1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 /* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */ 27 /* All Rights Reserved */ 28 29 #pragma ident "%Z%%M% %I% %E% SMI" 30 31 #include <sys/param.h> 32 #include <sys/types.h> 33 #include <sys/systm.h> 34 #include <sys/cred.h> 35 #include <sys/vfs.h> 36 #include <sys/vnode.h> 37 #include <sys/pathname.h> 38 #include <sys/sysmacros.h> 39 #include <sys/kmem.h> 40 #include <sys/kstat.h> 41 #include <sys/mkdev.h> 42 #include <sys/mount.h> 43 #include <sys/statvfs.h> 44 #include <sys/errno.h> 45 #include <sys/debug.h> 46 #include <sys/cmn_err.h> 47 #include <sys/utsname.h> 48 #include <sys/bootconf.h> 49 #include <sys/modctl.h> 50 #include <sys/acl.h> 51 #include <sys/flock.h> 52 #include <sys/kstr.h> 53 #include <sys/stropts.h> 54 #include <sys/strsubr.h> 55 #include <sys/atomic.h> 56 #include <sys/disp.h> 57 #include <sys/policy.h> 58 #include <sys/list.h> 59 #include <sys/zone.h> 60 61 #include <rpc/types.h> 62 #include <rpc/auth.h> 63 #include <rpc/rpcsec_gss.h> 64 #include <rpc/clnt.h> 65 #include <rpc/xdr.h> 66 67 #include <nfs/nfs.h> 68 #include <nfs/nfs_clnt.h> 69 #include <nfs/mount.h> 70 #include <nfs/nfs_acl.h> 71 72 #include <fs/fs_subr.h> 73 74 #include <nfs/nfs4.h> 75 #include <nfs/rnode4.h> 76 #include <nfs/nfs4_clnt.h> 77 #include <nfs/nfssys.h> 78 79 #ifdef DEBUG 80 /* 81 * These are "special" state IDs and file handles that 82 * match any delegation state ID or file handled. This 83 * is for testing purposes only. 84 */ 85 86 stateid4 nfs4_deleg_any = { 0x7FFFFFF0 }; 87 char nfs4_deleg_fh[] = "\0377\0376\0375\0374"; 88 nfs_fh4 nfs4_deleg_anyfh = { sizeof (nfs4_deleg_fh)-1, nfs4_deleg_fh }; 89 nfsstat4 cb4_getattr_fail = NFS4_OK; 90 nfsstat4 cb4_recall_fail = NFS4_OK; 91 92 int nfs4_callback_debug; 93 int nfs4_recall_debug; 94 int nfs4_drat_debug; 95 96 #endif 97 98 #define CB_NOTE(x) NFS4_DEBUG(nfs4_callback_debug, (CE_NOTE, x)) 99 #define CB_WARN(x) NFS4_DEBUG(nfs4_callback_debug, (CE_WARN, x)) 100 #define CB_WARN1(x, y) NFS4_DEBUG(nfs4_callback_debug, (CE_WARN, x, y)) 101 102 enum nfs4_delegreturn_policy nfs4_delegreturn_policy = INACTIVE; 103 104 static zone_key_t nfs4_callback_zone_key; 105 106 /* 107 * NFS4_MAPSIZE is the number of bytes we are willing to consume 108 * for the block allocation map when the server grants a NFS_LIMIT_BLOCK 109 * style delegation. 110 */ 111 112 #define NFS4_MAPSIZE 8192 113 #define NFS4_MAPWORDS NFS4_MAPSIZE/sizeof (uint_t) 114 #define NbPW (NBBY*sizeof (uint_t)) 115 116 static int nfs4_num_prognums = 1024; 117 static SVC_CALLOUT_TABLE nfs4_cb_sct; 118 119 struct nfs4_dnode { 120 list_node_t linkage; 121 rnode4_t *rnodep; 122 int flags; /* Flags for nfs4delegreturn_impl() */ 123 }; 124 125 static const struct nfs4_callback_stats nfs4_callback_stats_tmpl = { 126 { "delegations", KSTAT_DATA_UINT64 }, 127 { "cb_getattr", KSTAT_DATA_UINT64 }, 128 { "cb_recall", KSTAT_DATA_UINT64 }, 129 { "cb_null", KSTAT_DATA_UINT64 }, 130 { "cb_dispatch", KSTAT_DATA_UINT64 }, 131 { "delegaccept_r", KSTAT_DATA_UINT64 }, 132 { "delegaccept_rw", KSTAT_DATA_UINT64 }, 133 { "delegreturn", KSTAT_DATA_UINT64 }, 134 { "callbacks", KSTAT_DATA_UINT64 }, 135 { "claim_cur", KSTAT_DATA_UINT64 }, 136 { "claim_cur_ok", KSTAT_DATA_UINT64 }, 137 { "recall_trunc", KSTAT_DATA_UINT64 }, 138 { "recall_failed", KSTAT_DATA_UINT64 }, 139 { "return_limit_write", KSTAT_DATA_UINT64 }, 140 { "return_limit_addmap", KSTAT_DATA_UINT64 }, 141 { "deleg_recover", KSTAT_DATA_UINT64 }, 142 { "cb_illegal", KSTAT_DATA_UINT64 } 143 }; 144 145 struct nfs4_cb_port { 146 list_node_t linkage; /* linkage into per-zone port list */ 147 char netid[KNC_STRSIZE]; 148 char uaddr[KNC_STRSIZE]; 149 char protofmly[KNC_STRSIZE]; 150 char proto[KNC_STRSIZE]; 151 }; 152 153 static int cb_getattr_bytes; 154 155 struct cb_recall_pass { 156 rnode4_t *rp; 157 int flags; /* Flags for nfs4delegreturn_impl() */ 158 bool_t truncate; 159 }; 160 161 static nfs4_open_stream_t *get_next_deleg_stream(rnode4_t *, int); 162 static void nfs4delegreturn_thread(struct cb_recall_pass *); 163 static int deleg_reopen(vnode_t *, bool_t *, struct nfs4_callback_globals *, 164 int); 165 static void nfs4_dlistadd(rnode4_t *, struct nfs4_callback_globals *, int); 166 static void nfs4_dlistclean_impl(struct nfs4_callback_globals *, int); 167 static int nfs4delegreturn_impl(rnode4_t *, int, 168 struct nfs4_callback_globals *); 169 static void nfs4delegreturn_cleanup_impl(rnode4_t *, nfs4_server_t *, 170 struct nfs4_callback_globals *); 171 172 static void 173 cb_getattr(nfs_cb_argop4 *argop, nfs_cb_resop4 *resop, struct svc_req *req, 174 struct compound_state *cs, struct nfs4_callback_globals *ncg) 175 { 176 CB_GETATTR4args *args = &argop->nfs_cb_argop4_u.opcbgetattr; 177 CB_GETATTR4res *resp = &resop->nfs_cb_resop4_u.opcbgetattr; 178 rnode4_t *rp; 179 vnode_t *vp; 180 bool_t found = FALSE; 181 struct nfs4_server *sp; 182 struct fattr4 *fap; 183 rpc_inline_t *fdata; 184 long mapcnt; 185 fattr4_change change; 186 fattr4_size size; 187 uint_t rflag; 188 189 ncg->nfs4_callback_stats.cb_getattr.value.ui64++; 190 191 #ifdef DEBUG 192 /* 193 * error injection hook: set cb_getattr_fail global to 194 * NFS4 pcol error to be returned 195 */ 196 if (cb4_getattr_fail != NFS4_OK) { 197 *cs->statusp = resp->status = cb4_getattr_fail; 198 return; 199 } 200 #endif 201 202 resp->obj_attributes.attrmask = 0; 203 204 mutex_enter(&ncg->nfs4_cb_lock); 205 sp = ncg->nfs4prog2server[req->rq_prog - NFS4_CALLBACK]; 206 mutex_exit(&ncg->nfs4_cb_lock); 207 208 if (nfs4_server_vlock(sp, 0) == FALSE) { 209 210 CB_WARN("cb_getattr: cannot find server\n"); 211 212 *cs->statusp = resp->status = NFS4ERR_BADHANDLE; 213 return; 214 } 215 216 /* 217 * In cb_compound, callback_ident was validated against rq_prog, 218 * but we couldn't verify that it was set to the value we provided 219 * at setclientid time (because we didn't have server struct yet). 220 * Now we have the server struct, but don't have callback_ident 221 * handy. So, validate server struct program number against req 222 * RPC's prog number. At this point, we know the RPC prog num 223 * is valid (else we wouldn't be here); however, we don't know 224 * that it was the prog number we supplied to this server at 225 * setclientid time. If the prog numbers aren't equivalent, then 226 * log the problem and fail the request because either cbserv 227 * and/or cbclient are confused. This will probably never happen. 228 */ 229 if (sp->s_program != req->rq_prog) { 230 #ifdef DEBUG 231 zcmn_err(getzoneid(), CE_WARN, 232 "cb_getattr: wrong server program number srv=%d req=%d\n", 233 sp->s_program, req->rq_prog); 234 #else 235 zcmn_err(getzoneid(), CE_WARN, 236 "cb_getattr: wrong server program number\n"); 237 #endif 238 mutex_exit(&sp->s_lock); 239 nfs4_server_rele(sp); 240 *cs->statusp = resp->status = NFS4ERR_BADHANDLE; 241 return; 242 } 243 244 /* 245 * Search the delegation list for a matching file handle; 246 * mutex on sp prevents the list from changing. 247 */ 248 249 rp = list_head(&sp->s_deleg_list); 250 for (; rp != NULL; rp = list_next(&sp->s_deleg_list, rp)) { 251 nfs4_fhandle_t fhandle; 252 253 sfh4_copyval(rp->r_fh, &fhandle); 254 255 if ((fhandle.fh_len == args->fh.nfs_fh4_len && 256 bcmp(fhandle.fh_buf, args->fh.nfs_fh4_val, 257 fhandle.fh_len) == 0)) { 258 259 found = TRUE; 260 break; 261 } 262 #ifdef DEBUG 263 if (nfs4_deleg_anyfh.nfs_fh4_len == args->fh.nfs_fh4_len && 264 bcmp(nfs4_deleg_anyfh.nfs_fh4_val, args->fh.nfs_fh4_val, 265 args->fh.nfs_fh4_len) == 0) { 266 267 found = TRUE; 268 break; 269 } 270 #endif 271 } 272 273 /* 274 * VN_HOLD the vnode before releasing s_lock to guarantee 275 * we have a valid vnode reference. 276 */ 277 if (found == TRUE) { 278 vp = RTOV4(rp); 279 VN_HOLD(vp); 280 } 281 282 mutex_exit(&sp->s_lock); 283 nfs4_server_rele(sp); 284 285 if (found == FALSE) { 286 287 CB_WARN("cb_getattr: bad fhandle\n"); 288 289 *cs->statusp = resp->status = NFS4ERR_BADHANDLE; 290 return; 291 } 292 293 /* 294 * Figure out which attributes the server wants. We only 295 * offer FATTR4_CHANGE & FATTR4_SIZE; ignore the rest. 296 */ 297 fdata = kmem_alloc(cb_getattr_bytes, KM_SLEEP); 298 299 /* 300 * Don't actually need to create XDR to encode these 301 * simple data structures. 302 * xdrmem_create(&xdr, fdata, cb_getattr_bytes, XDR_ENCODE); 303 */ 304 fap = &resp->obj_attributes; 305 306 fap->attrmask = 0; 307 /* attrlist4_len starts at 0 and increases as attrs are processed */ 308 fap->attrlist4 = (char *)fdata; 309 fap->attrlist4_len = 0; 310 311 /* don't supply attrs if request was zero */ 312 if (args->attr_request != 0) { 313 if (args->attr_request & FATTR4_CHANGE_MASK) { 314 /* 315 * If the file is mmapped, then increment the change 316 * attribute and return it. This will guarantee that 317 * the server will perceive that the file has changed 318 * if there is any chance that the client application 319 * has changed it. Otherwise, just return the change 320 * attribute as it has been updated by nfs4write_deleg. 