1dfdcada3SDoug Rabson /*-
24d846d26SWarner Losh * SPDX-License-Identifier: BSD-2-Clause
3fe267a55SPedro F. Giffuni *
4dfdcada3SDoug Rabson * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
5dfdcada3SDoug Rabson * Authors: Doug Rabson <dfr@rabson.org>
6dfdcada3SDoug Rabson * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
7dfdcada3SDoug Rabson *
8dfdcada3SDoug Rabson * Redistribution and use in source and binary forms, with or without
9dfdcada3SDoug Rabson * modification, are permitted provided that the following conditions
10dfdcada3SDoug Rabson * are met:
11dfdcada3SDoug Rabson * 1. Redistributions of source code must retain the above copyright
12dfdcada3SDoug Rabson * notice, this list of conditions and the following disclaimer.
13dfdcada3SDoug Rabson * 2. Redistributions in binary form must reproduce the above copyright
14dfdcada3SDoug Rabson * notice, this list of conditions and the following disclaimer in the
15dfdcada3SDoug Rabson * documentation and/or other materials provided with the distribution.
16dfdcada3SDoug Rabson *
17dfdcada3SDoug Rabson * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18dfdcada3SDoug Rabson * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19dfdcada3SDoug Rabson * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20dfdcada3SDoug Rabson * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21dfdcada3SDoug Rabson * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22dfdcada3SDoug Rabson * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23dfdcada3SDoug Rabson * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24dfdcada3SDoug Rabson * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25dfdcada3SDoug Rabson * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26dfdcada3SDoug Rabson * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27dfdcada3SDoug Rabson * SUCH DAMAGE.
28dfdcada3SDoug Rabson */
29dfdcada3SDoug Rabson
30dfdcada3SDoug Rabson #include "opt_inet6.h"
31dfdcada3SDoug Rabson
32dfdcada3SDoug Rabson #include <sys/param.h>
33fbaa591fSZachary Loafman #include <sys/fail.h>
34dfdcada3SDoug Rabson #include <sys/fcntl.h>
35dfdcada3SDoug Rabson #include <sys/kernel.h>
36c675522fSDoug Rabson #include <sys/kthread.h>
37dfdcada3SDoug Rabson #include <sys/lockf.h>
38dfdcada3SDoug Rabson #include <sys/malloc.h>
39dfdcada3SDoug Rabson #include <sys/mount.h>
40dfdcada3SDoug Rabson #include <sys/priv.h>
41dfdcada3SDoug Rabson #include <sys/proc.h>
42dfdcada3SDoug Rabson #include <sys/socket.h>
43dfdcada3SDoug Rabson #include <sys/socketvar.h>
44dfdcada3SDoug Rabson #include <sys/syscall.h>
45dfdcada3SDoug Rabson #include <sys/sysctl.h>
46dfdcada3SDoug Rabson #include <sys/sysent.h>
471780110bSDoug Rabson #include <sys/syslog.h>
48dfdcada3SDoug Rabson #include <sys/sysproto.h>
49dfdcada3SDoug Rabson #include <sys/systm.h>
50dfdcada3SDoug Rabson #include <sys/taskqueue.h>
51dfdcada3SDoug Rabson #include <sys/unistd.h>
52dfdcada3SDoug Rabson #include <sys/vnode.h>
53dfdcada3SDoug Rabson
54c675522fSDoug Rabson #include <nfs/nfsproto.h>
55ca27c028SRick Macklem #include <nfs/nfs_lock.h>
56c675522fSDoug Rabson
57ee31b83aSDoug Rabson #include <nlm/nlm_prot.h>
58ee31b83aSDoug Rabson #include <nlm/sm_inter.h>
59ee31b83aSDoug Rabson #include <nlm/nlm.h>
60dfdcada3SDoug Rabson #include <rpc/rpc_com.h>
61dfdcada3SDoug Rabson #include <rpc/rpcb_prot.h>
62dfdcada3SDoug Rabson
63dfdcada3SDoug Rabson MALLOC_DEFINE(M_NLM, "NLM", "Network Lock Manager");
64dfdcada3SDoug Rabson
65dfdcada3SDoug Rabson /*
66dfdcada3SDoug Rabson * If a host is inactive (and holds no locks) for this amount of
67dfdcada3SDoug Rabson * seconds, we consider it idle and stop tracking it.
68dfdcada3SDoug Rabson */
69dfdcada3SDoug Rabson #define NLM_IDLE_TIMEOUT 30
70dfdcada3SDoug Rabson
71dfdcada3SDoug Rabson /*
72dfdcada3SDoug Rabson * We check the host list for idle every few seconds.
73dfdcada3SDoug Rabson */
74dfdcada3SDoug Rabson #define NLM_IDLE_PERIOD 5
75dfdcada3SDoug Rabson
76dfdcada3SDoug Rabson /*
77fbaa591fSZachary Loafman * We only look for GRANTED_RES messages for a little while.
78fbaa591fSZachary Loafman */
79fbaa591fSZachary Loafman #define NLM_EXPIRE_TIMEOUT 10
80fbaa591fSZachary Loafman
81fbaa591fSZachary Loafman /*
82dfdcada3SDoug Rabson * Support for sysctl vfs.nlm.sysid
83dfdcada3SDoug Rabson */
847029da5cSPawel Biernacki static SYSCTL_NODE(_vfs, OID_AUTO, nlm, CTLFLAG_RW | CTLFLAG_MPSAFE, NULL,
856472ac3dSEd Schouten "Network Lock Manager");
867029da5cSPawel Biernacki static SYSCTL_NODE(_vfs_nlm, OID_AUTO, sysid,
877029da5cSPawel Biernacki CTLFLAG_RW | CTLFLAG_MPSAFE, NULL,
887029da5cSPawel Biernacki "");
89dfdcada3SDoug Rabson
90dfdcada3SDoug Rabson /*
91dfdcada3SDoug Rabson * Syscall hooks
92dfdcada3SDoug Rabson */
93946c028eSBrooks Davis static struct syscall_helper_data nlm_syscalls[] = {
94946c028eSBrooks Davis SYSCALL_INIT_HELPER(nlm_syscall),
95946c028eSBrooks Davis SYSCALL_INIT_LAST
96ee31b83aSDoug Rabson };
97dfdcada3SDoug Rabson
98dfdcada3SDoug Rabson /*
99dfdcada3SDoug Rabson * Debug level passed in from userland. We also support a sysctl hook
100dfdcada3SDoug Rabson * so that it can be changed on a live system.
101dfdcada3SDoug Rabson */
102dfdcada3SDoug Rabson static int nlm_debug_level;
103dfdcada3SDoug Rabson SYSCTL_INT(_debug, OID_AUTO, nlm_debug, CTLFLAG_RW, &nlm_debug_level, 0, "");
104dfdcada3SDoug Rabson
1051780110bSDoug Rabson #define NLM_DEBUG(_level, args...) \
1061780110bSDoug Rabson do { \
1071780110bSDoug Rabson if (nlm_debug_level >= (_level)) \
1081780110bSDoug Rabson log(LOG_DEBUG, args); \
1091780110bSDoug Rabson } while(0)
1101780110bSDoug Rabson #define NLM_ERR(args...) \
1111780110bSDoug Rabson do { \
1121780110bSDoug Rabson log(LOG_ERR, args); \
1131780110bSDoug Rabson } while(0)
1141780110bSDoug Rabson
115dfdcada3SDoug Rabson /*
116dfdcada3SDoug Rabson * Grace period handling. The value of nlm_grace_threshold is the
117dfdcada3SDoug Rabson * value of time_uptime after which we are serving requests normally.
118dfdcada3SDoug Rabson */
119dfdcada3SDoug Rabson static time_t nlm_grace_threshold;
120dfdcada3SDoug Rabson
121dfdcada3SDoug Rabson /*
122dfdcada3SDoug Rabson * We check for idle hosts if time_uptime is greater than
123dfdcada3SDoug Rabson * nlm_next_idle_check,
124dfdcada3SDoug Rabson */
125dfdcada3SDoug Rabson static time_t nlm_next_idle_check;
126dfdcada3SDoug Rabson
127dfdcada3SDoug Rabson /*
1285ee5ec75SRick Macklem * A flag to indicate the server is already running.
1295ee5ec75SRick Macklem */
1305ee5ec75SRick Macklem static int nlm_is_running;
1315ee5ec75SRick Macklem
1325ee5ec75SRick Macklem /*
133dfdcada3SDoug Rabson * A socket to use for RPC - shared by all IPv4 RPC clients.
134dfdcada3SDoug Rabson */
135dfdcada3SDoug Rabson static struct socket *nlm_socket;
136dfdcada3SDoug Rabson
137dfdcada3SDoug Rabson #ifdef INET6
138dfdcada3SDoug Rabson
139dfdcada3SDoug Rabson /*
140dfdcada3SDoug Rabson * A socket to use for RPC - shared by all IPv6 RPC clients.
141dfdcada3SDoug Rabson */
142dfdcada3SDoug Rabson static struct socket *nlm_socket6;
143dfdcada3SDoug Rabson
144dfdcada3SDoug Rabson #endif
145dfdcada3SDoug Rabson
146dfdcada3SDoug Rabson /*
147dfdcada3SDoug Rabson * An RPC client handle that can be used to communicate with the local
148dfdcada3SDoug Rabson * NSM.
149dfdcada3SDoug Rabson */
150dfdcada3SDoug Rabson static CLIENT *nlm_nsm;
151dfdcada3SDoug Rabson
152dfdcada3SDoug Rabson /*
153c675522fSDoug Rabson * An AUTH handle for the server's creds.
154dfdcada3SDoug Rabson */
155c675522fSDoug Rabson static AUTH *nlm_auth;
156c675522fSDoug Rabson
157c675522fSDoug Rabson /*
158c675522fSDoug Rabson * A zero timeval for sending async RPC messages.
159c675522fSDoug Rabson */
160c675522fSDoug Rabson struct timeval nlm_zero_tv = { 0, 0 };
161c675522fSDoug Rabson
162c675522fSDoug Rabson /*
163c675522fSDoug Rabson * The local NSM state number
164c675522fSDoug Rabson */
165c675522fSDoug Rabson int nlm_nsm_state;
166c675522fSDoug Rabson
167c675522fSDoug Rabson /*
168c675522fSDoug Rabson * A lock to protect the host list and waiting lock list.
169c675522fSDoug Rabson */
170c675522fSDoug Rabson static struct mtx nlm_global_lock;
171dfdcada3SDoug Rabson
172dfdcada3SDoug Rabson /*
173dfdcada3SDoug Rabson * Locks:
174dfdcada3SDoug Rabson * (l) locked by nh_lock
175dfdcada3SDoug Rabson * (s) only accessed via server RPC which is single threaded
176c675522fSDoug Rabson * (g) locked by nlm_global_lock
177dfdcada3SDoug Rabson * (c) const until freeing
178c675522fSDoug Rabson * (a) modified using atomic ops
179dfdcada3SDoug Rabson */
180dfdcada3SDoug Rabson
181dfdcada3SDoug Rabson /*
182c675522fSDoug Rabson * A pending client-side lock request, stored on the nlm_waiting_locks
183c675522fSDoug Rabson * list.
184c675522fSDoug Rabson */
185c675522fSDoug Rabson struct nlm_waiting_lock {
186c675522fSDoug Rabson TAILQ_ENTRY(nlm_waiting_lock) nw_link; /* (g) */
187c675522fSDoug Rabson bool_t nw_waiting; /* (g) */
188c675522fSDoug Rabson nlm4_lock nw_lock; /* (c) */
189c675522fSDoug Rabson union nfsfh nw_fh; /* (c) */
190c675522fSDoug Rabson struct vnode *nw_vp; /* (c) */
191c675522fSDoug Rabson };
192c675522fSDoug Rabson TAILQ_HEAD(nlm_waiting_lock_list, nlm_waiting_lock);
193c675522fSDoug Rabson
194c675522fSDoug Rabson struct nlm_waiting_lock_list nlm_waiting_locks; /* (g) */
195c675522fSDoug Rabson
196c675522fSDoug Rabson /*
197c675522fSDoug Rabson * A pending server-side asynchronous lock request, stored on the
198c675522fSDoug Rabson * nh_pending list of the NLM host.
199dfdcada3SDoug Rabson */
200dfdcada3SDoug Rabson struct nlm_async_lock {
201dfdcada3SDoug Rabson TAILQ_ENTRY(nlm_async_lock) af_link; /* (l) host's list of locks */
202dfdcada3SDoug Rabson struct task af_task; /* (c) async callback details */
203dfdcada3SDoug Rabson void *af_cookie; /* (l) lock manager cancel token */
204dfdcada3SDoug Rabson struct vnode *af_vp; /* (l) vnode to lock */
205dfdcada3SDoug Rabson struct flock af_fl; /* (c) lock details */
206dfdcada3SDoug Rabson struct nlm_host *af_host; /* (c) host which is locking */
207c675522fSDoug Rabson CLIENT *af_rpc; /* (c) rpc client to send message */
208dfdcada3SDoug Rabson nlm4_testargs af_granted; /* (c) notification details */
209fbaa591fSZachary Loafman time_t af_expiretime; /* (c) notification time */
210dfdcada3SDoug Rabson };
211dfdcada3SDoug Rabson TAILQ_HEAD(nlm_async_lock_list, nlm_async_lock);
212dfdcada3SDoug Rabson
213dfdcada3SDoug Rabson /*
214dfdcada3SDoug Rabson * NLM host.
215dfdcada3SDoug Rabson */
2168d9278baSDoug Rabson enum nlm_host_state {
2178d9278baSDoug Rabson NLM_UNMONITORED,
2188d9278baSDoug Rabson NLM_MONITORED,
219c675522fSDoug Rabson NLM_MONITOR_FAILED,
220c675522fSDoug Rabson NLM_RECOVERING
2218d9278baSDoug Rabson };
222a9148abdSDoug Rabson
223a9148abdSDoug Rabson struct nlm_rpc {
224a9148abdSDoug Rabson CLIENT *nr_client; /* (l) RPC client handle */
225a9148abdSDoug Rabson time_t nr_create_time; /* (l) when client was created */
226a9148abdSDoug Rabson };
227a9148abdSDoug Rabson
228dfdcada3SDoug Rabson struct nlm_host {
229dfdcada3SDoug Rabson struct mtx nh_lock;
230c675522fSDoug Rabson volatile u_int nh_refs; /* (a) reference count */
231c675522fSDoug Rabson TAILQ_ENTRY(nlm_host) nh_link; /* (g) global list of hosts */
232c675522fSDoug Rabson char nh_caller_name[MAXNAMELEN]; /* (c) printable name of host */
233dfdcada3SDoug Rabson uint32_t nh_sysid; /* (c) our allocaed system ID */
234dfdcada3SDoug Rabson char nh_sysid_string[10]; /* (c) string rep. of sysid */
235dfdcada3SDoug Rabson struct sockaddr_storage nh_addr; /* (s) remote address of host */
236a9148abdSDoug Rabson struct nlm_rpc nh_srvrpc; /* (l) RPC for server replies */
237a9148abdSDoug Rabson struct nlm_rpc nh_clntrpc; /* (l) RPC for client requests */
238dfdcada3SDoug Rabson rpcvers_t nh_vers; /* (s) NLM version of host */
239dfdcada3SDoug Rabson int nh_state; /* (s) last seen NSM state of host */
240c675522fSDoug Rabson enum nlm_host_state nh_monstate; /* (l) local NSM monitoring state */
241dfdcada3SDoug Rabson time_t nh_idle_timeout; /* (s) Time at which host is idle */
242dfdcada3SDoug Rabson struct sysctl_ctx_list nh_sysctl; /* (c) vfs.nlm.sysid nodes */
243fbaa591fSZachary Loafman uint32_t nh_grantcookie; /* (l) grant cookie counter */
244dfdcada3SDoug Rabson struct nlm_async_lock_list nh_pending; /* (l) pending async locks */
245fbaa591fSZachary Loafman struct nlm_async_lock_list nh_granted; /* (l) granted locks */
246dfdcada3SDoug Rabson struct nlm_async_lock_list nh_finished; /* (l) finished async locks */
247dfdcada3SDoug Rabson };
248dfdcada3SDoug Rabson TAILQ_HEAD(nlm_host_list, nlm_host);
249dfdcada3SDoug Rabson
250c675522fSDoug Rabson static struct nlm_host_list nlm_hosts; /* (g) */
251c675522fSDoug Rabson static uint32_t nlm_next_sysid = 1; /* (g) */
252dfdcada3SDoug Rabson
253dfdcada3SDoug Rabson static void nlm_host_unmonitor(struct nlm_host *);
254dfdcada3SDoug Rabson
255fbaa591fSZachary Loafman struct nlm_grantcookie {
256fbaa591fSZachary Loafman uint32_t ng_sysid;
257fbaa591fSZachary Loafman uint32_t ng_cookie;
258fbaa591fSZachary Loafman };
259fbaa591fSZachary Loafman
260fbaa591fSZachary Loafman static inline uint32_t
ng_sysid(struct netobj * src)261fbaa591fSZachary Loafman ng_sysid(struct netobj *src)
262fbaa591fSZachary Loafman {
263fbaa591fSZachary Loafman
264fbaa591fSZachary Loafman return ((struct nlm_grantcookie *)src->n_bytes)->ng_sysid;
265fbaa591fSZachary Loafman }
266fbaa591fSZachary Loafman
267fbaa591fSZachary Loafman static inline uint32_t
ng_cookie(struct netobj * src)268fbaa591fSZachary Loafman ng_cookie(struct netobj *src)
269fbaa591fSZachary Loafman {
270fbaa591fSZachary Loafman
271fbaa591fSZachary Loafman return ((struct nlm_grantcookie *)src->n_bytes)->ng_cookie;
272fbaa591fSZachary Loafman }
273fbaa591fSZachary Loafman
274dfdcada3SDoug Rabson /**********************************************************************/
275dfdcada3SDoug Rabson
276dfdcada3SDoug Rabson /*
277dfdcada3SDoug Rabson * Initialise NLM globals.
278dfdcada3SDoug Rabson */
279946c028eSBrooks Davis static int
nlm_init(void)280946c028eSBrooks Davis nlm_init(void)
281dfdcada3SDoug Rabson {
282dfdcada3SDoug Rabson int error;
283dfdcada3SDoug Rabson
284c675522fSDoug Rabson mtx_init(&nlm_global_lock, "nlm_global_lock", NULL, MTX_DEF);
285c675522fSDoug Rabson TAILQ_INIT(&nlm_waiting_locks);
286dfdcada3SDoug Rabson TAILQ_INIT(&nlm_hosts);
287dfdcada3SDoug Rabson
288946c028eSBrooks Davis error = syscall_helper_register(nlm_syscalls, SY_THR_STATIC_KLD);
289946c028eSBrooks Davis if (error != 0)
2901780110bSDoug Rabson NLM_ERR("Can't register NLM syscall\n");
291946c028eSBrooks Davis return (error);
292dfdcada3SDoug Rabson }
293dfdcada3SDoug Rabson
294dfdcada3SDoug Rabson static void
nlm_uninit(void)295946c028eSBrooks Davis nlm_uninit(void)
296dfdcada3SDoug Rabson {
297dfdcada3SDoug Rabson
298946c028eSBrooks Davis syscall_helper_unregister(nlm_syscalls);
299dfdcada3SDoug Rabson }
300dfdcada3SDoug Rabson
301dfdcada3SDoug Rabson /*
302fbaa591fSZachary Loafman * Create a netobj from an arbitrary source.
