevel@tonic-gate 	/* get/generate a client handle */
2947c478bd9Sstevel@tonic-gate 	if ((ch = rfs4_cb_getch(cbp)) == NULL) {
2957c478bd9Sstevel@tonic-gate 		mutex_enter(cbp->cb_lock);
2967c478bd9Sstevel@tonic-gate 		cbp->cb_state = CB_BAD;
2977c478bd9Sstevel@tonic-gate 		cbp->cb_timefailed = gethrestime_sec(); /* observability */
2987c478bd9Sstevel@tonic-gate 		goto retry;
2997c478bd9Sstevel@tonic-gate 	}
3007c478bd9Sstevel@tonic-gate 
3017c478bd9Sstevel@tonic-gate 
3027c478bd9Sstevel@tonic-gate 	tv.tv_sec = 30;
3037c478bd9Sstevel@tonic-gate 	tv.tv_usec = 0;
3047c478bd9Sstevel@tonic-gate 	if (clnt_call(ch, CB_NULL, xdr_void, NULL, xdr_void, NULL, tv) != 0) {
3057c478bd9Sstevel@tonic-gate 		newstate = CB_BAD;
3067c478bd9Sstevel@tonic-gate 	} else {
3077c478bd9Sstevel@tonic-gate 		newstate = CB_OK;
3087c478bd9Sstevel@tonic-gate #ifdef	DEBUG
3097c478bd9Sstevel@tonic-gate 		rfs4_cb_null++;
3107c478bd9Sstevel@tonic-gate #endif
3117c478bd9Sstevel@tonic-gate 	}
3127c478bd9Sstevel@tonic-gate 
3137c478bd9Sstevel@tonic-gate 	/* Check to see if the client has specified new callback info */
3147c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
3157c478bd9Sstevel@tonic-gate 	rfs4_cb_freech(cbp, ch, TRUE);
3167c478bd9Sstevel@tonic-gate 	if (cbp->cb_newer.cb_new == TRUE &&
3177c478bd9Sstevel@tonic-gate 	    cbp->cb_newer.cb_confirmed == TRUE) {
3187c478bd9Sstevel@tonic-gate 		goto retry;	/* give the CB_NULL another chance */
3197c478bd9Sstevel@tonic-gate 	}
3207c478bd9Sstevel@tonic-gate 
3217c478bd9Sstevel@tonic-gate 	cbp->cb_state = newstate;
3227c478bd9Sstevel@tonic-gate 	if (cbp->cb_state == CB_BAD)
3237c478bd9Sstevel@tonic-gate 		cbp->cb_timefailed = gethrestime_sec(); /* observability */
3247c478bd9Sstevel@tonic-gate 
3257c478bd9Sstevel@tonic-gate 	cv_broadcast(cbp->cb_cv);	/* start up the other threads */
3267c478bd9Sstevel@tonic-gate 	cbp->cb_nullcaller = FALSE;
3277c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
3287c478bd9Sstevel@tonic-gate 	rfs4_client_rele(cp);
3290dfe541eSEvan Layton 	zthread_exit();
3307c478bd9Sstevel@tonic-gate }
3317c478bd9Sstevel@tonic-gate 
3327c478bd9Sstevel@tonic-gate /*
3337c478bd9Sstevel@tonic-gate  * Given a client struct, inspect the callback info to see if the
334878aca8dSDai Ngo  * callback path is up and available.
335878aca8dSDai Ngo  *
336878aca8dSDai Ngo  * If new callback path is available and no one has set it up then
337878aca8dSDai Ngo  * try to set it up. If setup is not successful after 5 tries (5 secs)
338878aca8dSDai Ngo  * then gives up and returns NULL.
339878aca8dSDai Ngo  *
340878aca8dSDai Ngo  * If callback path is being initialized, then wait for the CB_NULL RPC
341878aca8dSDai Ngo  * call to occur.
3427c478bd9Sstevel@tonic-gate  */
3437c478bd9Sstevel@tonic-gate static rfs4_cbinfo_t *
rfs4_cbinfo_hold(rfs4_client_t * cp)3447c478bd9Sstevel@tonic-gate rfs4_cbinfo_hold(rfs4_client_t *cp)
3457c478bd9Sstevel@tonic-gate {
346d216dff5SRobert Mastors 	rfs4_cbinfo_t *cbp = &cp->rc_cbinfo;
347878aca8dSDai Ngo 	int retries = 0;
3487c478bd9Sstevel@tonic-gate 
3497c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
3507c478bd9Sstevel@tonic-gate 
351878aca8dSDai Ngo 	while (cbp->cb_newer.cb_new == TRUE && cbp->cb_nullcaller == FALSE) {
3527c478bd9Sstevel@tonic-gate 		/*
3537c478bd9Sstevel@tonic-gate 		 * Looks like a new callback path may be available and
3547c478bd9Sstevel@tonic-gate 		 * noone has set it up.
3557c478bd9Sstevel@tonic-gate 		 */
3567c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
357d216dff5SRobert Mastors 		rfs4_dbe_hold(cp->rc_dbe);
3587c478bd9Sstevel@tonic-gate 		rfs4_do_cb_null(cp); /* caller will release client hold */
359878aca8dSDai Ngo 
360878aca8dSDai Ngo 		mutex_enter(cbp->cb_lock);
361878aca8dSDai Ngo 		/*
362878aca8dSDai Ngo 		 * If callback path is no longer new, or it's being setup
363878aca8dSDai Ngo 		 * then stop and wait for it to be done.
364878aca8dSDai Ngo 		 */
365878aca8dSDai Ngo 		if (cbp->cb_newer.cb_new == FALSE || cbp->cb_nullcaller == TRUE)
366878aca8dSDai Ngo 			break;
367878aca8dSDai Ngo 		mutex_exit(cbp->cb_lock);
368878aca8dSDai Ngo 
369878aca8dSDai Ngo 		if (++retries >= rfs4_max_setup_cb_tries)
370878aca8dSDai Ngo 			return (NULL);
371878aca8dSDai Ngo 		delay(hz);
372878aca8dSDai Ngo 		mutex_enter(cbp->cb_lock);
3737c478bd9Sstevel@tonic-gate 	}
3747c478bd9Sstevel@tonic-gate 
3757c478bd9Sstevel@tonic-gate 	/* Is there a thread working on doing the CB_NULL RPC? */
3767c478bd9Sstevel@tonic-gate 	if (cbp->cb_nullcaller == TRUE)
3777c478bd9Sstevel@tonic-gate 		cv_wait(cbp->cb_cv, cbp->cb_lock);  /* if so, wait on it */
3787c478bd9Sstevel@tonic-gate 
3797c478bd9Sstevel@tonic-gate 	/* If the callback path is not okay (up and running), just quit */
3807c478bd9Sstevel@tonic-gate 	if (cbp->cb_state != CB_OK) {
3817c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
3827c478bd9Sstevel@tonic-gate 		return (NULL);
3837c478bd9Sstevel@tonic-gate 	}
3847c478bd9Sstevel@tonic-gate 
3857c478bd9Sstevel@tonic-gate 	/* Let someone know we are using the current callback info */
3867c478bd9Sstevel@tonic-gate 	cbp->cb_refcnt++;
3877c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
3887c478bd9Sstevel@tonic-gate 	return (cbp);
3897c478bd9Sstevel@tonic-gate }
3907c478bd9Sstevel@tonic-gate 
3917c478bd9Sstevel@tonic-gate /*
3927c478bd9Sstevel@tonic-gate  * The caller is done with the callback info.  It may be that the
3937c478bd9Sstevel@tonic-gate  * caller's RPC failed and the NFSv4 client has actually provided new
3947c478bd9Sstevel@tonic-gate  * callback information.  If so, let the caller know so they can
3957c478bd9Sstevel@tonic-gate  * advantage of this and maybe retry the RPC that originally failed.
3967c478bd9Sstevel@tonic-gate  */
3977c478bd9Sstevel@tonic-gate static int
rfs4_cbinfo_rele(rfs4_cbinfo_t * cbp,rfs4_cbstate_t newstate)3987c478bd9Sstevel@tonic-gate rfs4_cbinfo_rele(rfs4_cbinfo_t *cbp, rfs4_cbstate_t newstate)
3997c478bd9Sstevel@tonic-gate {
4007c478bd9Sstevel@tonic-gate 	int cb_new = FALSE;
4017c478bd9Sstevel@tonic-gate 
4027c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
4037c478bd9Sstevel@tonic-gate 
4047c478bd9Sstevel@tonic-gate 	/* The caller gets a chance to mark the callback info as bad */
4057c478bd9Sstevel@tonic-gate 	if (newstate != CB_NOCHANGE)
4067c478bd9Sstevel@tonic-gate 		cbp->cb_state = newstate;
4077c478bd9Sstevel@tonic-gate 	if (newstate == CB_FAILED) {
4087c478bd9Sstevel@tonic-gate 		cbp->cb_timefailed = gethrestime_sec(); /* observability */
4097c478bd9Sstevel@tonic-gate 		cbp->cb_notified_of_cb_path_down = FALSE;
4107c478bd9Sstevel@tonic-gate 	}
4117c478bd9Sstevel@tonic-gate 
4127c478bd9Sstevel@tonic-gate 	cbp->cb_refcnt--;	/* no longer using the information */
4137c478bd9Sstevel@tonic-gate 
4147c478bd9Sstevel@tonic-gate 	/*
4157c478bd9Sstevel@tonic-gate 	 * A thread may be waiting on this one to finish and if so,
4167c478bd9Sstevel@tonic-gate 	 * let it know that it is okay to do the CB_NULL to the
4177c478bd9Sstevel@tonic-gate 	 * client's callback server.
4187c478bd9Sstevel@tonic-gate 	 */
4197c478bd9Sstevel@tonic-gate 	if (cbp->cb_refcnt == 0 && cbp->cb_nullcaller)
4207c478bd9Sstevel@tonic-gate 		cv_broadcast(cbp->cb_cv_nullcaller);
4217c478bd9Sstevel@tonic-gate 
4227c478bd9Sstevel@tonic-gate 	/*
4237c478bd9Sstevel@tonic-gate 	 * If this is the last thread to use the callback info and
4247c478bd9Sstevel@tonic-gate 	 * there is new callback information to try and no thread is
4257c478bd9Sstevel@tonic-gate 	 * there ready to do the CB_NULL, then return true to teh
4267c478bd9Sstevel@tonic-gate 	 * caller so they can do the CB_NULL
4277c478bd9Sstevel@tonic-gate 	 */
4287c478bd9Sstevel@tonic-gate 	if (cbp->cb_refcnt == 0 &&
4297c478bd9Sstevel@tonic-gate 	    cbp->cb_nullcaller == FALSE &&
4307c478bd9Sstevel@tonic-gate 	    cbp->cb_newer.cb_new == TRUE &&
4317c478bd9Sstevel@tonic-gate 	    cbp->cb_newer.cb_confirmed == TRUE)
4327c478bd9Sstevel@tonic-gate 		cb_new = TRUE;
4337c478bd9Sstevel@tonic-gate 
4347c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
4357c478bd9Sstevel@tonic-gate 
4367c478bd9Sstevel@tonic-gate 	return (cb_new);
4377c478bd9Sstevel@tonic-gate }
4387c478bd9Sstevel@tonic-gate 
4397c478bd9Sstevel@tonic-gate /*
4407c478bd9Sstevel@tonic-gate  * Given the information in the callback info struct, create a client
4417c478bd9Sstevel@tonic-gate  * handle that can be used by the server for its callback path.
4427c478bd9Sstevel@tonic-gate  */
4437c478bd9Sstevel@tonic-gate static CLIENT *
rfs4_cbch_init(rfs4_cbinfo_t * cbp)4447c478bd9Sstevel@tonic-gate rfs4_cbch_init(rfs4_cbinfo_t *cbp)
4457c478bd9Sstevel@tonic-gate {
4467c478bd9Sstevel@tonic-gate 	struct knetconfig knc;
4477c478bd9Sstevel@tonic-gate 	vnode_t *vp;
4487c478bd9Sstevel@tonic-gate 	struct sockaddr_in addr4;
4497c478bd9Sstevel@tonic-gate 	struct sockaddr_in6 addr6;
4507c478bd9Sstevel@tonic-gate 	void *addr, *taddr;
4517c478bd9Sstevel@tonic-gate 	in_port_t *pp;
4527c478bd9Sstevel@tonic-gate 	int af;
4537c478bd9Sstevel@tonic-gate 	char *devnam;
4547c478bd9Sstevel@tonic-gate 	struct netbuf nb;
4557c478bd9Sstevel@tonic-gate 	int size;
4567c478bd9Sstevel@tonic-gate 	CLIENT *ch = NULL;
4577c478bd9Sstevel@tonic-gate 	int useresvport = 0;
4587c478bd9Sstevel@tonic-gate 
4597c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
4607c478bd9Sstevel@tonic-gate 
4617c478bd9Sstevel@tonic-gate 	if (cbp->cb_callback.cb_location.r_netid == NULL ||
4627c478bd9Sstevel@tonic-gate 	    cbp->cb_callback.cb_location.r_addr == NULL) {
4637c478bd9Sstevel@tonic-gate 		goto cb_init_out;
4647c478bd9Sstevel@tonic-gate 	}
4657c478bd9Sstevel@tonic-gate 
4667c478bd9Sstevel@tonic-gate 	if (strcmp(cbp->cb_callback.cb_location.r_netid, "tcp") == 0) {
4677c478bd9Sstevel@tonic-gate 		knc.knc_semantics = NC_TPI_COTS;
4687c478bd9Sstevel@tonic-gate 		knc.knc_protofmly = "inet";
4697c478bd9Sstevel@tonic-gate 		knc.knc_proto = "tcp";
4707c478bd9Sstevel@tonic-gate 		devnam = "/dev/tcp";
4717c478bd9Sstevel@tonic-gate 		af = AF_INET;
4727c478bd9Sstevel@tonic-gate 	} else if (strcmp(cbp->cb_callback.cb_location.r_netid, "udp")
4737c478bd9Sstevel@tonic-gate 	    == 0) {
4747c478bd9Sstevel@tonic-gate 		knc.knc_semantics = NC_TPI_CLTS;
4757c478bd9Sstevel@tonic-gate 		knc.knc_protofmly = "inet";
4767c478bd9Sstevel@tonic-gate 		knc.knc_proto = "udp";
4777c478bd9Sstevel@tonic-gate 		devnam = "/dev/udp";
4787c478bd9Sstevel@tonic-gate 		af = AF_INET;
4797c478bd9Sstevel@tonic-gate 	} else if (strcmp(cbp->cb_callback.cb_location.r_netid, "tcp6")
4807c478bd9Sstevel@tonic-gate 	    == 0) {
4817c478bd9Sstevel@tonic-gate 		knc.knc_semantics = NC_TPI_COTS;
4827c478bd9Sstevel@tonic-gate 		knc.knc_protofmly = "inet6";
4837c478bd9Sstevel@tonic-gate 		knc.knc_proto = "tcp";
4847c478bd9Sstevel@tonic-gate 		devnam = "/dev/tcp6";
4857c478bd9Sstevel@tonic-gate 		af = AF_INET6;
4867c478bd9Sstevel@tonic-gate 	} else if (strcmp(cbp->cb_callback.cb_location.r_netid, "udp6")
4877c478bd9Sstevel@tonic-gate 	    == 0) {
4887c478bd9Sstevel@tonic-gate 		knc.knc_semantics = NC_TPI_CLTS;
4897c478bd9Sstevel@tonic-gate 		knc.knc_protofmly = "inet6";
4907c478bd9Sstevel@tonic-gate 		knc.knc_proto = "udp";
4917c478bd9Sstevel@tonic-gate 		devnam = "/dev/udp6";
4927c478bd9Sstevel@tonic-gate 		af = AF_INET6;
4937c478bd9Sstevel@tonic-gate 	} else {
4947c478bd9Sstevel@tonic-gate 		goto cb_init_out;
4957c478bd9Sstevel@tonic-gate 	}
4967c478bd9Sstevel@tonic-gate 
497c52d60d4Srg137905 	if (lookupname(devnam, UIO_SYSSPACE, FOLLOW, NULLVPP, &vp) != 0) {
4987c478bd9Sstevel@tonic-gate 
4997c478bd9Sstevel@tonic-gate 		goto cb_init_out;
5007c478bd9Sstevel@tonic-gate 	}
5017c478bd9Sstevel@tonic-gate 
5027c478bd9Sstevel@tonic-gate 	if (vp->v_type != VCHR) {
5037c478bd9Sstevel@tonic-gate 		VN_RELE(vp);
5047c478bd9Sstevel@tonic-gate 		goto cb_init_out;
5057c478bd9Sstevel@tonic-gate 	}
5067c478bd9Sstevel@tonic-gate 
5077c478bd9Sstevel@tonic-gate 	knc.knc_rdev = vp->v_rdev;
5087c478bd9Sstevel@tonic-gate 
5097c478bd9Sstevel@tonic-gate 	VN_RELE(vp);
5107c478bd9Sstevel@tonic-gate 
5117c478bd9Sstevel@tonic-gate 	if (af == AF_INET) {
5127c478bd9Sstevel@tonic-gate 		size = sizeof (addr4);
5137c478bd9Sstevel@tonic-gate 		bzero(&addr4, size);
5147c478bd9Sstevel@tonic-gate 		addr4.sin_family = (sa_family_t)af;
5157c478bd9Sstevel@tonic-gate 		addr = &addr4.sin_addr;
5167c478bd9Sstevel@tonic-gate 		pp = &addr4.sin_port;
5177c478bd9Sstevel@tonic-gate 		taddr = &addr4;
5187c478bd9Sstevel@tonic-gate 	} else /* AF_INET6 */ {
5197c478bd9Sstevel@tonic-gate 		size = sizeof (addr6);
5207c478bd9Sstevel@tonic-gate 		bzero(&addr6, size);
5217c478bd9Sstevel@tonic-gate 		addr6.sin6_family = (sa_family_t)af;
5227c478bd9Sstevel@tonic-gate 		addr = &addr6.sin6_addr;
5237c478bd9Sstevel@tonic-gate 		pp = &addr6.sin6_port;
5247c478bd9Sstevel@tonic-gate 		taddr = &addr6;
5257c478bd9Sstevel@tonic-gate 	}
5267c478bd9Sstevel@tonic-gate 
5277c478bd9Sstevel@tonic-gate 	if (uaddr2sockaddr(af,
5287c478bd9Sstevel@tonic-gate 	    cbp->cb_callback.cb_location.r_addr, addr, pp)) {
5297c478bd9Sstevel@tonic-gate 
5307c478bd9Sstevel@tonic-gate 		goto cb_init_out;
5317c478bd9Sstevel@tonic-gate 	}
5327c478bd9Sstevel@tonic-gate 
5337c478bd9Sstevel@tonic-gate 
5347c478bd9Sstevel@tonic-gate 	nb.maxlen = nb.len = size;
5357c478bd9Sstevel@tonic-gate 	nb.buf = (char *)taddr;
5367c478bd9Sstevel@tonic-gate 
537c52d60d4Srg137905 	if (clnt_tli_kcreate(&knc, &nb, cbp->cb_callback.cb_program,
5387c478bd9Sstevel@tonic-gate 	    NFS_CB, 0, 0, curthread->t_cred, &ch)) {
5397c478bd9Sstevel@tonic-gate 
5407c478bd9Sstevel@tonic-gate 		ch = NULL;
5417c478bd9Sstevel@tonic-gate 	}
5427c478bd9Sstevel@tonic-gate 
5437c478bd9Sstevel@tonic-gate 	/* turn off reserved port usage */
5447c478bd9Sstevel@tonic-gate 	(void) CLNT_CONTROL(ch, CLSET_BINDRESVPORT, (char *)&useresvport);
5457c478bd9Sstevel@tonic-gate 
5467c478bd9Sstevel@tonic-gate cb_init_out:
5477c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
5487c478bd9Sstevel@tonic-gate 	return (ch);
5497c478bd9Sstevel@tonic-gate }
5507c478bd9Sstevel@tonic-gate 
5517c478bd9Sstevel@tonic-gate /*
5527c478bd9Sstevel@tonic-gate  * Iterate over the client handle cache and
5537c478bd9Sstevel@tonic-gate  * destroy it.