321 */ 322 323 mutex_enter(&rp->r_statelock); 324 mapcnt = rp->r_mapcnt; 325 rflag = rp->r_flags; 326 mutex_exit(&rp->r_statelock); 327 328 mutex_enter(&rp->r_statev4_lock); 329 /* 330 * If object mapped, then always return new change. 331 * Otherwise, return change if object has dirty 332 * pages. If object doesn't have any dirty pages, 333 * then all changes have been pushed to server, so 334 * reset change to grant change. 335 */ 336 if (mapcnt) 337 rp->r_deleg_change++; 338 else if (! (rflag & R4DIRTY)) 339 rp->r_deleg_change = rp->r_deleg_change_grant; 340 change = rp->r_deleg_change; 341 mutex_exit(&rp->r_statev4_lock); 342 343 /* 344 * Use inline XDR code directly, we know that we 345 * going to a memory buffer and it has enough 346 * space so it cannot fail. 347 */ 348 IXDR_PUT_U_HYPER(fdata, change); 349 fap->attrlist4_len += 2 * BYTES_PER_XDR_UNIT; 350 fap->attrmask |= FATTR4_CHANGE_MASK; 351 } 352 353 if (args->attr_request & FATTR4_SIZE_MASK) { 354 /* 355 * Use an atomic add of 0 to fetch a consistent view 356 * of r_size; this avoids having to take rw_lock 357 * which could cause a deadlock. 358 */ 359 size = atomic_add_64_nv((uint64_t *)&rp->r_size, 0); 360 361 /* 362 * Use inline XDR code directly, we know that we 363 * going to a memory buffer and it has enough 364 * space so it cannot fail. 365 */ 366 IXDR_PUT_U_HYPER(fdata, size); 367 fap->attrlist4_len += 2 * BYTES_PER_XDR_UNIT; 368 fap->attrmask |= FATTR4_SIZE_MASK; 369 } 370 } 371 372 VN_RELE(vp); 373 374 *cs->statusp = resp->status = NFS4_OK; 375 } 376 377 static void 378 cb_getattr_free(nfs_cb_resop4 *resop) 379 { 380 if (resop->nfs_cb_resop4_u.opcbgetattr.obj_attributes.attrlist4) 381 kmem_free(resop->nfs_cb_resop4_u.opcbgetattr. 382 obj_attributes.attrlist4, cb_getattr_bytes); 383 } 384 385 static void 386 cb_recall(nfs_cb_argop4 *argop, nfs_cb_resop4 *resop, struct svc_req *req, 387 struct compound_state *cs, struct nfs4_callback_globals *ncg) 388 { 389 CB_RECALL4args * args = &argop->nfs_cb_argop4_u.opcbrecall; 390 CB_RECALL4res *resp = &resop->nfs_cb_resop4_u.opcbrecall; 391 rnode4_t *rp; 392 vnode_t *vp; 393 struct nfs4_server *sp; 394 bool_t found = FALSE; 395 396 ncg->nfs4_callback_stats.cb_recall.value.ui64++; 397 398 ASSERT(req->rq_prog >= NFS4_CALLBACK); 399 ASSERT(req->rq_prog < NFS4_CALLBACK+nfs4_num_prognums); 400 401 #ifdef DEBUG 402 /* 403 * error injection hook: set cb_recall_fail global to 404 * NFS4 pcol error to be returned 405 */ 406 if (cb4_recall_fail != NFS4_OK) { 407 *cs->statusp = resp->status = cb4_recall_fail; 408 return; 409 } 410 #endif 411 412 mutex_enter(&ncg->nfs4_cb_lock); 413 sp = ncg->nfs4prog2server[req->rq_prog - NFS4_CALLBACK]; 414 mutex_exit(&ncg->nfs4_cb_lock); 415 416 if (nfs4_server_vlock(sp, 0) == FALSE) { 417 418 CB_WARN("cb_recall: cannot find server\n"); 419 420 *cs->statusp = resp->status = NFS4ERR_BADHANDLE; 421 return; 422 } 423 424 /* 425 * Search the delegation list for a matching file handle 426 * AND stateid; mutex on sp prevents the list from changing. 427 */ 428 429 rp = list_head(&sp->s_deleg_list); 430 for (; rp != NULL; rp = list_next(&sp->s_deleg_list, rp)) { 431 mutex_enter(&rp->r_statev4_lock); 432 433 /* check both state id and file handle! */ 434 435 if ((bcmp(&rp->r_deleg_stateid, &args->stateid, 436 sizeof (stateid4)) == 0)) { 437 nfs4_fhandle_t fhandle; 438 439 sfh4_copyval(rp->r_fh, &fhandle); 440 if ((fhandle.fh_len == args->fh.nfs_fh4_len && 441 bcmp(fhandle.fh_buf, args->fh.nfs_fh4_val, 442 fhandle.fh_len) == 0)) { 443 444 found = TRUE; 445 break; 446 } else { 447 #ifdef DEBUG 448 CB_WARN("cb_recall: stateid OK, bad fh"); 449 #endif 450 } 451 } 452 #ifdef DEBUG 453 if (bcmp(&args->stateid, &nfs4_deleg_any, 454 sizeof (stateid4)) == 0) { 455 456 found = TRUE; 457 break; 458 } 459 #endif 460 mutex_exit(&rp->r_statev4_lock); 461 } 462 463 /* 464 * VN_HOLD the vnode before releasing s_lock to guarantee 465 * we have a valid vnode reference. The async thread will 466 * release the hold when it's done. 467 */ 468 if (found == TRUE) { 469 mutex_exit(&rp->r_statev4_lock); 470 vp = RTOV4(rp); 471 VN_HOLD(vp); 472 } 473 mutex_exit(&sp->s_lock); 474 nfs4_server_rele(sp); 475 476 if (found == FALSE) { 477 478 CB_WARN("cb_recall: bad stateid\n"); 479 480 *cs->statusp = resp->status = NFS4ERR_BAD_STATEID; 481 return; 482 } 483 484 /* Fire up a thread to do the delegreturn */ 485 nfs4delegreturn_async(rp, NFS4_DR_RECALL|NFS4_DR_REOPEN, 486 args->truncate); 487 488 *cs->statusp = resp->status = 0; 489 } 490 491 /* ARGSUSED */ 492 static void 493 cb_recall_free(nfs_cb_resop4 *resop) 494 { 495 /* nothing to do here, cb_recall doesn't kmem_alloc */ 496 } 497 498 /* 499 * This function handles the CB_NULL proc call from an NFSv4 Server. 500 * 501 * We take note that the server has sent a CB_NULL for later processing 502 * in the recovery logic. It is noted so we may pause slightly after the 503 * setclientid and before reopening files. The pause is to allow the 504 * NFSv4 Server time to receive the CB_NULL reply and adjust any of 505 * its internal structures such that it has the opportunity to grant 506 * delegations to reopened files. 507 * 508 */ 509 510 /* ARGSUSED */ 511 static void 512 cb_null(CB_COMPOUND4args *args, CB_COMPOUND4res *resp, struct svc_req *req, 513 struct nfs4_callback_globals *ncg) 514 { 515 struct nfs4_server *sp; 516 517 ncg->nfs4_callback_stats.cb_null.value.ui64++; 518 519 ASSERT(req->rq_prog >= NFS4_CALLBACK); 520 ASSERT(req->rq_prog < NFS4_CALLBACK+nfs4_num_prognums); 521 522 mutex_enter(&ncg->nfs4_cb_lock); 523 sp = ncg->nfs4prog2server[req->rq_prog - NFS4_CALLBACK]; 524 mutex_exit(&ncg->nfs4_cb_lock); 525 526 if (nfs4_server_vlock(sp, 0) != FALSE) { 527 sp->s_flags |= N4S_CB_PINGED; 528 cv_broadcast(&sp->wait_cb_null); 529 mutex_exit(&sp->s_lock); 530 nfs4_server_rele(sp); 531 } 532 } 533 534 /* 535 * cb_illegal args: void 536 * res : status (NFS4ERR_OP_CB_ILLEGAL) 537 */ 538 /* ARGSUSED */ 539 static void 540 cb_illegal(nfs_cb_argop4 *argop, nfs_cb_resop4 *resop, struct svc_req *req, 541 struct compound_state *cs, struct nfs4_callback_globals *ncg) 542 { 543 CB_ILLEGAL4res *resp = &resop->nfs_cb_resop4_u.opcbillegal; 544 545 ncg->nfs4_callback_stats.cb_illegal.value.ui64++; 546 resop->resop = OP_CB_ILLEGAL; 547 *cs->statusp = resp->status = NFS4ERR_OP_ILLEGAL; 548 } 549 550 static void 551 cb_compound(CB_COMPOUND4args *args, CB_COMPOUND4res *resp, struct svc_req *req, 552 struct nfs4_callback_globals *ncg) 553 { 554 uint_t i; 555 struct compound_state cs; 556 nfs_cb_argop4 *argop; 557 nfs_cb_resop4 *resop, *new_res; 558 uint_t op; 559 560 bzero(&cs, sizeof (cs)); 561 cs.statusp = &resp->status; 562 cs.cont = TRUE; 563 564 /* 565 * Form a reply tag by copying over the reqeuest tag. 566 */ 567 resp->tag.utf8string_len = args->tag.utf8string_len; 568 resp->tag.utf8string_val = kmem_alloc(resp->tag.utf8string_len, 569 KM_SLEEP); 570 bcopy(args->tag.utf8string_val, resp->tag.utf8string_val, 571 args->tag.utf8string_len); 572 573 /* 574 * XXX for now, minorversion should be zero 575 */ 576 if (args->minorversion != CB4_MINORVERSION) { 577 resp->array_len = 0; 578 resp->array = NULL; 579 resp->status = NFS4ERR_MINOR_VERS_MISMATCH; 580 return; 581 } 582 583 #ifdef DEBUG 584 /* 585 * Verify callback_ident. It doesn't really matter if it's wrong 586 * because we don't really use callback_ident -- we use prog number 587 * of the RPC request instead. In this case, just print a DEBUG 588 * console message to reveal brokenness of cbclient (at bkoff/cthon). 589 */ 590 if (args->callback_ident != req->rq_prog) 591 zcmn_err(getzoneid(), CE_WARN, 592 "cb_compound: cb_client using wrong " 593 "callback_ident(%d), should be %d", 594 args->callback_ident, req->rq_prog); 595 #endif 596 597 resp->array_len = args->array_len; 598 resp->array = kmem_zalloc(args->array_len * sizeof (nfs_cb_resop4), 599 KM_SLEEP); 600 601 for (i = 0; i < args->array_len && cs.cont; i++) { 602 603 argop = &args->array[i]; 604 resop = &resp->array[i]; 605 resop->resop = argop->argop; 606 op = (uint_t)resop->resop; 607 608 switch (op) { 609 610 case OP_CB_GETATTR: 611 612 cb_getattr(argop, resop, req, &cs, ncg); 613 break; 614 615 case OP_CB_RECALL: 616 617 cb_recall(argop, resop, req, &cs, ncg); 618 break; 619 620 case OP_CB_ILLEGAL: 621 622 /* fall through */ 623 624 default: 625 /* 626 * Handle OP_CB_ILLEGAL and any undefined opcode. 627 * Currently, the XDR code will return BADXDR 628 * if cb op doesn't decode to legal value, so 629 * it really only handles OP_CB_ILLEGAL. 630 */ 631 op = OP_CB_ILLEGAL; 632 cb_illegal(argop, resop, req, &cs, ncg); 633 } 634 635 if (*cs.statusp != NFS4_OK) 636 cs.cont = FALSE; 637 638 /* 639 * If not at last op, and if we are to stop, then 640 * compact the results array. 