303fbaa591fSZachary Loafman */
304fbaa591fSZachary Loafman void
nlm_make_netobj(struct netobj * dst,caddr_t src,size_t srcsize,struct malloc_type * type)305fbaa591fSZachary Loafman nlm_make_netobj(struct netobj *dst, caddr_t src, size_t srcsize,
306fbaa591fSZachary Loafman struct malloc_type *type)
307fbaa591fSZachary Loafman {
308fbaa591fSZachary Loafman
309fbaa591fSZachary Loafman dst->n_len = srcsize;
310fbaa591fSZachary Loafman dst->n_bytes = malloc(srcsize, type, M_WAITOK);
311fbaa591fSZachary Loafman memcpy(dst->n_bytes, src, srcsize);
312fbaa591fSZachary Loafman }
313fbaa591fSZachary Loafman
314fbaa591fSZachary Loafman /*
315dfdcada3SDoug Rabson * Copy a struct netobj.
316dfdcada3SDoug Rabson */
317dfdcada3SDoug Rabson void
nlm_copy_netobj(struct netobj * dst,struct netobj * src,struct malloc_type * type)318dfdcada3SDoug Rabson nlm_copy_netobj(struct netobj *dst, struct netobj *src,
319dfdcada3SDoug Rabson struct malloc_type *type)
320dfdcada3SDoug Rabson {
321dfdcada3SDoug Rabson
322fbaa591fSZachary Loafman nlm_make_netobj(dst, src->n_bytes, src->n_len, type);
323dfdcada3SDoug Rabson }
324dfdcada3SDoug Rabson
325dfdcada3SDoug Rabson /*
326dfdcada3SDoug Rabson * Create an RPC client handle for the given (address,prog,vers)
327dfdcada3SDoug Rabson * triple using UDP.
328dfdcada3SDoug Rabson */
329dfdcada3SDoug Rabson static CLIENT *
nlm_get_rpc(struct sockaddr * sa,rpcprog_t prog,rpcvers_t vers)330dfdcada3SDoug Rabson nlm_get_rpc(struct sockaddr *sa, rpcprog_t prog, rpcvers_t vers)
331dfdcada3SDoug Rabson {
332a9148abdSDoug Rabson char *wchan = "nlmrcv";
333dfdcada3SDoug Rabson struct sockaddr_storage ss;
334dfdcada3SDoug Rabson struct socket *so;
335dfdcada3SDoug Rabson CLIENT *rpcb;
336dfdcada3SDoug Rabson struct timeval timo;
337dfdcada3SDoug Rabson RPCB parms;
338dfdcada3SDoug Rabson char *uaddr;
33988abcb07SDoug Rabson enum clnt_stat stat = RPC_SUCCESS;
34088abcb07SDoug Rabson int rpcvers = RPCBVERS4;
34188abcb07SDoug Rabson bool_t do_tcp = FALSE;
342b4bf93f8SDoug Rabson bool_t tryagain = FALSE;
34371066861SDoug Rabson struct portmap mapping;
34488abcb07SDoug Rabson u_short port = 0;
345*14105aaeSTom Jones struct sockaddr_in *sin4;
346*14105aaeSTom Jones char namebuf[INET_ADDRSTRLEN];
347*14105aaeSTom Jones #ifdef INET6
348*14105aaeSTom Jones struct sockaddr_in6 *sin6;
349*14105aaeSTom Jones char namebuf6[INET6_ADDRSTRLEN];
350*14105aaeSTom Jones #endif
351dfdcada3SDoug Rabson
352dfdcada3SDoug Rabson /*
353dfdcada3SDoug Rabson * First we need to contact the remote RPCBIND service to find
354dfdcada3SDoug Rabson * the right port.
355dfdcada3SDoug Rabson */
356dfdcada3SDoug Rabson memcpy(&ss, sa, sa->sa_len);
357dfdcada3SDoug Rabson switch (ss.ss_family) {
358dfdcada3SDoug Rabson case AF_INET:
359dfdcada3SDoug Rabson ((struct sockaddr_in *)&ss)->sin_port = htons(111);
360dfdcada3SDoug Rabson so = nlm_socket;
361dfdcada3SDoug Rabson break;
362dfdcada3SDoug Rabson #ifdef INET6
363dfdcada3SDoug Rabson case AF_INET6:
364dfdcada3SDoug Rabson ((struct sockaddr_in6 *)&ss)->sin6_port = htons(111);
365dfdcada3SDoug Rabson so = nlm_socket6;
366dfdcada3SDoug Rabson break;
367dfdcada3SDoug Rabson #endif
368dfdcada3SDoug Rabson
369dfdcada3SDoug Rabson default:
370dfdcada3SDoug Rabson /*
371dfdcada3SDoug Rabson * Unsupported address family - fail.
372dfdcada3SDoug Rabson */
373dfdcada3SDoug Rabson return (NULL);
374dfdcada3SDoug Rabson }
375dfdcada3SDoug Rabson
376dfdcada3SDoug Rabson rpcb = clnt_dg_create(so, (struct sockaddr *)&ss,
37788abcb07SDoug Rabson RPCBPROG, rpcvers, 0, 0);
378dfdcada3SDoug Rabson if (!rpcb)
379dfdcada3SDoug Rabson return (NULL);
380dfdcada3SDoug Rabson
38188abcb07SDoug Rabson try_tcp:
382dfdcada3SDoug Rabson parms.r_prog = prog;
383dfdcada3SDoug Rabson parms.r_vers = vers;
38488abcb07SDoug Rabson if (do_tcp)
38588abcb07SDoug Rabson parms.r_netid = "tcp";
38688abcb07SDoug Rabson else
387dfdcada3SDoug Rabson parms.r_netid = "udp";
388dfdcada3SDoug Rabson parms.r_addr = "";
389dfdcada3SDoug Rabson parms.r_owner = "";
390dfdcada3SDoug Rabson
391dfdcada3SDoug Rabson /*
392dfdcada3SDoug Rabson * Use the default timeout.
393dfdcada3SDoug Rabson */
394dfdcada3SDoug Rabson timo.tv_sec = 25;
395dfdcada3SDoug Rabson timo.tv_usec = 0;
396dfdcada3SDoug Rabson again:
39788abcb07SDoug Rabson switch (rpcvers) {
39888abcb07SDoug Rabson case RPCBVERS4:
39988abcb07SDoug Rabson case RPCBVERS:
40088abcb07SDoug Rabson /*
40188abcb07SDoug Rabson * Try RPCBIND 4 then 3.
40288abcb07SDoug Rabson */
403dfdcada3SDoug Rabson uaddr = NULL;
404dfdcada3SDoug Rabson stat = CLNT_CALL(rpcb, (rpcprog_t) RPCBPROC_GETADDR,
405dfdcada3SDoug Rabson (xdrproc_t) xdr_rpcb, &parms,
406dfdcada3SDoug Rabson (xdrproc_t) xdr_wrapstring, &uaddr, timo);
407b4bf93f8SDoug Rabson if (stat == RPC_SUCCESS) {
408dfdcada3SDoug Rabson /*
40988abcb07SDoug Rabson * We have a reply from the remote RPCBIND - turn it
41088abcb07SDoug Rabson * into an appropriate address and make a new client
41188abcb07SDoug Rabson * that can talk to the remote NLM.
412dfdcada3SDoug Rabson *
413dfdcada3SDoug Rabson * XXX fixup IPv6 scope ID.
414dfdcada3SDoug Rabson */
415dfdcada3SDoug Rabson struct netbuf *a;
416dfdcada3SDoug Rabson a = __rpc_uaddr2taddr_af(ss.ss_family, uaddr);
41792c4ddb2SDoug Rabson if (!a) {
418b4bf93f8SDoug Rabson tryagain = TRUE;
419b4bf93f8SDoug Rabson } else {
420b4bf93f8SDoug Rabson tryagain = FALSE;
421dfdcada3SDoug Rabson memcpy(&ss, a->buf, a->len);
422dfdcada3SDoug Rabson free(a->buf, M_RPC);
423dfdcada3SDoug Rabson free(a, M_RPC);
424dfdcada3SDoug Rabson xdr_free((xdrproc_t) xdr_wrapstring, &uaddr);
42588abcb07SDoug Rabson }
426b4bf93f8SDoug Rabson }
427b4bf93f8SDoug Rabson if (tryagain || stat == RPC_PROGVERSMISMATCH) {
428b4bf93f8SDoug Rabson if (rpcvers == RPCBVERS4)
429b4bf93f8SDoug Rabson rpcvers = RPCBVERS;
430b4bf93f8SDoug Rabson else if (rpcvers == RPCBVERS)
431b4bf93f8SDoug Rabson rpcvers = PMAPVERS;
432b4bf93f8SDoug Rabson CLNT_CONTROL(rpcb, CLSET_VERS, &rpcvers);
433b4bf93f8SDoug Rabson goto again;
434b4bf93f8SDoug Rabson }
43588abcb07SDoug Rabson break;
43688abcb07SDoug Rabson case PMAPVERS:
437dfdcada3SDoug Rabson /*
438dfdcada3SDoug Rabson * Try portmap.
439dfdcada3SDoug Rabson */
440dfdcada3SDoug Rabson mapping.pm_prog = parms.r_prog;
441dfdcada3SDoug Rabson mapping.pm_vers = parms.r_vers;
44288abcb07SDoug Rabson mapping.pm_prot = do_tcp ? IPPROTO_TCP : IPPROTO_UDP;
443dfdcada3SDoug Rabson mapping.pm_port = 0;
444dfdcada3SDoug Rabson
445dfdcada3SDoug Rabson stat = CLNT_CALL(rpcb, (rpcprog_t) PMAPPROC_GETPORT,
44671066861SDoug Rabson (xdrproc_t) xdr_portmap, &mapping,
447dfdcada3SDoug Rabson (xdrproc_t) xdr_u_short, &port, timo);
448dfdcada3SDoug Rabson
449dfdcada3SDoug Rabson if (stat == RPC_SUCCESS) {
450dfdcada3SDoug Rabson switch (ss.ss_family) {
451dfdcada3SDoug Rabson case AF_INET:
452dfdcada3SDoug Rabson ((struct sockaddr_in *)&ss)->sin_port =
453dfdcada3SDoug Rabson htons(port);
454dfdcada3SDoug Rabson break;
455dfdcada3SDoug Rabson
456dfdcada3SDoug Rabson #ifdef INET6
457dfdcada3SDoug Rabson case AF_INET6:
458dfdcada3SDoug Rabson ((struct sockaddr_in6 *)&ss)->sin6_port =
459dfdcada3SDoug Rabson htons(port);
460dfdcada3SDoug Rabson break;
461dfdcada3SDoug Rabson #endif
462dfdcada3SDoug Rabson }
463dfdcada3SDoug Rabson }
46488abcb07SDoug Rabson break;
46588abcb07SDoug Rabson default:
46688abcb07SDoug Rabson panic("invalid rpcvers %d", rpcvers);
467dfdcada3SDoug Rabson }
46888abcb07SDoug Rabson /*
46988abcb07SDoug Rabson * We may have a positive response from the portmapper, but the NLM
47088abcb07SDoug Rabson * service was not found. Make sure we received a valid port.
47188abcb07SDoug Rabson */
47288abcb07SDoug Rabson switch (ss.ss_family) {
47388abcb07SDoug Rabson case AF_INET:
47488abcb07SDoug Rabson port = ((struct sockaddr_in *)&ss)->sin_port;
47588abcb07SDoug Rabson break;
47688abcb07SDoug Rabson #ifdef INET6
47788abcb07SDoug Rabson case AF_INET6:
47888abcb07SDoug Rabson port = ((struct sockaddr_in6 *)&ss)->sin6_port;
47988abcb07SDoug Rabson break;
48088abcb07SDoug Rabson #endif
48188abcb07SDoug Rabson }
48288abcb07SDoug Rabson if (stat != RPC_SUCCESS || !port) {
48388abcb07SDoug Rabson /*
48488abcb07SDoug Rabson * If we were able to talk to rpcbind or portmap, but the udp
48588abcb07SDoug Rabson * variant wasn't available, ask about tcp.
48688abcb07SDoug Rabson *
48788abcb07SDoug Rabson * XXX - We could also check for a TCP portmapper, but
48888abcb07SDoug Rabson * if the host is running a portmapper at all, we should be able
48988abcb07SDoug Rabson * to hail it over UDP.
49088abcb07SDoug Rabson */
49188abcb07SDoug Rabson if (stat == RPC_SUCCESS && !do_tcp) {
49288abcb07SDoug Rabson do_tcp = TRUE;
49388abcb07SDoug Rabson goto try_tcp;
49488abcb07SDoug Rabson }
49588abcb07SDoug Rabson
49688abcb07SDoug Rabson /* Otherwise, bad news. */
497*14105aaeSTom Jones switch (ss.ss_family) {
498*14105aaeSTom Jones case AF_INET:
499*14105aaeSTom Jones sin4 = (struct sockaddr_in *)&ss;
500*14105aaeSTom Jones inet_ntop(ss.ss_family, &sin4->sin_addr,
501*14105aaeSTom Jones namebuf, sizeof namebuf);
5021780110bSDoug Rabson NLM_ERR("NLM: failed to contact remote rpcbind, "
503*14105aaeSTom Jones "stat = %d, host = %s, port = %d\n",
504*14105aaeSTom Jones (int) stat, namebuf, htons(port));
505*14105aaeSTom Jones break;
506*14105aaeSTom Jones #ifdef INET6
507*14105aaeSTom Jones case AF_INET6:
508*14105aaeSTom Jones sin6 = (struct sockaddr_in6 *)&ss;
509*14105aaeSTom Jones inet_ntop(ss.ss_family, &sin6->sin6_addr,
510*14105aaeSTom Jones namebuf6, sizeof namebuf6);
511*14105aaeSTom Jones NLM_ERR("NLM: failed to contact remote rpcbind, "
512*14105aaeSTom Jones "stat = %d, host = %s, port = %d\n",
513*14105aaeSTom Jones (int) stat, namebuf6, htons(port));
514*14105aaeSTom Jones break;
515*14105aaeSTom Jones #endif
516*14105aaeSTom Jones }
51792c4ddb2SDoug Rabson CLNT_DESTROY(rpcb);
518dfdcada3SDoug Rabson return (NULL);
519dfdcada3SDoug Rabson }
520dfdcada3SDoug Rabson
52188abcb07SDoug Rabson if (do_tcp) {
52288abcb07SDoug Rabson /*
52388abcb07SDoug Rabson * Destroy the UDP client we used to speak to rpcbind and
52488abcb07SDoug Rabson * recreate as a TCP client.
52588abcb07SDoug Rabson */
52688abcb07SDoug Rabson struct netconfig *nconf = NULL;
52788abcb07SDoug Rabson
52888abcb07SDoug Rabson CLNT_DESTROY(rpcb);
52988abcb07SDoug Rabson
53088abcb07SDoug Rabson switch (ss.ss_family) {
53188abcb07SDoug Rabson case AF_INET:
53288abcb07SDoug Rabson nconf = getnetconfigent("tcp");
53388abcb07SDoug Rabson break;
53488abcb07SDoug Rabson #ifdef INET6
53588abcb07SDoug Rabson case AF_INET6:
53688abcb07SDoug Rabson nconf = getnetconfigent("tcp6");
53788abcb07SDoug Rabson break;
53888abcb07SDoug Rabson #endif
53988abcb07SDoug Rabson }
54088abcb07SDoug Rabson
54188abcb07SDoug Rabson rpcb = clnt_reconnect_create(nconf, (struct sockaddr *)&ss,
54288abcb07SDoug Rabson prog, vers, 0, 0);
543a9148abdSDoug Rabson CLNT_CONTROL(rpcb, CLSET_WAITCHAN, wchan);
54488abcb07SDoug Rabson rpcb->cl_auth = nlm_auth;
54588abcb07SDoug Rabson
54688abcb07SDoug Rabson } else {
547dfdcada3SDoug Rabson /*
548dfdcada3SDoug Rabson * Re-use the client we used to speak to rpcbind.
549dfdcada3SDoug Rabson */
550dfdcada3SDoug Rabson CLNT_CONTROL(rpcb, CLSET_SVC_ADDR, &ss);
551dfdcada3SDoug Rabson CLNT_CONTROL(rpcb, CLSET_PROG, &prog);
552dfdcada3SDoug Rabson CLNT_CONTROL(rpcb, CLSET_VERS, &vers);
553a9148abdSDoug Rabson CLNT_CONTROL(rpcb, CLSET_WAITCHAN, wchan);
554c675522fSDoug Rabson rpcb->cl_auth = nlm_auth;
55588abcb07SDoug Rabson }
556dfdcada3SDoug Rabson
557dfdcada3SDoug Rabson return (rpcb);
558dfdcada3SDoug Rabson }
559dfdcada3SDoug Rabson
560dfdcada3SDoug Rabson /*
561dfdcada3SDoug Rabson * This async callback after when an async lock request has been
562dfdcada3SDoug Rabson * granted. We notify the host which initiated the request.
563dfdcada3SDoug Rabson */
564dfdcada3SDoug Rabson static void
nlm_lock_callback(void * arg,int pending)565dfdcada3SDoug Rabson nlm_lock_callback(void *arg, int pending)
566dfdcada3SDoug Rabson {
567dfdcada3SDoug Rabson struct nlm_async_lock *af = (struct nlm_async_lock *) arg;
568c675522fSDoug Rabson struct rpc_callextra ext;
569dfdcada3SDoug Rabson
570fbaa591fSZachary Loafman NLM_DEBUG(2, "NLM: async lock %p for %s (sysid %d) granted,"
571fbaa591fSZachary Loafman " cookie %d:%d\n", af, af->af_host->nh_caller_name,
572fbaa591fSZachary Loafman af->af_host->nh_sysid, ng_sysid(&af->af_granted.cookie),
573fbaa591fSZachary Loafman ng_cookie(&af->af_granted.cookie));
574dfdcada3SDoug Rabson
575dfdcada3SDoug Rabson /*
576dfdcada3SDoug Rabson * Send the results back to the host.
577dfdcada3SDoug Rabson *
578dfdcada3SDoug Rabson * Note: there is a possible race here with nlm_host_notify
57992c4ddb2SDoug Rabson * destroying the RPC client. To avoid problems, the first
580dfdcada3SDoug Rabson * thing nlm_host_notify does is to cancel pending async lock
581dfdcada3SDoug Rabson * requests.