5547c478bd9Sstevel@tonic-gate  */
5557c478bd9Sstevel@tonic-gate static void
rfs4_cb_chflush(rfs4_cbinfo_t * cbp)5567c478bd9Sstevel@tonic-gate rfs4_cb_chflush(rfs4_cbinfo_t *cbp)
5577c478bd9Sstevel@tonic-gate {
5587c478bd9Sstevel@tonic-gate 	CLIENT *ch;
5597c478bd9Sstevel@tonic-gate 
5607c478bd9Sstevel@tonic-gate 	while (cbp->cb_chc_free) {
5617c478bd9Sstevel@tonic-gate 		cbp->cb_chc_free--;
5627c478bd9Sstevel@tonic-gate 		ch = cbp->cb_chc[cbp->cb_chc_free];
5637c478bd9Sstevel@tonic-gate 		cbp->cb_chc[cbp->cb_chc_free] = NULL;
5647c478bd9Sstevel@tonic-gate 		if (ch) {
5657c478bd9Sstevel@tonic-gate 			if (ch->cl_auth)
5667c478bd9Sstevel@tonic-gate 				auth_destroy(ch->cl_auth);
5677c478bd9Sstevel@tonic-gate 			clnt_destroy(ch);
5687c478bd9Sstevel@tonic-gate 		}
5697c478bd9Sstevel@tonic-gate 	}
5707c478bd9Sstevel@tonic-gate }
5717c478bd9Sstevel@tonic-gate 
5727c478bd9Sstevel@tonic-gate /*
5737c478bd9Sstevel@tonic-gate  * Return a client handle, either from a the small
5747c478bd9Sstevel@tonic-gate  * rfs4_client_t cache or one that we just created.
5757c478bd9Sstevel@tonic-gate  */
5767c478bd9Sstevel@tonic-gate static CLIENT *
rfs4_cb_getch(rfs4_cbinfo_t * cbp)5777c478bd9Sstevel@tonic-gate rfs4_cb_getch(rfs4_cbinfo_t *cbp)
5787c478bd9Sstevel@tonic-gate {
5797c478bd9Sstevel@tonic-gate 	CLIENT *cbch = NULL;
5807c478bd9Sstevel@tonic-gate 	uint32_t zilch = 0;
5817c478bd9Sstevel@tonic-gate 
5827c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
5837c478bd9Sstevel@tonic-gate 
5847c478bd9Sstevel@tonic-gate 	if (cbp->cb_chc_free) {
5857c478bd9Sstevel@tonic-gate 		cbp->cb_chc_free--;
5867c478bd9Sstevel@tonic-gate 		cbch = cbp->cb_chc[ cbp->cb_chc_free ];
5877c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
5887c478bd9Sstevel@tonic-gate 		(void) CLNT_CONTROL(cbch, CLSET_XID, (char *)&zilch);
5897c478bd9Sstevel@tonic-gate 		return (cbch);
5907c478bd9Sstevel@tonic-gate 	}
5917c478bd9Sstevel@tonic-gate 
5927c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
5937c478bd9Sstevel@tonic-gate 
5947c478bd9Sstevel@tonic-gate 	/* none free so make it now */
5957c478bd9Sstevel@tonic-gate 	cbch = rfs4_cbch_init(cbp);
5967c478bd9Sstevel@tonic-gate 
5977c478bd9Sstevel@tonic-gate 	return (cbch);
5987c478bd9Sstevel@tonic-gate }
5997c478bd9Sstevel@tonic-gate 
6007c478bd9Sstevel@tonic-gate /*
6017c478bd9Sstevel@tonic-gate  * Return the client handle to the small cache or
6027c478bd9Sstevel@tonic-gate  * destroy it.
6037c478bd9Sstevel@tonic-gate  */
6047c478bd9Sstevel@tonic-gate static void
rfs4_cb_freech(rfs4_cbinfo_t * cbp,CLIENT * ch,bool_t lockheld)6057c478bd9Sstevel@tonic-gate rfs4_cb_freech(rfs4_cbinfo_t *cbp, CLIENT *ch, bool_t lockheld)
6067c478bd9Sstevel@tonic-gate {
6077c478bd9Sstevel@tonic-gate 	if (lockheld == FALSE)
6087c478bd9Sstevel@tonic-gate 		mutex_enter(cbp->cb_lock);
6097c478bd9Sstevel@tonic-gate 
6107c478bd9Sstevel@tonic-gate 	if (cbp->cb_chc_free < RFS4_CBCH_MAX) {
6117c478bd9Sstevel@tonic-gate 		cbp->cb_chc[ cbp->cb_chc_free++ ] = ch;
6127c478bd9Sstevel@tonic-gate 		if (lockheld == FALSE)
6137c478bd9Sstevel@tonic-gate 			mutex_exit(cbp->cb_lock);
6147c478bd9Sstevel@tonic-gate 		return;
6157c478bd9Sstevel@tonic-gate 	}
6167c478bd9Sstevel@tonic-gate 	if (lockheld == FALSE)
6177c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
6187c478bd9Sstevel@tonic-gate 
6197c478bd9Sstevel@tonic-gate 	/*
6207c478bd9Sstevel@tonic-gate 	 * cache maxed out of free entries, obliterate
6217c478bd9Sstevel@tonic-gate 	 * this client handle, destroy it, throw it away.
6227c478bd9Sstevel@tonic-gate 	 */
6237c478bd9Sstevel@tonic-gate 	if (ch->cl_auth)
6247c478bd9Sstevel@tonic-gate 		auth_destroy(ch->cl_auth);
6257c478bd9Sstevel@tonic-gate 	clnt_destroy(ch);
6267c478bd9Sstevel@tonic-gate }
6277c478bd9Sstevel@tonic-gate 
6287c478bd9Sstevel@tonic-gate /*
6297c478bd9Sstevel@tonic-gate  * With the supplied callback information - initialize the client
6307c478bd9Sstevel@tonic-gate  * callback data.  If there is a callback in progress, save the
6317c478bd9Sstevel@tonic-gate  * callback info so that a thread can pick it up in the future.
6327c478bd9Sstevel@tonic-gate  */
6337c478bd9Sstevel@tonic-gate void
rfs4_client_setcb(rfs4_client_t * cp,cb_client4 * cb,uint32_t cb_ident)6347c478bd9Sstevel@tonic-gate rfs4_client_setcb(rfs4_client_t *cp, cb_client4 *cb, uint32_t cb_ident)
6357c478bd9Sstevel@tonic-gate {
6367c478bd9Sstevel@tonic-gate 	char *addr = NULL;
6377c478bd9Sstevel@tonic-gate 	char *netid = NULL;
638d216dff5SRobert Mastors 	rfs4_cbinfo_t *cbp = &cp->rc_cbinfo;
6397c478bd9Sstevel@tonic-gate 	size_t len;
6407c478bd9Sstevel@tonic-gate 
6417c478bd9Sstevel@tonic-gate 	/* Set the call back for the client */
642a31a5cfdSsamf 	if (cb->cb_location.r_addr && cb->cb_location.r_addr[0] != '\0' &&
643a31a5cfdSsamf 	    cb->cb_location.r_netid && cb->cb_location.r_netid[0] != '\0') {
6447c478bd9Sstevel@tonic-gate 		len = strlen(cb->cb_location.r_addr) + 1;
6457c478bd9Sstevel@tonic-gate 		addr = kmem_alloc(len, KM_SLEEP);
6467c478bd9Sstevel@tonic-gate 		bcopy(cb->cb_location.r_addr, addr, len);
6477c478bd9Sstevel@tonic-gate 		len = strlen(cb->cb_location.r_netid) + 1;
6487c478bd9Sstevel@tonic-gate 		netid = kmem_alloc(len, KM_SLEEP);
6497c478bd9Sstevel@tonic-gate 		bcopy(cb->cb_location.r_netid, netid, len);
6507c478bd9Sstevel@tonic-gate 	}
6517c478bd9Sstevel@tonic-gate 	/* ready to save the new information but first free old, if exists */
6527c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
6537c478bd9Sstevel@tonic-gate 
6547c478bd9Sstevel@tonic-gate 	cbp->cb_newer.cb_callback.cb_program = cb->cb_program;
655a31a5cfdSsamf 
656a31a5cfdSsamf 	if (cbp->cb_newer.cb_callback.cb_location.r_addr != NULL)
657a31a5cfdSsamf 		kmem_free(cbp->cb_newer.cb_callback.cb_location.r_addr,
658a31a5cfdSsamf 		    strlen(cbp->cb_newer.cb_callback.cb_location.r_addr) + 1);
6597c478bd9Sstevel@tonic-gate 	cbp->cb_newer.cb_callback.cb_location.r_addr = addr;
660a31a5cfdSsamf 
661a31a5cfdSsamf 	if (cbp->cb_newer.cb_callback.cb_location.r_netid != NULL)
662a31a5cfdSsamf 		kmem_free(cbp->cb_newer.cb_callback.cb_location.r_netid,
663a31a5cfdSsamf 		    strlen(cbp->cb_newer.cb_callback.cb_location.r_netid) + 1);
6647c478bd9Sstevel@tonic-gate 	cbp->cb_newer.cb_callback.cb_location.r_netid = netid;
6657c478bd9Sstevel@tonic-gate 
6667c478bd9Sstevel@tonic-gate 	cbp->cb_newer.cb_ident = cb_ident;
6677c478bd9Sstevel@tonic-gate 
6687c478bd9Sstevel@tonic-gate 	if (addr && *addr && netid && *netid) {
6697c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_new = TRUE;
6707c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_confirmed = FALSE;
6717c478bd9Sstevel@tonic-gate 	} else {
6727c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_new = FALSE;
6737c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_confirmed = FALSE;
6747c478bd9Sstevel@tonic-gate 	}
6757c478bd9Sstevel@tonic-gate 
6767c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
6777c478bd9Sstevel@tonic-gate }
6787c478bd9Sstevel@tonic-gate 
6797c478bd9Sstevel@tonic-gate /*
6807c478bd9Sstevel@tonic-gate  * The server uses this when processing SETCLIENTID_CONFIRM.  Callback
6817c478bd9Sstevel@tonic-gate  * information may have been provided on SETCLIENTID and this call
6827c478bd9Sstevel@tonic-gate  * marks that information as confirmed and then starts a thread to
6837c478bd9Sstevel@tonic-gate  * test the callback path.