641 */ 642 if ((i + 1) < args->array_len && !cs.cont) { 643 644 new_res = kmem_alloc( 645 (i+1) * sizeof (nfs_cb_resop4), KM_SLEEP); 646 bcopy(resp->array, 647 new_res, (i+1) * sizeof (nfs_cb_resop4)); 648 kmem_free(resp->array, 649 args->array_len * sizeof (nfs_cb_resop4)); 650 651 resp->array_len = i + 1; 652 resp->array = new_res; 653 } 654 } 655 656 } 657 658 static void 659 cb_compound_free(CB_COMPOUND4res *resp) 660 { 661 uint_t i, op; 662 nfs_cb_resop4 *resop; 663 664 if (resp->tag.utf8string_val) { 665 UTF8STRING_FREE(resp->tag) 666 } 667 668 for (i = 0; i < resp->array_len; i++) { 669 670 resop = &resp->array[i]; 671 op = (uint_t)resop->resop; 672 673 switch (op) { 674 675 case OP_CB_GETATTR: 676 677 cb_getattr_free(resop); 678 break; 679 680 case OP_CB_RECALL: 681 682 cb_recall_free(resop); 683 break; 684 685 default: 686 break; 687 } 688 } 689 690 if (resp->array != NULL) { 691 kmem_free(resp->array, 692 resp->array_len * sizeof (nfs_cb_resop4)); 693 } 694 } 695 696 static void 697 cb_dispatch(struct svc_req *req, SVCXPRT *xprt) 698 { 699 CB_COMPOUND4args args; 700 CB_COMPOUND4res res; 701 struct nfs4_callback_globals *ncg; 702 703 bool_t (*xdr_args)(), (*xdr_res)(); 704 void (*proc)(CB_COMPOUND4args *, CB_COMPOUND4res *, struct svc_req *, 705 struct nfs4_callback_globals *); 706 void (*freeproc)(CB_COMPOUND4res *); 707 708 ncg = zone_getspecific(nfs4_callback_zone_key, nfs_zone()); 709 ASSERT(ncg != NULL); 710 711 ncg->nfs4_callback_stats.cb_dispatch.value.ui64++; 712 713 switch (req->rq_proc) { 714 case CB_NULL: 715 xdr_args = xdr_void; 716 xdr_res = xdr_void; 717 proc = cb_null; 718 freeproc = NULL; 719 break; 720 721 case CB_COMPOUND: 722 xdr_args = xdr_CB_COMPOUND4args_clnt; 723 xdr_res = xdr_CB_COMPOUND4res; 724 proc = cb_compound; 725 freeproc = cb_compound_free; 726 break; 727 728 default: 729 CB_WARN("cb_dispatch: no proc\n"); 730 svcerr_noproc(xprt); 731 return; 732 } 733 734 args.tag.utf8string_val = NULL; 735 args.array = NULL; 736 737 if (!SVC_GETARGS(xprt, xdr_args, (caddr_t)&args)) { 738 739 CB_WARN("cb_dispatch: cannot getargs\n"); 740 svcerr_decode(xprt); 741 return; 742 } 743 744 (*proc)(&args, &res, req, ncg); 745 746 if (svc_sendreply(xprt, xdr_res, (caddr_t)&res) == FALSE) { 747 748 CB_WARN("cb_dispatch: bad sendreply\n"); 749 750 /* 751 * svcerr_systemerr(xprt); 752 */ 753 } 754 755 if (freeproc) 756 (*freeproc)(&res); 757 758 if (!SVC_FREEARGS(xprt, xdr_args, (caddr_t)&args)) { 759 760 CB_WARN("cb_dispatch: bad freeargs\n"); 761 } 762 } 763 764 static rpcprog_t 765 nfs4_getnextprogram(struct nfs4_callback_globals *ncg) 766 { 767 int i, j; 768 769 j = ncg->nfs4_program_hint; 770 for (i = 0; i < nfs4_num_prognums; i++, j++) { 771 772 if (j >= nfs4_num_prognums) 773 j = 0; 774 775 if (ncg->nfs4prog2server[j] == NULL) { 776 ncg->nfs4_program_hint = j+1; 777 return (j+NFS4_CALLBACK); 778 } 779 } 780 781 return (0); 782 } 783 784 void 785 nfs4callback_destroy(nfs4_server_t *np) 786 { 787 struct nfs4_callback_globals *ncg; 788 int i; 789 790 if (np->s_program == 0) 791 return; 792 793 ncg = np->zone_globals; 794 i = np->s_program - NFS4_CALLBACK; 795 796 mutex_enter(&ncg->nfs4_cb_lock); 797 798 ASSERT(ncg->nfs4prog2server[i] == np); 799 800 ncg->nfs4prog2server[i] = NULL; 801 802 if (i < ncg->nfs4_program_hint) 803 ncg->nfs4_program_hint = i; 804 805 mutex_exit(&ncg->nfs4_cb_lock); 806 } 807 808 /* 809 * nfs4_setport - This function saves a netid and univeral address for 810 * the callback program. These values will be used during setclientid. 811 */ 812 static void 813 nfs4_setport(char *netid, char *uaddr, char *protofmly, char *proto, 814 struct nfs4_callback_globals *ncg) 815 { 816 struct nfs4_cb_port *p; 817 bool_t found = FALSE; 818 819 ASSERT(MUTEX_HELD(&ncg->nfs4_cb_lock)); 820 821 p = list_head(&ncg->nfs4_cb_ports); 822 for (; p != NULL; p = list_next(&ncg->nfs4_cb_ports, p)) { 823 if (strcmp(p->netid, netid) == 0) { 824 found = TRUE; 825 break; 826 } 827 } 828 if (found == TRUE) 829 (void) strcpy(p->uaddr, uaddr); 830 else { 831 p = kmem_alloc(sizeof (*p), KM_SLEEP); 832 833 (void) strcpy(p->uaddr, uaddr); 834 (void) strcpy(p->netid, netid); 835 (void) strcpy(p->protofmly, protofmly); 836 (void) strcpy(p->proto, proto); 837 list_insert_head(&ncg->nfs4_cb_ports, p); 838 } 839 } 840 841 /* 842 * nfs4_cb_args - This function is used to construct the callback 843 * portion of the arguments needed for setclientid. 844 */ 845 846 void 847 nfs4_cb_args(nfs4_server_t *np, struct knetconfig *knc, SETCLIENTID4args *args) 848 { 849 struct nfs4_cb_port *p; 850 bool_t found = FALSE; 851 rpcprog_t pgm; 852 struct nfs4_callback_globals *ncg = np->zone_globals; 853 854 /* 855 * This server structure may already have a program number 856 * assigned to it. This happens when the client has to 857 * re-issue SETCLIENTID. Just re-use the information. 858 */ 859 if (np->s_program >= NFS4_CALLBACK && 860 np->s_program < NFS4_CALLBACK + nfs4_num_prognums) 861 nfs4callback_destroy(np); 862 863 mutex_enter(&ncg->nfs4_cb_lock); 864 865 p = list_head(&ncg->nfs4_cb_ports); 866 for (; p != NULL; p = list_next(&ncg->nfs4_cb_ports, p)) { 867 if (strcmp(p->protofmly, knc->knc_protofmly) == 0 && 868 strcmp(p->proto, knc->knc_proto) == 0) { 869 found = TRUE; 870 break; 871 } 872 } 873 874 if (found == FALSE) { 875 876 NFS4_DEBUG(nfs4_callback_debug, 877 (CE_WARN, "nfs4_cb_args: could not find netid for %s/%s\n", 878 knc->knc_protofmly, knc->knc_proto)); 879 880 args->callback.cb_program = 0; 881 args->callback.cb_location.r_netid = NULL; 882 args->callback.cb_location.r_addr = NULL; 883 args->callback_ident = 0; 884 mutex_exit(&ncg->nfs4_cb_lock); 885 return; 886 } 887 888 if ((pgm = nfs4_getnextprogram(ncg)) == 0) { 889 CB_WARN("nfs4_cb_args: out of program numbers\n"); 890 891 args->callback.cb_program = 0; 892 args->callback.cb_location.r_netid = NULL; 893 args->callback.cb_location.r_addr = NULL; 894 args->callback_ident = 0; 895 mutex_exit(&ncg->nfs4_cb_lock); 896 return; 897 } 898 899 ncg->nfs4prog2server[pgm-NFS4_CALLBACK] = np; 900 args->callback.cb_program = pgm; 901 args->callback.cb_location.r_netid = p->netid; 902 args->callback.cb_location.r_addr = p->uaddr; 903 args->callback_ident = pgm; 904 905 np->s_program = pgm; 906 907 mutex_exit(&ncg->nfs4_cb_lock); 908 } 909 910 static int 911 nfs4_dquery(struct nfs4_svc_args *arg, model_t model) 912 { 913 file_t *fp; 914 vnode_t *vp; 915 rnode4_t *rp; 916 int error; 917 STRUCT_HANDLE(nfs4_svc_args, uap); 918 919 STRUCT_SET_HANDLE(uap, model, arg); 920 921 if ((fp = getf(STRUCT_FGET(uap, fd))) == NULL) 922 return (EBADF); 923 924 vp = fp->f_vnode; 925 926 if (vp == NULL || vp->v_type != VREG || 927 !vn_matchops(vp, nfs4_vnodeops)) { 928 releasef(STRUCT_FGET(uap, fd)); 929 return (EBADF); 930 } 931 932 rp = VTOR4(vp); 933 934 /* 935 * I can't convince myself that we need locking here. The 936 * rnode cannot disappear and the value returned is instantly 937 * stale anway, so why bother? 938 */ 939 940 error = suword32(STRUCT_FGETP(uap, netid), rp->r_deleg_type); 941 releasef(STRUCT_FGET(uap, fd)); 942 return (error); 943 } 944 945 946 /* 947 * NFS4 client system call. This service does the 948 * necessary initialization for the callback program. 949 * This is fashioned after the server side interaction 950 * between nfsd and the kernel. On the client, the 951 * mount command forks and the child process does the 952 * necessary interaction with the kernel. 953 * 954 * uap->fd is the fd of an open transport provider 955 */ 956 int 957 nfs4_svc(struct nfs4_svc_args *arg, model_t model) 958 { 959 file_t *fp; 960 int error; 961 int readsize; 962 char buf[KNC_STRSIZE], uaddr[KNC_STRSIZE]; 963 char protofmly[KNC_STRSIZE], proto[KNC_STRSIZE]; 964 size_t len; 965 STRUCT_HANDLE(nfs4_svc_args, uap); 966 struct netbuf addrmask; 967 int cmd; 968 SVCMASTERXPRT *cb_xprt; 969 struct nfs4_callback_globals *ncg; 970 971 #ifdef lint 972 model = model; /* STRUCT macros don't always refer to it */ 973 #endif 974 975 STRUCT_SET_HANDLE(uap, model, arg); 976 977 if (STRUCT_FGET(uap, cmd) == NFS4_DQUERY) 978 return (nfs4_dquery(arg, model)); 979 980 if (secpolicy_nfs(CRED()) != 0) 981 return (EPERM); 982 983 if ((fp = getf(STRUCT_FGET(uap, fd))) == NULL) 984 return (EBADF); 985 986 /* 987 * Set read buffer size to rsize 988 * and add room for RPC headers. 