582dfdcada3SDoug Rabson */
583c675522fSDoug Rabson memset(&ext, 0, sizeof(ext));
584c675522fSDoug Rabson ext.rc_auth = nlm_auth;
585dfdcada3SDoug Rabson if (af->af_host->nh_vers == NLM_VERS4) {
586dfdcada3SDoug Rabson nlm4_granted_msg_4(&af->af_granted,
587c675522fSDoug Rabson NULL, af->af_rpc, &ext, nlm_zero_tv);
588dfdcada3SDoug Rabson } else {
589dfdcada3SDoug Rabson /*
590dfdcada3SDoug Rabson * Back-convert to legacy protocol
591dfdcada3SDoug Rabson */
592dfdcada3SDoug Rabson nlm_testargs granted;
593dfdcada3SDoug Rabson granted.cookie = af->af_granted.cookie;
594dfdcada3SDoug Rabson granted.exclusive = af->af_granted.exclusive;
595dfdcada3SDoug Rabson granted.alock.caller_name =
596dfdcada3SDoug Rabson af->af_granted.alock.caller_name;
597dfdcada3SDoug Rabson granted.alock.fh = af->af_granted.alock.fh;
598dfdcada3SDoug Rabson granted.alock.oh = af->af_granted.alock.oh;
599dfdcada3SDoug Rabson granted.alock.svid = af->af_granted.alock.svid;
600dfdcada3SDoug Rabson granted.alock.l_offset =
601dfdcada3SDoug Rabson af->af_granted.alock.l_offset;
602dfdcada3SDoug Rabson granted.alock.l_len =
603dfdcada3SDoug Rabson af->af_granted.alock.l_len;
604dfdcada3SDoug Rabson
605dfdcada3SDoug Rabson nlm_granted_msg_1(&granted,
606c675522fSDoug Rabson NULL, af->af_rpc, &ext, nlm_zero_tv);
607dfdcada3SDoug Rabson }
608dfdcada3SDoug Rabson
609dfdcada3SDoug Rabson /*
610fbaa591fSZachary Loafman * Move this entry to the nh_granted list.
611dfdcada3SDoug Rabson */
612fbaa591fSZachary Loafman af->af_expiretime = time_uptime + NLM_EXPIRE_TIMEOUT;
613dfdcada3SDoug Rabson mtx_lock(&af->af_host->nh_lock);
614dfdcada3SDoug Rabson TAILQ_REMOVE(&af->af_host->nh_pending, af, af_link);
615fbaa591fSZachary Loafman TAILQ_INSERT_TAIL(&af->af_host->nh_granted, af, af_link);
616dfdcada3SDoug Rabson mtx_unlock(&af->af_host->nh_lock);
617dfdcada3SDoug Rabson }
618dfdcada3SDoug Rabson
619dfdcada3SDoug Rabson /*
620dfdcada3SDoug Rabson * Free an async lock request. The request must have been removed from
621dfdcada3SDoug Rabson * any list.
622dfdcada3SDoug Rabson */
623dfdcada3SDoug Rabson static void
nlm_free_async_lock(struct nlm_async_lock * af)624dfdcada3SDoug Rabson nlm_free_async_lock(struct nlm_async_lock *af)
625dfdcada3SDoug Rabson {
626dfdcada3SDoug Rabson /*
627dfdcada3SDoug Rabson * Free an async lock.
628dfdcada3SDoug Rabson */
629c675522fSDoug Rabson if (af->af_rpc)
630c675522fSDoug Rabson CLNT_RELEASE(af->af_rpc);
631dfdcada3SDoug Rabson xdr_free((xdrproc_t) xdr_nlm4_testargs, &af->af_granted);
632dfdcada3SDoug Rabson if (af->af_vp)
633dfdcada3SDoug Rabson vrele(af->af_vp);
634dfdcada3SDoug Rabson free(af, M_NLM);
635dfdcada3SDoug Rabson }
636dfdcada3SDoug Rabson
637dfdcada3SDoug Rabson /*
638dfdcada3SDoug Rabson * Cancel our async request - this must be called with
639dfdcada3SDoug Rabson * af->nh_host->nh_lock held. This is slightly complicated by a
640dfdcada3SDoug Rabson * potential race with our own callback. If we fail to cancel the
641dfdcada3SDoug Rabson * lock, it must already have been granted - we make sure our async
642dfdcada3SDoug Rabson * task has completed by calling taskqueue_drain in this case.
643dfdcada3SDoug Rabson */
644dfdcada3SDoug Rabson static int
nlm_cancel_async_lock(struct nlm_async_lock * af)645dfdcada3SDoug Rabson nlm_cancel_async_lock(struct nlm_async_lock *af)
646dfdcada3SDoug Rabson {
647dfdcada3SDoug Rabson struct nlm_host *host = af->af_host;
648dfdcada3SDoug Rabson int error;
649dfdcada3SDoug Rabson
650dfdcada3SDoug Rabson mtx_assert(&host->nh_lock, MA_OWNED);
651dfdcada3SDoug Rabson
652dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
653dfdcada3SDoug Rabson
654dfdcada3SDoug Rabson error = VOP_ADVLOCKASYNC(af->af_vp, NULL, F_CANCEL, &af->af_fl,
655dfdcada3SDoug Rabson F_REMOTE, NULL, &af->af_cookie);
656dfdcada3SDoug Rabson
657dfdcada3SDoug Rabson if (error) {
658dfdcada3SDoug Rabson /*
659dfdcada3SDoug Rabson * We failed to cancel - make sure our callback has
660dfdcada3SDoug Rabson * completed before we continue.
661dfdcada3SDoug Rabson */
662dfdcada3SDoug Rabson taskqueue_drain(taskqueue_thread, &af->af_task);
663dfdcada3SDoug Rabson }
664dfdcada3SDoug Rabson
665dfdcada3SDoug Rabson mtx_lock(&host->nh_lock);
666dfdcada3SDoug Rabson
667dfdcada3SDoug Rabson if (!error) {
6681780110bSDoug Rabson NLM_DEBUG(2, "NLM: async lock %p for %s (sysid %d) "
6691780110bSDoug Rabson "cancelled\n", af, host->nh_caller_name, host->nh_sysid);
670dfdcada3SDoug Rabson
671dfdcada3SDoug Rabson /*
672dfdcada3SDoug Rabson * Remove from the nh_pending list and free now that
673dfdcada3SDoug Rabson * we are safe from the callback.
674dfdcada3SDoug Rabson */
675dfdcada3SDoug Rabson TAILQ_REMOVE(&host->nh_pending, af, af_link);
676dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
677dfdcada3SDoug Rabson nlm_free_async_lock(af);
678dfdcada3SDoug Rabson mtx_lock(&host->nh_lock);
679dfdcada3SDoug Rabson }
680dfdcada3SDoug Rabson
681dfdcada3SDoug Rabson return (error);
682dfdcada3SDoug Rabson }
683dfdcada3SDoug Rabson
684dfdcada3SDoug Rabson static void
nlm_check_expired_locks(struct nlm_host * host)685fbaa591fSZachary Loafman nlm_check_expired_locks(struct nlm_host *host)
686dfdcada3SDoug Rabson {
687dfdcada3SDoug Rabson struct nlm_async_lock *af;
688fbaa591fSZachary Loafman time_t uptime = time_uptime;
689dfdcada3SDoug Rabson
690dfdcada3SDoug Rabson mtx_lock(&host->nh_lock);
691fbaa591fSZachary Loafman while ((af = TAILQ_FIRST(&host->nh_granted)) != NULL
692fbaa591fSZachary Loafman && uptime >= af->af_expiretime) {
693fbaa591fSZachary Loafman NLM_DEBUG(2, "NLM: async lock %p for %s (sysid %d) expired,"
694fbaa591fSZachary Loafman " cookie %d:%d\n", af, af->af_host->nh_caller_name,
695fbaa591fSZachary Loafman af->af_host->nh_sysid, ng_sysid(&af->af_granted.cookie),
696fbaa591fSZachary Loafman ng_cookie(&af->af_granted.cookie));
697fbaa591fSZachary Loafman TAILQ_REMOVE(&host->nh_granted, af, af_link);
698fbaa591fSZachary Loafman mtx_unlock(&host->nh_lock);
699fbaa591fSZachary Loafman nlm_free_async_lock(af);
700fbaa591fSZachary Loafman mtx_lock(&host->nh_lock);
701fbaa591fSZachary Loafman }
702dfdcada3SDoug Rabson while ((af = TAILQ_FIRST(&host->nh_finished)) != NULL) {
703dfdcada3SDoug Rabson TAILQ_REMOVE(&host->nh_finished, af, af_link);
704dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
705dfdcada3SDoug Rabson nlm_free_async_lock(af);
706dfdcada3SDoug Rabson mtx_lock(&host->nh_lock);
707dfdcada3SDoug Rabson }
708dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
709dfdcada3SDoug Rabson }
710dfdcada3SDoug Rabson
711dfdcada3SDoug Rabson /*
712c675522fSDoug Rabson * Free resources used by a host. This is called after the reference
713c675522fSDoug Rabson * count has reached zero so it doesn't need to worry about locks.
714dfdcada3SDoug Rabson */
715dfdcada3SDoug Rabson static void
nlm_host_destroy(struct nlm_host * host)716c675522fSDoug Rabson nlm_host_destroy(struct nlm_host *host)
717c675522fSDoug Rabson {
718c675522fSDoug Rabson
719c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
720c675522fSDoug Rabson TAILQ_REMOVE(&nlm_hosts, host, nh_link);
721c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
722c675522fSDoug Rabson
723a9148abdSDoug Rabson if (host->nh_srvrpc.nr_client)
724a9148abdSDoug Rabson CLNT_RELEASE(host->nh_srvrpc.nr_client);
725a9148abdSDoug Rabson if (host->nh_clntrpc.nr_client)
726a9148abdSDoug Rabson CLNT_RELEASE(host->nh_clntrpc.nr_client);
727c675522fSDoug Rabson mtx_destroy(&host->nh_lock);
728c675522fSDoug Rabson sysctl_ctx_free(&host->nh_sysctl);
729c675522fSDoug Rabson free(host, M_NLM);
730c675522fSDoug Rabson }
731c675522fSDoug Rabson
732c675522fSDoug Rabson /*
733c675522fSDoug Rabson * Thread start callback for client lock recovery
734c675522fSDoug Rabson */
735c675522fSDoug Rabson static void
nlm_client_recovery_start(void * arg)736c675522fSDoug Rabson nlm_client_recovery_start(void *arg)
737c675522fSDoug Rabson {
738c675522fSDoug Rabson struct nlm_host *host = (struct nlm_host *) arg;
739c675522fSDoug Rabson
7401780110bSDoug Rabson NLM_DEBUG(1, "NLM: client lock recovery for %s started\n",
741c675522fSDoug Rabson host->nh_caller_name);
742c675522fSDoug Rabson
743c675522fSDoug Rabson nlm_client_recovery(host);
744c675522fSDoug Rabson
7451780110bSDoug Rabson NLM_DEBUG(1, "NLM: client lock recovery for %s completed\n",
746c675522fSDoug Rabson host->nh_caller_name);
747c675522fSDoug Rabson
748c675522fSDoug Rabson host->nh_monstate = NLM_MONITORED;
749c675522fSDoug Rabson nlm_host_release(host);
750c675522fSDoug Rabson
751c675522fSDoug Rabson kthread_exit();
752c675522fSDoug Rabson }
753c675522fSDoug Rabson
754c675522fSDoug Rabson /*
755c675522fSDoug Rabson * This is called when we receive a host state change notification. We
756c675522fSDoug Rabson * unlock any active locks owned by the host. When rpc.lockd is
757c675522fSDoug Rabson * shutting down, this function is called with newstate set to zero
758c675522fSDoug Rabson * which allows us to cancel any pending async locks and clear the
759c675522fSDoug Rabson * locking state.
760c675522fSDoug Rabson */
761c675522fSDoug Rabson static void
nlm_host_notify(struct nlm_host * host,int newstate)762c675522fSDoug Rabson nlm_host_notify(struct nlm_host *host, int newstate)
763dfdcada3SDoug Rabson {
764dfdcada3SDoug Rabson struct nlm_async_lock *af;
765dfdcada3SDoug Rabson
766dfdcada3SDoug Rabson if (newstate) {
7671780110bSDoug Rabson NLM_DEBUG(1, "NLM: host %s (sysid %d) rebooted, new "
7681780110bSDoug Rabson "state is %d\n", host->nh_caller_name,
7691780110bSDoug Rabson host->nh_sysid, newstate);
770dfdcada3SDoug Rabson }
771dfdcada3SDoug Rabson
772dfdcada3SDoug Rabson /*
773dfdcada3SDoug Rabson * Cancel any pending async locks for this host.
774dfdcada3SDoug Rabson */
775dfdcada3SDoug Rabson mtx_lock(&host->nh_lock);
776dfdcada3SDoug Rabson while ((af = TAILQ_FIRST(&host->nh_pending)) != NULL) {
777dfdcada3SDoug Rabson /*
778dfdcada3SDoug Rabson * nlm_cancel_async_lock will remove the entry from
779dfdcada3SDoug Rabson * nh_pending and free it.
780dfdcada3SDoug Rabson */
781dfdcada3SDoug Rabson nlm_cancel_async_lock(af);
782dfdcada3SDoug Rabson }
783dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
784fbaa591fSZachary Loafman nlm_check_expired_locks(host);
785dfdcada3SDoug Rabson
786dfdcada3SDoug Rabson /*
787c675522fSDoug Rabson * The host just rebooted - trash its locks.
788dfdcada3SDoug Rabson */
789dfdcada3SDoug Rabson lf_clearremotesys(host->nh_sysid);
790dfdcada3SDoug Rabson host->nh_state = newstate;
791dfdcada3SDoug Rabson
792dfdcada3SDoug Rabson /*
793c675522fSDoug Rabson * If we have any remote locks for this host (i.e. it
794c675522fSDoug Rabson * represents a remote NFS server that our local NFS client
795c675522fSDoug Rabson * has locks for), start a recovery thread.
796dfdcada3SDoug Rabson */
797c675522fSDoug Rabson if (newstate != 0
798c675522fSDoug Rabson && host->nh_monstate != NLM_RECOVERING
799c675522fSDoug Rabson && lf_countlocks(NLM_SYSID_CLIENT | host->nh_sysid) > 0) {
800c675522fSDoug Rabson struct thread *td;
801c675522fSDoug Rabson host->nh_monstate = NLM_RECOVERING;
802c675522fSDoug Rabson refcount_acquire(&host->nh_refs);
803c675522fSDoug Rabson kthread_add(nlm_client_recovery_start, host, curproc, &td, 0, 0,
804c675522fSDoug Rabson "NFS lock recovery for %s", host->nh_caller_name);
805dfdcada3SDoug Rabson }
806dfdcada3SDoug Rabson }
807dfdcada3SDoug Rabson
808dfdcada3SDoug Rabson /*
809dfdcada3SDoug Rabson * Sysctl handler to count the number of locks for a sysid.
810dfdcada3SDoug Rabson */
811dfdcada3SDoug Rabson static int
nlm_host_lock_count_sysctl(SYSCTL_HANDLER_ARGS)812dfdcada3SDoug Rabson nlm_host_lock_count_sysctl(SYSCTL_HANDLER_ARGS)
813dfdcada3SDoug Rabson {
814dfdcada3SDoug Rabson struct nlm_host *host;
815dfdcada3SDoug Rabson int count;
816dfdcada3SDoug Rabson
817dfdcada3SDoug Rabson host = oidp->oid_arg1;
818dfdcada3SDoug Rabson count = lf_countlocks(host->nh_sysid);
819dfdcada3SDoug Rabson return sysctl_handle_int(oidp, &count, 0, req);
820dfdcada3SDoug Rabson }
821dfdcada3SDoug Rabson
822dfdcada3SDoug Rabson /*
823c675522fSDoug Rabson * Sysctl handler to count the number of client locks for a sysid.
824c675522fSDoug Rabson */
825c675522fSDoug Rabson static int
nlm_host_client_lock_count_sysctl(SYSCTL_HANDLER_ARGS)826c675522fSDoug Rabson nlm_host_client_lock_count_sysctl(SYSCTL_HANDLER_ARGS)
827c675522fSDoug Rabson {
828c675522fSDoug Rabson struct nlm_host *host;
829c675522fSDoug Rabson int count;
830c675522fSDoug Rabson
831c675522fSDoug Rabson host = oidp->oid_arg1;
832c675522fSDoug Rabson count = lf_countlocks(NLM_SYSID_CLIENT | host->nh_sysid);
833c675522fSDoug Rabson return sysctl_handle_int(oidp, &count, 0, req);
834c675522fSDoug Rabson }
835c675522fSDoug Rabson
836c675522fSDoug Rabson /*
837dfdcada3SDoug Rabson * Create a new NLM host.
838dfdcada3SDoug Rabson */
839dfdcada3SDoug Rabson static struct nlm_host *
nlm_create_host(const char * caller_name)840dfdcada3SDoug Rabson nlm_create_host(const char* caller_name)
841dfdcada3SDoug Rabson {
842dfdcada3SDoug Rabson struct nlm_host *host;
843dfdcada3SDoug Rabson struct sysctl_oid *oid;
844dfdcada3SDoug Rabson
845c675522fSDoug Rabson mtx_assert(&nlm_global_lock, MA_OWNED);
846c675522fSDoug Rabson
8471780110bSDoug Rabson NLM_DEBUG(1, "NLM: new host %s (sysid %d)\n",
848dfdcada3SDoug Rabson caller_name, nlm_next_sysid);
849c675522fSDoug Rabson host = malloc(sizeof(struct nlm_host), M_NLM, M_NOWAIT|M_ZERO);
850c675522fSDoug Rabson if (!host)
851c675522fSDoug Rabson return (NULL);
852dfdcada3SDoug Rabson mtx_init(&host->nh_lock, "nh_lock", NULL, MTX_DEF);
8533026214eSMateusz Guzik refcount_init(&host->nh_refs, 1);
854c675522fSDoug Rabson strlcpy(host->nh_caller_name, caller_name, MAXNAMELEN);
855dfdcada3SDoug Rabson host->nh_sysid = nlm_next_sysid++;
856dfdcada3SDoug Rabson snprintf(host->nh_sysid_string, sizeof(host->nh_sysid_string),
857dfdcada3SDoug Rabson "%d", host->nh_sysid);
858dfdcada3SDoug Rabson host->nh_vers = 0;
859dfdcada3SDoug Rabson host->nh_state = 0;
8608d9278baSDoug Rabson host->nh_monstate = NLM_UNMONITORED;
861fbaa591fSZachary Loafman host->nh_grantcookie = 1;
862dfdcada3SDoug Rabson TAILQ_INIT(&host->nh_pending);
863fbaa591fSZachary Loafman TAILQ_INIT(&host->nh_granted);
864dfdcada3SDoug Rabson TAILQ_INIT(&host->nh_finished);
865dfdcada3SDoug Rabson TAILQ_INSERT_TAIL(&nlm_hosts, host, nh_link);
866dfdcada3SDoug Rabson
867c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
868c675522fSDoug Rabson
869dfdcada3SDoug Rabson sysctl_ctx_init(&host->nh_sysctl);
870dfdcada3SDoug Rabson oid = SYSCTL_ADD_NODE(&host->nh_sysctl,
871dfdcada3SDoug Rabson SYSCTL_STATIC_CHILDREN(_vfs_nlm_sysid),
8727029da5cSPawel Biernacki OID_AUTO, host->nh_sysid_string, CTLFLAG_RD | CTLFLAG_MPSAFE,
8737029da5cSPawel Biernacki NULL, "");
874dfdcada3SDoug Rabson SYSCTL_ADD_STRING(&host->nh_sysctl, SYSCTL_CHILDREN(oid), OID_AUTO,
875dfdcada3SDoug Rabson "hostname", CTLFLAG_RD, host->nh_caller_name, 0, "");
876fbbb13f9SMatthew D Fleming SYSCTL_ADD_UINT(&host->nh_sysctl, SYSCTL_CHILDREN(oid), OID_AUTO,
877dfdcada3SDoug Rabson "version", CTLFLAG_RD, &host->nh_vers, 0, "");
878fbbb13f9SMatthew D Fleming SYSCTL_ADD_UINT(&host->nh_sysctl, SYSCTL_CHILDREN(oid), OID_AUTO,
8798d9278baSDoug Rabson "monitored", CTLFLAG_RD, &host->nh_monstate, 0, "");
880dfdcada3SDoug Rabson SYSCTL_ADD_PROC(&host->nh_sysctl, SYSCTL_CHILDREN(oid), OID_AUTO,
8817029da5cSPawel Biernacki "lock_count", CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_MPSAFE, host,
8827029da5cSPawel Biernacki 0, nlm_host_lock_count_sysctl, "I", "");
883c675522fSDoug Rabson SYSCTL_ADD_PROC(&host->nh_sysctl, SYSCTL_CHILDREN(oid), OID_AUTO,
8847029da5cSPawel Biernacki "client_lock_count", CTLTYPE_INT | CTLFLAG_RD | CTLFLAG_MPSAFE,
8857029da5cSPawel Biernacki host, 0, nlm_host_client_lock_count_sysctl, "I", "");
886c675522fSDoug Rabson
887c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
888dfdcada3SDoug Rabson
889dfdcada3SDoug Rabson return (host);
890dfdcada3SDoug Rabson }
891dfdcada3SDoug Rabson
892dfdcada3SDoug Rabson /*
893596c0880SRick Macklem * Acquire the next sysid for remote locks not handled by the NLM.