6847c478bd9Sstevel@tonic-gate  */
6857c478bd9Sstevel@tonic-gate void
rfs4_deleg_cb_check(rfs4_client_t * cp)6867c478bd9Sstevel@tonic-gate rfs4_deleg_cb_check(rfs4_client_t *cp)
6877c478bd9Sstevel@tonic-gate {
688d216dff5SRobert Mastors 	if (cp->rc_cbinfo.cb_newer.cb_new == FALSE)
6897c478bd9Sstevel@tonic-gate 		return;
6907c478bd9Sstevel@tonic-gate 
691d216dff5SRobert Mastors 	cp->rc_cbinfo.cb_newer.cb_confirmed = TRUE;
6927c478bd9Sstevel@tonic-gate 
693d216dff5SRobert Mastors 	rfs4_dbe_hold(cp->rc_dbe); /* hold the client struct for thread */
6947c478bd9Sstevel@tonic-gate 
6950dfe541eSEvan Layton 	(void) zthread_create(NULL, 0, rfs4_do_cb_null, cp, 0,
6967c478bd9Sstevel@tonic-gate 	    minclsyspri);
6977c478bd9Sstevel@tonic-gate }
6987c478bd9Sstevel@tonic-gate 
6997c478bd9Sstevel@tonic-gate static void
rfs4args_cb_recall_free(nfs_cb_argop4 * argop)7007c478bd9Sstevel@tonic-gate rfs4args_cb_recall_free(nfs_cb_argop4 *argop)
7017c478bd9Sstevel@tonic-gate {
7027c478bd9Sstevel@tonic-gate 	CB_RECALL4args	*rec_argp;
7037c478bd9Sstevel@tonic-gate 
7047c478bd9Sstevel@tonic-gate 	rec_argp = &argop->nfs_cb_argop4_u.opcbrecall;
7057c478bd9Sstevel@tonic-gate 	if (rec_argp->fh.nfs_fh4_val)
7067c478bd9Sstevel@tonic-gate 		kmem_free(rec_argp->fh.nfs_fh4_val, rec_argp->fh.nfs_fh4_len);
7077c478bd9Sstevel@tonic-gate }
7087c478bd9Sstevel@tonic-gate 
7097c478bd9Sstevel@tonic-gate /* ARGSUSED */
7107c478bd9Sstevel@tonic-gate static void
rfs4args_cb_getattr_free(nfs_cb_argop4 * argop)7117c478bd9Sstevel@tonic-gate rfs4args_cb_getattr_free(nfs_cb_argop4 *argop)
7127c478bd9Sstevel@tonic-gate {
7137c478bd9Sstevel@tonic-gate 	CB_GETATTR4args *argp;
7147c478bd9Sstevel@tonic-gate 
7157c478bd9Sstevel@tonic-gate 	argp = &argop->nfs_cb_argop4_u.opcbgetattr;
7167c478bd9Sstevel@tonic-gate 	if (argp->fh.nfs_fh4_val)
7177c478bd9Sstevel@tonic-gate 		kmem_free(argp->fh.nfs_fh4_val, argp->fh.nfs_fh4_len);
7187c478bd9Sstevel@tonic-gate }
7197c478bd9Sstevel@tonic-gate 
7207c478bd9Sstevel@tonic-gate static void
rfs4freeargres(CB_COMPOUND4args * args,CB_COMPOUND4res * resp)7217c478bd9Sstevel@tonic-gate rfs4freeargres(CB_COMPOUND4args *args, CB_COMPOUND4res *resp)
7227c478bd9Sstevel@tonic-gate {
7237c478bd9Sstevel@tonic-gate 	int i, arglen;
7247c478bd9Sstevel@tonic-gate 	nfs_cb_argop4 *argop;
7257c478bd9Sstevel@tonic-gate 
7267c478bd9Sstevel@tonic-gate 	/*
7277c478bd9Sstevel@tonic-gate 	 * First free any special args alloc'd for specific ops.
7287c478bd9Sstevel@tonic-gate 	 */
7297c478bd9Sstevel@tonic-gate 	arglen = args->array_len;
7307c478bd9Sstevel@tonic-gate 	argop = args->array;
7317c478bd9Sstevel@tonic-gate 	for (i = 0; i < arglen; i++, argop++) {
7327c478bd9Sstevel@tonic-gate 
7337c478bd9Sstevel@tonic-gate 		switch (argop->argop) {
7347c478bd9Sstevel@tonic-gate 		case OP_CB_RECALL:
7357c478bd9Sstevel@tonic-gate 			rfs4args_cb_recall_free(argop);
7367c478bd9Sstevel@tonic-gate 			break;
7377c478bd9Sstevel@tonic-gate 
7387c478bd9Sstevel@tonic-gate 		case OP_CB_GETATTR:
7397c478bd9Sstevel@tonic-gate 			rfs4args_cb_getattr_free(argop);
7407c478bd9Sstevel@tonic-gate 			break;
7417c478bd9Sstevel@tonic-gate 
7427c478bd9Sstevel@tonic-gate 		default:
7437c478bd9Sstevel@tonic-gate 			return;
7447c478bd9Sstevel@tonic-gate 		}
7457c478bd9Sstevel@tonic-gate 	}
7467c478bd9Sstevel@tonic-gate 
7477c478bd9Sstevel@tonic-gate 	if (args->tag.utf8string_len > 0)
7487c478bd9Sstevel@tonic-gate 		UTF8STRING_FREE(args->tag)
7497c478bd9Sstevel@tonic-gate 
7507c478bd9Sstevel@tonic-gate 	kmem_free(args->array, arglen * sizeof (nfs_cb_argop4));
7517c478bd9Sstevel@tonic-gate 	if (resp)
752a17ce845SMarcel Telka 		xdr_free(xdr_CB_COMPOUND4res, (caddr_t)resp);
7537c478bd9Sstevel@tonic-gate }
7547c478bd9Sstevel@tonic-gate 
7557c478bd9Sstevel@tonic-gate /*
7567c478bd9Sstevel@tonic-gate  * General callback routine for the server to the client.
7577c478bd9Sstevel@tonic-gate  */
7587c478bd9Sstevel@tonic-gate static enum clnt_stat
rfs4_do_callback(rfs4_client_t * cp,CB_COMPOUND4args * args,CB_COMPOUND4res * res,struct timeval timeout)7597c478bd9Sstevel@tonic-gate rfs4_do_callback(rfs4_client_t *cp, CB_COMPOUND4args *args,
7607c478bd9Sstevel@tonic-gate     CB_COMPOUND4res *res, struct timeval timeout)
7617c478bd9Sstevel@tonic-gate {
7627c478bd9Sstevel@tonic-gate 	rfs4_cbinfo_t *cbp;
7637c478bd9Sstevel@tonic-gate 	CLIENT *ch;
7647c478bd9Sstevel@tonic-gate 	/* start with this in case cb_getch() fails */
7657c478bd9Sstevel@tonic-gate 	enum clnt_stat	stat = RPC_FAILED;
7667c478bd9Sstevel@tonic-gate 
7677c478bd9Sstevel@tonic-gate 	res->tag.utf8string_val = NULL;
7687c478bd9Sstevel@tonic-gate 	res->array = NULL;
7697c478bd9Sstevel@tonic-gate 
7707c478bd9Sstevel@tonic-gate retry:
7717c478bd9Sstevel@tonic-gate 	cbp = rfs4_cbinfo_hold(cp);
7727c478bd9Sstevel@tonic-gate 	if (cbp == NULL)
7737c478bd9Sstevel@tonic-gate 		return (stat);
7747c478bd9Sstevel@tonic-gate 
7757c478bd9Sstevel@tonic-gate 	/* get a client handle */
7767c478bd9Sstevel@tonic-gate 	if ((ch = rfs4_cb_getch(cbp)) != NULL) {
7777c478bd9Sstevel@tonic-gate 		/*
7787c478bd9Sstevel@tonic-gate 		 * reset the cb_ident since it may have changed in
7797c478bd9Sstevel@tonic-gate 		 * rfs4_cbinfo_hold()
7807c478bd9Sstevel@tonic-gate 		 */
7817c478bd9Sstevel@tonic-gate 		args->callback_ident = cbp->cb_ident;
7827c478bd9Sstevel@tonic-gate 
783eac3aab7Srobinson 		stat = clnt_call(ch, CB_COMPOUND, xdr_CB_COMPOUND4args_srv,
7847c478bd9Sstevel@tonic-gate 		    (caddr_t)args, xdr_CB_COMPOUND4res,
7857c478bd9Sstevel@tonic-gate 		    (caddr_t)res, timeout);
7867c478bd9Sstevel@tonic-gate 
7877c478bd9Sstevel@tonic-gate 		/* free client handle */
7887c478bd9Sstevel@tonic-gate 		rfs4_cb_freech(cbp, ch, FALSE);
7897c478bd9Sstevel@tonic-gate 	}
7907c478bd9Sstevel@tonic-gate 
7917c478bd9Sstevel@tonic-gate 	/*
7927c478bd9Sstevel@tonic-gate 	 * If the rele says that there may be new callback info then
7937c478bd9Sstevel@tonic-gate 	 * retry this sequence and it may succeed as a result of the
7947c478bd9Sstevel@tonic-gate 	 * new callback path
7957c478bd9Sstevel@tonic-gate 	 */
7967c478bd9Sstevel@tonic-gate 	if (rfs4_cbinfo_rele(cbp,
7977c478bd9Sstevel@tonic-gate 	    (stat == RPC_SUCCESS ? CB_NOCHANGE : CB_FAILED)) == TRUE)
7987c478bd9Sstevel@tonic-gate 		goto retry;
7997c478bd9Sstevel@tonic-gate 
8007c478bd9Sstevel@tonic-gate 	return (stat);
8017c478bd9Sstevel@tonic-gate }
8027c478bd9Sstevel@tonic-gate 
8037c478bd9Sstevel@tonic-gate /*
8047c478bd9Sstevel@tonic-gate  * Used by the NFSv4 server to get attributes for a file while
8057c478bd9Sstevel@tonic-gate  * handling the case where a file has been write delegated.  For the
8067c478bd9Sstevel@tonic-gate  * time being, VOP_GETATTR() is called and CB_GETATTR processing is
8077c478bd9Sstevel@tonic-gate  * not undertaken.  This call site is maintained in case the server is
8087c478bd9Sstevel@tonic-gate  * updated in the future to handle write delegation space guarantees.
8097c478bd9Sstevel@tonic-gate  */
8107c478bd9Sstevel@tonic-gate nfsstat4
rfs4_vop_getattr(vnode_t * vp,vattr_t * vap,int flag,cred_t * cr)8117c478bd9Sstevel@tonic-gate rfs4_vop_getattr(vnode_t *vp, vattr_t *vap, int flag, cred_t *cr)
8127c478bd9Sstevel@tonic-gate {
81300ba712dSGarima Tripathi 
8147c478bd9Sstevel@tonic-gate 	int error;
8157c478bd9Sstevel@tonic-gate 
816da6c28aaSamw 	error = VOP_GETATTR(vp, vap, flag, cr, NULL);
8177c478bd9Sstevel@tonic-gate 	return (puterrno4(error));
8187c478bd9Sstevel@tonic-gate }
8197c478bd9Sstevel@tonic-gate 
8207c478bd9Sstevel@tonic-gate /*
8217c478bd9Sstevel@tonic-gate  * This is used everywhere in the v2/v3 server to allow the
8227c478bd9Sstevel@tonic-gate  * integration of all NFS versions and the support of delegation.  For
8237c478bd9Sstevel@tonic-gate  * now, just call the VOP_GETATTR().  If the NFSv4 server is enhanced
8247c478bd9Sstevel@tonic-gate  * in the future to provide space guarantees for write delegations
8257c478bd9Sstevel@tonic-gate  * then this call site should be expanded to interact with the client.
8267c478bd9Sstevel@tonic-gate  */
8277c478bd9Sstevel@tonic-gate int
rfs4_delegated_getattr(vnode_t * vp,vattr_t * vap,int flag,cred_t * cr)8287c478bd9Sstevel@tonic-gate rfs4_delegated_getattr(vnode_t *vp, vattr_t *vap, int flag, cred_t *cr)
8297c478bd9Sstevel@tonic-gate {
830da6c28aaSamw 	return (VOP_GETATTR(vp, vap, flag, cr, NULL));
8317c478bd9Sstevel@tonic-gate }
8327c478bd9Sstevel@tonic-gate 
8337c478bd9Sstevel@tonic-gate /*
8347c478bd9Sstevel@tonic-gate  * Place the actual cb_recall otw call to client.
8357c478bd9Sstevel@tonic-gate  */
8367c478bd9Sstevel@tonic-gate static void
rfs4_do_cb_recall(rfs4_deleg_state_t * dsp,bool_t trunc)8377c478bd9Sstevel@tonic-gate rfs4_do_cb_recall(rfs4_deleg_state_t *dsp, bool_t trunc)
8387c478bd9Sstevel@tonic-gate {
8397c478bd9Sstevel@tonic-gate 	CB_COMPOUND4args	cb4_args;
8407c478bd9Sstevel@tonic-gate 	CB_COMPOUND4res		cb4_res;
8417c478bd9Sstevel@tonic-gate 	CB_RECALL4args		*rec_argp;
842f3b585ceSsamf 	CB_RECALL4res		*rec_resp;
8437c478bd9Sstevel@tonic-gate 	nfs_cb_argop4		*argop;
8447c478bd9Sstevel@tonic-gate 	int			numops;
8457c478bd9Sstevel@tonic-gate 	int			argoplist_size;
8467c478bd9Sstevel@tonic-gate 	struct timeval		timeout;
8477c478bd9Sstevel@tonic-gate 	nfs_fh4			*fhp;
8487c478bd9Sstevel@tonic-gate 	enum clnt_stat		call_stat;
8497c478bd9Sstevel@tonic-gate 
8507c478bd9Sstevel@tonic-gate 	/*
8517c478bd9Sstevel@tonic-gate 	 * set up the compound args
8527c478bd9Sstevel@tonic-gate 	 */
8537c478bd9Sstevel@tonic-gate 	numops = 1;	/* CB_RECALL only */
8547c478bd9Sstevel@tonic-gate 
8557c478bd9Sstevel@tonic-gate 	argoplist_size = numops * sizeof (nfs_cb_argop4);
8567c478bd9Sstevel@tonic-gate 	argop = kmem_zalloc(argoplist_size, KM_SLEEP);
8577c478bd9Sstevel@tonic-gate 	argop->argop = OP_CB_RECALL;
8587c478bd9Sstevel@tonic-gate 	rec_argp = &argop->nfs_cb_argop4_u.opcbrecall;
8597c478bd9Sstevel@tonic-gate 
8607c478bd9Sstevel@tonic-gate 	(void) str_to_utf8("cb_recall", &cb4_args.tag);
8617c478bd9Sstevel@tonic-gate 	cb4_args.minorversion = CB4_MINORVERSION;
8627c478bd9Sstevel@tonic-gate 	/* cb4_args.callback_ident is set in rfs4_do_callback() */
8637c478bd9Sstevel@tonic-gate 	cb4_args.array_len = numops;
8647c478bd9Sstevel@tonic-gate 	cb4_args.array = argop;
8657c478bd9Sstevel@tonic-gate 
8667c478bd9Sstevel@tonic-gate 	/*
8677c478bd9Sstevel@tonic-gate 	 * fill in the args struct
8687c478bd9Sstevel@tonic-gate 	 */
869d216dff5SRobert Mastors 	bcopy(&dsp->rds_delegid.stateid, &rec_argp->stateid, sizeof (stateid4));
8707c478bd9Sstevel@tonic-gate 	rec_argp->truncate = trunc;
8717c478bd9Sstevel@tonic-gate 
872d216dff5SRobert Mastors 	fhp = &dsp->rds_finfo->rf_filehandle;
8737c478bd9Sstevel@tonic-gate 	rec_argp->fh.nfs_fh4_val = kmem_alloc(sizeof (char) *
8747c478bd9Sstevel@tonic-gate 	    fhp->nfs_fh4_len, KM_SLEEP);
8757c478bd9Sstevel@tonic-gate 	nfs_fh4_copy(fhp, &rec_argp->fh);
8767c478bd9Sstevel@tonic-gate 
8777c478bd9Sstevel@tonic-gate 	/* Keep track of when we did this for observability */
878d216dff5SRobert Mastors 	dsp->rds_time_recalled = gethrestime_sec();
8797c478bd9Sstevel@tonic-gate 
8807c478bd9Sstevel@tonic-gate 	/*
8817c478bd9Sstevel@tonic-gate 	 * Set up the timeout for the callback and make the actual call.
8827c478bd9Sstevel@tonic-gate 	 * Timeout will be 80% of the lease period for this server.