989 */ 990 readsize = nfs3tsize() + (RPC_MAXDATASIZE - NFS_MAXDATA); 991 if (readsize < RPC_MAXDATASIZE) 992 readsize = RPC_MAXDATASIZE; 993 994 error = copyinstr((const char *)STRUCT_FGETP(uap, netid), buf, 995 KNC_STRSIZE, &len); 996 if (error) { 997 releasef(STRUCT_FGET(uap, fd)); 998 return (error); 999 } 1000 1001 cmd = STRUCT_FGET(uap, cmd); 1002 1003 if (cmd & NFS4_KRPC_START) { 1004 addrmask.len = STRUCT_FGET(uap, addrmask.len); 1005 addrmask.maxlen = STRUCT_FGET(uap, addrmask.maxlen); 1006 addrmask.buf = kmem_alloc(addrmask.maxlen, KM_SLEEP); 1007 error = copyin(STRUCT_FGETP(uap, addrmask.buf), addrmask.buf, 1008 addrmask.len); 1009 if (error) { 1010 releasef(STRUCT_FGET(uap, fd)); 1011 kmem_free(addrmask.buf, addrmask.maxlen); 1012 return (error); 1013 } 1014 } 1015 else 1016 addrmask.buf = NULL; 1017 1018 error = copyinstr((const char *)STRUCT_FGETP(uap, addr), uaddr, 1019 sizeof (uaddr), &len); 1020 if (error) { 1021 releasef(STRUCT_FGET(uap, fd)); 1022 if (addrmask.buf) 1023 kmem_free(addrmask.buf, addrmask.maxlen); 1024 return (error); 1025 } 1026 1027 error = copyinstr((const char *)STRUCT_FGETP(uap, protofmly), protofmly, 1028 sizeof (protofmly), &len); 1029 if (error) { 1030 releasef(STRUCT_FGET(uap, fd)); 1031 if (addrmask.buf) 1032 kmem_free(addrmask.buf, addrmask.maxlen); 1033 return (error); 1034 } 1035 1036 error = copyinstr((const char *)STRUCT_FGETP(uap, proto), proto, 1037 sizeof (proto), &len); 1038 if (error) { 1039 releasef(STRUCT_FGET(uap, fd)); 1040 if (addrmask.buf) 1041 kmem_free(addrmask.buf, addrmask.maxlen); 1042 return (error); 1043 } 1044 1045 ncg = zone_getspecific(nfs4_callback_zone_key, nfs_zone()); 1046 ASSERT(ncg != NULL); 1047 1048 mutex_enter(&ncg->nfs4_cb_lock); 1049 if (cmd & NFS4_SETPORT) 1050 nfs4_setport(buf, uaddr, protofmly, proto, ncg); 1051 1052 if (cmd & NFS4_KRPC_START) { 1053 error = svc_tli_kcreate(fp, readsize, buf, &addrmask, &cb_xprt, 1054 &nfs4_cb_sct, NULL, NFS_CB_SVCPOOL_ID, FALSE); 1055 if (error) { 1056 CB_WARN1("nfs4_svc: svc_tli_kcreate failed %d\n", 1057 error); 1058 kmem_free(addrmask.buf, addrmask.maxlen); 1059 } 1060 } 1061 1062 mutex_exit(&ncg->nfs4_cb_lock); 1063 releasef(STRUCT_FGET(uap, fd)); 1064 return (error); 1065 } 1066 1067 struct nfs4_callback_globals * 1068 nfs4_get_callback_globals(void) 1069 { 1070 return (zone_getspecific(nfs4_callback_zone_key, nfs_zone())); 1071 } 1072 1073 static void * 1074 nfs4_callback_init_zone(zoneid_t zoneid) 1075 { 1076 kstat_t *nfs4_callback_kstat; 1077 struct nfs4_callback_globals *ncg; 1078 1079 ncg = kmem_zalloc(sizeof (*ncg), KM_SLEEP); 1080 1081 ncg->nfs4prog2server = kmem_zalloc(nfs4_num_prognums * 1082 sizeof (struct nfs4_server *), KM_SLEEP); 1083 1084 /* initialize the dlist */ 1085 mutex_init(&ncg->nfs4_dlist_lock, NULL, MUTEX_DEFAULT, NULL); 1086 list_create(&ncg->nfs4_dlist, sizeof (struct nfs4_dnode), 1087 offsetof(struct nfs4_dnode, linkage)); 1088 1089 /* initialize cb_port list */ 1090 mutex_init(&ncg->nfs4_cb_lock, NULL, MUTEX_DEFAULT, NULL); 1091 list_create(&ncg->nfs4_cb_ports, sizeof (struct nfs4_cb_port), 1092 offsetof(struct nfs4_cb_port, linkage)); 1093 1094 /* get our own copy of the kstats */ 1095 bcopy(&nfs4_callback_stats_tmpl, &ncg->nfs4_callback_stats, 1096 sizeof (nfs4_callback_stats_tmpl)); 1097 /* register "nfs:0:nfs4_callback_stats" for this zone */ 1098 if ((nfs4_callback_kstat = 1099 kstat_create_zone("nfs", 0, "nfs4_callback_stats", "misc", 1100 KSTAT_TYPE_NAMED, 1101 sizeof (ncg->nfs4_callback_stats) / sizeof (kstat_named_t), 1102 KSTAT_FLAG_VIRTUAL | KSTAT_FLAG_WRITABLE, 1103 zoneid)) != NULL) { 1104 nfs4_callback_kstat->ks_data = &ncg->nfs4_callback_stats; 1105 kstat_install(nfs4_callback_kstat); 1106 } 1107 return (ncg); 1108 } 1109 1110 static void 1111 nfs4_discard_delegations(struct nfs4_callback_globals *ncg) 1112 { 1113 nfs4_server_t *sp; 1114 int i, num_removed; 1115 1116 /* 1117 * It's OK here to just run through the registered "programs", as 1118 * servers without programs won't have any delegations to handle. 1119 */ 1120 for (i = 0; i < nfs4_num_prognums; i++) { 1121 rnode4_t *rp; 1122 1123 mutex_enter(&ncg->nfs4_cb_lock); 1124 sp = ncg->nfs4prog2server[i]; 1125 mutex_exit(&ncg->nfs4_cb_lock); 1126 1127 if (nfs4_server_vlock(sp, 1) == FALSE) 1128 continue; 1129 num_removed = 0; 1130 while ((rp = list_head(&sp->s_deleg_list)) != NULL) { 1131 mutex_enter(&rp->r_statev4_lock); 1132 if (rp->r_deleg_type == OPEN_DELEGATE_NONE) { 1133 /* 1134 * We need to take matters into our own hands, 1135 * as nfs4delegreturn_cleanup_impl() won't 1136 * remove this from the list. 1137 */ 1138 list_remove(&sp->s_deleg_list, rp); 1139 mutex_exit(&rp->r_statev4_lock); 1140 nfs4_dec_state_ref_count_nolock(sp, 1141 VTOMI4(RTOV4(rp))); 1142 num_removed++; 1143 continue; 1144 } 1145 mutex_exit(&rp->r_statev4_lock); 1146 VN_HOLD(RTOV4(rp)); 1147 mutex_exit(&sp->s_lock); 1148 /* 1149 * The following will remove the node from the list. 1150 */ 1151 nfs4delegreturn_cleanup_impl(rp, sp, ncg); 1152 VN_RELE(RTOV4(rp)); 1153 mutex_enter(&sp->s_lock); 1154 } 1155 mutex_exit(&sp->s_lock); 1156 /* each removed list node reles a reference */ 1157 while (num_removed-- > 0) 1158 nfs4_server_rele(sp); 1159 /* remove our reference for nfs4_server_vlock */ 1160 nfs4_server_rele(sp); 1161 } 1162 } 1163 1164 /* ARGSUSED */ 1165 static void 1166 nfs4_callback_shutdown_zone(zoneid_t zoneid, void *data) 1167 { 1168 struct nfs4_callback_globals *ncg = data; 1169 1170 /* 1171 * Clean pending delegation return list. 1172 */ 1173 nfs4_dlistclean_impl(ncg, NFS4_DR_DISCARD); 1174 1175 /* 1176 * Discard all delegations. 1177 */ 1178 nfs4_discard_delegations(ncg); 1179 } 1180 1181 static void 1182 nfs4_callback_fini_zone(zoneid_t zoneid, void *data) 1183 { 1184 struct nfs4_callback_globals *ncg = data; 1185 struct nfs4_cb_port *p; 1186 nfs4_server_t *sp, *next; 1187 nfs4_server_t freelist; 1188 int i; 1189 1190 kstat_delete_byname_zone("nfs", 0, "nfs4_callback_stats", zoneid); 1191 1192 /* 1193 * Discard all delegations that may have crept in since we did the 1194 * _shutdown. 1195 */ 1196 nfs4_discard_delegations(ncg); 1197 /* 1198 * We're completely done with this zone and all associated 1199 * nfs4_server_t's. Any remaining nfs4_server_ts should only have one 1200 * more reference outstanding -- the reference we didn't release in 1201 * nfs4_renew_lease_thread(). 1202 * 1203 * Here we need to run through the global nfs4_server_lst as we need to 1204 * deal with nfs4_server_ts without programs, as they also have threads 1205 * created for them, and so have outstanding references that we need to 1206 * release. 1207 */ 1208 freelist.forw = &freelist; 1209 freelist.back = &freelist; 1210 mutex_enter(&nfs4_server_lst_lock); 1211 sp = nfs4_server_lst.forw; 1212 while (sp != &nfs4_server_lst) { 1213 next = sp->forw; 1214 if (sp->zoneid == zoneid) { 1215 remque(sp); 1216 insque(sp, &freelist); 1217 } 1218 sp = next; 1219 } 1220 mutex_exit(&nfs4_server_lst_lock); 1221 1222 sp = freelist.forw; 1223 while (sp != &freelist) { 1224 next = sp->forw; 1225 nfs4_server_rele(sp); /* free the list's reference */ 1226 sp = next; 1227 } 1228 1229 #ifdef DEBUG 1230 for (i = 0; i < nfs4_num_prognums; i++) { 1231 ASSERT(ncg->nfs4prog2server[i] == NULL); 1232 } 1233 #endif 1234 kmem_free(ncg->nfs4prog2server, nfs4_num_prognums * 1235 sizeof (struct nfs4_server *)); 1236 1237 mutex_enter(&ncg->nfs4_cb_lock); 1238 while ((p = list_head(&ncg->nfs4_cb_ports)) != NULL) { 1239 list_remove(&ncg->nfs4_cb_ports, p); 1240 kmem_free(p, sizeof (*p)); 1241 } 1242 list_destroy(&ncg->nfs4_cb_ports); 1243 mutex_destroy(&ncg->nfs4_cb_lock); 1244 list_destroy(&ncg->nfs4_dlist); 1245 mutex_destroy(&ncg->nfs4_dlist_lock); 1246 kmem_free(ncg, sizeof (*ncg)); 1247 } 1248 1249 void 1250 nfs4_callback_init(void) 1251 { 1252 int i; 1253 SVC_CALLOUT *nfs4_cb_sc; 1254 1255 /* initialize the callback table */ 1256 nfs4_cb_sc = kmem_alloc(nfs4_num_prognums * 1257 sizeof (SVC_CALLOUT), KM_SLEEP); 1258 1259 for (i = 0; i < nfs4_num_prognums; i++) { 1260 nfs4_cb_sc[i].sc_prog = NFS4_CALLBACK+i; 1261 nfs4_cb_sc[i].sc_versmin = NFS_CB; 1262 nfs4_cb_sc[i].sc_versmax = NFS_CB; 1263 nfs4_cb_sc[i].sc_dispatch = cb_dispatch; 1264 } 1265 1266 nfs4_cb_sct.sct_size = nfs4_num_prognums; 1267 nfs4_cb_sct.sct_free = FALSE; 1268 nfs4_cb_sct.sct_sc = nfs4_cb_sc; 1269 1270 /* 1271 * Compute max bytes required for dyamically allocated parts 1272 * of cb_getattr reply. Only size and change are supported now. 1273 * If CB_GETATTR is changed to reply with additional attrs, 1274 * additional sizes must be added below. 1275 * 1276 * fattr4_change + fattr4_size == uint64_t + uint64_t 1277 */ 1278 cb_getattr_bytes = 2 * BYTES_PER_XDR_UNIT + 2 * BYTES_PER_XDR_UNIT; 1279 1280 zone_key_create(&nfs4_callback_zone_key, nfs4_callback_init_zone, 1281 nfs4_callback_shutdown_zone, nfs4_callback_fini_zone); 1282 } 1283 1284 void 1285 nfs4_callback_fini(void) 1286 { 1287 } 1288 1289 /* 1290 * NB: This function can be called from the *wrong* zone (ie, the zone that 1291 * 'rp' belongs to and the caller's zone may not be the same). This can happen 1292 * if the zone is going away and we get called from nfs4_async_inactive(). In 1293 * this case the globals will be NULL and we won't update the counters, which 1294 * doesn't matter as the zone is going away anyhow. 