894596c0880SRick Macklem */
895596c0880SRick Macklem uint32_t
nlm_acquire_next_sysid(void)896596c0880SRick Macklem nlm_acquire_next_sysid(void)
897596c0880SRick Macklem {
898596c0880SRick Macklem uint32_t next_sysid;
899596c0880SRick Macklem
900596c0880SRick Macklem mtx_lock(&nlm_global_lock);
901596c0880SRick Macklem next_sysid = nlm_next_sysid++;
902596c0880SRick Macklem mtx_unlock(&nlm_global_lock);
903596c0880SRick Macklem return (next_sysid);
904596c0880SRick Macklem }
905596c0880SRick Macklem
906596c0880SRick Macklem /*
907dfdcada3SDoug Rabson * Return non-zero if the address parts of the two sockaddrs are the
908dfdcada3SDoug Rabson * same.
909dfdcada3SDoug Rabson */
910dfdcada3SDoug Rabson static int
nlm_compare_addr(const struct sockaddr * a,const struct sockaddr * b)911dfdcada3SDoug Rabson nlm_compare_addr(const struct sockaddr *a, const struct sockaddr *b)
912dfdcada3SDoug Rabson {
913dfdcada3SDoug Rabson const struct sockaddr_in *a4, *b4;
914dfdcada3SDoug Rabson #ifdef INET6
915dfdcada3SDoug Rabson const struct sockaddr_in6 *a6, *b6;
916dfdcada3SDoug Rabson #endif
917dfdcada3SDoug Rabson
918dfdcada3SDoug Rabson if (a->sa_family != b->sa_family)
919dfdcada3SDoug Rabson return (FALSE);
920dfdcada3SDoug Rabson
921dfdcada3SDoug Rabson switch (a->sa_family) {
922dfdcada3SDoug Rabson case AF_INET:
923dfdcada3SDoug Rabson a4 = (const struct sockaddr_in *) a;
924dfdcada3SDoug Rabson b4 = (const struct sockaddr_in *) b;
925dfdcada3SDoug Rabson return !memcmp(&a4->sin_addr, &b4->sin_addr,
926dfdcada3SDoug Rabson sizeof(a4->sin_addr));
927dfdcada3SDoug Rabson #ifdef INET6
928dfdcada3SDoug Rabson case AF_INET6:
929dfdcada3SDoug Rabson a6 = (const struct sockaddr_in6 *) a;
930dfdcada3SDoug Rabson b6 = (const struct sockaddr_in6 *) b;
931dfdcada3SDoug Rabson return !memcmp(&a6->sin6_addr, &b6->sin6_addr,
932dfdcada3SDoug Rabson sizeof(a6->sin6_addr));
933dfdcada3SDoug Rabson #endif
934dfdcada3SDoug Rabson }
935dfdcada3SDoug Rabson
936dfdcada3SDoug Rabson return (0);
937dfdcada3SDoug Rabson }
938dfdcada3SDoug Rabson
939dfdcada3SDoug Rabson /*
940dfdcada3SDoug Rabson * Check for idle hosts and stop monitoring them. We could also free
941dfdcada3SDoug Rabson * the host structure here, possibly after a larger timeout but that
942dfdcada3SDoug Rabson * would require some care to avoid races with
943dfdcada3SDoug Rabson * e.g. nlm_host_lock_count_sysctl.
944dfdcada3SDoug Rabson */
945dfdcada3SDoug Rabson static void
nlm_check_idle(void)946dfdcada3SDoug Rabson nlm_check_idle(void)
947dfdcada3SDoug Rabson {
948dfdcada3SDoug Rabson struct nlm_host *host;
949dfdcada3SDoug Rabson
950c675522fSDoug Rabson mtx_assert(&nlm_global_lock, MA_OWNED);
951c675522fSDoug Rabson
952dfdcada3SDoug Rabson if (time_uptime <= nlm_next_idle_check)
953dfdcada3SDoug Rabson return;
954dfdcada3SDoug Rabson
955dfdcada3SDoug Rabson nlm_next_idle_check = time_uptime + NLM_IDLE_PERIOD;
956dfdcada3SDoug Rabson
957dfdcada3SDoug Rabson TAILQ_FOREACH(host, &nlm_hosts, nh_link) {
9588d9278baSDoug Rabson if (host->nh_monstate == NLM_MONITORED
959dfdcada3SDoug Rabson && time_uptime > host->nh_idle_timeout) {
960c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
961c675522fSDoug Rabson if (lf_countlocks(host->nh_sysid) > 0
962c675522fSDoug Rabson || lf_countlocks(NLM_SYSID_CLIENT
963c675522fSDoug Rabson + host->nh_sysid)) {
964dfdcada3SDoug Rabson host->nh_idle_timeout =
965dfdcada3SDoug Rabson time_uptime + NLM_IDLE_TIMEOUT;
966c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
967dfdcada3SDoug Rabson continue;
968dfdcada3SDoug Rabson }
969dfdcada3SDoug Rabson nlm_host_unmonitor(host);
970c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
971dfdcada3SDoug Rabson }
972dfdcada3SDoug Rabson }
973dfdcada3SDoug Rabson }
974dfdcada3SDoug Rabson
975dfdcada3SDoug Rabson /*
976dfdcada3SDoug Rabson * Search for an existing NLM host that matches the given name
977dfdcada3SDoug Rabson * (typically the caller_name element of an nlm4_lock). If none is
978c675522fSDoug Rabson * found, create a new host. If 'addr' is non-NULL, record the remote
979dfdcada3SDoug Rabson * address of the host so that we can call it back for async
980c675522fSDoug Rabson * responses. If 'vers' is greater than zero then record the NLM
981c675522fSDoug Rabson * program version to use to communicate with this client.
982dfdcada3SDoug Rabson */
983dfdcada3SDoug Rabson struct nlm_host *
nlm_find_host_by_name(const char * name,const struct sockaddr * addr,rpcvers_t vers)984c675522fSDoug Rabson nlm_find_host_by_name(const char *name, const struct sockaddr *addr,
985c675522fSDoug Rabson rpcvers_t vers)
986dfdcada3SDoug Rabson {
987dfdcada3SDoug Rabson struct nlm_host *host;
988dfdcada3SDoug Rabson
989c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
990dfdcada3SDoug Rabson
991dfdcada3SDoug Rabson /*
992dfdcada3SDoug Rabson * The remote host is determined by caller_name.
993dfdcada3SDoug Rabson */
994dfdcada3SDoug Rabson TAILQ_FOREACH(host, &nlm_hosts, nh_link) {
995dfdcada3SDoug Rabson if (!strcmp(host->nh_caller_name, name))
996dfdcada3SDoug Rabson break;
997dfdcada3SDoug Rabson }
998dfdcada3SDoug Rabson
999c675522fSDoug Rabson if (!host) {
1000dfdcada3SDoug Rabson host = nlm_create_host(name);
1001c675522fSDoug Rabson if (!host) {
1002c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1003c675522fSDoug Rabson return (NULL);
1004c675522fSDoug Rabson }
1005c675522fSDoug Rabson }
1006c675522fSDoug Rabson refcount_acquire(&host->nh_refs);
1007c675522fSDoug Rabson
1008dfdcada3SDoug Rabson host->nh_idle_timeout = time_uptime + NLM_IDLE_TIMEOUT;
1009dfdcada3SDoug Rabson
1010dfdcada3SDoug Rabson /*
1011c675522fSDoug Rabson * If we have an address for the host, record it so that we
1012c675522fSDoug Rabson * can send async replies etc.
1013dfdcada3SDoug Rabson */
1014c675522fSDoug Rabson if (addr) {
1015dfdcada3SDoug Rabson
1016c675522fSDoug Rabson KASSERT(addr->sa_len < sizeof(struct sockaddr_storage),
1017dfdcada3SDoug Rabson ("Strange remote transport address length"));
1018dfdcada3SDoug Rabson
1019dfdcada3SDoug Rabson /*
1020dfdcada3SDoug Rabson * If we have seen an address before and we currently
1021dfdcada3SDoug Rabson * have an RPC client handle, make sure the address is
1022dfdcada3SDoug Rabson * the same, otherwise discard the client handle.
1023dfdcada3SDoug Rabson */
1024a9148abdSDoug Rabson if (host->nh_addr.ss_len && host->nh_srvrpc.nr_client) {
1025dfdcada3SDoug Rabson if (!nlm_compare_addr(
1026dfdcada3SDoug Rabson (struct sockaddr *) &host->nh_addr,
1027c675522fSDoug Rabson addr)
1028c675522fSDoug Rabson || host->nh_vers != vers) {
1029c675522fSDoug Rabson CLIENT *client;
1030c675522fSDoug Rabson mtx_lock(&host->nh_lock);
1031a9148abdSDoug Rabson client = host->nh_srvrpc.nr_client;
1032a9148abdSDoug Rabson host->nh_srvrpc.nr_client = NULL;
1033c675522fSDoug Rabson mtx_unlock(&host->nh_lock);
1034c675522fSDoug Rabson if (client) {
1035c675522fSDoug Rabson CLNT_RELEASE(client);
1036dfdcada3SDoug Rabson }
1037dfdcada3SDoug Rabson }
1038dfdcada3SDoug Rabson }
1039c675522fSDoug Rabson memcpy(&host->nh_addr, addr, addr->sa_len);
1040c675522fSDoug Rabson host->nh_vers = vers;
1041c675522fSDoug Rabson }
1042c675522fSDoug Rabson
1043c675522fSDoug Rabson nlm_check_idle();
1044c675522fSDoug Rabson
1045c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1046dfdcada3SDoug Rabson
1047dfdcada3SDoug Rabson return (host);
1048dfdcada3SDoug Rabson }
1049dfdcada3SDoug Rabson
1050dfdcada3SDoug Rabson /*
1051dfdcada3SDoug Rabson * Search for an existing NLM host that matches the given remote
1052dfdcada3SDoug Rabson * address. If none is found, create a new host with the requested
1053dfdcada3SDoug Rabson * address and remember 'vers' as the NLM protocol version to use for
1054dfdcada3SDoug Rabson * that host.
1055dfdcada3SDoug Rabson */
1056dfdcada3SDoug Rabson struct nlm_host *
nlm_find_host_by_addr(const struct sockaddr * addr,int vers)1057dfdcada3SDoug Rabson nlm_find_host_by_addr(const struct sockaddr *addr, int vers)
1058dfdcada3SDoug Rabson {
1059dfdcada3SDoug Rabson /*
1060dfdcada3SDoug Rabson * Fake up a name using inet_ntop. This buffer is
1061dfdcada3SDoug Rabson * large enough for an IPv6 address.
1062dfdcada3SDoug Rabson */
1063dfdcada3SDoug Rabson char tmp[sizeof "ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255"];
1064c675522fSDoug Rabson struct nlm_host *host;
1065c675522fSDoug Rabson
1066dfdcada3SDoug Rabson switch (addr->sa_family) {
1067dfdcada3SDoug Rabson case AF_INET:
1068109c1de8SAttilio Rao inet_ntop(AF_INET,
1069dfdcada3SDoug Rabson &((const struct sockaddr_in *) addr)->sin_addr,
1070dfdcada3SDoug Rabson tmp, sizeof tmp);
1071dfdcada3SDoug Rabson break;
1072dfdcada3SDoug Rabson #ifdef INET6
1073dfdcada3SDoug Rabson case AF_INET6:
1074109c1de8SAttilio Rao inet_ntop(AF_INET6,
1075dfdcada3SDoug Rabson &((const struct sockaddr_in6 *) addr)->sin6_addr,
1076dfdcada3SDoug Rabson tmp, sizeof tmp);
1077dfdcada3SDoug Rabson break;
1078dfdcada3SDoug Rabson #endif
1079dfdcada3SDoug Rabson default:
10800bd8e9dcSXin LI strlcpy(tmp, "<unknown>", sizeof(tmp));
1081dfdcada3SDoug Rabson }
1082c675522fSDoug Rabson
1083c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
1084c675522fSDoug Rabson
1085c675522fSDoug Rabson /*
1086c675522fSDoug Rabson * The remote host is determined by caller_name.
1087c675522fSDoug Rabson */
1088c675522fSDoug Rabson TAILQ_FOREACH(host, &nlm_hosts, nh_link) {
1089c675522fSDoug Rabson if (nlm_compare_addr(addr,
1090c675522fSDoug Rabson (const struct sockaddr *) &host->nh_addr))
1091c675522fSDoug Rabson break;
1092c675522fSDoug Rabson }
1093c675522fSDoug Rabson
1094c675522fSDoug Rabson if (!host) {
1095dfdcada3SDoug Rabson host = nlm_create_host(tmp);
1096c675522fSDoug Rabson if (!host) {
1097c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1098c675522fSDoug Rabson return (NULL);
1099c675522fSDoug Rabson }
1100dfdcada3SDoug Rabson memcpy(&host->nh_addr, addr, addr->sa_len);
1101dfdcada3SDoug Rabson host->nh_vers = vers;
1102dfdcada3SDoug Rabson }
1103c675522fSDoug Rabson refcount_acquire(&host->nh_refs);
1104c675522fSDoug Rabson
1105dfdcada3SDoug Rabson host->nh_idle_timeout = time_uptime + NLM_IDLE_TIMEOUT;
1106dfdcada3SDoug Rabson
1107c675522fSDoug Rabson nlm_check_idle();
1108c675522fSDoug Rabson
1109c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1110c675522fSDoug Rabson
1111dfdcada3SDoug Rabson return (host);
1112dfdcada3SDoug Rabson }
1113dfdcada3SDoug Rabson
1114dfdcada3SDoug Rabson /*
1115dfdcada3SDoug Rabson * Find the NLM host that matches the value of 'sysid'. If none
1116dfdcada3SDoug Rabson * exists, return NULL.
1117dfdcada3SDoug Rabson */
1118dfdcada3SDoug Rabson static struct nlm_host *
nlm_find_host_by_sysid(int sysid)1119dfdcada3SDoug Rabson nlm_find_host_by_sysid(int sysid)
1120dfdcada3SDoug Rabson {
1121dfdcada3SDoug Rabson struct nlm_host *host;
1122dfdcada3SDoug Rabson
1123dfdcada3SDoug Rabson TAILQ_FOREACH(host, &nlm_hosts, nh_link) {
1124c675522fSDoug Rabson if (host->nh_sysid == sysid) {
1125c675522fSDoug Rabson refcount_acquire(&host->nh_refs);
1126dfdcada3SDoug Rabson return (host);
1127dfdcada3SDoug Rabson }
1128c675522fSDoug Rabson }
1129dfdcada3SDoug Rabson
1130dfdcada3SDoug Rabson return (NULL);
1131dfdcada3SDoug Rabson }
1132dfdcada3SDoug Rabson
nlm_host_release(struct nlm_host * host)1133c675522fSDoug Rabson void nlm_host_release(struct nlm_host *host)
1134c675522fSDoug Rabson {
1135c675522fSDoug Rabson if (refcount_release(&host->nh_refs)) {
1136c675522fSDoug Rabson /*
1137c675522fSDoug Rabson * Free the host
1138c675522fSDoug Rabson */
1139c675522fSDoug Rabson nlm_host_destroy(host);
1140c675522fSDoug Rabson }
1141c675522fSDoug Rabson }
1142c675522fSDoug Rabson
1143dfdcada3SDoug Rabson /*
1144dfdcada3SDoug Rabson * Unregister this NLM host with the local NSM due to idleness.
1145dfdcada3SDoug Rabson */
1146dfdcada3SDoug Rabson static void
nlm_host_unmonitor(struct nlm_host * host)1147dfdcada3SDoug Rabson nlm_host_unmonitor(struct nlm_host *host)
1148dfdcada3SDoug Rabson {
1149dfdcada3SDoug Rabson mon_id smmonid;
1150dfdcada3SDoug Rabson sm_stat_res smstat;
1151dfdcada3SDoug Rabson struct timeval timo;
1152dfdcada3SDoug Rabson enum clnt_stat stat;
1153dfdcada3SDoug Rabson
11541780110bSDoug Rabson NLM_DEBUG(1, "NLM: unmonitoring %s (sysid %d)\n",
1155dfdcada3SDoug Rabson host->nh_caller_name, host->nh_sysid);
1156dfdcada3SDoug Rabson
1157dfdcada3SDoug Rabson /*
1158dfdcada3SDoug Rabson * We put our assigned system ID value in the priv field to
1159dfdcada3SDoug Rabson * make it simpler to find the host if we are notified of a
1160dfdcada3SDoug Rabson * host restart.
1161dfdcada3SDoug Rabson */
1162dfdcada3SDoug Rabson smmonid.mon_name = host->nh_caller_name;
1163dfdcada3SDoug Rabson smmonid.my_id.my_name = "localhost";
1164dfdcada3SDoug Rabson smmonid.my_id.my_prog = NLM_PROG;
1165dfdcada3SDoug Rabson smmonid.my_id.my_vers = NLM_SM;
1166dfdcada3SDoug Rabson smmonid.my_id.my_proc = NLM_SM_NOTIFY;
1167dfdcada3SDoug Rabson
1168dfdcada3SDoug Rabson timo.tv_sec = 25;
1169dfdcada3SDoug Rabson timo.tv_usec = 0;
1170dfdcada3SDoug Rabson stat = CLNT_CALL(nlm_nsm, SM_UNMON,
1171dfdcada3SDoug Rabson (xdrproc_t) xdr_mon, &smmonid,
1172dfdcada3SDoug Rabson (xdrproc_t) xdr_sm_stat, &smstat, timo);
1173dfdcada3SDoug Rabson
1174dfdcada3SDoug Rabson if (stat != RPC_SUCCESS) {
11751780110bSDoug Rabson NLM_ERR("Failed to contact local NSM - rpc error %d\n", stat);
1176dfdcada3SDoug Rabson return;
1177dfdcada3SDoug Rabson }
1178dfdcada3SDoug Rabson if (smstat.res_stat == stat_fail) {
11791780110bSDoug Rabson NLM_ERR("Local NSM refuses to unmonitor %s\n",
1180dfdcada3SDoug Rabson host->nh_caller_name);
1181dfdcada3SDoug Rabson return;
1182dfdcada3SDoug Rabson }
1183dfdcada3SDoug Rabson
11848d9278baSDoug Rabson host->nh_monstate = NLM_UNMONITORED;
1185dfdcada3SDoug Rabson }
1186dfdcada3SDoug Rabson
1187dfdcada3SDoug Rabson /*
1188dfdcada3SDoug Rabson * Register this NLM host with the local NSM so that we can be
1189dfdcada3SDoug Rabson * notified if it reboots.