8837c478bd9Sstevel@tonic-gate 	 */
8847c478bd9Sstevel@tonic-gate 	timeout.tv_sec = (rfs4_lease_time * 80) / 100;
8857c478bd9Sstevel@tonic-gate 	timeout.tv_usec = 0;
8867c478bd9Sstevel@tonic-gate 
887d216dff5SRobert Mastors 	DTRACE_NFSV4_3(cb__recall__start, rfs4_client_t *, dsp->rds_client,
888f3b585ceSsamf 	    rfs4_deleg_state_t *, dsp, CB_RECALL4args *, rec_argp);
889f3b585ceSsamf 
890d216dff5SRobert Mastors 	call_stat = rfs4_do_callback(dsp->rds_client, &cb4_args, &cb4_res,
891d216dff5SRobert Mastors 	    timeout);
8927c478bd9Sstevel@tonic-gate 
893f3b585ceSsamf 	rec_resp = (cb4_res.array_len == 0) ? NULL :
894f3b585ceSsamf 	    &cb4_res.array[0].nfs_cb_resop4_u.opcbrecall;
895f3b585ceSsamf 
896d216dff5SRobert Mastors 	DTRACE_NFSV4_3(cb__recall__done, rfs4_client_t *, dsp->rds_client,
897f3b585ceSsamf 	    rfs4_deleg_state_t *, dsp, CB_RECALL4res *, rec_resp);
898f3b585ceSsamf 
8997c478bd9Sstevel@tonic-gate 	if (call_stat != RPC_SUCCESS || cb4_res.status != NFS4_OK) {
900d216dff5SRobert Mastors 		rfs4_return_deleg(dsp, TRUE);
9017c478bd9Sstevel@tonic-gate 	}
9027c478bd9Sstevel@tonic-gate 
9037c478bd9Sstevel@tonic-gate 	rfs4freeargres(&cb4_args, &cb4_res);
9047c478bd9Sstevel@tonic-gate }
9057c478bd9Sstevel@tonic-gate 
9067c478bd9Sstevel@tonic-gate struct recall_arg {
9077c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
9087c478bd9Sstevel@tonic-gate 	void (*recall)(rfs4_deleg_state_t *, bool_t trunc);
9097c478bd9Sstevel@tonic-gate 	bool_t trunc;
9107c478bd9Sstevel@tonic-gate };
9117c478bd9Sstevel@tonic-gate 
9127c478bd9Sstevel@tonic-gate static void
do_recall(struct recall_arg * arg)9137c478bd9Sstevel@tonic-gate do_recall(struct recall_arg *arg)
9147c478bd9Sstevel@tonic-gate {
9157c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp = arg->dsp;
916d216dff5SRobert Mastors 	rfs4_file_t *fp = dsp->rds_finfo;
9177c478bd9Sstevel@tonic-gate 	callb_cpr_t cpr_info;
9187c478bd9Sstevel@tonic-gate 	kmutex_t cpr_lock;
9197c478bd9Sstevel@tonic-gate 
9207c478bd9Sstevel@tonic-gate 	mutex_init(&cpr_lock, NULL, MUTEX_DEFAULT, NULL);
9217c478bd9Sstevel@tonic-gate 	CALLB_CPR_INIT(&cpr_info, &cpr_lock, callb_generic_cpr, "nfsv4Recall");
9227c478bd9Sstevel@tonic-gate 
9237c478bd9Sstevel@tonic-gate 	/*
9247c478bd9Sstevel@tonic-gate 	 * It is possible that before this thread starts
9257c478bd9Sstevel@tonic-gate 	 * the client has send us a return_delegation, and
9267c478bd9Sstevel@tonic-gate 	 * if that is the case we do not need to send the
9277c478bd9Sstevel@tonic-gate 	 * recall callback.
9287c478bd9Sstevel@tonic-gate 	 */
929d216dff5SRobert Mastors 	if (dsp->rds_dtype != OPEN_DELEGATE_NONE) {
930ed57cab9Srg137905 		DTRACE_PROBE3(nfss__i__recall,
931ed57cab9Srg137905 		    struct recall_arg *, arg,
932ed57cab9Srg137905 		    struct rfs4_deleg_state_t *, dsp,
933ed57cab9Srg137905 		    struct rfs4_file_t *, fp);
9347c478bd9Sstevel@tonic-gate 
9357c478bd9Sstevel@tonic-gate 		if (arg->recall)
9367c478bd9Sstevel@tonic-gate 			(void) (*arg->recall)(dsp, arg->trunc);
9377c478bd9Sstevel@tonic-gate 	}
9387c478bd9Sstevel@tonic-gate 
939d216dff5SRobert Mastors 	mutex_enter(fp->rf_dinfo.rd_recall_lock);
9407c478bd9Sstevel@tonic-gate 	/*
9417c478bd9Sstevel@tonic-gate 	 * Recall count may go negative if the parent thread that is
9427c478bd9Sstevel@tonic-gate 	 * creating the individual callback threads does not modify
9437c478bd9Sstevel@tonic-gate 	 * the recall_count field before the callback thread actually
9447c478bd9Sstevel@tonic-gate 	 * gets a response from the CB_RECALL
9457c478bd9Sstevel@tonic-gate 	 */
946d216dff5SRobert Mastors 	fp->rf_dinfo.rd_recall_count--;
947d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_recall_count == 0)
948d216dff5SRobert Mastors 		cv_signal(fp->rf_dinfo.rd_recall_cv);
949d216dff5SRobert Mastors 	mutex_exit(fp->rf_dinfo.rd_recall_lock);
9507c478bd9Sstevel@tonic-gate 
9517c478bd9Sstevel@tonic-gate 	mutex_enter(&cpr_lock);
9527c478bd9Sstevel@tonic-gate 	CALLB_CPR_EXIT(&cpr_info);
9537c478bd9Sstevel@tonic-gate 	mutex_destroy(&cpr_lock);
9547c478bd9Sstevel@tonic-gate 
9557c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_rele(dsp); /* release the hold for this thread */
9567c478bd9Sstevel@tonic-gate 	kmem_free(arg, sizeof (struct recall_arg));
9570dfe541eSEvan Layton 	zthread_exit();
9587c478bd9Sstevel@tonic-gate }
9597c478bd9Sstevel@tonic-gate 
9607c478bd9Sstevel@tonic-gate struct master_recall_args {
9617c478bd9Sstevel@tonic-gate     rfs4_file_t *fp;
9627c478bd9Sstevel@tonic-gate     void (*recall)(rfs4_deleg_state_t *, bool_t);
9637c478bd9Sstevel@tonic-gate     bool_t trunc;
9647c478bd9Sstevel@tonic-gate };
9657c478bd9Sstevel@tonic-gate 
9667c478bd9Sstevel@tonic-gate static void
do_recall_file(struct master_recall_args * map)9677c478bd9Sstevel@tonic-gate do_recall_file(struct master_recall_args *map)
9687c478bd9Sstevel@tonic-gate {
9697c478bd9Sstevel@tonic-gate 	rfs4_file_t *fp = map->fp;
9707c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
9717c478bd9Sstevel@tonic-gate 	struct recall_arg *arg;
9727c478bd9Sstevel@tonic-gate 	callb_cpr_t cpr_info;
9737c478bd9Sstevel@tonic-gate 	kmutex_t cpr_lock;
9747c478bd9Sstevel@tonic-gate 	int32_t recall_count;
9757c478bd9Sstevel@tonic-gate 
976d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
977ed57cab9Srg137905 
978ed57cab9Srg137905 	/* Recall already in progress ? */
979d216dff5SRobert Mastors 	mutex_enter(fp->rf_dinfo.rd_recall_lock);
980d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_recall_count != 0) {
981d216dff5SRobert Mastors 		mutex_exit(fp->rf_dinfo.rd_recall_lock);
982d216dff5SRobert Mastors 		rfs4_dbe_rele_nolock(fp->rf_dbe);
983d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
9847c478bd9Sstevel@tonic-gate 		kmem_free(map, sizeof (struct master_recall_args));
9850dfe541eSEvan Layton 		zthread_exit();
9867c478bd9Sstevel@tonic-gate 	}
9877c478bd9Sstevel@tonic-gate 
988d216dff5SRobert Mastors 	mutex_exit(fp->rf_dinfo.rd_recall_lock);
989ed57cab9Srg137905 
9907c478bd9Sstevel@tonic-gate 	mutex_init(&cpr_lock, NULL, MUTEX_DEFAULT, NULL);
991ed57cab9Srg137905 	CALLB_CPR_INIT(&cpr_info, &cpr_lock, callb_generic_cpr,	"v4RecallFile");
9927c478bd9Sstevel@tonic-gate 
9937c478bd9Sstevel@tonic-gate 	recall_count = 0;
994d216dff5SRobert Mastors 	for (dsp = list_head(&fp->rf_delegstatelist); dsp != NULL;
995d216dff5SRobert Mastors 	    dsp = list_next(&fp->rf_delegstatelist, dsp)) {
996ed57cab9Srg137905 
997d216dff5SRobert Mastors 		rfs4_dbe_lock(dsp->rds_dbe);
998ed57cab9Srg137905 		/*
999ed57cab9Srg137905 		 * if this delegation state
1000ed57cab9Srg137905 		 * is being reaped skip it
1001ed57cab9Srg137905 		 */
1002d216dff5SRobert Mastors 		if (rfs4_dbe_is_invalid(dsp->rds_dbe)) {
1003d216dff5SRobert Mastors 			rfs4_dbe_unlock(dsp->rds_dbe);
1004ed57cab9Srg137905 			continue;
1005ed57cab9Srg137905 		}
1006ed57cab9Srg137905 
1007ed57cab9Srg137905 		/* hold for receiving thread */
1008d216dff5SRobert Mastors 		rfs4_dbe_hold(dsp->rds_dbe);
1009d216dff5SRobert Mastors 		rfs4_dbe_unlock(dsp->rds_dbe);
1010ed57cab9Srg137905 
10117c478bd9Sstevel@tonic-gate 		arg = kmem_alloc(sizeof (struct recall_arg), KM_SLEEP);
10127c478bd9Sstevel@tonic-gate 		arg->recall = map->recall;
10137c478bd9Sstevel@tonic-gate 		arg->trunc = map->trunc;
10147c478bd9Sstevel@tonic-gate 		arg->dsp = dsp;
10157c478bd9Sstevel@tonic-gate 
10167c478bd9Sstevel@tonic-gate 		recall_count++;
10177c478bd9Sstevel@tonic-gate 
10180dfe541eSEvan Layton 		(void) zthread_create(NULL, 0, do_recall, arg, 0,
10197c478bd9Sstevel@tonic-gate 		    minclsyspri);
10207c478bd9Sstevel@tonic-gate 	}
1021ed57cab9Srg137905 
1022d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
10237c478bd9Sstevel@tonic-gate 
1024d216dff5SRobert Mastors 	mutex_enter(fp->rf_dinfo.rd_recall_lock);
10257c478bd9Sstevel@tonic-gate 	/*
10267c478bd9Sstevel@tonic-gate 	 * Recall count may go negative if the parent thread that is
10277c478bd9Sstevel@tonic-gate 	 * creating the individual callback threads does not modify
10287c478bd9Sstevel@tonic-gate 	 * the recall_count field before the callback thread actually
10297c478bd9Sstevel@tonic-gate 	 * gets a response from the CB_RECALL
10307c478bd9Sstevel@tonic-gate 	 */
1031d216dff5SRobert Mastors 	fp->rf_dinfo.rd_recall_count += recall_count;
1032d216dff5SRobert Mastors 	while (fp->rf_dinfo.rd_recall_count)
1033d216dff5SRobert Mastors 		cv_wait(fp->rf_dinfo.rd_recall_cv, fp->rf_dinfo.rd_recall_lock);
10347c478bd9Sstevel@tonic-gate 
1035d216dff5SRobert Mastors 	mutex_exit(fp->rf_dinfo.rd_recall_lock);
10367c478bd9Sstevel@tonic-gate 
1037ed57cab9Srg137905 	DTRACE_PROBE1(nfss__i__recall_done, rfs4_file_t *, fp);
10387c478bd9Sstevel@tonic-gate 	rfs4_file_rele(fp);
10397c478bd9Sstevel@tonic-gate 	kmem_free(map, sizeof (struct master_recall_args));
10407c478bd9Sstevel@tonic-gate 	mutex_enter(&cpr_lock);
10417c478bd9Sstevel@tonic-gate 	CALLB_CPR_EXIT(&cpr_info);
10427c478bd9Sstevel@tonic-gate 	mutex_destroy(&cpr_lock);
10430dfe541eSEvan Layton 	zthread_exit();
10447c478bd9Sstevel@tonic-gate }
10457c478bd9Sstevel@tonic-gate 
10467c478bd9Sstevel@tonic-gate static void
rfs4_recall_file(rfs4_file_t * fp,void (* recall)(rfs4_deleg_state_t *,bool_t trunc),bool_t trunc,rfs4_client_t * cp)10477c478bd9Sstevel@tonic-gate rfs4_recall_file(rfs4_file_t *fp,
10487c478bd9Sstevel@tonic-gate     void (*recall)(rfs4_deleg_state_t *, bool_t trunc),
10497c478bd9Sstevel@tonic-gate     bool_t trunc, rfs4_client_t *cp)
10507c478bd9Sstevel@tonic-gate {
10517c478bd9Sstevel@tonic-gate 	struct master_recall_args *args;
10527c478bd9Sstevel@tonic-gate 
1053d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
1054d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_NONE) {
1055d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
10567c478bd9Sstevel@tonic-gate 		return;
10577c478bd9Sstevel@tonic-gate 	}
1058d216dff5SRobert Mastors 	rfs4_dbe_hold(fp->rf_dbe);	/* hold for new thread */
10597c478bd9Sstevel@tonic-gate 
10607c478bd9Sstevel@tonic-gate 	/*
10617c478bd9Sstevel@tonic-gate 	 * Mark the time we started the recall processing.
10627c478bd9Sstevel@tonic-gate 	 * If it has been previously recalled, do not reset the
10637c478bd9Sstevel@tonic-gate 	 * timer since this is used for the revocation decision.
10647c478bd9Sstevel@tonic-gate 	 */
1065d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_time_recalled == 0)
1066d216dff5SRobert Mastors 		fp->rf_dinfo.rd_time_recalled = gethrestime_sec();
1067d216dff5SRobert Mastors 	fp->rf_dinfo.rd_ever_recalled = TRUE; /* used for policy decision */
10687c478bd9Sstevel@tonic-gate 	/* Client causing recall not always available */
10697c478bd9Sstevel@tonic-gate 	if (cp)
1070d216dff5SRobert Mastors 		fp->rf_dinfo.rd_conflicted_client = cp->rc_clientid;
10717c478bd9Sstevel@tonic-gate 
1072d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
10737c478bd9Sstevel@tonic-gate 
10747c478bd9Sstevel@tonic-gate 	args = kmem_alloc(sizeof (struct master_recall_args), KM_SLEEP);
10757c478bd9Sstevel@tonic-gate 	args->fp = fp;
10767c478bd9Sstevel@tonic-gate 	args->recall = recall;
10777c478bd9Sstevel@tonic-gate 	args->trunc = trunc;
10787c478bd9Sstevel@tonic-gate 
10790dfe541eSEvan Layton 	(void) zthread_create(NULL, 0, do_recall_file, args, 0,
10807c478bd9Sstevel@tonic-gate 	    minclsyspri);
10817c478bd9Sstevel@tonic-gate }
10827c478bd9Sstevel@tonic-gate 
10837c478bd9Sstevel@tonic-gate void
rfs4_recall_deleg(rfs4_file_t * fp,bool_t trunc,rfs4_client_t * cp)10847c478bd9Sstevel@tonic-gate rfs4_recall_deleg(rfs4_file_t *fp, bool_t trunc, rfs4_client_t *cp)
10857c478bd9Sstevel@tonic-gate {
10867c478bd9Sstevel@tonic-gate 	time_t elapsed1, elapsed2;
10877c478bd9Sstevel@tonic-gate 
1088d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_time_recalled != 0) {
1089d216dff5SRobert Mastors 		elapsed1 = gethrestime_sec() - fp->rf_dinfo.rd_time_recalled;
1090d216dff5SRobert Mastors 		elapsed2 = gethrestime_sec() - fp->rf_dinfo.rd_time_lastwrite;
10917c478bd9Sstevel@tonic-gate 		/* First check to see if a revocation should occur */
10927c478bd9Sstevel@tonic-gate 		if (elapsed1 > rfs4_lease_time &&
10937c478bd9Sstevel@tonic-gate 		    elapsed2 > rfs4_lease_time) {
10947c478bd9Sstevel@tonic-gate 			rfs4_revoke_file(fp);
10957c478bd9Sstevel@tonic-gate 			return;
10967c478bd9Sstevel@tonic-gate 		}
10977c478bd9Sstevel@tonic-gate 		/*
10987c478bd9Sstevel@tonic-gate 		 * Next check to see if a recall should be done again
10997c478bd9Sstevel@tonic-gate 		 * so quickly.