1295 */ 1296 static void 1297 nfs4delegreturn_cleanup_impl(rnode4_t *rp, nfs4_server_t *np, 1298 struct nfs4_callback_globals *ncg) 1299 { 1300 mntinfo4_t *mi = VTOMI4(RTOV4(rp)); 1301 boolean_t need_rele = B_FALSE; 1302 1303 /* 1304 * Caller must be holding mi_recovlock in read mode 1305 * to call here. This is provided by start_op. 1306 * Delegation management requires to grab s_lock 1307 * first and then r_statev4_lock. 1308 */ 1309 1310 if (np == NULL) { 1311 np = find_nfs4_server_all(mi, 1); 1312 ASSERT(np != NULL); 1313 need_rele = B_TRUE; 1314 } else { 1315 mutex_enter(&np->s_lock); 1316 } 1317 1318 mutex_enter(&rp->r_statev4_lock); 1319 1320 if (rp->r_deleg_type == OPEN_DELEGATE_NONE) { 1321 mutex_exit(&rp->r_statev4_lock); 1322 mutex_exit(&np->s_lock); 1323 if (need_rele) 1324 nfs4_server_rele(np); 1325 return; 1326 } 1327 1328 /* 1329 * Free the cred originally held when 1330 * the delegation was granted. Caller must 1331 * hold this cred if it wants to use it after 1332 * this call. 1333 */ 1334 crfree(rp->r_deleg_cred); 1335 rp->r_deleg_cred = NULL; 1336 rp->r_deleg_type = OPEN_DELEGATE_NONE; 1337 rp->r_deleg_needs_recovery = OPEN_DELEGATE_NONE; 1338 rp->r_deleg_needs_recall = FALSE; 1339 rp->r_deleg_return_pending = FALSE; 1340 1341 /* 1342 * Remove the rnode from the server's list and 1343 * update the ref counts. 1344 */ 1345 list_remove(&np->s_deleg_list, rp); 1346 mutex_exit(&rp->r_statev4_lock); 1347 nfs4_dec_state_ref_count_nolock(np, mi); 1348 mutex_exit(&np->s_lock); 1349 /* removed list node removes a reference */ 1350 nfs4_server_rele(np); 1351 if (need_rele) 1352 nfs4_server_rele(np); 1353 if (ncg != NULL) 1354 ncg->nfs4_callback_stats.delegations.value.ui64--; 1355 } 1356 1357 void 1358 nfs4delegreturn_cleanup(rnode4_t *rp, nfs4_server_t *np) 1359 { 1360 struct nfs4_callback_globals *ncg; 1361 1362 if (np != NULL) { 1363 ncg = np->zone_globals; 1364 } else if (nfs_zone() == VTOMI4(RTOV4(rp))->mi_zone) { 1365 ncg = zone_getspecific(nfs4_callback_zone_key, nfs_zone()); 1366 ASSERT(ncg != NULL); 1367 } else { 1368 /* 1369 * Request coming from the wrong zone. 1370 */ 1371 ASSERT(getzoneid() == GLOBAL_ZONEID); 1372 ncg = NULL; 1373 } 1374 1375 nfs4delegreturn_cleanup_impl(rp, np, ncg); 1376 } 1377 1378 static void 1379 nfs4delegreturn_save_lost_rqst(int error, nfs4_lost_rqst_t *lost_rqstp, 1380 cred_t *cr, vnode_t *vp) 1381 { 1382 if (error != ETIMEDOUT && error != EINTR && 1383 !NFS4_FRC_UNMT_ERR(error, vp->v_vfsp)) { 1384 lost_rqstp->lr_op = 0; 1385 return; 1386 } 1387 1388 NFS4_DEBUG(nfs4_lost_rqst_debug, (CE_NOTE, 1389 "nfs4close_save_lost_rqst: error %d", error)); 1390 1391 lost_rqstp->lr_op = OP_DELEGRETURN; 1392 /* 1393 * The vp is held and rele'd via the recovery code. 1394 * See nfs4_save_lost_rqst. 1395 */ 1396 lost_rqstp->lr_vp = vp; 1397 lost_rqstp->lr_dvp = NULL; 1398 lost_rqstp->lr_oop = NULL; 1399 lost_rqstp->lr_osp = NULL; 1400 lost_rqstp->lr_lop = NULL; 1401 lost_rqstp->lr_cr = cr; 1402 lost_rqstp->lr_flk = NULL; 1403 lost_rqstp->lr_putfirst = FALSE; 1404 } 1405 1406 static void 1407 nfs4delegreturn_otw(rnode4_t *rp, cred_t *cr, nfs4_error_t *ep) 1408 { 1409 COMPOUND4args_clnt args; 1410 COMPOUND4res_clnt res; 1411 nfs_argop4 argops[3]; 1412 nfs4_ga_res_t *garp = NULL; 1413 hrtime_t t; 1414 int numops; 1415 int doqueue = 1; 1416 1417 args.ctag = TAG_DELEGRETURN; 1418 1419 numops = 3; /* PUTFH, GETATTR, DELEGRETURN */ 1420 1421 args.array = argops; 1422 args.array_len = numops; 1423 1424 argops[0].argop = OP_CPUTFH; 1425 argops[0].nfs_argop4_u.opcputfh.sfh = rp->r_fh; 1426 1427 argops[1].argop = OP_GETATTR; 1428 argops[1].nfs_argop4_u.opgetattr.attr_request = NFS4_VATTR_MASK; 1429 argops[1].nfs_argop4_u.opgetattr.mi = VTOMI4(RTOV4(rp)); 1430 1431 argops[2].argop = OP_DELEGRETURN; 1432 argops[2].nfs_argop4_u.opdelegreturn.deleg_stateid = 1433 rp->r_deleg_stateid; 1434 1435 t = gethrtime(); 1436 rfs4call(VTOMI4(RTOV4(rp)), &args, &res, cr, &doqueue, 0, ep); 1437 1438 if (ep->error) 1439 return; 1440 1441 if (res.status == NFS4_OK) { 1442 garp = &res.array[1].nfs_resop4_u.opgetattr.ga_res; 1443 nfs4_attr_cache(RTOV4(rp), garp, t, cr, TRUE, NULL); 1444 1445 } 1446 (void) xdr_free(xdr_COMPOUND4res_clnt, (caddr_t)&res); 1447 } 1448 1449 int 1450 nfs4_do_delegreturn(rnode4_t *rp, int flags, cred_t *cr, 1451 struct nfs4_callback_globals *ncg) 1452 { 1453 vnode_t *vp = RTOV4(rp); 1454 mntinfo4_t *mi = VTOMI4(vp); 1455 nfs4_lost_rqst_t lost_rqst; 1456 nfs4_recov_state_t recov_state; 1457 bool_t needrecov = FALSE, recovonly, done = FALSE; 1458 nfs4_error_t e = { 0, NFS4_OK, RPC_SUCCESS }; 1459 1460 ncg->nfs4_callback_stats.delegreturn.value.ui64++; 1461 1462 while (!done) { 1463 e.error = nfs4_start_fop(mi, vp, NULL, OH_DELEGRETURN, 1464 &recov_state, &recovonly); 1465 1466 if (e.error) { 1467 if (flags & NFS4_DR_FORCE) { 1468 (void) nfs_rw_enter_sig(&mi->mi_recovlock, 1469 RW_READER, 0); 1470 nfs4delegreturn_cleanup_impl(rp, NULL, ncg); 1471 nfs_rw_exit(&mi->mi_recovlock); 1472 } 1473 break; 1474 } 1475 1476 /* 1477 * Check to see if the delegation has already been 1478 * returned by the recovery thread. The state of 1479 * the delegation cannot change at this point due 1480 * to start_fop and the r_deleg_recall_lock. 1481 */ 1482 if (rp->r_deleg_type == OPEN_DELEGATE_NONE) { 1483 e.error = 0; 1484 nfs4_end_op(mi, vp, NULL, &recov_state, needrecov); 1485 break; 1486 } 1487 1488 if (recovonly) { 1489 /* 1490 * Delegation will be returned via the 1491 * recovery framework. Build a lost request 1492 * structure, start recovery and get out. 1493 */ 1494 nfs4_error_init(&e, EINTR); 1495 nfs4delegreturn_save_lost_rqst(e.error, &lost_rqst, 1496 cr, vp); 1497 (void) nfs4_start_recovery(&e, mi, vp, 1498 NULL, &rp->r_deleg_stateid, 1499 lost_rqst.lr_op == OP_DELEGRETURN ? 1500 &lost_rqst : NULL, OP_DELEGRETURN, NULL); 1501 nfs4_end_op(mi, vp, NULL, &recov_state, needrecov); 1502 break; 1503 } 1504 1505 nfs4delegreturn_otw(rp, cr, &e); 1506 1507 /* 1508 * Ignore some errors on delegreturn; no point in marking 1509 * the file dead on a state destroying operation. 1510 */ 1511 if (e.error == 0 && (nfs4_recov_marks_dead(e.stat) || 1512 e.stat == NFS4ERR_BADHANDLE || 1513 e.stat == NFS4ERR_STALE)) 1514 needrecov = FALSE; 1515 else 1516 needrecov = nfs4_needs_recovery(&e, TRUE, vp->v_vfsp); 1517 1518 if (needrecov) { 1519 nfs4delegreturn_save_lost_rqst(e.error, &lost_rqst, 1520 cr, vp); 1521 (void) nfs4_start_recovery(&e, mi, vp, 1522 NULL, &rp->r_deleg_stateid, 1523 lost_rqst.lr_op == OP_DELEGRETURN ? 1524 &lost_rqst : NULL, OP_DELEGRETURN, NULL); 1525 } else { 1526 nfs4delegreturn_cleanup_impl(rp, NULL, ncg); 1527 done = TRUE; 1528 } 1529 1530 nfs4_end_op(mi, vp, NULL, &recov_state, needrecov); 1531 } 1532 return (e.error); 1533 } 1534 1535 /* 1536 * nfs4_resend_delegreturn - used to drive the delegreturn 1537 * operation via the recovery thread. 1538 */ 1539 void 1540 nfs4_resend_delegreturn(nfs4_lost_rqst_t *lorp, nfs4_error_t *ep, 1541 nfs4_server_t *np) 1542 { 1543 rnode4_t *rp = VTOR4(lorp->lr_vp); 1544 1545 /* If the file failed recovery, just quit. */ 1546 mutex_enter(&rp->r_statelock); 1547 if (rp->r_flags & R4RECOVERR) { 1548 ep->error = EIO; 1549 } 1550 mutex_exit(&rp->r_statelock); 1551 1552 if (!ep->error) 1553 nfs4delegreturn_otw(rp, lorp->lr_cr, ep); 1554 1555 /* 1556 * If recovery is now needed, then return the error 1557 * and status and let the recovery thread handle it, 1558 * including re-driving another delegreturn. Otherwise, 1559 * just give up and clean up the delegation. 1560 */ 1561 if (nfs4_needs_recovery(ep, TRUE, lorp->lr_vp->v_vfsp)) 1562 return; 1563 1564 if (rp->r_deleg_type != OPEN_DELEGATE_NONE) 1565 nfs4delegreturn_cleanup(rp, np); 1566 1567 nfs4_error_zinit(ep); 1568 } 1569 1570 /* 1571 * nfs4delegreturn - general function to return a delegation. 1572 * 1573 * NFS4_DR_FORCE - return the delegation even if start_op fails 1574 * NFS4_DR_PUSH - push modified data back to the server via VOP_PUTPAGE 1575 * NFS4_DR_DISCARD - discard the delegation w/o delegreturn 1576 * NFS4_DR_DID_OP - calling function already did nfs4_start_op 1577 * NFS4_DR_RECALL - delegreturned initiated via CB_RECALL 1578 * NFS4_DR_REOPEN - do file reopens, if applicable 1579 */ 1580 static int 1581 nfs4delegreturn_impl(rnode4_t *rp, int flags, struct nfs4_callback_globals *ncg) 1582 { 1583 int error = 0; 1584 cred_t *cr = NULL; 1585 vnode_t *vp; 1586 bool_t needrecov = FALSE; 1587 bool_t rw_entered = FALSE; 1588 bool_t do_reopen; 1589 1590 vp = RTOV4(rp); 1591 1592 /* 1593 * If NFS4_DR_DISCARD is set by itself, take a short-cut and 1594 * discard without doing an otw DELEGRETURN. This may only be used 1595 * by the recovery thread because it bypasses the synchronization 1596 * with r_deleg_recall_lock and mi->mi_recovlock. 