1190dfdcada3SDoug Rabson */
1191c675522fSDoug Rabson void
nlm_host_monitor(struct nlm_host * host,int state)1192dfdcada3SDoug Rabson nlm_host_monitor(struct nlm_host *host, int state)
1193dfdcada3SDoug Rabson {
1194dfdcada3SDoug Rabson mon smmon;
1195dfdcada3SDoug Rabson sm_stat_res smstat;
1196dfdcada3SDoug Rabson struct timeval timo;
1197dfdcada3SDoug Rabson enum clnt_stat stat;
1198dfdcada3SDoug Rabson
1199dfdcada3SDoug Rabson if (state && !host->nh_state) {
1200dfdcada3SDoug Rabson /*
1201dfdcada3SDoug Rabson * This is the first time we have seen an NSM state
1202dfdcada3SDoug Rabson * value for this host. We record it here to help
1203dfdcada3SDoug Rabson * detect host reboots.
1204dfdcada3SDoug Rabson */
1205dfdcada3SDoug Rabson host->nh_state = state;
12061780110bSDoug Rabson NLM_DEBUG(1, "NLM: host %s (sysid %d) has NSM state %d\n",
1207dfdcada3SDoug Rabson host->nh_caller_name, host->nh_sysid, state);
1208dfdcada3SDoug Rabson }
1209dfdcada3SDoug Rabson
1210c675522fSDoug Rabson mtx_lock(&host->nh_lock);
1211c675522fSDoug Rabson if (host->nh_monstate != NLM_UNMONITORED) {
1212c675522fSDoug Rabson mtx_unlock(&host->nh_lock);
1213dfdcada3SDoug Rabson return;
1214c675522fSDoug Rabson }
1215c675522fSDoug Rabson host->nh_monstate = NLM_MONITORED;
1216c675522fSDoug Rabson mtx_unlock(&host->nh_lock);
1217dfdcada3SDoug Rabson
12181780110bSDoug Rabson NLM_DEBUG(1, "NLM: monitoring %s (sysid %d)\n",
1219dfdcada3SDoug Rabson host->nh_caller_name, host->nh_sysid);
1220dfdcada3SDoug Rabson
1221dfdcada3SDoug Rabson /*
1222dfdcada3SDoug Rabson * We put our assigned system ID value in the priv field to
1223dfdcada3SDoug Rabson * make it simpler to find the host if we are notified of a
1224dfdcada3SDoug Rabson * host restart.
1225dfdcada3SDoug Rabson */
1226dfdcada3SDoug Rabson smmon.mon_id.mon_name = host->nh_caller_name;
1227dfdcada3SDoug Rabson smmon.mon_id.my_id.my_name = "localhost";
1228dfdcada3SDoug Rabson smmon.mon_id.my_id.my_prog = NLM_PROG;
1229dfdcada3SDoug Rabson smmon.mon_id.my_id.my_vers = NLM_SM;
1230dfdcada3SDoug Rabson smmon.mon_id.my_id.my_proc = NLM_SM_NOTIFY;
1231dfdcada3SDoug Rabson memcpy(smmon.priv, &host->nh_sysid, sizeof(host->nh_sysid));
1232dfdcada3SDoug Rabson
1233dfdcada3SDoug Rabson timo.tv_sec = 25;
1234dfdcada3SDoug Rabson timo.tv_usec = 0;
1235dfdcada3SDoug Rabson stat = CLNT_CALL(nlm_nsm, SM_MON,
1236dfdcada3SDoug Rabson (xdrproc_t) xdr_mon, &smmon,
1237dfdcada3SDoug Rabson (xdrproc_t) xdr_sm_stat, &smstat, timo);
1238dfdcada3SDoug Rabson
1239dfdcada3SDoug Rabson if (stat != RPC_SUCCESS) {
12401780110bSDoug Rabson NLM_ERR("Failed to contact local NSM - rpc error %d\n", stat);
1241dfdcada3SDoug Rabson return;
1242dfdcada3SDoug Rabson }
1243dfdcada3SDoug Rabson if (smstat.res_stat == stat_fail) {
12441780110bSDoug Rabson NLM_ERR("Local NSM refuses to monitor %s\n",
1245dfdcada3SDoug Rabson host->nh_caller_name);
1246c675522fSDoug Rabson mtx_lock(&host->nh_lock);
12478d9278baSDoug Rabson host->nh_monstate = NLM_MONITOR_FAILED;
1248c675522fSDoug Rabson mtx_unlock(&host->nh_lock);
1249dfdcada3SDoug Rabson return;
1250dfdcada3SDoug Rabson }
1251dfdcada3SDoug Rabson
12528d9278baSDoug Rabson host->nh_monstate = NLM_MONITORED;
1253dfdcada3SDoug Rabson }
1254dfdcada3SDoug Rabson
1255dfdcada3SDoug Rabson /*
1256dfdcada3SDoug Rabson * Return an RPC client handle that can be used to talk to the NLM
1257dfdcada3SDoug Rabson * running on the given host.
1258dfdcada3SDoug Rabson */
1259dfdcada3SDoug Rabson CLIENT *
nlm_host_get_rpc(struct nlm_host * host,bool_t isserver)1260a9148abdSDoug Rabson nlm_host_get_rpc(struct nlm_host *host, bool_t isserver)
1261dfdcada3SDoug Rabson {
1262a9148abdSDoug Rabson struct nlm_rpc *rpc;
1263c675522fSDoug Rabson CLIENT *client;
1264c675522fSDoug Rabson
1265c675522fSDoug Rabson mtx_lock(&host->nh_lock);
1266dfdcada3SDoug Rabson
1267a9148abdSDoug Rabson if (isserver)
1268a9148abdSDoug Rabson rpc = &host->nh_srvrpc;
1269a9148abdSDoug Rabson else
1270a9148abdSDoug Rabson rpc = &host->nh_clntrpc;
1271a9148abdSDoug Rabson
127279fe3d02SDoug Rabson /*
127379fe3d02SDoug Rabson * We can't hold onto RPC handles for too long - the async
127479fe3d02SDoug Rabson * call/reply protocol used by some NLM clients makes it hard
127579fe3d02SDoug Rabson * to tell when they change port numbers (e.g. after a
127679fe3d02SDoug Rabson * reboot). Note that if a client reboots while it isn't
127779fe3d02SDoug Rabson * holding any locks, it won't bother to notify us. We
127879fe3d02SDoug Rabson * expire the RPC handles after two minutes.
127979fe3d02SDoug Rabson */
1280a9148abdSDoug Rabson if (rpc->nr_client && time_uptime > rpc->nr_create_time + 2*60) {
1281a9148abdSDoug Rabson client = rpc->nr_client;
1282a9148abdSDoug Rabson rpc->nr_client = NULL;
1283c675522fSDoug Rabson mtx_unlock(&host->nh_lock);
1284c675522fSDoug Rabson CLNT_RELEASE(client);
1285c675522fSDoug Rabson mtx_lock(&host->nh_lock);
128679fe3d02SDoug Rabson }
128779fe3d02SDoug Rabson
1288a9148abdSDoug Rabson if (!rpc->nr_client) {
1289c675522fSDoug Rabson mtx_unlock(&host->nh_lock);
1290c675522fSDoug Rabson client = nlm_get_rpc((struct sockaddr *)&host->nh_addr,
1291dfdcada3SDoug Rabson NLM_PROG, host->nh_vers);
1292c675522fSDoug Rabson mtx_lock(&host->nh_lock);
1293dfdcada3SDoug Rabson
1294c675522fSDoug Rabson if (client) {
1295a9148abdSDoug Rabson if (rpc->nr_client) {
1296c675522fSDoug Rabson mtx_unlock(&host->nh_lock);
1297c675522fSDoug Rabson CLNT_DESTROY(client);
1298c675522fSDoug Rabson mtx_lock(&host->nh_lock);
1299c675522fSDoug Rabson } else {
1300a9148abdSDoug Rabson rpc->nr_client = client;
1301a9148abdSDoug Rabson rpc->nr_create_time = time_uptime;
1302dfdcada3SDoug Rabson }
1303dfdcada3SDoug Rabson }
1304c675522fSDoug Rabson }
1305c675522fSDoug Rabson
1306a9148abdSDoug Rabson client = rpc->nr_client;
1307c675522fSDoug Rabson if (client)
1308c675522fSDoug Rabson CLNT_ACQUIRE(client);
1309c675522fSDoug Rabson mtx_unlock(&host->nh_lock);
1310c675522fSDoug Rabson
1311c675522fSDoug Rabson return (client);
1312c675522fSDoug Rabson
1313c675522fSDoug Rabson }
1314c675522fSDoug Rabson
nlm_host_get_sysid(struct nlm_host * host)1315c675522fSDoug Rabson int nlm_host_get_sysid(struct nlm_host *host)
1316c675522fSDoug Rabson {
1317c675522fSDoug Rabson
1318c675522fSDoug Rabson return (host->nh_sysid);
1319c675522fSDoug Rabson }
1320c675522fSDoug Rabson
1321c675522fSDoug Rabson int
nlm_host_get_state(struct nlm_host * host)1322c675522fSDoug Rabson nlm_host_get_state(struct nlm_host *host)
1323c675522fSDoug Rabson {
1324c675522fSDoug Rabson
1325c675522fSDoug Rabson return (host->nh_state);
1326c675522fSDoug Rabson }
1327c675522fSDoug Rabson
1328c675522fSDoug Rabson void *
nlm_register_wait_lock(struct nlm4_lock * lock,struct vnode * vp)1329c675522fSDoug Rabson nlm_register_wait_lock(struct nlm4_lock *lock, struct vnode *vp)
1330c675522fSDoug Rabson {
1331c675522fSDoug Rabson struct nlm_waiting_lock *nw;
1332c675522fSDoug Rabson
1333c675522fSDoug Rabson nw = malloc(sizeof(struct nlm_waiting_lock), M_NLM, M_WAITOK);
1334c675522fSDoug Rabson nw->nw_lock = *lock;
1335c675522fSDoug Rabson memcpy(&nw->nw_fh.fh_bytes, nw->nw_lock.fh.n_bytes,
1336c675522fSDoug Rabson nw->nw_lock.fh.n_len);
1337c675522fSDoug Rabson nw->nw_lock.fh.n_bytes = nw->nw_fh.fh_bytes;
1338c675522fSDoug Rabson nw->nw_waiting = TRUE;
1339c675522fSDoug Rabson nw->nw_vp = vp;
1340c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
1341c675522fSDoug Rabson TAILQ_INSERT_TAIL(&nlm_waiting_locks, nw, nw_link);
1342c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1343c675522fSDoug Rabson
1344c675522fSDoug Rabson return nw;
1345c675522fSDoug Rabson }
1346c675522fSDoug Rabson
1347c675522fSDoug Rabson void
nlm_deregister_wait_lock(void * handle)1348c675522fSDoug Rabson nlm_deregister_wait_lock(void *handle)
1349c675522fSDoug Rabson {
1350c675522fSDoug Rabson struct nlm_waiting_lock *nw = handle;
1351c675522fSDoug Rabson
1352c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
1353c675522fSDoug Rabson TAILQ_REMOVE(&nlm_waiting_locks, nw, nw_link);
1354c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1355c675522fSDoug Rabson
1356c675522fSDoug Rabson free(nw, M_NLM);
1357c675522fSDoug Rabson }
1358c675522fSDoug Rabson
1359c675522fSDoug Rabson int
nlm_wait_lock(void * handle,int timo)1360c675522fSDoug Rabson nlm_wait_lock(void *handle, int timo)
1361c675522fSDoug Rabson {
1362c675522fSDoug Rabson struct nlm_waiting_lock *nw = handle;
1363883a5a4aSKonstantin Belousov int error, stops_deferred;
1364c675522fSDoug Rabson
1365c675522fSDoug Rabson /*
1366c675522fSDoug Rabson * If the granted message arrived before we got here,
1367c675522fSDoug Rabson * nw->nw_waiting will be FALSE - in that case, don't sleep.
1368c675522fSDoug Rabson */
1369c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
1370c675522fSDoug Rabson error = 0;
1371883a5a4aSKonstantin Belousov if (nw->nw_waiting) {
1372883a5a4aSKonstantin Belousov stops_deferred = sigdeferstop(SIGDEFERSTOP_ERESTART);
1373c675522fSDoug Rabson error = msleep(nw, &nlm_global_lock, PCATCH, "nlmlock", timo);
1374883a5a4aSKonstantin Belousov sigallowstop(stops_deferred);
1375883a5a4aSKonstantin Belousov }
1376c675522fSDoug Rabson TAILQ_REMOVE(&nlm_waiting_locks, nw, nw_link);
1377c675522fSDoug Rabson if (error) {
1378c675522fSDoug Rabson /*
1379c675522fSDoug Rabson * The granted message may arrive after the
1380c675522fSDoug Rabson * interrupt/timeout but before we manage to lock the
1381c675522fSDoug Rabson * mutex. Detect this by examining nw_lock.
1382c675522fSDoug Rabson */
1383c675522fSDoug Rabson if (!nw->nw_waiting)
1384c675522fSDoug Rabson error = 0;
1385c675522fSDoug Rabson } else {
1386c675522fSDoug Rabson /*
1387c675522fSDoug Rabson * If nlm_cancel_wait is called, then error will be
1388c675522fSDoug Rabson * zero but nw_waiting will still be TRUE. We
1389c675522fSDoug Rabson * translate this into EINTR.
1390c675522fSDoug Rabson */
1391c675522fSDoug Rabson if (nw->nw_waiting)
1392c675522fSDoug Rabson error = EINTR;
1393c675522fSDoug Rabson }
1394c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1395c675522fSDoug Rabson
1396c675522fSDoug Rabson free(nw, M_NLM);
1397c675522fSDoug Rabson
1398c675522fSDoug Rabson return (error);
1399c675522fSDoug Rabson }
1400c675522fSDoug Rabson
1401c675522fSDoug Rabson void
nlm_cancel_wait(struct vnode * vp)1402c675522fSDoug Rabson nlm_cancel_wait(struct vnode *vp)
1403c675522fSDoug Rabson {
1404c675522fSDoug Rabson struct nlm_waiting_lock *nw;
1405c675522fSDoug Rabson
1406c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
1407c675522fSDoug Rabson TAILQ_FOREACH(nw, &nlm_waiting_locks, nw_link) {
1408c675522fSDoug Rabson if (nw->nw_vp == vp) {
1409c675522fSDoug Rabson wakeup(nw);
1410c675522fSDoug Rabson }
1411c675522fSDoug Rabson }
1412c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1413c675522fSDoug Rabson }
1414c675522fSDoug Rabson
1415dfdcada3SDoug Rabson /**********************************************************************/
1416dfdcada3SDoug Rabson
1417dfdcada3SDoug Rabson /*
1418dfdcada3SDoug Rabson * Syscall interface with userland.
1419dfdcada3SDoug Rabson */
1420dfdcada3SDoug Rabson
1421dfdcada3SDoug Rabson extern void nlm_prog_0(struct svc_req *rqstp, SVCXPRT *transp);
1422dfdcada3SDoug Rabson extern void nlm_prog_1(struct svc_req *rqstp, SVCXPRT *transp);
1423dfdcada3SDoug Rabson extern void nlm_prog_3(struct svc_req *rqstp, SVCXPRT *transp);
1424dfdcada3SDoug Rabson extern void nlm_prog_4(struct svc_req *rqstp, SVCXPRT *transp);
1425dfdcada3SDoug Rabson
1426dfdcada3SDoug Rabson static int
nlm_register_services(SVCPOOL * pool,int addr_count,char ** addrs)1427dfdcada3SDoug Rabson nlm_register_services(SVCPOOL *pool, int addr_count, char **addrs)
1428dfdcada3SDoug Rabson {
1429dfdcada3SDoug Rabson static rpcvers_t versions[] = {
1430dfdcada3SDoug Rabson NLM_SM, NLM_VERS, NLM_VERSX, NLM_VERS4
1431dfdcada3SDoug Rabson };
1432dfdcada3SDoug Rabson static void (*dispatchers[])(struct svc_req *, SVCXPRT *) = {
1433dfdcada3SDoug Rabson nlm_prog_0, nlm_prog_1, nlm_prog_3, nlm_prog_4
1434dfdcada3SDoug Rabson };
1435dfdcada3SDoug Rabson
1436dfdcada3SDoug Rabson SVCXPRT **xprts;
1437dfdcada3SDoug Rabson char netid[16];
1438dfdcada3SDoug Rabson char uaddr[128];
1439dfdcada3SDoug Rabson struct netconfig *nconf;
1440dfdcada3SDoug Rabson int i, j, error;
1441dfdcada3SDoug Rabson
1442dfdcada3SDoug Rabson if (!addr_count) {
14431780110bSDoug Rabson NLM_ERR("NLM: no service addresses given - can't start server");
1444dfdcada3SDoug Rabson return (EINVAL);
1445dfdcada3SDoug Rabson }
1446dfdcada3SDoug Rabson
14472f7a2b9dSSean Bruno if (addr_count < 0 || addr_count > 256 ) {
14482f7a2b9dSSean Bruno NLM_ERR("NLM: too many service addresses (%d) given, "
14492f7a2b9dSSean Bruno "max 256 - can't start server\n", addr_count);
14502f7a2b9dSSean Bruno return (EINVAL);
14512f7a2b9dSSean Bruno }
14522f7a2b9dSSean Bruno
14536b97c9f0SRick Macklem xprts = malloc(addr_count * sizeof(SVCXPRT *), M_NLM, M_WAITOK|M_ZERO);
14548dfea464SPedro F. Giffuni for (i = 0; i < nitems(versions); i++) {
1455dfdcada3SDoug Rabson for (j = 0; j < addr_count; j++) {
1456dfdcada3SDoug Rabson /*
1457dfdcada3SDoug Rabson * Create transports for the first version and
1458dfdcada3SDoug Rabson * then just register everything else to the
1459dfdcada3SDoug Rabson * same transports.