11007c478bd9Sstevel@tonic-gate 		 */
11017c478bd9Sstevel@tonic-gate 		if (elapsed1 <= ((rfs4_lease_time * 20) / 100))
11027c478bd9Sstevel@tonic-gate 			return;
11037c478bd9Sstevel@tonic-gate 	}
11047c478bd9Sstevel@tonic-gate 	rfs4_recall_file(fp, rfs4_do_cb_recall, trunc, cp);
11057c478bd9Sstevel@tonic-gate }
11067c478bd9Sstevel@tonic-gate 
11077c478bd9Sstevel@tonic-gate /*
11087c478bd9Sstevel@tonic-gate  * rfs4_check_recall is called from rfs4_do_open to determine if the current
11097c478bd9Sstevel@tonic-gate  * open conflicts with the delegation.
11107c478bd9Sstevel@tonic-gate  * Return true if we need recall otherwise false.
1111d216dff5SRobert Mastors  * Assumes entry locks for sp and sp->rs_finfo are held.
11127c478bd9Sstevel@tonic-gate  */
11137c478bd9Sstevel@tonic-gate bool_t
rfs4_check_recall(rfs4_state_t * sp,uint32_t access)11147c478bd9Sstevel@tonic-gate rfs4_check_recall(rfs4_state_t *sp, uint32_t access)
11157c478bd9Sstevel@tonic-gate {
1116d216dff5SRobert Mastors 	open_delegation_type4 dtype = sp->rs_finfo->rf_dinfo.rd_dtype;
11177c478bd9Sstevel@tonic-gate 
11187c478bd9Sstevel@tonic-gate 	switch (dtype) {
11197c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_NONE:
11207c478bd9Sstevel@tonic-gate 		/* Not currently delegated so there is nothing to do */
11217c478bd9Sstevel@tonic-gate 		return (FALSE);
11227c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_READ:
11237c478bd9Sstevel@tonic-gate 		/*
11247c478bd9Sstevel@tonic-gate 		 * If the access is only asking for READ then there is
11257c478bd9Sstevel@tonic-gate 		 * no conflict and nothing to do.  If it is asking
11267c478bd9Sstevel@tonic-gate 		 * for write, then there will be conflict and the read
11277c478bd9Sstevel@tonic-gate 		 * delegation should be recalled.
11287c478bd9Sstevel@tonic-gate 		 */
11297c478bd9Sstevel@tonic-gate 		if (access == OPEN4_SHARE_ACCESS_READ)
11307c478bd9Sstevel@tonic-gate 			return (FALSE);
11317c478bd9Sstevel@tonic-gate 		else
11327c478bd9Sstevel@tonic-gate 			return (TRUE);
11337c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_WRITE:
11347c478bd9Sstevel@tonic-gate 		/* Check to see if this client has the delegation */
11357c478bd9Sstevel@tonic-gate 		return (rfs4_is_deleg(sp));
11367c478bd9Sstevel@tonic-gate 	}
11377c478bd9Sstevel@tonic-gate 
11387c478bd9Sstevel@tonic-gate 	return (FALSE);
11397c478bd9Sstevel@tonic-gate }
11407c478bd9Sstevel@tonic-gate 
11417c478bd9Sstevel@tonic-gate /*
11427c478bd9Sstevel@tonic-gate  * Return the "best" allowable delegation available given the current
11437c478bd9Sstevel@tonic-gate  * delegation type and the desired access and deny modes on the file.
11447c478bd9Sstevel@tonic-gate  * At the point that this routine is called we know that the access and
11457c478bd9Sstevel@tonic-gate  * deny modes are consistent with the file modes.
11467c478bd9Sstevel@tonic-gate  */
11477c478bd9Sstevel@tonic-gate static open_delegation_type4
rfs4_check_delegation(rfs4_state_t * sp,rfs4_file_t * fp)11487c478bd9Sstevel@tonic-gate rfs4_check_delegation(rfs4_state_t *sp, rfs4_file_t *fp)
11497c478bd9Sstevel@tonic-gate {
1150d216dff5SRobert Mastors 	open_delegation_type4 dtype = fp->rf_dinfo.rd_dtype;
1151d216dff5SRobert Mastors 	uint32_t access = sp->rs_share_access;
1152d216dff5SRobert Mastors 	uint32_t deny = sp->rs_share_deny;
11537c478bd9Sstevel@tonic-gate 	int readcnt = 0;
11547c478bd9Sstevel@tonic-gate 	int writecnt = 0;
11557c478bd9Sstevel@tonic-gate 
11567c478bd9Sstevel@tonic-gate 	switch (dtype) {
11577c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_NONE:
11587c478bd9Sstevel@tonic-gate 		/*
11597c478bd9Sstevel@tonic-gate 		 * Determine if more than just this OPEN have the file
11607c478bd9Sstevel@tonic-gate 		 * open and if so, no delegation may be provided to
11617c478bd9Sstevel@tonic-gate 		 * the client.
11627c478bd9Sstevel@tonic-gate 		 */
11637c478bd9Sstevel@tonic-gate 		if (access & OPEN4_SHARE_ACCESS_WRITE)
11647c478bd9Sstevel@tonic-gate 			writecnt++;
11657c478bd9Sstevel@tonic-gate 		if (access & OPEN4_SHARE_ACCESS_READ)
11667c478bd9Sstevel@tonic-gate 			readcnt++;
11677c478bd9Sstevel@tonic-gate 
1168d216dff5SRobert Mastors 		if (fp->rf_access_read > readcnt ||
1169d216dff5SRobert Mastors 		    fp->rf_access_write > writecnt)
11707c478bd9Sstevel@tonic-gate 			return (OPEN_DELEGATE_NONE);
11717c478bd9Sstevel@tonic-gate 
11727c478bd9Sstevel@tonic-gate 		/*
11737c478bd9Sstevel@tonic-gate 		 * If the client is going to write, or if the client
11747c478bd9Sstevel@tonic-gate 		 * has exclusive access, return a write delegation.
11757c478bd9Sstevel@tonic-gate 		 */
11767c478bd9Sstevel@tonic-gate 		if ((access & OPEN4_SHARE_ACCESS_WRITE) ||
11777c478bd9Sstevel@tonic-gate 		    (deny & (OPEN4_SHARE_DENY_READ | OPEN4_SHARE_DENY_WRITE)))
11787c478bd9Sstevel@tonic-gate 			return (OPEN_DELEGATE_WRITE);
11797c478bd9Sstevel@tonic-gate 		/*
11807c478bd9Sstevel@tonic-gate 		 * If we don't want to write or we've haven't denied read
11817c478bd9Sstevel@tonic-gate 		 * access to others, return a read delegation.
11827c478bd9Sstevel@tonic-gate 		 */
11837c478bd9Sstevel@tonic-gate 		if ((access & ~OPEN4_SHARE_ACCESS_WRITE) ||
11847c478bd9Sstevel@tonic-gate 		    (deny & ~OPEN4_SHARE_DENY_READ))
11857c478bd9Sstevel@tonic-gate 			return (OPEN_DELEGATE_READ);
11867c478bd9Sstevel@tonic-gate 
11877c478bd9Sstevel@tonic-gate 		/* Shouldn't get here */
11887c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_NONE);
11897c478bd9Sstevel@tonic-gate 
11907c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_READ:
11917c478bd9Sstevel@tonic-gate 		/*
11927c478bd9Sstevel@tonic-gate 		 * If the file is delegated for read but we wan't to
11937c478bd9Sstevel@tonic-gate 		 * write or deny others to read then we can't delegate
11947c478bd9Sstevel@tonic-gate 		 * the file. We shouldn't get here since the delegation should
11957c478bd9Sstevel@tonic-gate 		 * have been recalled already.
11967c478bd9Sstevel@tonic-gate 		 */
11977c478bd9Sstevel@tonic-gate 		if ((access & OPEN4_SHARE_ACCESS_WRITE) ||
11987c478bd9Sstevel@tonic-gate 		    (deny & OPEN4_SHARE_DENY_READ))
11997c478bd9Sstevel@tonic-gate 			return (OPEN_DELEGATE_NONE);
12007c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_READ);
12017c478bd9Sstevel@tonic-gate 
12027c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_WRITE:
12037c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_WRITE);
12047c478bd9Sstevel@tonic-gate 	}
12057c478bd9Sstevel@tonic-gate 
12067c478bd9Sstevel@tonic-gate 	/* Shouldn't get here */
12077c478bd9Sstevel@tonic-gate 	return (OPEN_DELEGATE_NONE);
12087c478bd9Sstevel@tonic-gate }
12097c478bd9Sstevel@tonic-gate 
12107c478bd9Sstevel@tonic-gate /*
12117c478bd9Sstevel@tonic-gate  * Given the desired delegation type and the "history" of the file
12127c478bd9Sstevel@tonic-gate  * determine the actual delegation type to return.
12137c478bd9Sstevel@tonic-gate  */
12147c478bd9Sstevel@tonic-gate static open_delegation_type4
rfs4_delegation_policy(nfs4_srv_t * nsrv4,open_delegation_type4 dtype,rfs4_dinfo_t * dinfo,clientid4 cid)12150dfe541eSEvan Layton rfs4_delegation_policy(nfs4_srv_t *nsrv4, open_delegation_type4 dtype,
12167c478bd9Sstevel@tonic-gate     rfs4_dinfo_t *dinfo, clientid4 cid)
12177c478bd9Sstevel@tonic-gate {
12187c478bd9Sstevel@tonic-gate 	time_t elapsed;
12197c478bd9Sstevel@tonic-gate 
12200dfe541eSEvan Layton 	if (nsrv4->nfs4_deleg_policy != SRV_NORMAL_DELEGATE)
12217c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_NONE);
12227c478bd9Sstevel@tonic-gate 
12237c478bd9Sstevel@tonic-gate 	/*
12247c478bd9Sstevel@tonic-gate 	 * Has this file/delegation ever been recalled?  If not then
1225d216dff5SRobert Mastors 	 * no further checks for a delegation race need to be done.
12267c478bd9Sstevel@tonic-gate 	 * However if a recall has occurred, then check to see if a
12277c478bd9Sstevel@tonic-gate 	 * client has caused its own delegation recall to occur.  If
12287c478bd9Sstevel@tonic-gate 	 * not, then has a delegation for this file been returned
12297c478bd9Sstevel@tonic-gate 	 * recently?  If so, then do not assign a new delegation to
12307c478bd9Sstevel@tonic-gate 	 * avoid a "delegation race" between the original client and
12317c478bd9Sstevel@tonic-gate 	 * the new/conflicting client.
12327c478bd9Sstevel@tonic-gate 	 */
1233d216dff5SRobert Mastors 	if (dinfo->rd_ever_recalled == TRUE) {
1234d216dff5SRobert Mastors 		if (dinfo->rd_conflicted_client != cid) {
1235d216dff5SRobert Mastors 			elapsed = gethrestime_sec() - dinfo->rd_time_returned;
12367c478bd9Sstevel@tonic-gate 			if (elapsed < rfs4_lease_time)
12377c478bd9Sstevel@tonic-gate 				return (OPEN_DELEGATE_NONE);
12387c478bd9Sstevel@tonic-gate 		}
12397c478bd9Sstevel@tonic-gate 	}
12407c478bd9Sstevel@tonic-gate 
12417c478bd9Sstevel@tonic-gate 	/* Limit the number of read grants */
12427c478bd9Sstevel@tonic-gate 	if (dtype == OPEN_DELEGATE_READ &&
1243d216dff5SRobert Mastors 	    dinfo->rd_rdgrants > MAX_READ_DELEGATIONS)
12447c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_NONE);
12457c478bd9Sstevel@tonic-gate 
12467c478bd9Sstevel@tonic-gate 	/*
12477c478bd9Sstevel@tonic-gate 	 * Should consider limiting total number of read/write
12487c478bd9Sstevel@tonic-gate 	 * delegations the server will permit.
12497c478bd9Sstevel@tonic-gate 	 */
12507c478bd9Sstevel@tonic-gate 
12517c478bd9Sstevel@tonic-gate 	return (dtype);
12527c478bd9Sstevel@tonic-gate }
12537c478bd9Sstevel@tonic-gate 
12547c478bd9Sstevel@tonic-gate /*
12557c478bd9Sstevel@tonic-gate  * Try and grant a delegation for an open give the state. The routine
12567c478bd9Sstevel@tonic-gate  * returns the delegation type granted. This could be OPEN_DELEGATE_NONE.
12577c478bd9Sstevel@tonic-gate  *
12587c478bd9Sstevel@tonic-gate  * The state and associate file entry must be locked
12597c478bd9Sstevel@tonic-gate  */
12607c478bd9Sstevel@tonic-gate rfs4_deleg_state_t *
rfs4_grant_delegation(delegreq_t dreq,rfs4_state_t * sp,int * recall)12617c478bd9Sstevel@tonic-gate rfs4_grant_delegation(delegreq_t dreq, rfs4_state_t *sp, int *recall)
12627c478bd9Sstevel@tonic-gate {
12630dfe541eSEvan Layton 	nfs4_srv_t *nsrv4;
1264d216dff5SRobert Mastors 	rfs4_file_t *fp = sp->rs_finfo;
12657c478bd9Sstevel@tonic-gate 	open_delegation_type4 dtype;
12667c478bd9Sstevel@tonic-gate 	int no_delegation;
12677c478bd9Sstevel@tonic-gate 
1268d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(sp->rs_dbe));
1269d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(fp->rf_dbe));
12707c478bd9Sstevel@tonic-gate 
12710dfe541eSEvan Layton 	nsrv4 = nfs4_get_srv();
12720dfe541eSEvan Layton 
12737c478bd9Sstevel@tonic-gate 	/* Is the server even providing delegations? */
12740dfe541eSEvan Layton 	if (nsrv4->nfs4_deleg_policy == SRV_NEVER_DELEGATE ||
12750dfe541eSEvan Layton 	    dreq == DELEG_NONE) {
12767c478bd9Sstevel@tonic-gate 		return (NULL);
12770dfe541eSEvan Layton 	}
12787c478bd9Sstevel@tonic-gate 
12797c478bd9Sstevel@tonic-gate 	/* Check to see if delegations have been temporarily disabled */
12800dfe541eSEvan Layton 	mutex_enter(&nsrv4->deleg_lock);
12817c478bd9Sstevel@tonic-gate 	no_delegation = rfs4_deleg_disabled;
12820dfe541eSEvan Layton 	mutex_exit(&nsrv4->deleg_lock);
12837c478bd9Sstevel@tonic-gate 
12847c478bd9Sstevel@tonic-gate 	if (no_delegation)
12857c478bd9Sstevel@tonic-gate 		return (NULL);
12867c478bd9Sstevel@tonic-gate 
12877c478bd9Sstevel@tonic-gate 	/* Don't grant a delegation if a deletion is impending. */
1288d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_hold_grant > 0) {
12897c478bd9Sstevel@tonic-gate 		return (NULL);
12907c478bd9Sstevel@tonic-gate 	}
12917c478bd9Sstevel@tonic-gate 
12927c478bd9Sstevel@tonic-gate 	/*
12937c478bd9Sstevel@tonic-gate 	 * Don't grant a delegation if there are any lock manager
12947c478bd9Sstevel@tonic-gate 	 * (NFSv2/v3) locks for the file.  This is a bit of a hack (e.g.,
12957c478bd9Sstevel@tonic-gate 	 * if there are only read locks we should be able to grant a
12967c478bd9Sstevel@tonic-gate 	 * read-only delegation), but it's good enough for now.