1597 */ 1598 if (flags == NFS4_DR_DISCARD) { 1599 nfs4delegreturn_cleanup_impl(rp, NULL, ncg); 1600 return (0); 1601 } 1602 1603 if (flags & NFS4_DR_DID_OP) { 1604 /* 1605 * Caller had already done start_op, which means the 1606 * r_deleg_recall_lock is already held in READ mode 1607 * so we cannot take it in write mode. Return the 1608 * delegation asynchronously. 1609 * 1610 * Remove the NFS4_DR_DID_OP flag so we don't 1611 * get stuck looping through here. 1612 */ 1613 VN_HOLD(vp); 1614 nfs4delegreturn_async(rp, (flags & ~NFS4_DR_DID_OP), FALSE); 1615 return (0); 1616 } 1617 1618 /* 1619 * Verify we still have a delegation and crhold the credential. 1620 */ 1621 mutex_enter(&rp->r_statev4_lock); 1622 if (rp->r_deleg_type == OPEN_DELEGATE_NONE) { 1623 mutex_exit(&rp->r_statev4_lock); 1624 goto out; 1625 } 1626 cr = rp->r_deleg_cred; 1627 ASSERT(cr != NULL); 1628 crhold(cr); 1629 mutex_exit(&rp->r_statev4_lock); 1630 1631 /* 1632 * Push the modified data back to the server synchronously 1633 * before doing DELEGRETURN. 1634 */ 1635 if (flags & NFS4_DR_PUSH) 1636 (void) VOP_PUTPAGE(vp, 0, 0, 0, cr, NULL); 1637 1638 /* 1639 * Take r_deleg_recall_lock in WRITE mode, this will prevent 1640 * nfs4_is_otw_open_necessary from trying to use the delegation 1641 * while the DELEGRETURN is in progress. 1642 */ 1643 (void) nfs_rw_enter_sig(&rp->r_deleg_recall_lock, RW_WRITER, FALSE); 1644 1645 rw_entered = TRUE; 1646 1647 if (rp->r_deleg_type == OPEN_DELEGATE_NONE) 1648 goto out; 1649 1650 if (flags & NFS4_DR_REOPEN) { 1651 /* 1652 * If R4RECOVERRP is already set, then skip re-opening 1653 * the delegation open streams and go straight to doing 1654 * delegreturn. (XXX if the file has failed recovery, then the 1655 * delegreturn attempt is likely to be futile.) 1656 */ 1657 mutex_enter(&rp->r_statelock); 1658 do_reopen = !(rp->r_flags & R4RECOVERRP); 1659 mutex_exit(&rp->r_statelock); 1660 1661 if (do_reopen) { 1662 error = deleg_reopen(vp, &needrecov, ncg, flags); 1663 if (error != 0) { 1664 if ((flags & (NFS4_DR_FORCE | NFS4_DR_RECALL)) 1665 == 0) 1666 goto out; 1667 } else if (needrecov) { 1668 if ((flags & NFS4_DR_FORCE) == 0) 1669 goto out; 1670 } 1671 } 1672 } 1673 1674 if (flags & NFS4_DR_DISCARD) { 1675 mntinfo4_t *mi = VTOMI4(RTOV4(rp)); 1676 1677 mutex_enter(&rp->r_statelock); 1678 /* 1679 * deleg_return_pending is cleared inside of delegation_accept 1680 * when a delegation is accepted. if this flag has been 1681 * cleared, then a new delegation has overwritten the one we 1682 * were about to throw away. 1683 */ 1684 if (!rp->r_deleg_return_pending) { 1685 mutex_exit(&rp->r_statelock); 1686 goto out; 1687 } 1688 mutex_exit(&rp->r_statelock); 1689 (void) nfs_rw_enter_sig(&mi->mi_recovlock, RW_READER, FALSE); 1690 nfs4delegreturn_cleanup_impl(rp, NULL, ncg); 1691 nfs_rw_exit(&mi->mi_recovlock); 1692 } else { 1693 error = nfs4_do_delegreturn(rp, flags, cr, ncg); 1694 } 1695 1696 out: 1697 if (cr) 1698 crfree(cr); 1699 if (rw_entered) 1700 nfs_rw_exit(&rp->r_deleg_recall_lock); 1701 return (error); 1702 } 1703 1704 int 1705 nfs4delegreturn(rnode4_t *rp, int flags) 1706 { 1707 struct nfs4_callback_globals *ncg; 1708 1709 ncg = zone_getspecific(nfs4_callback_zone_key, nfs_zone()); 1710 ASSERT(ncg != NULL); 1711 1712 return (nfs4delegreturn_impl(rp, flags, ncg)); 1713 } 1714 1715 void 1716 nfs4delegreturn_async(rnode4_t *rp, int flags, bool_t trunc) 1717 { 1718 struct cb_recall_pass *pp; 1719 1720 pp = kmem_alloc(sizeof (struct cb_recall_pass), KM_SLEEP); 1721 pp->rp = rp; 1722 pp->flags = flags; 1723 pp->truncate = trunc; 1724 1725 /* 1726 * Fire up a thread to do the actual delegreturn 1727 * Caller must guarantee that the rnode doesn't 1728 * vanish (by calling VN_HOLD). 1729 */ 1730 1731 (void) zthread_create(NULL, 0, nfs4delegreturn_thread, pp, 0, 1732 minclsyspri); 1733 } 1734 1735 static void 1736 delegreturn_all_thread(rpcprog_t *pp) 1737 { 1738 nfs4_server_t *np; 1739 bool_t found = FALSE; 1740 rpcprog_t prog; 1741 rnode4_t *rp; 1742 vnode_t *vp; 1743 zoneid_t zoneid = getzoneid(); 1744 struct nfs4_callback_globals *ncg; 1745 1746 NFS4_DEBUG(nfs4_drat_debug, 1747 (CE_NOTE, "delereturn_all_thread: prog %d\n", *pp)); 1748 1749 prog = *pp; 1750 kmem_free(pp, sizeof (*pp)); 1751 pp = NULL; 1752 1753 mutex_enter(&nfs4_server_lst_lock); 1754 for (np = nfs4_server_lst.forw; np != &nfs4_server_lst; np = np->forw) { 1755 if (np->zoneid == zoneid && np->s_program == prog) { 1756 mutex_enter(&np->s_lock); 1757 found = TRUE; 1758 break; 1759 } 1760 } 1761 mutex_exit(&nfs4_server_lst_lock); 1762 1763 /* 1764 * It's possible that the nfs4_server which was using this 1765 * program number has vanished since this thread is async. 1766 * If so, just return. Your work here is finished, my friend. 1767 */ 1768 if (!found) 1769 goto out; 1770 1771 ncg = np->zone_globals; 1772 while ((rp = list_head(&np->s_deleg_list)) != NULL) { 1773 vp = RTOV4(rp); 1774 VN_HOLD(vp); 1775 mutex_exit(&np->s_lock); 1776 (void) nfs4delegreturn_impl(rp, NFS4_DR_PUSH|NFS4_DR_REOPEN, 1777 ncg); 1778 VN_RELE(vp); 1779 1780 /* retake the s_lock for next trip through the loop */ 1781 mutex_enter(&np->s_lock); 1782 } 1783 mutex_exit(&np->s_lock); 1784 out: 1785 NFS4_DEBUG(nfs4_drat_debug, 1786 (CE_NOTE, "delereturn_all_thread: complete\n")); 1787 zthread_exit(); 1788 } 1789 1790 void 1791 nfs4_delegreturn_all(nfs4_server_t *sp) 1792 { 1793 rpcprog_t pro, *pp; 1794 1795 mutex_enter(&sp->s_lock); 1796 1797 /* Check to see if the delegation list is empty */ 1798 1799 if (list_head(&sp->s_deleg_list) == NULL) { 1800 mutex_exit(&sp->s_lock); 1801 return; 1802 } 1803 /* 1804 * Grab the program number; the async thread will use this 1805 * to find the nfs4_server. 1806 */ 1807 pro = sp->s_program; 1808 mutex_exit(&sp->s_lock); 1809 pp = kmem_alloc(sizeof (rpcprog_t), KM_SLEEP); 1810 *pp = pro; 1811 (void) zthread_create(NULL, 0, delegreturn_all_thread, pp, 0, 1812 minclsyspri); 1813 } 1814 1815 1816 /* 1817 * Discard any delegations 1818 * 1819 * Iterate over the servers s_deleg_list and 1820 * for matching mount-point rnodes discard 1821 * the delegation. 1822 */ 1823 void 1824 nfs4_deleg_discard(mntinfo4_t *mi, nfs4_server_t *sp) 1825 { 1826 rnode4_t *rp, *next; 1827 mntinfo4_t *r_mi; 1828 struct nfs4_callback_globals *ncg; 1829 1830 ASSERT(mutex_owned(&sp->s_lock)); 1831 ncg = sp->zone_globals; 1832 1833 for (rp = list_head(&sp->s_deleg_list); rp != NULL; rp = next) { 1834 r_mi = VTOMI4(RTOV4(rp)); 1835 next = list_next(&sp->s_deleg_list, rp); 1836 1837 if (r_mi != mi) { 1838 /* 1839 * Skip if this rnode is in not on the 1840 * same mount-point 1841 */ 1842 continue; 1843 } 1844 1845 ASSERT(rp->r_deleg_type == OPEN_DELEGATE_READ); 1846 1847 #ifdef DEBUG 1848 if (nfs4_client_recov_debug) { 1849 zprintf(getzoneid(), 1850 "nfs4_deleg_discard: matched rnode %p " 1851 "-- discarding delegation\n", (void *)rp); 1852 } 1853 #endif 1854 mutex_enter(&rp->r_statev4_lock); 1855 /* 1856 * Free the cred originally held when the delegation 1857 * was granted. Also need to decrement the refcnt 1858 * on this server for each delegation we discard 1859 */ 1860 if (rp->r_deleg_cred) 1861 crfree(rp->r_deleg_cred); 1862 rp->r_deleg_cred = NULL; 1863 rp->r_deleg_type = OPEN_DELEGATE_NONE; 1864 rp->r_deleg_needs_recovery = OPEN_DELEGATE_NONE; 1865 rp->r_deleg_needs_recall = FALSE; 1866 ASSERT(sp->s_refcnt > 1); 1867 sp->s_refcnt--; 1868 list_remove(&sp->s_deleg_list, rp); 1869 mutex_exit(&rp->r_statev4_lock); 1870 nfs4_dec_state_ref_count_nolock(sp, mi); 1871 ncg->nfs4_callback_stats.delegations.value.ui64--; 1872 } 1873 } 1874 1875 /* 1876 * Reopen any open streams that were covered by the given file's 1877 * delegation. 1878 * Returns zero or an errno value. If there was no error, *recovp 1879 * indicates whether recovery was initiated. 1880 */ 1881 1882 static int 1883 deleg_reopen(vnode_t *vp, bool_t *recovp, struct nfs4_callback_globals *ncg, 1884 int flags) 1885 { 1886 nfs4_open_stream_t *osp; 1887 nfs4_recov_state_t recov_state; 1888 bool_t needrecov = FALSE; 1889 mntinfo4_t *mi; 1890 rnode4_t *rp; 1891 nfs4_error_t e = { 0, NFS4_OK, RPC_SUCCESS }; 1892 int claimnull; 1893 1894 mi = VTOMI4(vp); 1895 rp = VTOR4(vp); 1896 1897 recov_state.rs_flags = 0; 1898 recov_state.rs_num_retry_despite_err = 0; 1899 1900 retry: 1901 if ((e.error = nfs4_start_op(mi, vp, NULL, &recov_state)) != 0) { 1902 return (e.error); 1903 } 1904 1905 /* 1906 * if we mean to discard the delegation, it must be BAD, so don't 1907 * use it when doing the reopen or it will fail too. 1908 */ 1909 claimnull = (flags & NFS4_DR_DISCARD); 1910 /* 1911 * Loop through the open streams for this rnode to find 1912 * all of the ones created using the delegation state ID. 1913 * Each of these needs to be re-opened. 1914 */ 1915 1916 while ((osp = get_next_deleg_stream(rp, claimnull)) != NULL) { 1917 1918 if (claimnull) { 1919 nfs4_reopen(vp, osp, &e, CLAIM_NULL, FALSE, FALSE); 1920 } else { 1921 ncg->nfs4_callback_stats.claim_cur.value.ui64++; 1922 1923 nfs4_reopen(vp, osp, &e, CLAIM_DELEGATE_CUR, FALSE, 1924 FALSE); 1925 if (e.error == 0 && e.stat == NFS4_OK) 1926 ncg->nfs4_callback_stats. 