1460dfdcada3SDoug Rabson */
1461dfdcada3SDoug Rabson if (i == 0) {
1462dfdcada3SDoug Rabson char *up;
1463dfdcada3SDoug Rabson
1464dfdcada3SDoug Rabson error = copyin(&addrs[2*j], &up,
1465dfdcada3SDoug Rabson sizeof(char*));
1466dfdcada3SDoug Rabson if (error)
1467dfdcada3SDoug Rabson goto out;
1468dfdcada3SDoug Rabson error = copyinstr(up, netid, sizeof(netid),
1469dfdcada3SDoug Rabson NULL);
1470dfdcada3SDoug Rabson if (error)
1471dfdcada3SDoug Rabson goto out;
1472dfdcada3SDoug Rabson error = copyin(&addrs[2*j+1], &up,
1473dfdcada3SDoug Rabson sizeof(char*));
1474dfdcada3SDoug Rabson if (error)
1475dfdcada3SDoug Rabson goto out;
1476dfdcada3SDoug Rabson error = copyinstr(up, uaddr, sizeof(uaddr),
1477dfdcada3SDoug Rabson NULL);
1478dfdcada3SDoug Rabson if (error)
1479dfdcada3SDoug Rabson goto out;
1480dfdcada3SDoug Rabson nconf = getnetconfigent(netid);
1481dfdcada3SDoug Rabson if (!nconf) {
14821780110bSDoug Rabson NLM_ERR("Can't lookup netid %s\n",
1483dfdcada3SDoug Rabson netid);
1484dfdcada3SDoug Rabson error = EINVAL;
1485dfdcada3SDoug Rabson goto out;
1486dfdcada3SDoug Rabson }
1487dfdcada3SDoug Rabson xprts[j] = svc_tp_create(pool, dispatchers[i],
1488dfdcada3SDoug Rabson NLM_PROG, versions[i], uaddr, nconf);
1489dfdcada3SDoug Rabson if (!xprts[j]) {
14901780110bSDoug Rabson NLM_ERR("NLM: unable to create "
1491dfdcada3SDoug Rabson "(NLM_PROG, %d).\n", versions[i]);
1492dfdcada3SDoug Rabson error = EINVAL;
1493dfdcada3SDoug Rabson goto out;
1494dfdcada3SDoug Rabson }
1495dfdcada3SDoug Rabson freenetconfigent(nconf);
1496dfdcada3SDoug Rabson } else {
1497dfdcada3SDoug Rabson nconf = getnetconfigent(xprts[j]->xp_netid);
1498dfdcada3SDoug Rabson rpcb_unset(NLM_PROG, versions[i], nconf);
1499dfdcada3SDoug Rabson if (!svc_reg(xprts[j], NLM_PROG, versions[i],
1500dfdcada3SDoug Rabson dispatchers[i], nconf)) {
15011780110bSDoug Rabson NLM_ERR("NLM: can't register "
1502dfdcada3SDoug Rabson "(NLM_PROG, %d)\n", versions[i]);
1503dfdcada3SDoug Rabson error = EINVAL;
1504dfdcada3SDoug Rabson goto out;
1505dfdcada3SDoug Rabson }
1506dfdcada3SDoug Rabson }
1507dfdcada3SDoug Rabson }
1508dfdcada3SDoug Rabson }
1509dfdcada3SDoug Rabson error = 0;
1510dfdcada3SDoug Rabson out:
15116b97c9f0SRick Macklem for (j = 0; j < addr_count; j++) {
15126b97c9f0SRick Macklem if (xprts[j])
15136b97c9f0SRick Macklem SVC_RELEASE(xprts[j]);
15146b97c9f0SRick Macklem }
1515dfdcada3SDoug Rabson free(xprts, M_NLM);
1516dfdcada3SDoug Rabson return (error);
1517dfdcada3SDoug Rabson }
1518dfdcada3SDoug Rabson
1519dfdcada3SDoug Rabson /*
1520dfdcada3SDoug Rabson * Main server entry point. Contacts the local NSM to get its current
1521dfdcada3SDoug Rabson * state and send SM_UNMON_ALL. Registers the NLM services and then
1522dfdcada3SDoug Rabson * services requests. Does not return until the server is interrupted
1523dfdcada3SDoug Rabson * by a signal.
1524dfdcada3SDoug Rabson */
1525dfdcada3SDoug Rabson static int
nlm_server_main(int addr_count,char ** addrs)1526dfdcada3SDoug Rabson nlm_server_main(int addr_count, char **addrs)
1527dfdcada3SDoug Rabson {
1528dfdcada3SDoug Rabson struct thread *td = curthread;
1529dfdcada3SDoug Rabson int error;
15305b0981f0SDoug Rabson SVCPOOL *pool = NULL;
1531dfdcada3SDoug Rabson struct sockopt opt;
1532dfdcada3SDoug Rabson int portlow;
1533dfdcada3SDoug Rabson #ifdef INET6
1534dfdcada3SDoug Rabson struct sockaddr_in6 sin6;
1535dfdcada3SDoug Rabson #endif
1536dfdcada3SDoug Rabson struct sockaddr_in sin;
1537dfdcada3SDoug Rabson my_id id;
1538dfdcada3SDoug Rabson sm_stat smstat;
1539dfdcada3SDoug Rabson struct timeval timo;
1540dfdcada3SDoug Rabson enum clnt_stat stat;
1541c675522fSDoug Rabson struct nlm_host *host, *nhost;
1542c675522fSDoug Rabson struct nlm_waiting_lock *nw;
1543c675522fSDoug Rabson vop_advlock_t *old_nfs_advlock;
1544c675522fSDoug Rabson vop_reclaim_t *old_nfs_reclaim;
1545dfdcada3SDoug Rabson
15465ee5ec75SRick Macklem if (nlm_is_running != 0) {
15471780110bSDoug Rabson NLM_ERR("NLM: can't start server - "
15481780110bSDoug Rabson "it appears to be running already\n");
1549dfdcada3SDoug Rabson return (EPERM);
1550dfdcada3SDoug Rabson }
1551dfdcada3SDoug Rabson
15525ee5ec75SRick Macklem if (nlm_socket == NULL) {
1553dfdcada3SDoug Rabson memset(&opt, 0, sizeof(opt));
1554dfdcada3SDoug Rabson
1555dfdcada3SDoug Rabson error = socreate(AF_INET, &nlm_socket, SOCK_DGRAM, 0,
1556dfdcada3SDoug Rabson td->td_ucred, td);
1557dfdcada3SDoug Rabson if (error) {
15585ee5ec75SRick Macklem NLM_ERR("NLM: can't create IPv4 socket - error %d\n",
15595ee5ec75SRick Macklem error);
1560dfdcada3SDoug Rabson return (error);
1561dfdcada3SDoug Rabson }
1562dfdcada3SDoug Rabson opt.sopt_dir = SOPT_SET;
1563dfdcada3SDoug Rabson opt.sopt_level = IPPROTO_IP;
1564dfdcada3SDoug Rabson opt.sopt_name = IP_PORTRANGE;
1565dfdcada3SDoug Rabson portlow = IP_PORTRANGE_LOW;
1566dfdcada3SDoug Rabson opt.sopt_val = &portlow;
1567dfdcada3SDoug Rabson opt.sopt_valsize = sizeof(portlow);
1568dfdcada3SDoug Rabson sosetopt(nlm_socket, &opt);
1569dfdcada3SDoug Rabson
1570dfdcada3SDoug Rabson #ifdef INET6
1571dfdcada3SDoug Rabson nlm_socket6 = NULL;
1572dfdcada3SDoug Rabson error = socreate(AF_INET6, &nlm_socket6, SOCK_DGRAM, 0,
1573dfdcada3SDoug Rabson td->td_ucred, td);
1574dfdcada3SDoug Rabson if (error) {
15755ee5ec75SRick Macklem NLM_ERR("NLM: can't create IPv6 socket - error %d\n",
15765ee5ec75SRick Macklem error);
15775ee5ec75SRick Macklem soclose(nlm_socket);
15785ee5ec75SRick Macklem nlm_socket = NULL;
1579dfdcada3SDoug Rabson return (error);
1580dfdcada3SDoug Rabson }
1581dfdcada3SDoug Rabson opt.sopt_dir = SOPT_SET;
1582dfdcada3SDoug Rabson opt.sopt_level = IPPROTO_IPV6;
1583dfdcada3SDoug Rabson opt.sopt_name = IPV6_PORTRANGE;
1584dfdcada3SDoug Rabson portlow = IPV6_PORTRANGE_LOW;
1585dfdcada3SDoug Rabson opt.sopt_val = &portlow;
1586dfdcada3SDoug Rabson opt.sopt_valsize = sizeof(portlow);
1587dfdcada3SDoug Rabson sosetopt(nlm_socket6, &opt);
1588dfdcada3SDoug Rabson #endif
15895ee5ec75SRick Macklem }
1590dfdcada3SDoug Rabson
1591c675522fSDoug Rabson nlm_auth = authunix_create(curthread->td_ucred);
1592c675522fSDoug Rabson
1593dfdcada3SDoug Rabson #ifdef INET6
1594dfdcada3SDoug Rabson memset(&sin6, 0, sizeof(sin6));
1595dfdcada3SDoug Rabson sin6.sin6_len = sizeof(sin6);
1596dfdcada3SDoug Rabson sin6.sin6_family = AF_INET6;
1597dfdcada3SDoug Rabson sin6.sin6_addr = in6addr_loopback;
1598dfdcada3SDoug Rabson nlm_nsm = nlm_get_rpc((struct sockaddr *) &sin6, SM_PROG, SM_VERS);
1599dfdcada3SDoug Rabson if (!nlm_nsm) {
1600dfdcada3SDoug Rabson #endif
1601dfdcada3SDoug Rabson memset(&sin, 0, sizeof(sin));
1602dfdcada3SDoug Rabson sin.sin_len = sizeof(sin);
16035b0981f0SDoug Rabson sin.sin_family = AF_INET;
1604dfdcada3SDoug Rabson sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
1605dfdcada3SDoug Rabson nlm_nsm = nlm_get_rpc((struct sockaddr *) &sin, SM_PROG,
1606dfdcada3SDoug Rabson SM_VERS);
1607dfdcada3SDoug Rabson #ifdef INET6
1608dfdcada3SDoug Rabson }
1609dfdcada3SDoug Rabson #endif
1610dfdcada3SDoug Rabson
1611dfdcada3SDoug Rabson if (!nlm_nsm) {
16121780110bSDoug Rabson NLM_ERR("Can't start NLM - unable to contact NSM\n");
16135b0981f0SDoug Rabson error = EINVAL;
16145b0981f0SDoug Rabson goto out;
1615dfdcada3SDoug Rabson }
1616dfdcada3SDoug Rabson
1617a9148abdSDoug Rabson pool = svcpool_create("NLM", NULL);
1618dfdcada3SDoug Rabson
1619dfdcada3SDoug Rabson error = nlm_register_services(pool, addr_count, addrs);
1620dfdcada3SDoug Rabson if (error)
1621dfdcada3SDoug Rabson goto out;
1622dfdcada3SDoug Rabson
1623dfdcada3SDoug Rabson memset(&id, 0, sizeof(id));
1624dfdcada3SDoug Rabson id.my_name = "NFS NLM";
1625dfdcada3SDoug Rabson
1626dfdcada3SDoug Rabson timo.tv_sec = 25;
1627dfdcada3SDoug Rabson timo.tv_usec = 0;
1628dfdcada3SDoug Rabson stat = CLNT_CALL(nlm_nsm, SM_UNMON_ALL,
1629dfdcada3SDoug Rabson (xdrproc_t) xdr_my_id, &id,
1630dfdcada3SDoug Rabson (xdrproc_t) xdr_sm_stat, &smstat, timo);
1631dfdcada3SDoug Rabson
1632dfdcada3SDoug Rabson if (stat != RPC_SUCCESS) {
1633dfdcada3SDoug Rabson struct rpc_err err;
1634dfdcada3SDoug Rabson
1635dfdcada3SDoug Rabson CLNT_GETERR(nlm_nsm, &err);
16361780110bSDoug Rabson NLM_ERR("NLM: unexpected error contacting NSM, "
16371780110bSDoug Rabson "stat=%d, errno=%d\n", stat, err.re_errno);
1638dfdcada3SDoug Rabson error = EINVAL;
1639dfdcada3SDoug Rabson goto out;
1640dfdcada3SDoug Rabson }
16415ee5ec75SRick Macklem nlm_is_running = 1;
1642dfdcada3SDoug Rabson
16431780110bSDoug Rabson NLM_DEBUG(1, "NLM: local NSM state is %d\n", smstat.state);
1644c675522fSDoug Rabson nlm_nsm_state = smstat.state;
1645c675522fSDoug Rabson
1646c675522fSDoug Rabson old_nfs_advlock = nfs_advlock_p;
1647c675522fSDoug Rabson nfs_advlock_p = nlm_advlock;
1648c675522fSDoug Rabson old_nfs_reclaim = nfs_reclaim_p;
1649c675522fSDoug Rabson nfs_reclaim_p = nlm_reclaim;
1650dfdcada3SDoug Rabson
1651dfdcada3SDoug Rabson svc_run(pool);
1652dfdcada3SDoug Rabson error = 0;
1653dfdcada3SDoug Rabson
1654c675522fSDoug Rabson nfs_advlock_p = old_nfs_advlock;
1655c675522fSDoug Rabson nfs_reclaim_p = old_nfs_reclaim;
1656c675522fSDoug Rabson
1657dfdcada3SDoug Rabson out:
16585ee5ec75SRick Macklem nlm_is_running = 0;
1659dfdcada3SDoug Rabson if (pool)
1660dfdcada3SDoug Rabson svcpool_destroy(pool);
1661dfdcada3SDoug Rabson
1662dfdcada3SDoug Rabson /*
1663c675522fSDoug Rabson * We are finished communicating with the NSM.
1664dfdcada3SDoug Rabson */
1665dfdcada3SDoug Rabson if (nlm_nsm) {
1666c675522fSDoug Rabson CLNT_RELEASE(nlm_nsm);
1667dfdcada3SDoug Rabson nlm_nsm = NULL;
1668dfdcada3SDoug Rabson }
1669dfdcada3SDoug Rabson
1670c675522fSDoug Rabson /*
1671c675522fSDoug Rabson * Trash all the existing state so that if the server
1672c675522fSDoug Rabson * restarts, it gets a clean slate. This is complicated by the
1673c675522fSDoug Rabson * possibility that there may be other threads trying to make
1674c675522fSDoug Rabson * client locking requests.
1675c675522fSDoug Rabson *
1676c675522fSDoug Rabson * First we fake a client reboot notification which will
1677c675522fSDoug Rabson * cancel any pending async locks and purge remote lock state
1678c675522fSDoug Rabson * from the local lock manager. We release the reference from
1679c675522fSDoug Rabson * nlm_hosts to the host (which may remove it from the list
1680c675522fSDoug Rabson * and free it). After this phase, the only entries in the
1681c675522fSDoug Rabson * nlm_host list should be from other threads performing
16825ee5ec75SRick Macklem * client lock requests.
1683c675522fSDoug Rabson */
1684c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
1685c675522fSDoug Rabson TAILQ_FOREACH(nw, &nlm_waiting_locks, nw_link) {
1686c675522fSDoug Rabson wakeup(nw);
1687c675522fSDoug Rabson }
1688c675522fSDoug Rabson TAILQ_FOREACH_SAFE(host, &nlm_hosts, nh_link, nhost) {
1689c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1690c675522fSDoug Rabson nlm_host_notify(host, 0);
1691c675522fSDoug Rabson nlm_host_release(host);
1692c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
1693c675522fSDoug Rabson }
1694c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
1695c675522fSDoug Rabson
1696c675522fSDoug Rabson AUTH_DESTROY(nlm_auth);
1697c675522fSDoug Rabson
1698dfdcada3SDoug Rabson return (error);
1699dfdcada3SDoug Rabson }
1700dfdcada3SDoug Rabson
1701dfdcada3SDoug Rabson int
sys_nlm_syscall(struct thread * td,struct nlm_syscall_args * uap)17028451d0ddSKip Macy sys_nlm_syscall(struct thread *td, struct nlm_syscall_args *uap)
1703dfdcada3SDoug Rabson {
1704dfdcada3SDoug Rabson int error;
1705dfdcada3SDoug Rabson
1706dfdcada3SDoug Rabson error = priv_check(td, PRIV_NFS_LOCKD);
1707dfdcada3SDoug Rabson if (error)
1708dfdcada3SDoug Rabson return (error);
1709dfdcada3SDoug Rabson
1710dfdcada3SDoug Rabson nlm_debug_level = uap->debug_level;
1711dfdcada3SDoug Rabson nlm_grace_threshold = time_uptime + uap->grace_period;
1712dfdcada3SDoug Rabson nlm_next_idle_check = time_uptime + NLM_IDLE_PERIOD;
1713dfdcada3SDoug Rabson
1714dfdcada3SDoug Rabson return nlm_server_main(uap->addr_count, uap->addrs);
1715dfdcada3SDoug Rabson }
1716dfdcada3SDoug Rabson
1717dfdcada3SDoug Rabson /**********************************************************************/
1718dfdcada3SDoug Rabson
1719dfdcada3SDoug Rabson /*
1720dfdcada3SDoug Rabson * NLM implementation details, called from the RPC stubs.