12977c478bd9Sstevel@tonic-gate 	 *
12987c478bd9Sstevel@tonic-gate 	 * MT safety: the lock manager checks for conflicting delegations
12997c478bd9Sstevel@tonic-gate 	 * before processing a lock request.  That check will block until
13007c478bd9Sstevel@tonic-gate 	 * we are done here.  So if the lock manager acquires a lock after
13017c478bd9Sstevel@tonic-gate 	 * we decide to grant the delegation, the delegation will get
13027c478bd9Sstevel@tonic-gate 	 * immediately recalled (if there's a conflict), so we're safe.
13037c478bd9Sstevel@tonic-gate 	 */
1304d216dff5SRobert Mastors 	if (lm_vp_active(fp->rf_vp)) {
13057c478bd9Sstevel@tonic-gate 		return (NULL);
13067c478bd9Sstevel@tonic-gate 	}
13077c478bd9Sstevel@tonic-gate 
13087c478bd9Sstevel@tonic-gate 	/*
13097c478bd9Sstevel@tonic-gate 	 * Based on the type of delegation request passed in, take the
13107c478bd9Sstevel@tonic-gate 	 * appropriate action (DELEG_NONE is handled above)
13117c478bd9Sstevel@tonic-gate 	 */
13127c478bd9Sstevel@tonic-gate 	switch (dreq) {
13137c478bd9Sstevel@tonic-gate 
13147c478bd9Sstevel@tonic-gate 	case DELEG_READ:
13157c478bd9Sstevel@tonic-gate 	case DELEG_WRITE:
13167c478bd9Sstevel@tonic-gate 		/*
13177c478bd9Sstevel@tonic-gate 		 * The server "must" grant the delegation in this case.
13187c478bd9Sstevel@tonic-gate 		 * Client is using open previous
13197c478bd9Sstevel@tonic-gate 		 */
13207c478bd9Sstevel@tonic-gate 		dtype = (open_delegation_type4)dreq;
13217c478bd9Sstevel@tonic-gate 		*recall = 1;
13227c478bd9Sstevel@tonic-gate 		break;
13237c478bd9Sstevel@tonic-gate 	case DELEG_ANY:
13247c478bd9Sstevel@tonic-gate 		/*
13257c478bd9Sstevel@tonic-gate 		 * If a valid callback path does not exist, no delegation may
13267c478bd9Sstevel@tonic-gate 		 * be granted.
13277c478bd9Sstevel@tonic-gate 		 */
1328d216dff5SRobert Mastors 		if (sp->rs_owner->ro_client->rc_cbinfo.cb_state != CB_OK)
13297c478bd9Sstevel@tonic-gate 			return (NULL);
13307c478bd9Sstevel@tonic-gate 
13317c478bd9Sstevel@tonic-gate 		/*
13327c478bd9Sstevel@tonic-gate 		 * If the original operation which caused time_rm_delayed
13337c478bd9Sstevel@tonic-gate 		 * to be set hasn't been retried and completed for one
13347c478bd9Sstevel@tonic-gate 		 * full lease period, clear it and allow delegations to
13357c478bd9Sstevel@tonic-gate 		 * get granted again.
13367c478bd9Sstevel@tonic-gate 		 */
1337d216dff5SRobert Mastors 		if (fp->rf_dinfo.rd_time_rm_delayed > 0 &&
13387c478bd9Sstevel@tonic-gate 		    gethrestime_sec() >
1339d216dff5SRobert Mastors 		    fp->rf_dinfo.rd_time_rm_delayed + rfs4_lease_time)
1340d216dff5SRobert Mastors 			fp->rf_dinfo.rd_time_rm_delayed = 0;
13417c478bd9Sstevel@tonic-gate 
13427c478bd9Sstevel@tonic-gate 		/*
13437c478bd9Sstevel@tonic-gate 		 * If we are waiting for a delegation to be returned then
13447c478bd9Sstevel@tonic-gate 		 * don't delegate this file. We do this for correctness as
13457c478bd9Sstevel@tonic-gate 		 * well as if the file is being recalled we would likely
13467c478bd9Sstevel@tonic-gate 		 * recall this file again.
13477c478bd9Sstevel@tonic-gate 		 */
13487c478bd9Sstevel@tonic-gate 
1349d216dff5SRobert Mastors 		if (fp->rf_dinfo.rd_time_recalled != 0 ||
1350d216dff5SRobert Mastors 		    fp->rf_dinfo.rd_time_rm_delayed != 0)
13517c478bd9Sstevel@tonic-gate 			return (NULL);
13527c478bd9Sstevel@tonic-gate 
13537c478bd9Sstevel@tonic-gate 		/* Get the "best" delegation candidate */
13547c478bd9Sstevel@tonic-gate 		dtype = rfs4_check_delegation(sp, fp);
13557c478bd9Sstevel@tonic-gate 
13567c478bd9Sstevel@tonic-gate 		if (dtype == OPEN_DELEGATE_NONE)
13577c478bd9Sstevel@tonic-gate 			return (NULL);
13587c478bd9Sstevel@tonic-gate 
13597c478bd9Sstevel@tonic-gate 		/*
13607c478bd9Sstevel@tonic-gate 		 * Based on policy and the history of the file get the
13617c478bd9Sstevel@tonic-gate 		 * actual delegation.
13627c478bd9Sstevel@tonic-gate 		 */
13630dfe541eSEvan Layton 		dtype = rfs4_delegation_policy(nsrv4, dtype, &fp->rf_dinfo,
1364d216dff5SRobert Mastors 		    sp->rs_owner->ro_client->rc_clientid);
13657c478bd9Sstevel@tonic-gate 
13667c478bd9Sstevel@tonic-gate 		if (dtype == OPEN_DELEGATE_NONE)
13677c478bd9Sstevel@tonic-gate 			return (NULL);
13687c478bd9Sstevel@tonic-gate 		break;
13697c478bd9Sstevel@tonic-gate 	default:
13707c478bd9Sstevel@tonic-gate 		return (NULL);
13717c478bd9Sstevel@tonic-gate 	}
13727c478bd9Sstevel@tonic-gate 
13737c478bd9Sstevel@tonic-gate 	/* set the delegation for the state */
13747c478bd9Sstevel@tonic-gate 	return (rfs4_deleg_state(sp, dtype, recall));
13757c478bd9Sstevel@tonic-gate }
13767c478bd9Sstevel@tonic-gate 
13777c478bd9Sstevel@tonic-gate void
rfs4_set_deleg_response(rfs4_deleg_state_t * dsp,open_delegation4 * dp,nfsace4 * ace,int recall)13787c478bd9Sstevel@tonic-gate rfs4_set_deleg_response(rfs4_deleg_state_t *dsp, open_delegation4 *dp,
13797c478bd9Sstevel@tonic-gate     nfsace4 *ace,  int recall)
13807c478bd9Sstevel@tonic-gate {
13817c478bd9Sstevel@tonic-gate 	open_write_delegation4 *wp;
13827c478bd9Sstevel@tonic-gate 	open_read_delegation4 *rp;
13837c478bd9Sstevel@tonic-gate 	nfs_space_limit4 *spl;
13847c478bd9Sstevel@tonic-gate 	nfsace4 nace;
13857c478bd9Sstevel@tonic-gate 
13867c478bd9Sstevel@tonic-gate 	/*
13877c478bd9Sstevel@tonic-gate 	 * We need to allocate a new copy of the who string.
13887c478bd9Sstevel@tonic-gate 	 * this string will be freed by the rfs4_op_open dis_resfree
13897c478bd9Sstevel@tonic-gate 	 * routine. We need to do this allocation since replays will
13907c478bd9Sstevel@tonic-gate 	 * be allocated and rfs4_compound can't tell the difference from
13917c478bd9Sstevel@tonic-gate 	 * a replay and an inital open. N.B. if an ace is passed in, it
13927c478bd9Sstevel@tonic-gate 	 * the caller's responsibility to free it.
13937c478bd9Sstevel@tonic-gate 	 */
13947c478bd9Sstevel@tonic-gate 
13957c478bd9Sstevel@tonic-gate 	if (ace == NULL) {
13967c478bd9Sstevel@tonic-gate 		/*
13977c478bd9Sstevel@tonic-gate 		 * Default is to deny all access, the client will have
13987c478bd9Sstevel@tonic-gate 		 * to contact the server.  XXX Do we want to actually
13997c478bd9Sstevel@tonic-gate 		 * set a deny for every one, or do we simply want to
14007c478bd9Sstevel@tonic-gate 		 * construct an entity that will match no one?
14017c478bd9Sstevel@tonic-gate 		 */
14027c478bd9Sstevel@tonic-gate 		nace.type = ACE4_ACCESS_DENIED_ACE_TYPE;
14037c478bd9Sstevel@tonic-gate 		nace.flag = 0;
14047c478bd9Sstevel@tonic-gate 		nace.access_mask = ACE4_VALID_MASK_BITS;
14057c478bd9Sstevel@tonic-gate 		(void) str_to_utf8(ACE4_WHO_EVERYONE, &nace.who);
14067c478bd9Sstevel@tonic-gate 	} else {
14077c478bd9Sstevel@tonic-gate 		nace.type = ace->type;
14087c478bd9Sstevel@tonic-gate 		nace.flag = ace->flag;
14097c478bd9Sstevel@tonic-gate 		nace.access_mask = ace->access_mask;
14107c478bd9Sstevel@tonic-gate 		(void) utf8_copy(&ace->who, &nace.who);
14117c478bd9Sstevel@tonic-gate 	}
14127c478bd9Sstevel@tonic-gate 
1413d216dff5SRobert Mastors 	dp->delegation_type = dsp->rds_dtype;
14147c478bd9Sstevel@tonic-gate 
1415d216dff5SRobert Mastors 	switch (dsp->rds_dtype) {
14167c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_NONE:
14177c478bd9Sstevel@tonic-gate 		break;
14187c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_READ:
14197c478bd9Sstevel@tonic-gate 		rp = &dp->open_delegation4_u.read;
1420d216dff5SRobert Mastors 		rp->stateid = dsp->rds_delegid.stateid;
14217c478bd9Sstevel@tonic-gate 		rp->recall = (bool_t)recall;
14227c478bd9Sstevel@tonic-gate 		rp->permissions = nace;
14237c478bd9Sstevel@tonic-gate 		break;
14247c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_WRITE:
14257c478bd9Sstevel@tonic-gate 		wp = &dp->open_delegation4_u.write;
1426d216dff5SRobert Mastors 		wp->stateid = dsp->rds_delegid.stateid;
14277c478bd9Sstevel@tonic-gate 		wp->recall = (bool_t)recall;
14287c478bd9Sstevel@tonic-gate 		spl = &wp->space_limit;
14297c478bd9Sstevel@tonic-gate 		spl->limitby = NFS_LIMIT_SIZE;
14307c478bd9Sstevel@tonic-gate 		spl->nfs_space_limit4_u.filesize = 0;
14317c478bd9Sstevel@tonic-gate 		wp->permissions = nace;
14327c478bd9Sstevel@tonic-gate 		break;
14337c478bd9Sstevel@tonic-gate 	}
14347c478bd9Sstevel@tonic-gate }
14357c478bd9Sstevel@tonic-gate 
14367c478bd9Sstevel@tonic-gate /*
14377c478bd9Sstevel@tonic-gate  * Check if the file is delegated via the provided file struct.
14387c478bd9Sstevel@tonic-gate  * Return TRUE if it is delegated.  This is intended for use by
14397c478bd9Sstevel@tonic-gate  * the v4 server.  The v2/v3 server code should use rfs4_check_delegated().
14407c478bd9Sstevel@tonic-gate  *
14417c478bd9Sstevel@tonic-gate  * Note that if the file is found to have a delegation, it is
14427c478bd9Sstevel@tonic-gate  * recalled, unless the clientid of the caller matches the clientid of the
14437c478bd9Sstevel@tonic-gate  * delegation. If the caller has specified, there is a slight delay
14447c478bd9Sstevel@tonic-gate  * inserted in the hopes that the delegation will be returned quickly.
14457c478bd9Sstevel@tonic-gate  */
14467c478bd9Sstevel@tonic-gate bool_t
rfs4_check_delegated_byfp(int mode,rfs4_file_t * fp,bool_t trunc,bool_t do_delay,bool_t is_rm,clientid4 * cp)14477c478bd9Sstevel@tonic-gate rfs4_check_delegated_byfp(int mode, rfs4_file_t *fp,
14487c478bd9Sstevel@tonic-gate     bool_t trunc, bool_t do_delay, bool_t is_rm, clientid4 *cp)
14497c478bd9Sstevel@tonic-gate {
14507c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
14517c478bd9Sstevel@tonic-gate 
14520dfe541eSEvan Layton 	nfs4_srv_t *nsrv4 = nfs4_get_srv();
14530dfe541eSEvan Layton 
14547c478bd9Sstevel@tonic-gate 	/* Is delegation enabled? */
14550dfe541eSEvan Layton 	if (nsrv4->nfs4_deleg_policy == SRV_NEVER_DELEGATE)
14567c478bd9Sstevel@tonic-gate 		return (FALSE);
14577c478bd9Sstevel@tonic-gate 
14587c478bd9Sstevel@tonic-gate 	/* do we have a delegation on this file? */
1459d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
1460d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_NONE) {
14617c478bd9Sstevel@tonic-gate 		if (is_rm)
1462d216dff5SRobert Mastors 			fp->rf_dinfo.rd_hold_grant++;
1463d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
14647c478bd9Sstevel@tonic-gate 		return (FALSE);
14657c478bd9Sstevel@tonic-gate 	}
14667c478bd9Sstevel@tonic-gate 	/*
14677c478bd9Sstevel@tonic-gate 	 * do we have a write delegation on this file or are we
14687c478bd9Sstevel@tonic-gate 	 * requesting write access to a file with any type of existing
14697c478bd9Sstevel@tonic-gate 	 * delegation?
14707c478bd9Sstevel@tonic-gate 	 */
1471d216dff5SRobert Mastors 	if (mode == FWRITE || fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_WRITE) {
14727c478bd9Sstevel@tonic-gate 		if (cp != NULL) {
1473d216dff5SRobert Mastors 			dsp = list_head(&fp->rf_delegstatelist);
14747c478bd9Sstevel@tonic-gate 			if (dsp == NULL) {
1475d216dff5SRobert Mastors 				rfs4_dbe_unlock(fp->rf_dbe);
14767c478bd9Sstevel@tonic-gate 				return (FALSE);
14777c478bd9Sstevel@tonic-gate 			}
14787c478bd9Sstevel@tonic-gate 			/*
14797c478bd9Sstevel@tonic-gate 			 * Does the requestor already own the delegation?