1927 claim_cur_ok.value.ui64++; 1928 } 1929 1930 if (e.error == EAGAIN) { 1931 nfs4_end_op(mi, vp, NULL, &recov_state, TRUE); 1932 goto retry; 1933 } 1934 1935 /* 1936 * if error is EINTR, ETIMEDOUT, or NFS4_FRC_UNMT_ERR, then 1937 * recovery has already been started inside of nfs4_reopen. 1938 */ 1939 if (e.error == EINTR || e.error == ETIMEDOUT || 1940 NFS4_FRC_UNMT_ERR(e.error, vp->v_vfsp)) { 1941 open_stream_rele(osp, rp); 1942 break; 1943 } 1944 1945 needrecov = nfs4_needs_recovery(&e, TRUE, vp->v_vfsp); 1946 1947 if (e.error != 0 && !needrecov) { 1948 /* 1949 * Recovery is not possible, but don't give up yet; 1950 * we'd still like to do delegreturn after 1951 * reopening as many streams as possible. 1952 * Continue processing the open streams. 1953 */ 1954 1955 ncg->nfs4_callback_stats.recall_failed.value.ui64++; 1956 1957 } else if (needrecov) { 1958 /* 1959 * Start recovery and bail out. The recovery 1960 * thread will take it from here. 1961 */ 1962 (void) nfs4_start_recovery(&e, mi, vp, NULL, NULL, 1963 NULL, OP_OPEN, NULL); 1964 open_stream_rele(osp, rp); 1965 *recovp = TRUE; 1966 break; 1967 } 1968 1969 open_stream_rele(osp, rp); 1970 } 1971 1972 nfs4_end_op(mi, vp, NULL, &recov_state, needrecov); 1973 1974 return (e.error); 1975 } 1976 1977 /* 1978 * get_next_deleg_stream - returns the next open stream which 1979 * represents a delegation for this rnode. In order to assure 1980 * forward progress, the caller must guarantee that each open 1981 * stream returned is changed so that a future call won't return 1982 * it again. 1983 * 1984 * There are several ways for the open stream to change. If the open 1985 * stream is !os_delegation, then we aren't interested in it. Also, if 1986 * either os_failed_reopen or !os_valid, then don't return the osp. 1987 * 1988 * If claimnull is false (doing reopen CLAIM_DELEGATE_CUR) then return 1989 * the osp if it is an os_delegation open stream. Also, if the rnode still 1990 * has r_deleg_return_pending, then return the os_delegation osp. Lastly, 1991 * if the rnode's r_deleg_stateid is different from the osp's open_stateid, 1992 * then return the osp. 1993 * 1994 * We have already taken the 'r_deleg_recall_lock' as WRITER, which 1995 * prevents new OPENs from going OTW (as start_fop takes this 1996 * lock in READ mode); thus, no new open streams can be created 1997 * (which inherently means no new delegation open streams are 1998 * being created). 1999 */ 2000 2001 static nfs4_open_stream_t * 2002 get_next_deleg_stream(rnode4_t *rp, int claimnull) 2003 { 2004 nfs4_open_stream_t *osp; 2005 2006 ASSERT(nfs_rw_lock_held(&rp->r_deleg_recall_lock, RW_WRITER)); 2007 2008 /* 2009 * Search through the list of open streams looking for 2010 * one that was created while holding the delegation. 2011 */ 2012 mutex_enter(&rp->r_os_lock); 2013 for (osp = list_head(&rp->r_open_streams); osp != NULL; 2014 osp = list_next(&rp->r_open_streams, osp)) { 2015 mutex_enter(&osp->os_sync_lock); 2016 if (!osp->os_delegation || osp->os_failed_reopen || 2017 !osp->os_valid) { 2018 mutex_exit(&osp->os_sync_lock); 2019 continue; 2020 } 2021 if (!claimnull || rp->r_deleg_return_pending || 2022 !stateid4_cmp(&osp->open_stateid, &rp->r_deleg_stateid)) { 2023 osp->os_ref_count++; 2024 mutex_exit(&osp->os_sync_lock); 2025 mutex_exit(&rp->r_os_lock); 2026 return (osp); 2027 } 2028 mutex_exit(&osp->os_sync_lock); 2029 } 2030 mutex_exit(&rp->r_os_lock); 2031 2032 return (NULL); 2033 } 2034 2035 static void 2036 nfs4delegreturn_thread(struct cb_recall_pass *args) 2037 { 2038 rnode4_t *rp; 2039 vnode_t *vp; 2040 cred_t *cr; 2041 int dtype, error, flags; 2042 bool_t rdirty, rip; 2043 kmutex_t cpr_lock; 2044 callb_cpr_t cpr_info; 2045 struct nfs4_callback_globals *ncg; 2046 2047 ncg = zone_getspecific(nfs4_callback_zone_key, nfs_zone()); 2048 ASSERT(ncg != NULL); 2049 2050 mutex_init(&cpr_lock, NULL, MUTEX_DEFAULT, NULL); 2051 2052 CALLB_CPR_INIT(&cpr_info, &cpr_lock, callb_generic_cpr, 2053 "nfsv4delegRtn"); 2054 2055 rp = args->rp; 2056 vp = RTOV4(rp); 2057 2058 mutex_enter(&rp->r_statev4_lock); 2059 if (rp->r_deleg_type == OPEN_DELEGATE_NONE) { 2060 mutex_exit(&rp->r_statev4_lock); 2061 goto out; 2062 } 2063 mutex_exit(&rp->r_statev4_lock); 2064 2065 /* 2066 * Take the read-write lock in read mode to prevent other 2067 * threads from modifying the data during the recall. This 2068 * doesn't affect mmappers. 2069 */ 2070 (void) nfs_rw_enter_sig(&rp->r_rwlock, RW_READER, FALSE); 2071 2072 /* Proceed with delegreturn */ 2073 2074 mutex_enter(&rp->r_statev4_lock); 2075 if (rp->r_deleg_type == OPEN_DELEGATE_NONE) { 2076 mutex_exit(&rp->r_statev4_lock); 2077 nfs_rw_exit(&rp->r_rwlock); 2078 goto out; 2079 } 2080 dtype = rp->r_deleg_type; 2081 cr = rp->r_deleg_cred; 2082 ASSERT(cr != NULL); 2083 crhold(cr); 2084 mutex_exit(&rp->r_statev4_lock); 2085 2086 flags = args->flags; 2087 2088 /* 2089 * If the file is being truncated at the server, then throw 2090 * away all of the pages, it doesn't matter what flavor of 2091 * delegation we have. 2092 */ 2093 2094 if (args->truncate) { 2095 ncg->nfs4_callback_stats.recall_trunc.value.ui64++; 2096 nfs4_invalidate_pages(vp, 0, cr); 2097 } else if (dtype == OPEN_DELEGATE_WRITE) { 2098 2099 mutex_enter(&rp->r_statelock); 2100 rdirty = rp->r_flags & R4DIRTY; 2101 mutex_exit(&rp->r_statelock); 2102 2103 if (rdirty) { 2104 error = VOP_PUTPAGE(vp, 0, 0, 0, cr, NULL); 2105 2106 if (error) 2107 CB_WARN1("nfs4delegreturn_thread:" 2108 " VOP_PUTPAGE: %d\n", error); 2109 } 2110 /* turn off NFS4_DR_PUSH because we just did that above. */ 2111 flags &= ~NFS4_DR_PUSH; 2112 } 2113 2114 mutex_enter(&rp->r_statelock); 2115 rip = rp->r_flags & R4RECOVERRP; 2116 mutex_exit(&rp->r_statelock); 2117 2118 /* If a failed recovery is indicated, discard the pages */ 2119 2120 if (rip) { 2121 2122 error = VOP_PUTPAGE(vp, 0, 0, B_INVAL, cr, NULL); 2123 2124 if (error) 2125 CB_WARN1("nfs4delegreturn_thread: VOP_PUTPAGE: %d\n", 2126 error); 2127 } 2128 2129 /* 2130 * Pass the flags to nfs4delegreturn_impl, but be sure not to pass 2131 * NFS4_DR_DID_OP, which just calls nfs4delegreturn_async again. 2132 */ 2133 flags &= ~NFS4_DR_DID_OP; 2134 2135 (void) nfs4delegreturn_impl(rp, flags, ncg); 2136 2137 nfs_rw_exit(&rp->r_rwlock); 2138 crfree(cr); 2139 out: 2140 kmem_free(args, sizeof (struct cb_recall_pass)); 2141 VN_RELE(vp); 2142 mutex_enter(&cpr_lock); 2143 CALLB_CPR_EXIT(&cpr_info); 2144 mutex_destroy(&cpr_lock); 2145 zthread_exit(); 2146 } 2147 2148 /* 2149 * This function has one assumption that the caller of this function is 2150 * either doing recovery (therefore cannot call nfs4_start_op) or has 2151 * already called nfs4_start_op(). 2152 */ 2153 void 2154 nfs4_delegation_accept(rnode4_t *rp, open_claim_type4 claim, OPEN4res *res, 2155 nfs4_ga_res_t *garp, cred_t *cr) 2156 { 2157 open_read_delegation4 *orp; 2158 open_write_delegation4 *owp; 2159 nfs4_server_t *np; 2160 bool_t already = FALSE; 2161 bool_t recall = FALSE; 2162 bool_t valid_garp = TRUE; 2163 bool_t delegation_granted = FALSE; 2164 bool_t dr_needed = FALSE; 2165 bool_t recov; 2166 int dr_flags = 0; 2167 long mapcnt; 2168 uint_t rflag; 2169 mntinfo4_t *mi; 2170 struct nfs4_callback_globals *ncg; 2171 open_delegation_type4 odt; 2172 2173 ncg = zone_getspecific(nfs4_callback_zone_key, nfs_zone()); 2174 ASSERT(ncg != NULL); 2175 2176 mi = VTOMI4(RTOV4(rp)); 2177 2178 /* 2179 * Accept a delegation granted to the client via an OPEN. 2180 * Set the delegation fields in the rnode and insert the 2181 * rnode onto the list anchored in the nfs4_server_t. The 2182 * proper locking order requires the nfs4_server_t first, 2183 * even though it may not be needed in all cases. 2184 * 2185 * NB: find_nfs4_server returns with s_lock held. 2186 */ 2187 2188 if ((np = find_nfs4_server(mi)) == NULL) 2189 return; 2190 2191 /* grab the statelock too, for examining r_mapcnt */ 2192 mutex_enter(&rp->r_statelock); 2193 mutex_enter(&rp->r_statev4_lock); 2194 2195 if (rp->r_deleg_type == OPEN_DELEGATE_READ || 2196 rp->r_deleg_type == OPEN_DELEGATE_WRITE) 2197 already = TRUE; 2198 2199 odt = res->delegation.delegation_type; 2200 2201 if (odt == OPEN_DELEGATE_READ) { 2202 2203 rp->r_deleg_type = res->delegation.delegation_type; 2204 orp = &res->delegation.open_delegation4_u.read; 2205 rp->r_deleg_stateid = orp->stateid; 2206 rp->r_deleg_perms = orp->permissions; 2207 if (claim == CLAIM_PREVIOUS) 2208 if ((recall = orp->recall) != 0) 2209 dr_needed = TRUE; 2210 2211 delegation_granted = TRUE; 2212 2213 ncg->nfs4_callback_stats.delegations.value.ui64++; 2214 ncg->nfs4_callback_stats.delegaccept_r.value.ui64++; 2215 2216 } else if (odt == OPEN_DELEGATE_WRITE) { 2217 2218 rp->r_deleg_type = res->delegation.delegation_type; 2219 owp = &res->delegation.open_delegation4_u.write; 2220 rp->r_deleg_stateid = owp->stateid; 2221 rp->r_deleg_perms = owp->permissions; 2222 rp->r_deleg_limit = owp->space_limit; 2223 if (claim == CLAIM_PREVIOUS) 2224 if ((recall = owp->recall) != 0) 2225 dr_needed = TRUE; 2226 2227 delegation_granted = TRUE; 2228 2229 if (garp == NULL || !garp->n4g_change_valid) { 2230 valid_garp = FALSE; 2231 rp->r_deleg_change = 0; 2232 rp->r_deleg_change_grant = 0; 2233 } else { 2234 rp->r_deleg_change = garp->n4g_change; 2235 rp->r_deleg_change_grant = garp->n4g_change; 2236 } 2237 mapcnt = rp->r_mapcnt; 2238 rflag = rp->r_flags; 2239 2240 /* 2241 * Update the delegation change attribute if 2242 * there are mappers for the file is dirty. This 2243 * might be the case during recovery after server 2244 * reboot. 