1721dfdcada3SDoug Rabson */
1722dfdcada3SDoug Rabson
1723dfdcada3SDoug Rabson void
nlm_sm_notify(struct nlm_sm_status * argp)1724dfdcada3SDoug Rabson nlm_sm_notify(struct nlm_sm_status *argp)
1725dfdcada3SDoug Rabson {
1726dfdcada3SDoug Rabson uint32_t sysid;
1727dfdcada3SDoug Rabson struct nlm_host *host;
1728dfdcada3SDoug Rabson
17291780110bSDoug Rabson NLM_DEBUG(3, "nlm_sm_notify(): mon_name = %s\n", argp->mon_name);
1730dfdcada3SDoug Rabson memcpy(&sysid, &argp->priv, sizeof(sysid));
1731dfdcada3SDoug Rabson host = nlm_find_host_by_sysid(sysid);
1732c675522fSDoug Rabson if (host) {
1733c675522fSDoug Rabson nlm_host_notify(host, argp->state);
1734c675522fSDoug Rabson nlm_host_release(host);
1735c675522fSDoug Rabson }
1736dfdcada3SDoug Rabson }
1737dfdcada3SDoug Rabson
1738dfdcada3SDoug Rabson static void
nlm_convert_to_fhandle_t(fhandle_t * fhp,struct netobj * p)1739dfdcada3SDoug Rabson nlm_convert_to_fhandle_t(fhandle_t *fhp, struct netobj *p)
1740dfdcada3SDoug Rabson {
1741dfdcada3SDoug Rabson memcpy(fhp, p->n_bytes, sizeof(fhandle_t));
1742dfdcada3SDoug Rabson }
1743dfdcada3SDoug Rabson
1744dfdcada3SDoug Rabson struct vfs_state {
1745dfdcada3SDoug Rabson struct mount *vs_mp;
1746dfdcada3SDoug Rabson struct vnode *vs_vp;
17478d9278baSDoug Rabson int vs_vnlocked;
1748dfdcada3SDoug Rabson };
1749dfdcada3SDoug Rabson
1750dfdcada3SDoug Rabson static int
nlm_get_vfs_state(struct nlm_host * host,struct svc_req * rqstp,fhandle_t * fhp,struct vfs_state * vs,accmode_t accmode)1751dfdcada3SDoug Rabson nlm_get_vfs_state(struct nlm_host *host, struct svc_req *rqstp,
1752a8122d16SRick Macklem fhandle_t *fhp, struct vfs_state *vs, accmode_t accmode)
1753dfdcada3SDoug Rabson {
17541f7104d7SRick Macklem int error;
17551f7104d7SRick Macklem uint64_t exflags;
1756a8122d16SRick Macklem struct ucred *cred = NULL, *credanon = NULL;
1757dfdcada3SDoug Rabson
1758dfdcada3SDoug Rabson memset(vs, 0, sizeof(*vs));
1759dfdcada3SDoug Rabson
1760dfdcada3SDoug Rabson vs->vs_mp = vfs_getvfs(&fhp->fh_fsid);
1761dfdcada3SDoug Rabson if (!vs->vs_mp) {
1762dfdcada3SDoug Rabson return (ESTALE);
1763dfdcada3SDoug Rabson }
1764dfdcada3SDoug Rabson
1765a8122d16SRick Macklem /* accmode == 0 means don't check, since it is an unlock. */
1766a8122d16SRick Macklem if (accmode != 0) {
1767a8122d16SRick Macklem error = VFS_CHECKEXP(vs->vs_mp,
1768a8122d16SRick Macklem (struct sockaddr *)&host->nh_addr, &exflags, &credanon,
1769a8122d16SRick Macklem NULL, NULL);
1770dfdcada3SDoug Rabson if (error)
1771dfdcada3SDoug Rabson goto out;
1772dfdcada3SDoug Rabson
1773a8122d16SRick Macklem if (exflags & MNT_EXRDONLY ||
1774a8122d16SRick Macklem (vs->vs_mp->mnt_flag & MNT_RDONLY)) {
1775dfdcada3SDoug Rabson error = EROFS;
1776dfdcada3SDoug Rabson goto out;
1777dfdcada3SDoug Rabson }
1778a8122d16SRick Macklem }
1779dfdcada3SDoug Rabson
1780694a586aSRick Macklem error = VFS_FHTOVP(vs->vs_mp, &fhp->fh_fid, LK_EXCLUSIVE, &vs->vs_vp);
1781dfdcada3SDoug Rabson if (error)
1782dfdcada3SDoug Rabson goto out;
17838d9278baSDoug Rabson vs->vs_vnlocked = TRUE;
1784dfdcada3SDoug Rabson
1785a8122d16SRick Macklem if (accmode != 0) {
1786a9148abdSDoug Rabson if (!svc_getcred(rqstp, &cred, NULL)) {
1787dfdcada3SDoug Rabson error = EINVAL;
1788dfdcada3SDoug Rabson goto out;
1789dfdcada3SDoug Rabson }
1790dfdcada3SDoug Rabson if (cred->cr_uid == 0 || (exflags & MNT_EXPORTANON)) {
1791dfdcada3SDoug Rabson crfree(cred);
17925679fe19SAlexander Kabaev cred = credanon;
17935679fe19SAlexander Kabaev credanon = NULL;
1794dfdcada3SDoug Rabson }
1795dfdcada3SDoug Rabson
1796dfdcada3SDoug Rabson /*
1797dfdcada3SDoug Rabson * Check cred.
1798dfdcada3SDoug Rabson */
1799a8122d16SRick Macklem error = VOP_ACCESS(vs->vs_vp, accmode, cred, curthread);
1800a8122d16SRick Macklem /*
1801a8122d16SRick Macklem * If this failed and accmode != VWRITE, try again with
1802a8122d16SRick Macklem * VWRITE to maintain backwards compatibility with the
1803a8122d16SRick Macklem * old code that always used VWRITE.
1804a8122d16SRick Macklem */
1805a8122d16SRick Macklem if (error != 0 && accmode != VWRITE)
1806dfdcada3SDoug Rabson error = VOP_ACCESS(vs->vs_vp, VWRITE, cred, curthread);
1807dfdcada3SDoug Rabson if (error)
1808dfdcada3SDoug Rabson goto out;
1809a8122d16SRick Macklem }
1810dfdcada3SDoug Rabson
1811b249ce48SMateusz Guzik VOP_UNLOCK(vs->vs_vp);
18128d9278baSDoug Rabson vs->vs_vnlocked = FALSE;
18138d9278baSDoug Rabson
1814dfdcada3SDoug Rabson out:
1815a9148abdSDoug Rabson if (cred)
1816dfdcada3SDoug Rabson crfree(cred);
18175679fe19SAlexander Kabaev if (credanon)
18185679fe19SAlexander Kabaev crfree(credanon);
1819dfdcada3SDoug Rabson
1820dfdcada3SDoug Rabson return (error);
1821dfdcada3SDoug Rabson }
1822dfdcada3SDoug Rabson
1823dfdcada3SDoug Rabson static void
nlm_release_vfs_state(struct vfs_state * vs)1824dfdcada3SDoug Rabson nlm_release_vfs_state(struct vfs_state *vs)
1825dfdcada3SDoug Rabson {
1826dfdcada3SDoug Rabson
18278d9278baSDoug Rabson if (vs->vs_vp) {
18288d9278baSDoug Rabson if (vs->vs_vnlocked)
18298d9278baSDoug Rabson vput(vs->vs_vp);
18308d9278baSDoug Rabson else
1831dfdcada3SDoug Rabson vrele(vs->vs_vp);
18328d9278baSDoug Rabson }
1833dfdcada3SDoug Rabson if (vs->vs_mp)
1834dfdcada3SDoug Rabson vfs_rel(vs->vs_mp);
1835dfdcada3SDoug Rabson }
1836dfdcada3SDoug Rabson
1837dfdcada3SDoug Rabson static nlm4_stats
nlm_convert_error(int error)1838dfdcada3SDoug Rabson nlm_convert_error(int error)
1839dfdcada3SDoug Rabson {
1840dfdcada3SDoug Rabson
1841dfdcada3SDoug Rabson if (error == ESTALE)
1842dfdcada3SDoug Rabson return nlm4_stale_fh;
1843dfdcada3SDoug Rabson else if (error == EROFS)
1844dfdcada3SDoug Rabson return nlm4_rofs;
1845dfdcada3SDoug Rabson else
1846dfdcada3SDoug Rabson return nlm4_failed;
1847dfdcada3SDoug Rabson }
1848dfdcada3SDoug Rabson
1849c675522fSDoug Rabson int
nlm_do_test(nlm4_testargs * argp,nlm4_testres * result,struct svc_req * rqstp,CLIENT ** rpcp)1850c675522fSDoug Rabson nlm_do_test(nlm4_testargs *argp, nlm4_testres *result, struct svc_req *rqstp,
1851c675522fSDoug Rabson CLIENT **rpcp)
1852dfdcada3SDoug Rabson {
1853dfdcada3SDoug Rabson fhandle_t fh;
1854dfdcada3SDoug Rabson struct vfs_state vs;
1855dfdcada3SDoug Rabson struct nlm_host *host, *bhost;
1856dfdcada3SDoug Rabson int error, sysid;
1857dfdcada3SDoug Rabson struct flock fl;
1858a8122d16SRick Macklem accmode_t accmode;
1859dfdcada3SDoug Rabson
1860dfdcada3SDoug Rabson memset(result, 0, sizeof(*result));
1861c675522fSDoug Rabson memset(&vs, 0, sizeof(vs));
1862dfdcada3SDoug Rabson
1863c675522fSDoug Rabson host = nlm_find_host_by_name(argp->alock.caller_name,
1864a9148abdSDoug Rabson svc_getrpccaller(rqstp), rqstp->rq_vers);
1865dfdcada3SDoug Rabson if (!host) {
1866dfdcada3SDoug Rabson result->stat.stat = nlm4_denied_nolocks;
1867c675522fSDoug Rabson return (ENOMEM);
1868dfdcada3SDoug Rabson }
1869dfdcada3SDoug Rabson
18701780110bSDoug Rabson NLM_DEBUG(3, "nlm_do_test(): caller_name = %s (sysid = %d)\n",
1871dfdcada3SDoug Rabson host->nh_caller_name, host->nh_sysid);
1872dfdcada3SDoug Rabson
1873fbaa591fSZachary Loafman nlm_check_expired_locks(host);
1874dfdcada3SDoug Rabson sysid = host->nh_sysid;
1875dfdcada3SDoug Rabson
1876dfdcada3SDoug Rabson nlm_convert_to_fhandle_t(&fh, &argp->alock.fh);
1877dfdcada3SDoug Rabson nlm_copy_netobj(&result->cookie, &argp->cookie, M_RPC);
1878dfdcada3SDoug Rabson
1879dfdcada3SDoug Rabson if (time_uptime < nlm_grace_threshold) {
1880dfdcada3SDoug Rabson result->stat.stat = nlm4_denied_grace_period;
1881c675522fSDoug Rabson goto out;
1882dfdcada3SDoug Rabson }
1883dfdcada3SDoug Rabson
1884a8122d16SRick Macklem accmode = argp->exclusive ? VWRITE : VREAD;
1885a8122d16SRick Macklem error = nlm_get_vfs_state(host, rqstp, &fh, &vs, accmode);
1886dfdcada3SDoug Rabson if (error) {
1887dfdcada3SDoug Rabson result->stat.stat = nlm_convert_error(error);
1888dfdcada3SDoug Rabson goto out;
1889dfdcada3SDoug Rabson }
1890dfdcada3SDoug Rabson
1891dfdcada3SDoug Rabson fl.l_start = argp->alock.l_offset;
1892dfdcada3SDoug Rabson fl.l_len = argp->alock.l_len;
1893dfdcada3SDoug Rabson fl.l_pid = argp->alock.svid;
1894dfdcada3SDoug Rabson fl.l_sysid = sysid;
1895dfdcada3SDoug Rabson fl.l_whence = SEEK_SET;
1896dfdcada3SDoug Rabson if (argp->exclusive)
1897dfdcada3SDoug Rabson fl.l_type = F_WRLCK;
1898dfdcada3SDoug Rabson else
1899dfdcada3SDoug Rabson fl.l_type = F_RDLCK;
1900dfdcada3SDoug Rabson error = VOP_ADVLOCK(vs.vs_vp, NULL, F_GETLK, &fl, F_REMOTE);
1901dfdcada3SDoug Rabson if (error) {
1902dfdcada3SDoug Rabson result->stat.stat = nlm4_failed;
1903dfdcada3SDoug Rabson goto out;
1904dfdcada3SDoug Rabson }
1905dfdcada3SDoug Rabson
1906dfdcada3SDoug Rabson if (fl.l_type == F_UNLCK) {
1907dfdcada3SDoug Rabson result->stat.stat = nlm4_granted;
1908dfdcada3SDoug Rabson } else {
1909dfdcada3SDoug Rabson result->stat.stat = nlm4_denied;
1910dfdcada3SDoug Rabson result->stat.nlm4_testrply_u.holder.exclusive =
1911dfdcada3SDoug Rabson (fl.l_type == F_WRLCK);
1912dfdcada3SDoug Rabson result->stat.nlm4_testrply_u.holder.svid = fl.l_pid;
1913dfdcada3SDoug Rabson bhost = nlm_find_host_by_sysid(fl.l_sysid);
1914dfdcada3SDoug Rabson if (bhost) {
1915dfdcada3SDoug Rabson /*
1916dfdcada3SDoug Rabson * We don't have any useful way of recording
1917dfdcada3SDoug Rabson * the value of oh used in the original lock
1918dfdcada3SDoug Rabson * request. Ideally, the test reply would have
1919dfdcada3SDoug Rabson * a space for the owning host's name allowing
1920dfdcada3SDoug Rabson * our caller's NLM to keep track.
1921dfdcada3SDoug Rabson *
1922dfdcada3SDoug Rabson * As far as I can see, Solaris uses an eight
1923dfdcada3SDoug Rabson * byte structure for oh which contains a four
1924dfdcada3SDoug Rabson * byte pid encoded in local byte order and
1925dfdcada3SDoug Rabson * the first four bytes of the host
1926dfdcada3SDoug Rabson * name. Linux uses a variable length string
1927dfdcada3SDoug Rabson * 'pid@hostname' in ascii but doesn't even
1928dfdcada3SDoug Rabson * return that in test replies.
1929dfdcada3SDoug Rabson *
1930dfdcada3SDoug Rabson * For the moment, return nothing in oh
1931dfdcada3SDoug Rabson * (already zero'ed above).
1932dfdcada3SDoug Rabson */
1933c675522fSDoug Rabson nlm_host_release(bhost);
1934dfdcada3SDoug Rabson }
1935dfdcada3SDoug Rabson result->stat.nlm4_testrply_u.holder.l_offset = fl.l_start;
1936dfdcada3SDoug Rabson result->stat.nlm4_testrply_u.holder.l_len = fl.l_len;
1937dfdcada3SDoug Rabson }
1938dfdcada3SDoug Rabson
1939dfdcada3SDoug Rabson out:
1940dfdcada3SDoug Rabson nlm_release_vfs_state(&vs);
1941c675522fSDoug Rabson if (rpcp)
1942a9148abdSDoug Rabson *rpcp = nlm_host_get_rpc(host, TRUE);
1943c675522fSDoug Rabson nlm_host_release(host);
1944c675522fSDoug Rabson return (0);
1945dfdcada3SDoug Rabson }
1946dfdcada3SDoug Rabson
1947c675522fSDoug Rabson int
nlm_do_lock(nlm4_lockargs * argp,nlm4_res * result,struct svc_req * rqstp,bool_t monitor,CLIENT ** rpcp)1948dfdcada3SDoug Rabson nlm_do_lock(nlm4_lockargs *argp, nlm4_res *result, struct svc_req *rqstp,
1949c675522fSDoug Rabson bool_t monitor, CLIENT **rpcp)
1950dfdcada3SDoug Rabson {
1951dfdcada3SDoug Rabson fhandle_t fh;
1952dfdcada3SDoug Rabson struct vfs_state vs;
1953dfdcada3SDoug Rabson struct nlm_host *host;
1954dfdcada3SDoug Rabson int error, sysid;
1955dfdcada3SDoug Rabson struct flock fl;
1956a8122d16SRick Macklem accmode_t accmode;
1957dfdcada3SDoug Rabson
1958dfdcada3SDoug Rabson memset(result, 0, sizeof(*result));
1959c675522fSDoug Rabson memset(&vs, 0, sizeof(vs));
1960dfdcada3SDoug Rabson
1961c675522fSDoug Rabson host = nlm_find_host_by_name(argp->alock.caller_name,
1962a9148abdSDoug Rabson svc_getrpccaller(rqstp), rqstp->rq_vers);
1963dfdcada3SDoug Rabson if (!host) {
1964dfdcada3SDoug Rabson result->stat.stat = nlm4_denied_nolocks;
1965c675522fSDoug Rabson return (ENOMEM);
1966dfdcada3SDoug Rabson }
1967dfdcada3SDoug Rabson
19681780110bSDoug Rabson NLM_DEBUG(3, "nlm_do_lock(): caller_name = %s (sysid = %d)\n",
1969dfdcada3SDoug Rabson host->nh_caller_name, host->nh_sysid);
1970dfdcada3SDoug Rabson
197176263c7fSDoug Rabson if (monitor && host->nh_state && argp->state
197276263c7fSDoug Rabson && host->nh_state != argp->state) {
197376263c7fSDoug Rabson /*
197476263c7fSDoug Rabson * The host rebooted without telling us. Trash its
197576263c7fSDoug Rabson * locks.
197676263c7fSDoug Rabson */
1977c675522fSDoug Rabson nlm_host_notify(host, argp->state);
197876263c7fSDoug Rabson }
197976263c7fSDoug Rabson
1980fbaa591fSZachary Loafman nlm_check_expired_locks(host);
1981dfdcada3SDoug Rabson sysid = host->nh_sysid;
1982dfdcada3SDoug Rabson
1983dfdcada3SDoug Rabson nlm_convert_to_fhandle_t(&fh, &argp->alock.fh);
1984dfdcada3SDoug Rabson nlm_copy_netobj(&result->cookie, &argp->cookie, M_RPC);
1985dfdcada3SDoug Rabson
1986dfdcada3SDoug Rabson if (time_uptime < nlm_grace_threshold && !argp->reclaim) {
1987dfdcada3SDoug Rabson result->stat.stat = nlm4_denied_grace_period;
1988c675522fSDoug Rabson goto out;
1989dfdcada3SDoug Rabson }
1990dfdcada3SDoug Rabson
1991a8122d16SRick Macklem accmode = argp->exclusive ? VWRITE : VREAD;
1992a8122d16SRick Macklem error = nlm_get_vfs_state(host, rqstp, &fh, &vs, accmode);
1993dfdcada3SDoug Rabson if (error) {
1994dfdcada3SDoug Rabson result->stat.stat = nlm_convert_error(error);
1995dfdcada3SDoug Rabson goto out;
1996dfdcada3SDoug Rabson }
1997dfdcada3SDoug Rabson
1998dfdcada3SDoug Rabson fl.l_start = argp->alock.l_offset;
1999dfdcada3SDoug Rabson fl.l_len = argp->alock.l_len;
2000dfdcada3SDoug Rabson fl.l_pid = argp->alock.svid;
2001dfdcada3SDoug Rabson fl.l_sysid = sysid;
2002dfdcada3SDoug Rabson fl.l_whence = SEEK_SET;
2003dfdcada3SDoug Rabson if (argp->exclusive)
2004dfdcada3SDoug Rabson fl.l_type = F_WRLCK;
2005dfdcada3SDoug Rabson else
2006dfdcada3SDoug Rabson fl.l_type = F_RDLCK;
2007dfdcada3SDoug Rabson if (argp->block) {
2008dfdcada3SDoug Rabson struct nlm_async_lock *af;
2009c675522fSDoug Rabson CLIENT *client;
2010fbaa591fSZachary Loafman struct nlm_grantcookie cookie;
2011dfdcada3SDoug Rabson
2012dfdcada3SDoug Rabson /*
2013dfdcada3SDoug Rabson * First, make sure we can contact the host's NLM.
2014dfdcada3SDoug Rabson */
2015a9148abdSDoug Rabson client = nlm_host_get_rpc(host, TRUE);
2016c675522fSDoug Rabson if (!client) {
2017dfdcada3SDoug Rabson result->stat.stat = nlm4_failed;
2018dfdcada3SDoug Rabson goto out;
2019dfdcada3SDoug Rabson }
2020dfdcada3SDoug Rabson
2021dfdcada3SDoug Rabson /*
2022dfdcada3SDoug Rabson * First we need to check and see if there is an
2023dfdcada3SDoug Rabson * existing blocked lock that matches. This could be a
2024dfdcada3SDoug Rabson * badly behaved client or an RPC re-send. If we find
2025dfdcada3SDoug Rabson * one, just return nlm4_blocked.