14807c478bd9Sstevel@tonic-gate 			 */
1481d216dff5SRobert Mastors 			if (dsp->rds_client->rc_clientid == *(cp)) {
1482d216dff5SRobert Mastors 				rfs4_dbe_unlock(fp->rf_dbe);
14837c478bd9Sstevel@tonic-gate 				return (FALSE);
14847c478bd9Sstevel@tonic-gate 			}
14857c478bd9Sstevel@tonic-gate 		}
14867c478bd9Sstevel@tonic-gate 
1487d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
14887c478bd9Sstevel@tonic-gate 		rfs4_recall_deleg(fp, trunc, NULL);
14897c478bd9Sstevel@tonic-gate 
14907c478bd9Sstevel@tonic-gate 		if (!do_delay) {
1491d216dff5SRobert Mastors 			rfs4_dbe_lock(fp->rf_dbe);
1492d216dff5SRobert Mastors 			fp->rf_dinfo.rd_time_rm_delayed = gethrestime_sec();
1493d216dff5SRobert Mastors 			rfs4_dbe_unlock(fp->rf_dbe);
14947c478bd9Sstevel@tonic-gate 			return (TRUE);
14957c478bd9Sstevel@tonic-gate 		}
14967c478bd9Sstevel@tonic-gate 
14977c478bd9Sstevel@tonic-gate 		delay(NFS4_DELEGATION_CONFLICT_DELAY);
14987c478bd9Sstevel@tonic-gate 
1499d216dff5SRobert Mastors 		rfs4_dbe_lock(fp->rf_dbe);
1500d216dff5SRobert Mastors 		if (fp->rf_dinfo.rd_dtype != OPEN_DELEGATE_NONE) {
1501d216dff5SRobert Mastors 			fp->rf_dinfo.rd_time_rm_delayed = gethrestime_sec();
1502d216dff5SRobert Mastors 			rfs4_dbe_unlock(fp->rf_dbe);
15037c478bd9Sstevel@tonic-gate 			return (TRUE);
15047c478bd9Sstevel@tonic-gate 		}
15057c478bd9Sstevel@tonic-gate 	}
15067c478bd9Sstevel@tonic-gate 	if (is_rm)
1507d216dff5SRobert Mastors 		fp->rf_dinfo.rd_hold_grant++;
1508d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
15097c478bd9Sstevel@tonic-gate 	return (FALSE);
15107c478bd9Sstevel@tonic-gate }
15117c478bd9Sstevel@tonic-gate 
15127c478bd9Sstevel@tonic-gate /*
15137c478bd9Sstevel@tonic-gate  * Check if the file is delegated in the case of a v2 or v3 access.
15147c478bd9Sstevel@tonic-gate  * Return TRUE if it is delegated which in turn means that v2 should
15157c478bd9Sstevel@tonic-gate  * drop the request and in the case of v3 JUKEBOX should be returned.
15167c478bd9Sstevel@tonic-gate  */
15177c478bd9Sstevel@tonic-gate bool_t
rfs4_check_delegated(int mode,vnode_t * vp,bool_t trunc)15187c478bd9Sstevel@tonic-gate rfs4_check_delegated(int mode, vnode_t *vp, bool_t trunc)
15197c478bd9Sstevel@tonic-gate {
15200dfe541eSEvan Layton 	nfs4_srv_t *nsrv4;
15217c478bd9Sstevel@tonic-gate 	rfs4_file_t *fp;
15227c478bd9Sstevel@tonic-gate 	bool_t create = FALSE;
15237c478bd9Sstevel@tonic-gate 	bool_t rc = FALSE;
15247c478bd9Sstevel@tonic-gate 
15250dfe541eSEvan Layton 	nsrv4 = nfs4_get_srv();
15260dfe541eSEvan Layton 	rfs4_hold_deleg_policy(nsrv4);
15277c478bd9Sstevel@tonic-gate 
15287c478bd9Sstevel@tonic-gate 	/* Is delegation enabled? */
15290dfe541eSEvan Layton 	if (nsrv4->nfs4_deleg_policy != SRV_NEVER_DELEGATE) {
15307c478bd9Sstevel@tonic-gate 		fp = rfs4_findfile(vp, NULL, &create);
15317c478bd9Sstevel@tonic-gate 		if (fp != NULL) {
15327c478bd9Sstevel@tonic-gate 			if (rfs4_check_delegated_byfp(mode, fp, trunc,
15337c478bd9Sstevel@tonic-gate 			    TRUE, FALSE, NULL)) {
15347c478bd9Sstevel@tonic-gate 				rc = TRUE;
15357c478bd9Sstevel@tonic-gate 			}
15367c478bd9Sstevel@tonic-gate 			rfs4_file_rele(fp);
15377c478bd9Sstevel@tonic-gate 		}
15387c478bd9Sstevel@tonic-gate 	}
15390dfe541eSEvan Layton 	rfs4_rele_deleg_policy(nsrv4);
15407c478bd9Sstevel@tonic-gate 	return (rc);
15417c478bd9Sstevel@tonic-gate }
15427c478bd9Sstevel@tonic-gate 
15437c478bd9Sstevel@tonic-gate /*
15447c478bd9Sstevel@tonic-gate  * Release a hold on the hold_grant counter which
15457c478bd9Sstevel@tonic-gate  * prevents delegation from being granted while a remove
15467c478bd9Sstevel@tonic-gate  * or a rename is in progress.
15477c478bd9Sstevel@tonic-gate  */
15487c478bd9Sstevel@tonic-gate void
rfs4_clear_dont_grant(rfs4_file_t * fp)15497c478bd9Sstevel@tonic-gate rfs4_clear_dont_grant(rfs4_file_t *fp)
15507c478bd9Sstevel@tonic-gate {
15510dfe541eSEvan Layton 	nfs4_srv_t *nsrv4 = nfs4_get_srv();
15520dfe541eSEvan Layton 
15530dfe541eSEvan Layton 	if (nsrv4->nfs4_deleg_policy == SRV_NEVER_DELEGATE)
15547c478bd9Sstevel@tonic-gate 		return;
1555d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
1556d216dff5SRobert Mastors 	ASSERT(fp->rf_dinfo.rd_hold_grant > 0);
1557d216dff5SRobert Mastors 	fp->rf_dinfo.rd_hold_grant--;
1558d216dff5SRobert Mastors 	fp->rf_dinfo.rd_time_rm_delayed = 0;
1559d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
15607c478bd9Sstevel@tonic-gate }
15617c478bd9Sstevel@tonic-gate 
15627c478bd9Sstevel@tonic-gate /*
15637c478bd9Sstevel@tonic-gate  * State support for delegation.
15647c478bd9Sstevel@tonic-gate  * Set the state delegation type for this state;
15657c478bd9Sstevel@tonic-gate  * This routine is called from open via rfs4_grant_delegation and the entry
1566d216dff5SRobert Mastors  * locks on sp and sp->rs_finfo are assumed.
15677c478bd9Sstevel@tonic-gate  */
15687c478bd9Sstevel@tonic-gate static rfs4_deleg_state_t *
rfs4_deleg_state(rfs4_state_t * sp,open_delegation_type4 dtype,int * recall)15697c478bd9Sstevel@tonic-gate rfs4_deleg_state(rfs4_state_t *sp, open_delegation_type4 dtype, int *recall)
15707c478bd9Sstevel@tonic-gate {
1571d216dff5SRobert Mastors 	rfs4_file_t *fp = sp->rs_finfo;
15727c478bd9Sstevel@tonic-gate 	bool_t create = TRUE;
15737c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
15747c478bd9Sstevel@tonic-gate 	vnode_t *vp;
15757c478bd9Sstevel@tonic-gate 	int open_prev = *recall;
1576da6c28aaSamw 	int ret;
1577da6c28aaSamw 	int fflags = 0;
15787c478bd9Sstevel@tonic-gate 
1579d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(sp->rs_dbe));
1580d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(fp->rf_dbe));
15817c478bd9Sstevel@tonic-gate 
15827c478bd9Sstevel@tonic-gate 	/* Shouldn't happen */
1583d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_recall_count != 0 ||
1584d216dff5SRobert Mastors 	    (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_READ &&
15857c478bd9Sstevel@tonic-gate 	    dtype != OPEN_DELEGATE_READ)) {
15867c478bd9Sstevel@tonic-gate 		return (NULL);
15877c478bd9Sstevel@tonic-gate 	}
15887c478bd9Sstevel@tonic-gate 
15897c478bd9Sstevel@tonic-gate 	/* Unlock to avoid deadlock */
1590d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
1591d216dff5SRobert Mastors 	rfs4_dbe_unlock(sp->rs_dbe);
15927c478bd9Sstevel@tonic-gate 
15937c478bd9Sstevel@tonic-gate 	dsp = rfs4_finddeleg(sp, &create);
15947c478bd9Sstevel@tonic-gate 
1595d216dff5SRobert Mastors 	rfs4_dbe_lock(sp->rs_dbe);
1596d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
15977c478bd9Sstevel@tonic-gate 
15987c478bd9Sstevel@tonic-gate 	if (dsp == NULL)
15997c478bd9Sstevel@tonic-gate 		return (NULL);
16007c478bd9Sstevel@tonic-gate 
1601da1b9cd5Sjwahlig 	/*
1602da1b9cd5Sjwahlig 	 * It is possible that since we dropped the lock
1603da1b9cd5Sjwahlig 	 * in order to call finddeleg, the rfs4_file_t
1604da1b9cd5Sjwahlig 	 * was marked such that we should not grant a
1605da1b9cd5Sjwahlig 	 * delegation, if so bail out.
1606da1b9cd5Sjwahlig 	 */
1607d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_hold_grant > 0) {
1608da1b9cd5Sjwahlig 		rfs4_deleg_state_rele(dsp);
1609da1b9cd5Sjwahlig 		return (NULL);
1610da1b9cd5Sjwahlig 	}
1611da1b9cd5Sjwahlig 
16127c478bd9Sstevel@tonic-gate 	if (create == FALSE) {
1613d216dff5SRobert Mastors 		if (sp->rs_owner->ro_client == dsp->rds_client &&
1614d216dff5SRobert Mastors 		    dsp->rds_dtype == dtype) {
16157c478bd9Sstevel@tonic-gate 			return (dsp);
16167c478bd9Sstevel@tonic-gate 		} else {
16177c478bd9Sstevel@tonic-gate 			rfs4_deleg_state_rele(dsp);
16187c478bd9Sstevel@tonic-gate 			return (NULL);
16197c478bd9Sstevel@tonic-gate 		}
16207c478bd9Sstevel@tonic-gate 	}
16217c478bd9Sstevel@tonic-gate 
16227c478bd9Sstevel@tonic-gate 	/*
16237c478bd9Sstevel@tonic-gate 	 * Check that this file has not been delegated to another
16247c478bd9Sstevel@tonic-gate 	 * client
16257c478bd9Sstevel@tonic-gate 	 */
1626d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_recall_count != 0 ||
1627d216dff5SRobert Mastors 	    fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_WRITE ||
1628d216dff5SRobert Mastors 	    (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_READ &&
16297c478bd9Sstevel@tonic-gate 	    dtype != OPEN_DELEGATE_READ)) {
16307c478bd9Sstevel@tonic-gate 		rfs4_deleg_state_rele(dsp);
16317c478bd9Sstevel@tonic-gate 		return (NULL);
16327c478bd9Sstevel@tonic-gate 	}
16337c478bd9Sstevel@tonic-gate 
1634d216dff5SRobert Mastors 	vp = fp->rf_vp;
16357c478bd9Sstevel@tonic-gate 	/* vnevent_support returns 0 if file system supports vnevents */
1636da6c28aaSamw 	if (vnevent_support(vp, NULL)) {
16377c478bd9Sstevel@tonic-gate 		rfs4_deleg_state_rele(dsp);
16387c478bd9Sstevel@tonic-gate 		return (NULL);
16397c478bd9Sstevel@tonic-gate 	}
16407c478bd9Sstevel@tonic-gate 
1641da6c28aaSamw 	/* Calculate the fflags for this OPEN. */
1642d216dff5SRobert Mastors 	if (sp->rs_share_access & OPEN4_SHARE_ACCESS_READ)
1643da6c28aaSamw 		fflags |= FREAD;
1644d216dff5SRobert Mastors 	if (sp->rs_share_access & OPEN4_SHARE_ACCESS_WRITE)
1645da6c28aaSamw 		fflags |= FWRITE;
1646da6c28aaSamw 
16477c478bd9Sstevel@tonic-gate 	*recall = 0;
1648da6c28aaSamw 	/*
1649da6c28aaSamw 	 * Before granting a delegation we need to know if anyone else has
1650da6c28aaSamw 	 * opened the file in a conflicting mode.  However, first we need to
1651da6c28aaSamw 	 * know how we opened the file to check the counts properly.
1652da6c28aaSamw 	 */
16537c478bd9Sstevel@tonic-gate 	if (dtype == OPEN_DELEGATE_READ) {
1654da6c28aaSamw 		if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) ||
1655da6c28aaSamw 		    (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) ||
1656da6c28aaSamw 		    vn_is_mapped(vp, V_WRITE)) {
16577c478bd9Sstevel@tonic-gate 			if (open_prev) {
16587c478bd9Sstevel@tonic-gate 				*recall = 1;
16597c478bd9Sstevel@tonic-gate 			} else {
16607c478bd9Sstevel@tonic-gate 				rfs4_deleg_state_rele(dsp);
16617c478bd9Sstevel@tonic-gate 				return (NULL);
16627c478bd9Sstevel@tonic-gate 			}
16637c478bd9Sstevel@tonic-gate 		}
1664da6c28aaSamw 		ret = fem_install(vp, deleg_rdops, (void *)fp, OPUNIQ,
16657c478bd9Sstevel@tonic-gate 		    rfs4_mon_hold, rfs4_mon_rele);
1666da6c28aaSamw 		if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) ||
1667da6c28aaSamw 		    (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) ||
1668da6c28aaSamw 		    vn_is_mapped(vp, V_WRITE)) {
16697c478bd9Sstevel@tonic-gate 			if (open_prev) {
16707c478bd9Sstevel@tonic-gate 				*recall = 1;
16717c478bd9Sstevel@tonic-gate 			} else {
16727c478bd9Sstevel@tonic-gate 				(void) fem_uninstall(vp, deleg_rdops,
16737c478bd9Sstevel@tonic-gate 				    (void *)fp);
16747c478bd9Sstevel@tonic-gate 				rfs4_deleg_state_rele(dsp);
16757c478bd9Sstevel@tonic-gate 				return (NULL);
16767c478bd9Sstevel@tonic-gate 			}
16777c478bd9Sstevel@tonic-gate 		}
1678da6c28aaSamw 		/*
1679da6c28aaSamw 		 * Because a client can hold onto a delegation after the
1680da6c28aaSamw 		 * file has been closed, we need to keep track of the
1681da6c28aaSamw 		 * access to this file.  Otherwise the CIFS server would
1682da6c28aaSamw 		 * not know about the client accessing the file and could
1683da6c28aaSamw 		 * inappropriately grant an OPLOCK.
1684da6c28aaSamw 		 * fem_install() returns EBUSY when asked to install a
1685da6c28aaSamw 		 * OPUNIQ monitor more than once.  Therefore, check the
1686da6c28aaSamw 		 * return code because we only want this done once.
1687da6c28aaSamw 		 */
1688da6c28aaSamw 		if (ret == 0)
1689da6c28aaSamw 			vn_open_upgrade(vp, FREAD);
16907c478bd9Sstevel@tonic-gate 	} else { /* WRITE */
1691da6c28aaSamw 		if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) ||
1692da6c28aaSamw 		    (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) ||
1693da6c28aaSamw 		    ((fflags & FREAD) && vn_has_other_opens(vp, V_READ)) ||
1694da6c28aaSamw 		    (((fflags & FREAD) == 0) && vn_is_opened(vp, V_READ)) ||
1695da6c28aaSamw 		    vn_is_mapped(vp, V_RDORWR)) {
16967c478bd9Sstevel@tonic-gate 			if (open_prev) {
16977c478bd9Sstevel@tonic-gate 				*recall = 1;
16987c478bd9Sstevel@tonic-gate 			} else {
16997c478bd9Sstevel@tonic-gate 				rfs4_deleg_state_rele(dsp);
17007c478bd9Sstevel@tonic-gate 				return (NULL);
17017c478bd9Sstevel@tonic-gate 			}
17027c478bd9Sstevel@tonic-gate 		}
1703da6c28aaSamw 		ret = fem_install(vp, deleg_wrops, (void *)fp, OPUNIQ,
17047c478bd9Sstevel@tonic-gate 		    rfs4_mon_hold, rfs4_mon_rele);
1705da6c28aaSamw 		if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) ||
1706da6c28aaSamw 		    (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) ||
1707da6c28aaSamw 		    ((fflags & FREAD) && vn_has_other_opens(vp, V_READ)) ||
1708da6c28aaSamw 		    (((fflags & FREAD) == 0) && vn_is_opened(vp, V_READ)) ||
1709da6c28aaSamw 		    vn_is_mapped(vp, V_RDORWR)) {
17107c478bd9Sstevel@tonic-gate 			if (open_prev) {
17117c478bd9Sstevel@tonic-gate 				*recall = 1;
17127c478bd9Sstevel@tonic-gate 			} else {
17137c478bd9Sstevel@tonic-gate 				(void) fem_uninstall(vp, deleg_wrops,
17147c478bd9Sstevel@tonic-gate 				    (void *)fp);
17157c478bd9Sstevel@tonic-gate 				rfs4_deleg_state_rele(dsp);
17167c478bd9Sstevel@tonic-gate 				return (NULL);
17177c478bd9Sstevel@tonic-gate 			}
17187c478bd9Sstevel@tonic-gate 		}
1719da6c28aaSamw 		/*
1720da6c28aaSamw 		 * Because a client can hold onto a delegation after the
1721da6c28aaSamw 		 * file has been closed, we need to keep track of the
1722da6c28aaSamw 		 * access to this file.  Otherwise the CIFS server would
1723da6c28aaSamw 		 * not know about the client accessing the file and could
1724da6c28aaSamw 		 * inappropriately grant an OPLOCK.