2245 */ 2246 if (mapcnt > 0 || rflag & R4DIRTY) 2247 rp->r_deleg_change++; 2248 2249 NFS4_DEBUG(nfs4_callback_debug, (CE_NOTE, 2250 "nfs4_delegation_accept: r_deleg_change: 0x%x\n", 2251 (int)(rp->r_deleg_change >> 32))); 2252 NFS4_DEBUG(nfs4_callback_debug, (CE_NOTE, 2253 "nfs4_delegation_accept: r_delg_change_grant: 0x%x\n", 2254 (int)(rp->r_deleg_change_grant >> 32))); 2255 2256 2257 ncg->nfs4_callback_stats.delegations.value.ui64++; 2258 ncg->nfs4_callback_stats.delegaccept_rw.value.ui64++; 2259 } else if (already) { 2260 /* 2261 * No delegation granted. If the rnode currently has 2262 * has one, then consider it tainted and return it. 2263 */ 2264 dr_needed = TRUE; 2265 } 2266 2267 if (delegation_granted) { 2268 /* Add the rnode to the list. */ 2269 if (!already) { 2270 crhold(cr); 2271 rp->r_deleg_cred = cr; 2272 2273 ASSERT(mutex_owned(&np->s_lock)); 2274 list_insert_head(&np->s_deleg_list, rp); 2275 /* added list node gets a reference */ 2276 np->s_refcnt++; 2277 nfs4_inc_state_ref_count_nolock(np, mi); 2278 } 2279 rp->r_deleg_needs_recovery = OPEN_DELEGATE_NONE; 2280 } 2281 2282 /* 2283 * We've now safely accepted the delegation, if any. Drop the 2284 * locks and figure out what post-processing is needed. We'd 2285 * like to retain r_statev4_lock, but nfs4_server_rele takes 2286 * s_lock which would be a lock ordering violation. 2287 */ 2288 mutex_exit(&rp->r_statev4_lock); 2289 mutex_exit(&rp->r_statelock); 2290 mutex_exit(&np->s_lock); 2291 nfs4_server_rele(np); 2292 2293 /* 2294 * Check to see if we are in recovery. Remember that 2295 * this function is protected by start_op, so a recovery 2296 * cannot begin until we are out of here. 2297 */ 2298 mutex_enter(&mi->mi_lock); 2299 recov = mi->mi_recovflags & MI4_RECOV_ACTIV; 2300 mutex_exit(&mi->mi_lock); 2301 2302 mutex_enter(&rp->r_statev4_lock); 2303 2304 if (nfs4_delegreturn_policy == IMMEDIATE || !valid_garp) 2305 dr_needed = TRUE; 2306 2307 if (dr_needed && rp->r_deleg_return_pending == FALSE) { 2308 if (recov) { 2309 /* 2310 * We cannot call delegreturn from inside 2311 * of recovery or VOP_PUTPAGE will hang 2312 * due to nfs4_start_fop call in 2313 * nfs4write. Use dlistadd to add the 2314 * rnode to the list of rnodes needing 2315 * cleaning. We do not need to do reopen 2316 * here because recov_openfiles will do it. 2317 * In the non-recall case, just discard the 2318 * delegation as it is no longer valid. 2319 */ 2320 if (recall) 2321 dr_flags = NFS4_DR_PUSH; 2322 else 2323 dr_flags = NFS4_DR_PUSH|NFS4_DR_DISCARD; 2324 2325 nfs4_dlistadd(rp, ncg, dr_flags); 2326 dr_flags = 0; 2327 } else { 2328 /* 2329 * Push the modified data back to the server, 2330 * reopen any delegation open streams, and return 2331 * the delegation. Drop the statev4_lock first! 2332 */ 2333 dr_flags = NFS4_DR_PUSH|NFS4_DR_DID_OP|NFS4_DR_REOPEN; 2334 } 2335 } 2336 mutex_exit(&rp->r_statev4_lock); 2337 if (dr_flags) 2338 (void) nfs4delegreturn_impl(rp, dr_flags, ncg); 2339 } 2340 2341 /* 2342 * nfs4delegabandon - Abandon the delegation on an rnode4. This code 2343 * is called when the client receives EXPIRED, BAD_STATEID, OLD_STATEID 2344 * or BADSEQID and the recovery code is unable to recover. Push any 2345 * dirty data back to the server and return the delegation (if any). 2346 */ 2347 2348 void 2349 nfs4delegabandon(rnode4_t *rp) 2350 { 2351 vnode_t *vp; 2352 struct cb_recall_pass *pp; 2353 open_delegation_type4 dt; 2354 2355 mutex_enter(&rp->r_statev4_lock); 2356 dt = rp->r_deleg_type; 2357 mutex_exit(&rp->r_statev4_lock); 2358 2359 if (dt == OPEN_DELEGATE_NONE) 2360 return; 2361 2362 vp = RTOV4(rp); 2363 VN_HOLD(vp); 2364 2365 pp = kmem_alloc(sizeof (struct cb_recall_pass), KM_SLEEP); 2366 pp->rp = rp; 2367 /* 2368 * Recovery on the file has failed and we want to return 2369 * the delegation. We don't want to reopen files and 2370 * nfs4delegreturn_thread() figures out what to do about 2371 * the data. The only thing to do is attempt to return 2372 * the delegation. 2373 */ 2374 pp->flags = 0; 2375 pp->truncate = FALSE; 2376 2377 /* 2378 * Fire up a thread to do the delegreturn; this is 2379 * necessary because we could be inside a GETPAGE or 2380 * PUTPAGE and we cannot do another one. 2381 */ 2382 2383 (void) zthread_create(NULL, 0, nfs4delegreturn_thread, pp, 0, 2384 minclsyspri); 2385 } 2386 2387 static int 2388 wait_for_recall1(vnode_t *vp, nfs4_op_hint_t op, nfs4_recov_state_t *rsp, 2389 int flg) 2390 { 2391 rnode4_t *rp; 2392 int error = 0; 2393 2394 #ifdef lint 2395 op = op; 2396 #endif 2397 2398 if (vp && vp->v_type == VREG) { 2399 rp = VTOR4(vp); 2400 2401 /* 2402 * Take r_deleg_recall_lock in read mode to synchronize 2403 * with delegreturn. 2404 */ 2405 error = nfs_rw_enter_sig(&rp->r_deleg_recall_lock, 2406 RW_READER, INTR4(vp)); 2407 2408 if (error == 0) 2409 rsp->rs_flags |= flg; 2410 2411 } 2412 return (error); 2413 } 2414 2415 void 2416 nfs4_end_op_recall(vnode_t *vp1, vnode_t *vp2, nfs4_recov_state_t *rsp) 2417 { 2418 NFS4_DEBUG(nfs4_recall_debug, 2419 (CE_NOTE, "nfs4_end_op_recall: 0x%p, 0x%p\n", 2420 (void *)vp1, (void *)vp2)); 2421 2422 if (vp2 && rsp->rs_flags & NFS4_RS_RECALL_HELD2) 2423 nfs_rw_exit(&VTOR4(vp2)->r_deleg_recall_lock); 2424 if (vp1 && rsp->rs_flags & NFS4_RS_RECALL_HELD1) 2425 nfs_rw_exit(&VTOR4(vp1)->r_deleg_recall_lock); 2426 } 2427 2428 int 2429 wait_for_recall(vnode_t *vp1, vnode_t *vp2, nfs4_op_hint_t op, 2430 nfs4_recov_state_t *rsp) 2431 { 2432 int error; 2433 2434 NFS4_DEBUG(nfs4_recall_debug, 2435 (CE_NOTE, "wait_for_recall: 0x%p, 0x%p\n", 2436 (void *)vp1, (void *) vp2)); 2437 2438 rsp->rs_flags &= ~(NFS4_RS_RECALL_HELD1|NFS4_RS_RECALL_HELD2); 2439 2440 if ((error = wait_for_recall1(vp1, op, rsp, NFS4_RS_RECALL_HELD1)) != 0) 2441 return (error); 2442 2443 if ((error = wait_for_recall1(vp2, op, rsp, NFS4_RS_RECALL_HELD2)) 2444 != 0) { 2445 if (rsp->rs_flags & NFS4_RS_RECALL_HELD1) { 2446 nfs_rw_exit(&VTOR4(vp1)->r_deleg_recall_lock); 2447 rsp->rs_flags &= ~NFS4_RS_RECALL_HELD1; 2448 } 2449 2450 return (error); 2451 } 2452 2453 return (0); 2454 } 2455 2456 /* 2457 * nfs4_dlistadd - Add this rnode to a list of rnodes to be 2458 * DELEGRETURN'd at the end of recovery. 2459 */ 2460 2461 static void 2462 nfs4_dlistadd(rnode4_t *rp, struct nfs4_callback_globals *ncg, int flags) 2463 { 2464 struct nfs4_dnode *dp; 2465 2466 ASSERT(mutex_owned(&rp->r_statev4_lock)); 2467 /* 2468 * Mark the delegation as having a return pending. 2469 * This will prevent the use of the delegation stateID 2470 * by read, write, setattr and open. 2471 */ 2472 rp->r_deleg_return_pending = TRUE; 2473 dp = kmem_alloc(sizeof (*dp), KM_SLEEP); 2474 VN_HOLD(RTOV4(rp)); 2475 dp->rnodep = rp; 2476 dp->flags = flags; 2477 mutex_enter(&ncg->nfs4_dlist_lock); 2478 list_insert_head(&ncg->nfs4_dlist, dp); 2479 #ifdef DEBUG 2480 ncg->nfs4_dlistadd_c++; 2481 #endif 2482 mutex_exit(&ncg->nfs4_dlist_lock); 2483 } 2484 2485 /* 2486 * nfs4_dlistclean_impl - Do DELEGRETURN for each rnode on the list. 2487 * of files awaiting cleaning. If the override_flags are non-zero 2488 * then use them rather than the flags that were set when the rnode 2489 * was added to the dlist. 2490 */ 2491 static void 2492 nfs4_dlistclean_impl(struct nfs4_callback_globals *ncg, int override_flags) 2493 { 2494 rnode4_t *rp; 2495 struct nfs4_dnode *dp; 2496 int flags; 2497 2498 ASSERT(override_flags == 0 || override_flags == NFS4_DR_DISCARD); 2499 2500 mutex_enter(&ncg->nfs4_dlist_lock); 2501 while ((dp = list_head(&ncg->nfs4_dlist)) != NULL) { 2502 #ifdef DEBUG 2503 ncg->nfs4_dlistclean_c++; 2504 #endif 2505 list_remove(&ncg->nfs4_dlist, dp); 2506 mutex_exit(&ncg->nfs4_dlist_lock); 2507 rp = dp->rnodep; 2508 flags = (override_flags != 0) ? override_flags : dp->flags; 2509 kmem_free(dp, sizeof (*dp)); 2510 (void) nfs4delegreturn_impl(rp, flags, ncg); 2511 VN_RELE(RTOV4(rp)); 2512 mutex_enter(&ncg->nfs4_dlist_lock); 2513 } 2514 mutex_exit(&ncg->nfs4_dlist_lock); 2515 } 2516 2517 void 2518 nfs4_dlistclean(void) 2519 { 2520 struct nfs4_callback_globals *ncg; 2521 2522 ncg = zone_getspecific(nfs4_callback_zone_key, nfs_zone()); 2523 ASSERT(ncg != NULL); 2524 2525 nfs4_dlistclean_impl(ncg, 0); 2526 } 2527