1725da6c28aaSamw 		 * fem_install() returns EBUSY when asked to install a
1726da6c28aaSamw 		 * OPUNIQ monitor more than once.  Therefore, check the
1727da6c28aaSamw 		 * return code because we only want this done once.
1728da6c28aaSamw 		 */
1729da6c28aaSamw 		if (ret == 0)
1730da6c28aaSamw 			vn_open_upgrade(vp, FREAD|FWRITE);
17317c478bd9Sstevel@tonic-gate 	}
17327c478bd9Sstevel@tonic-gate 	/* Place on delegation list for file */
1733d216dff5SRobert Mastors 	ASSERT(!list_link_active(&dsp->rds_node));
1734d216dff5SRobert Mastors 	list_insert_tail(&fp->rf_delegstatelist, dsp);
17357c478bd9Sstevel@tonic-gate 
1736d216dff5SRobert Mastors 	dsp->rds_dtype = fp->rf_dinfo.rd_dtype = dtype;
17377c478bd9Sstevel@tonic-gate 
17387c478bd9Sstevel@tonic-gate 	/* Update delegation stats for this file */
1739d216dff5SRobert Mastors 	fp->rf_dinfo.rd_time_lastgrant = gethrestime_sec();
17407c478bd9Sstevel@tonic-gate 
17417c478bd9Sstevel@tonic-gate 	/* reset since this is a new delegation */
1742d216dff5SRobert Mastors 	fp->rf_dinfo.rd_conflicted_client = 0;
1743d216dff5SRobert Mastors 	fp->rf_dinfo.rd_ever_recalled = FALSE;
17447c478bd9Sstevel@tonic-gate 
17457c478bd9Sstevel@tonic-gate 	if (dtype == OPEN_DELEGATE_READ)
1746d216dff5SRobert Mastors 		fp->rf_dinfo.rd_rdgrants++;
17477c478bd9Sstevel@tonic-gate 	else
1748d216dff5SRobert Mastors 		fp->rf_dinfo.rd_wrgrants++;
17497c478bd9Sstevel@tonic-gate 
17507c478bd9Sstevel@tonic-gate 	return (dsp);
17517c478bd9Sstevel@tonic-gate }
17527c478bd9Sstevel@tonic-gate 
17537c478bd9Sstevel@tonic-gate /*
17547c478bd9Sstevel@tonic-gate  * State routine for the server when a delegation is returned.
17557c478bd9Sstevel@tonic-gate  */
17567c478bd9Sstevel@tonic-gate void
rfs4_return_deleg(rfs4_deleg_state_t * dsp,bool_t revoked)17577c478bd9Sstevel@tonic-gate rfs4_return_deleg(rfs4_deleg_state_t *dsp, bool_t revoked)
17587c478bd9Sstevel@tonic-gate {
1759d216dff5SRobert Mastors 	rfs4_file_t *fp = dsp->rds_finfo;
17607c478bd9Sstevel@tonic-gate 	open_delegation_type4 dtypewas;
17617c478bd9Sstevel@tonic-gate 
1762d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
1763d216dff5SRobert Mastors 
1764d216dff5SRobert Mastors 	/* nothing to do if no longer on list */
1765d216dff5SRobert Mastors 	if (!list_link_active(&dsp->rds_node)) {
1766d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
1767d216dff5SRobert Mastors 		return;
1768d216dff5SRobert Mastors 	}
1769d216dff5SRobert Mastors 
17707c478bd9Sstevel@tonic-gate 	/* Remove state from recall list */
1771d216dff5SRobert Mastors 	list_remove(&fp->rf_delegstatelist, dsp);
17727c478bd9Sstevel@tonic-gate 
1773d216dff5SRobert Mastors 	if (list_is_empty(&fp->rf_delegstatelist)) {
1774d216dff5SRobert Mastors 		dtypewas = fp->rf_dinfo.rd_dtype;
1775d216dff5SRobert Mastors 		fp->rf_dinfo.rd_dtype = OPEN_DELEGATE_NONE;
1776d216dff5SRobert Mastors 		rfs4_dbe_cv_broadcast(fp->rf_dbe);
17777c478bd9Sstevel@tonic-gate 
17787c478bd9Sstevel@tonic-gate 		/* if file system was unshared, the vp will be NULL */
1779d216dff5SRobert Mastors 		if (fp->rf_vp != NULL) {
1780da6c28aaSamw 			/*
1781da6c28aaSamw 			 * Once a delegation is no longer held by any client,
1782da6c28aaSamw 			 * the monitor is uninstalled.  At this point, the
1783da6c28aaSamw 			 * client must send OPEN otw, so we don't need the
1784da6c28aaSamw 			 * reference on the vnode anymore.  The open
1785da6c28aaSamw 			 * downgrade removes the reference put on earlier.
1786da6c28aaSamw 			 */
1787da6c28aaSamw 			if (dtypewas == OPEN_DELEGATE_READ) {
1788d216dff5SRobert Mastors 				(void) fem_uninstall(fp->rf_vp, deleg_rdops,
17897c478bd9Sstevel@tonic-gate 				    (void *)fp);
1790d216dff5SRobert Mastors 				vn_open_downgrade(fp->rf_vp, FREAD);
1791da6c28aaSamw 			} else if (dtypewas == OPEN_DELEGATE_WRITE) {
1792d216dff5SRobert Mastors 				(void) fem_uninstall(fp->rf_vp, deleg_wrops,
17937c478bd9Sstevel@tonic-gate 				    (void *)fp);
1794d216dff5SRobert Mastors 				vn_open_downgrade(fp->rf_vp, FREAD|FWRITE);
1795da6c28aaSamw 			}
17967c478bd9Sstevel@tonic-gate 		}
17977c478bd9Sstevel@tonic-gate 	}
17987c478bd9Sstevel@tonic-gate 
1799d216dff5SRobert Mastors 	switch (dsp->rds_dtype) {
18007c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_READ:
1801d216dff5SRobert Mastors 		fp->rf_dinfo.rd_rdgrants--;
18027c478bd9Sstevel@tonic-gate 		break;
18037c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_WRITE:
1804d216dff5SRobert Mastors 		fp->rf_dinfo.rd_wrgrants--;
18057c478bd9Sstevel@tonic-gate 		break;
18067c478bd9Sstevel@tonic-gate 	default:
18077c478bd9Sstevel@tonic-gate 		break;
18087c478bd9Sstevel@tonic-gate 	}
18097c478bd9Sstevel@tonic-gate 
18107c478bd9Sstevel@tonic-gate 	/* used in the policy decision */
1811d216dff5SRobert Mastors 	fp->rf_dinfo.rd_time_returned = gethrestime_sec();
18127c478bd9Sstevel@tonic-gate 
18137c478bd9Sstevel@tonic-gate 	/*
18147c478bd9Sstevel@tonic-gate 	 * reset the time_recalled field so future delegations are not
18157c478bd9Sstevel@tonic-gate 	 * accidentally revoked
18167c478bd9Sstevel@tonic-gate 	 */
1817d216dff5SRobert Mastors 	if ((fp->rf_dinfo.rd_rdgrants + fp->rf_dinfo.rd_wrgrants) == 0)
1818d216dff5SRobert Mastors 		fp->rf_dinfo.rd_time_recalled = 0;
18197c478bd9Sstevel@tonic-gate 
1820d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
18217c478bd9Sstevel@tonic-gate 
1822d216dff5SRobert Mastors 	rfs4_dbe_lock(dsp->rds_dbe);
18237c478bd9Sstevel@tonic-gate 
1824d216dff5SRobert Mastors 	dsp->rds_dtype = OPEN_DELEGATE_NONE;
18257c478bd9Sstevel@tonic-gate 
18267c478bd9Sstevel@tonic-gate 	if (revoked == TRUE)
1827d216dff5SRobert Mastors 		dsp->rds_time_revoked = gethrestime_sec();
18287c478bd9Sstevel@tonic-gate 
1829d216dff5SRobert Mastors 	rfs4_dbe_invalidate(dsp->rds_dbe);
18307c478bd9Sstevel@tonic-gate 
1831d216dff5SRobert Mastors 	rfs4_dbe_unlock(dsp->rds_dbe);
18327c478bd9Sstevel@tonic-gate 
18337c478bd9Sstevel@tonic-gate 	if (revoked == TRUE) {
1834d216dff5SRobert Mastors 		rfs4_dbe_lock(dsp->rds_client->rc_dbe);
1835d216dff5SRobert Mastors 		dsp->rds_client->rc_deleg_revoked++;	/* observability */
1836d216dff5SRobert Mastors 		rfs4_dbe_unlock(dsp->rds_client->rc_dbe);
18377c478bd9Sstevel@tonic-gate 	}
18387c478bd9Sstevel@tonic-gate }
18397c478bd9Sstevel@tonic-gate 
18407c478bd9Sstevel@tonic-gate static void
rfs4_revoke_file(rfs4_file_t * fp)18417c478bd9Sstevel@tonic-gate rfs4_revoke_file(rfs4_file_t *fp)
18427c478bd9Sstevel@tonic-gate {
18437c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
18447c478bd9Sstevel@tonic-gate 
18457c478bd9Sstevel@tonic-gate 	/*
18467c478bd9Sstevel@tonic-gate 	 * The lock for rfs4_file_t must be held when traversing the
18477c478bd9Sstevel@tonic-gate 	 * delegation list but that lock needs to be released to call
1848d216dff5SRobert Mastors 	 * rfs4_return_deleg()
18497c478bd9Sstevel@tonic-gate 	 */
1850d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
1851*bd3561fbSToomas Soome 	while ((dsp = list_head(&fp->rf_delegstatelist)) != NULL) {
1852d216dff5SRobert Mastors 		rfs4_dbe_hold(dsp->rds_dbe);
1853d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
1854d216dff5SRobert Mastors 		rfs4_return_deleg(dsp, TRUE);
18557c478bd9Sstevel@tonic-gate 		rfs4_deleg_state_rele(dsp);
1856d216dff5SRobert Mastors 		rfs4_dbe_lock(fp->rf_dbe);
18577c478bd9Sstevel@tonic-gate 	}
1858d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
18597c478bd9Sstevel@tonic-gate }
18607c478bd9Sstevel@tonic-gate 
18617c478bd9Sstevel@tonic-gate /*
18627c478bd9Sstevel@tonic-gate  * A delegation is assumed to be present on the file associated with
1863d216dff5SRobert Mastors  * "sp".  Check to see if the delegation matches is associated with
1864d216dff5SRobert Mastors  * the same client as referenced by "sp".  If it is not, TRUE is
18657c478bd9Sstevel@tonic-gate  * returned.  If the delegation DOES match the client (or no
18667c478bd9Sstevel@tonic-gate  * delegation is present), return FALSE.
18677c478bd9Sstevel@tonic-gate  * Assume the state entry and file entry are locked.
18687c478bd9Sstevel@tonic-gate  */
18697c478bd9Sstevel@tonic-gate bool_t
rfs4_is_deleg(rfs4_state_t * sp)1870d216dff5SRobert Mastors rfs4_is_deleg(rfs4_state_t *sp)
18717c478bd9Sstevel@tonic-gate {
18727c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
1873d216dff5SRobert Mastors 	rfs4_file_t *fp = sp->rs_finfo;
1874d216dff5SRobert Mastors 	rfs4_client_t *cp = sp->rs_owner->ro_client;
18757c478bd9Sstevel@tonic-gate 
1876d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(fp->rf_dbe));
1877d216dff5SRobert Mastors 	for (dsp = list_head(&fp->rf_delegstatelist); dsp != NULL;
1878d216dff5SRobert Mastors 	    dsp = list_next(&fp->rf_delegstatelist, dsp)) {
1879d216dff5SRobert Mastors 		if (cp != dsp->rds_client) {
18807c478bd9Sstevel@tonic-gate 			return (TRUE);
18817c478bd9Sstevel@tonic-gate 		}
18827c478bd9Sstevel@tonic-gate 	}
18837c478bd9Sstevel@tonic-gate 	return (FALSE);
18847c478bd9Sstevel@tonic-gate }
18857c478bd9Sstevel@tonic-gate 
18867c478bd9Sstevel@tonic-gate void
rfs4_disable_delegation(void)18877c478bd9Sstevel@tonic-gate rfs4_disable_delegation(void)
18887c478bd9Sstevel@tonic-gate {
18890dfe541eSEvan Layton 	nfs4_srv_t *nsrv4;
18900dfe541eSEvan Layton 
18910dfe541eSEvan Layton 	nsrv4 = nfs4_get_srv();
18920dfe541eSEvan Layton 	mutex_enter(&nsrv4->deleg_lock);
18937c478bd9Sstevel@tonic-gate 	rfs4_deleg_disabled++;
18940dfe541eSEvan Layton 	mutex_exit(&nsrv4->deleg_lock);
18957c478bd9Sstevel@tonic-gate }
18967c478bd9Sstevel@tonic-gate 
18977c478bd9Sstevel@tonic-gate void
rfs4_enable_delegation(void)18987c478bd9Sstevel@tonic-gate rfs4_enable_delegation(void)
18997c478bd9Sstevel@tonic-gate {
19000dfe541eSEvan Layton 	nfs4_srv_t *nsrv4;
19010dfe541eSEvan Layton 
19020dfe541eSEvan Layton 	nsrv4 = nfs4_get_srv();
19030dfe541eSEvan Layton 	mutex_enter(&nsrv4->deleg_lock);
19047c478bd9Sstevel@tonic-gate 	ASSERT(rfs4_deleg_disabled > 0);
19057c478bd9Sstevel@tonic-gate 	rfs4_deleg_disabled--;
19060dfe541eSEvan Layton 	mutex_exit(&nsrv4->deleg_lock);
19077c478bd9Sstevel@tonic-gate }
19087c478bd9Sstevel@tonic-gate 
19097c478bd9Sstevel@tonic-gate void
rfs4_mon_hold(void * arg)19107c478bd9Sstevel@tonic-gate rfs4_mon_hold(void *arg)
19117c478bd9Sstevel@tonic-gate {
19127c478bd9Sstevel@tonic-gate 	rfs4_file_t *fp = arg;
19137c478bd9Sstevel@tonic-gate 
1914d216dff5SRobert Mastors 	rfs4_dbe_hold(fp->rf_dbe);
19157c478bd9Sstevel@tonic-gate }
19167c478bd9Sstevel@tonic-gate 
19177c478bd9Sstevel@tonic-gate void
rfs4_mon_rele(void * arg)19187c478bd9Sstevel@tonic-gate rfs4_mon_rele(void *arg)
19197c478bd9Sstevel@tonic-gate {
19207c478bd9Sstevel@tonic-gate 	rfs4_file_t *fp = arg;
19217c478bd9Sstevel@tonic-gate 
1922d216dff5SRobert Mastors 	rfs4_dbe_rele_nolock(fp->rf_dbe);
19237c478bd9Sstevel@tonic-gate }
1924