2026dfdcada3SDoug Rabson */
2027dfdcada3SDoug Rabson mtx_lock(&host->nh_lock);
2028dfdcada3SDoug Rabson TAILQ_FOREACH(af, &host->nh_pending, af_link) {
2029dfdcada3SDoug Rabson if (af->af_fl.l_start == fl.l_start
2030dfdcada3SDoug Rabson && af->af_fl.l_len == fl.l_len
2031dfdcada3SDoug Rabson && af->af_fl.l_pid == fl.l_pid
2032dfdcada3SDoug Rabson && af->af_fl.l_type == fl.l_type) {
2033dfdcada3SDoug Rabson break;
2034dfdcada3SDoug Rabson }
2035dfdcada3SDoug Rabson }
2036fbaa591fSZachary Loafman if (!af) {
2037fbaa591fSZachary Loafman cookie.ng_sysid = host->nh_sysid;
2038fbaa591fSZachary Loafman cookie.ng_cookie = host->nh_grantcookie++;
2039fbaa591fSZachary Loafman }
2040dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
2041dfdcada3SDoug Rabson if (af) {
2042c675522fSDoug Rabson CLNT_RELEASE(client);
2043dfdcada3SDoug Rabson result->stat.stat = nlm4_blocked;
2044dfdcada3SDoug Rabson goto out;
2045dfdcada3SDoug Rabson }
2046dfdcada3SDoug Rabson
2047dfdcada3SDoug Rabson af = malloc(sizeof(struct nlm_async_lock), M_NLM,
2048dfdcada3SDoug Rabson M_WAITOK|M_ZERO);
2049dfdcada3SDoug Rabson TASK_INIT(&af->af_task, 0, nlm_lock_callback, af);
2050dfdcada3SDoug Rabson af->af_vp = vs.vs_vp;
2051dfdcada3SDoug Rabson af->af_fl = fl;
2052dfdcada3SDoug Rabson af->af_host = host;
2053c675522fSDoug Rabson af->af_rpc = client;
2054dfdcada3SDoug Rabson /*
2055dfdcada3SDoug Rabson * We use M_RPC here so that we can xdr_free the thing
2056dfdcada3SDoug Rabson * later.
2057dfdcada3SDoug Rabson */
2058fbaa591fSZachary Loafman nlm_make_netobj(&af->af_granted.cookie,
2059fbaa591fSZachary Loafman (caddr_t)&cookie, sizeof(cookie), M_RPC);
2060dfdcada3SDoug Rabson af->af_granted.exclusive = argp->exclusive;
2061dfdcada3SDoug Rabson af->af_granted.alock.caller_name =
2062dfdcada3SDoug Rabson strdup(argp->alock.caller_name, M_RPC);
2063dfdcada3SDoug Rabson nlm_copy_netobj(&af->af_granted.alock.fh,
2064dfdcada3SDoug Rabson &argp->alock.fh, M_RPC);
2065dfdcada3SDoug Rabson nlm_copy_netobj(&af->af_granted.alock.oh,
2066dfdcada3SDoug Rabson &argp->alock.oh, M_RPC);
2067dfdcada3SDoug Rabson af->af_granted.alock.svid = argp->alock.svid;
2068dfdcada3SDoug Rabson af->af_granted.alock.l_offset = argp->alock.l_offset;
2069dfdcada3SDoug Rabson af->af_granted.alock.l_len = argp->alock.l_len;
2070dfdcada3SDoug Rabson
2071dfdcada3SDoug Rabson /*
2072dfdcada3SDoug Rabson * Put the entry on the pending list before calling
2073dfdcada3SDoug Rabson * VOP_ADVLOCKASYNC. We do this in case the lock
2074dfdcada3SDoug Rabson * request was blocked (returning EINPROGRESS) but
2075dfdcada3SDoug Rabson * then granted before we manage to run again. The
2076dfdcada3SDoug Rabson * client may receive the granted message before we
2077dfdcada3SDoug Rabson * send our blocked reply but thats their problem.
2078dfdcada3SDoug Rabson */
2079dfdcada3SDoug Rabson mtx_lock(&host->nh_lock);
2080dfdcada3SDoug Rabson TAILQ_INSERT_TAIL(&host->nh_pending, af, af_link);
2081dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
2082dfdcada3SDoug Rabson
2083dfdcada3SDoug Rabson error = VOP_ADVLOCKASYNC(vs.vs_vp, NULL, F_SETLK, &fl, F_REMOTE,
2084dfdcada3SDoug Rabson &af->af_task, &af->af_cookie);
2085dfdcada3SDoug Rabson
2086dfdcada3SDoug Rabson /*
2087dfdcada3SDoug Rabson * If the lock completed synchronously, just free the
2088dfdcada3SDoug Rabson * tracking structure now.
2089dfdcada3SDoug Rabson */
2090dfdcada3SDoug Rabson if (error != EINPROGRESS) {
2091c675522fSDoug Rabson CLNT_RELEASE(af->af_rpc);
2092dfdcada3SDoug Rabson mtx_lock(&host->nh_lock);
2093dfdcada3SDoug Rabson TAILQ_REMOVE(&host->nh_pending, af, af_link);
2094dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
2095dfdcada3SDoug Rabson xdr_free((xdrproc_t) xdr_nlm4_testargs,
2096dfdcada3SDoug Rabson &af->af_granted);
2097dfdcada3SDoug Rabson free(af, M_NLM);
2098dfdcada3SDoug Rabson } else {
20991780110bSDoug Rabson NLM_DEBUG(2, "NLM: pending async lock %p for %s "
21001780110bSDoug Rabson "(sysid %d)\n", af, host->nh_caller_name, sysid);
2101dfdcada3SDoug Rabson /*
2102dfdcada3SDoug Rabson * Don't vrele the vnode just yet - this must
2103dfdcada3SDoug Rabson * wait until either the async callback
2104dfdcada3SDoug Rabson * happens or the lock is cancelled.
2105dfdcada3SDoug Rabson */
2106dfdcada3SDoug Rabson vs.vs_vp = NULL;
2107dfdcada3SDoug Rabson }
2108dfdcada3SDoug Rabson } else {
2109dfdcada3SDoug Rabson error = VOP_ADVLOCK(vs.vs_vp, NULL, F_SETLK, &fl, F_REMOTE);
2110dfdcada3SDoug Rabson }
2111dfdcada3SDoug Rabson
2112dfdcada3SDoug Rabson if (error) {
2113dfdcada3SDoug Rabson if (error == EINPROGRESS) {
2114dfdcada3SDoug Rabson result->stat.stat = nlm4_blocked;
2115dfdcada3SDoug Rabson } else if (error == EDEADLK) {
2116dfdcada3SDoug Rabson result->stat.stat = nlm4_deadlck;
2117dfdcada3SDoug Rabson } else if (error == EAGAIN) {
2118dfdcada3SDoug Rabson result->stat.stat = nlm4_denied;
2119dfdcada3SDoug Rabson } else {
2120dfdcada3SDoug Rabson result->stat.stat = nlm4_failed;
2121dfdcada3SDoug Rabson }
2122dfdcada3SDoug Rabson } else {
2123dfdcada3SDoug Rabson if (monitor)
2124dfdcada3SDoug Rabson nlm_host_monitor(host, argp->state);
2125dfdcada3SDoug Rabson result->stat.stat = nlm4_granted;
2126dfdcada3SDoug Rabson }
2127dfdcada3SDoug Rabson
2128dfdcada3SDoug Rabson out:
2129dfdcada3SDoug Rabson nlm_release_vfs_state(&vs);
2130c675522fSDoug Rabson if (rpcp)
2131a9148abdSDoug Rabson *rpcp = nlm_host_get_rpc(host, TRUE);
2132c675522fSDoug Rabson nlm_host_release(host);
2133c675522fSDoug Rabson return (0);
2134dfdcada3SDoug Rabson }
2135dfdcada3SDoug Rabson
2136c675522fSDoug Rabson int
nlm_do_cancel(nlm4_cancargs * argp,nlm4_res * result,struct svc_req * rqstp,CLIENT ** rpcp)2137c675522fSDoug Rabson nlm_do_cancel(nlm4_cancargs *argp, nlm4_res *result, struct svc_req *rqstp,
2138c675522fSDoug Rabson CLIENT **rpcp)
2139dfdcada3SDoug Rabson {
2140dfdcada3SDoug Rabson fhandle_t fh;
2141dfdcada3SDoug Rabson struct vfs_state vs;
2142dfdcada3SDoug Rabson struct nlm_host *host;
2143dfdcada3SDoug Rabson int error, sysid;
2144dfdcada3SDoug Rabson struct flock fl;
2145dfdcada3SDoug Rabson struct nlm_async_lock *af;
2146dfdcada3SDoug Rabson
2147dfdcada3SDoug Rabson memset(result, 0, sizeof(*result));
2148c675522fSDoug Rabson memset(&vs, 0, sizeof(vs));
2149dfdcada3SDoug Rabson
2150c675522fSDoug Rabson host = nlm_find_host_by_name(argp->alock.caller_name,
2151a9148abdSDoug Rabson svc_getrpccaller(rqstp), rqstp->rq_vers);
2152dfdcada3SDoug Rabson if (!host) {
2153dfdcada3SDoug Rabson result->stat.stat = nlm4_denied_nolocks;
2154c675522fSDoug Rabson return (ENOMEM);
2155dfdcada3SDoug Rabson }
2156dfdcada3SDoug Rabson
21571780110bSDoug Rabson NLM_DEBUG(3, "nlm_do_cancel(): caller_name = %s (sysid = %d)\n",
2158dfdcada3SDoug Rabson host->nh_caller_name, host->nh_sysid);
2159dfdcada3SDoug Rabson
2160fbaa591fSZachary Loafman nlm_check_expired_locks(host);
2161dfdcada3SDoug Rabson sysid = host->nh_sysid;
2162dfdcada3SDoug Rabson
2163dfdcada3SDoug Rabson nlm_convert_to_fhandle_t(&fh, &argp->alock.fh);
2164dfdcada3SDoug Rabson nlm_copy_netobj(&result->cookie, &argp->cookie, M_RPC);
2165dfdcada3SDoug Rabson
2166dfdcada3SDoug Rabson if (time_uptime < nlm_grace_threshold) {
2167dfdcada3SDoug Rabson result->stat.stat = nlm4_denied_grace_period;
2168c675522fSDoug Rabson goto out;
2169dfdcada3SDoug Rabson }
2170dfdcada3SDoug Rabson
2171a8122d16SRick Macklem error = nlm_get_vfs_state(host, rqstp, &fh, &vs, (accmode_t)0);
2172dfdcada3SDoug Rabson if (error) {
2173dfdcada3SDoug Rabson result->stat.stat = nlm_convert_error(error);
2174dfdcada3SDoug Rabson goto out;
2175dfdcada3SDoug Rabson }
2176dfdcada3SDoug Rabson
2177dfdcada3SDoug Rabson fl.l_start = argp->alock.l_offset;
2178dfdcada3SDoug Rabson fl.l_len = argp->alock.l_len;
2179dfdcada3SDoug Rabson fl.l_pid = argp->alock.svid;
2180dfdcada3SDoug Rabson fl.l_sysid = sysid;
2181dfdcada3SDoug Rabson fl.l_whence = SEEK_SET;
2182dfdcada3SDoug Rabson if (argp->exclusive)
2183dfdcada3SDoug Rabson fl.l_type = F_WRLCK;
2184dfdcada3SDoug Rabson else
2185dfdcada3SDoug Rabson fl.l_type = F_RDLCK;
2186dfdcada3SDoug Rabson
2187dfdcada3SDoug Rabson /*
2188dfdcada3SDoug Rabson * First we need to try and find the async lock request - if
2189dfdcada3SDoug Rabson * there isn't one, we give up and return nlm4_denied.
2190dfdcada3SDoug Rabson */
2191dfdcada3SDoug Rabson mtx_lock(&host->nh_lock);
2192dfdcada3SDoug Rabson
2193dfdcada3SDoug Rabson TAILQ_FOREACH(af, &host->nh_pending, af_link) {
2194dfdcada3SDoug Rabson if (af->af_fl.l_start == fl.l_start
2195dfdcada3SDoug Rabson && af->af_fl.l_len == fl.l_len
2196dfdcada3SDoug Rabson && af->af_fl.l_pid == fl.l_pid
2197dfdcada3SDoug Rabson && af->af_fl.l_type == fl.l_type) {
2198dfdcada3SDoug Rabson break;
2199dfdcada3SDoug Rabson }
2200dfdcada3SDoug Rabson }
2201dfdcada3SDoug Rabson
2202dfdcada3SDoug Rabson if (!af) {
2203dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
2204dfdcada3SDoug Rabson result->stat.stat = nlm4_denied;
2205dfdcada3SDoug Rabson goto out;
2206dfdcada3SDoug Rabson }
2207dfdcada3SDoug Rabson
2208dfdcada3SDoug Rabson error = nlm_cancel_async_lock(af);
2209dfdcada3SDoug Rabson
2210dfdcada3SDoug Rabson if (error) {
2211dfdcada3SDoug Rabson result->stat.stat = nlm4_denied;
2212dfdcada3SDoug Rabson } else {
2213dfdcada3SDoug Rabson result->stat.stat = nlm4_granted;
2214dfdcada3SDoug Rabson }
2215dfdcada3SDoug Rabson
2216dfdcada3SDoug Rabson mtx_unlock(&host->nh_lock);
2217dfdcada3SDoug Rabson
2218dfdcada3SDoug Rabson out:
2219dfdcada3SDoug Rabson nlm_release_vfs_state(&vs);
2220c675522fSDoug Rabson if (rpcp)
2221a9148abdSDoug Rabson *rpcp = nlm_host_get_rpc(host, TRUE);
2222c675522fSDoug Rabson nlm_host_release(host);
2223c675522fSDoug Rabson return (0);
2224dfdcada3SDoug Rabson }
2225dfdcada3SDoug Rabson
2226c675522fSDoug Rabson int
nlm_do_unlock(nlm4_unlockargs * argp,nlm4_res * result,struct svc_req * rqstp,CLIENT ** rpcp)2227c675522fSDoug Rabson nlm_do_unlock(nlm4_unlockargs *argp, nlm4_res *result, struct svc_req *rqstp,
2228c675522fSDoug Rabson CLIENT **rpcp)
2229dfdcada3SDoug Rabson {
2230dfdcada3SDoug Rabson fhandle_t fh;
2231dfdcada3SDoug Rabson struct vfs_state vs;
2232dfdcada3SDoug Rabson struct nlm_host *host;
2233dfdcada3SDoug Rabson int error, sysid;
2234dfdcada3SDoug Rabson struct flock fl;
2235dfdcada3SDoug Rabson
2236dfdcada3SDoug Rabson memset(result, 0, sizeof(*result));
2237c675522fSDoug Rabson memset(&vs, 0, sizeof(vs));
2238dfdcada3SDoug Rabson
2239c675522fSDoug Rabson host = nlm_find_host_by_name(argp->alock.caller_name,
2240a9148abdSDoug Rabson svc_getrpccaller(rqstp), rqstp->rq_vers);
2241dfdcada3SDoug Rabson if (!host) {
2242dfdcada3SDoug Rabson result->stat.stat = nlm4_denied_nolocks;
2243c675522fSDoug Rabson return (ENOMEM);
2244dfdcada3SDoug Rabson }
2245dfdcada3SDoug Rabson
22461780110bSDoug Rabson NLM_DEBUG(3, "nlm_do_unlock(): caller_name = %s (sysid = %d)\n",
2247dfdcada3SDoug Rabson host->nh_caller_name, host->nh_sysid);
2248dfdcada3SDoug Rabson
2249fbaa591fSZachary Loafman nlm_check_expired_locks(host);
2250dfdcada3SDoug Rabson sysid = host->nh_sysid;
2251dfdcada3SDoug Rabson
2252dfdcada3SDoug Rabson nlm_convert_to_fhandle_t(&fh, &argp->alock.fh);
2253dfdcada3SDoug Rabson nlm_copy_netobj(&result->cookie, &argp->cookie, M_RPC);
2254dfdcada3SDoug Rabson
2255dfdcada3SDoug Rabson if (time_uptime < nlm_grace_threshold) {
2256dfdcada3SDoug Rabson result->stat.stat = nlm4_denied_grace_period;
2257c675522fSDoug Rabson goto out;
2258dfdcada3SDoug Rabson }
2259dfdcada3SDoug Rabson
2260a8122d16SRick Macklem error = nlm_get_vfs_state(host, rqstp, &fh, &vs, (accmode_t)0);
2261dfdcada3SDoug Rabson if (error) {
2262dfdcada3SDoug Rabson result->stat.stat = nlm_convert_error(error);
2263dfdcada3SDoug Rabson goto out;
2264dfdcada3SDoug Rabson }
2265dfdcada3SDoug Rabson
2266dfdcada3SDoug Rabson fl.l_start = argp->alock.l_offset;
2267dfdcada3SDoug Rabson fl.l_len = argp->alock.l_len;
2268dfdcada3SDoug Rabson fl.l_pid = argp->alock.svid;
2269dfdcada3SDoug Rabson fl.l_sysid = sysid;
2270dfdcada3SDoug Rabson fl.l_whence = SEEK_SET;
2271dfdcada3SDoug Rabson fl.l_type = F_UNLCK;
2272dfdcada3SDoug Rabson error = VOP_ADVLOCK(vs.vs_vp, NULL, F_UNLCK, &fl, F_REMOTE);
2273dfdcada3SDoug Rabson
2274dfdcada3SDoug Rabson /*
2275dfdcada3SDoug Rabson * Ignore the error - there is no result code for failure,
2276dfdcada3SDoug Rabson * only for grace period.
2277dfdcada3SDoug Rabson */
2278dfdcada3SDoug Rabson result->stat.stat = nlm4_granted;
2279dfdcada3SDoug Rabson
2280dfdcada3SDoug Rabson out:
2281dfdcada3SDoug Rabson nlm_release_vfs_state(&vs);
2282c675522fSDoug Rabson if (rpcp)
2283a9148abdSDoug Rabson *rpcp = nlm_host_get_rpc(host, TRUE);
2284c675522fSDoug Rabson nlm_host_release(host);
2285c675522fSDoug Rabson return (0);
2286c675522fSDoug Rabson }
2287dfdcada3SDoug Rabson
2288c675522fSDoug Rabson int
nlm_do_granted(nlm4_testargs * argp,nlm4_res * result,struct svc_req * rqstp,CLIENT ** rpcp)2289c675522fSDoug Rabson nlm_do_granted(nlm4_testargs *argp, nlm4_res *result, struct svc_req *rqstp,
2290c675522fSDoug Rabson
2291c675522fSDoug Rabson CLIENT **rpcp)
2292c675522fSDoug Rabson {
2293c675522fSDoug Rabson struct nlm_host *host;
2294c675522fSDoug Rabson struct nlm_waiting_lock *nw;
2295c675522fSDoug Rabson
2296c675522fSDoug Rabson memset(result, 0, sizeof(*result));
2297c675522fSDoug Rabson
2298a9148abdSDoug Rabson host = nlm_find_host_by_addr(svc_getrpccaller(rqstp), rqstp->rq_vers);
2299c675522fSDoug Rabson if (!host) {
2300c675522fSDoug Rabson result->stat.stat = nlm4_denied_nolocks;
2301c675522fSDoug Rabson return (ENOMEM);
2302c675522fSDoug Rabson }
2303c675522fSDoug Rabson
2304c675522fSDoug Rabson nlm_copy_netobj(&result->cookie, &argp->cookie, M_RPC);
2305c675522fSDoug Rabson result->stat.stat = nlm4_denied;
2306fbaa591fSZachary Loafman KFAIL_POINT_CODE(DEBUG_FP, nlm_deny_grant, goto out);
2307c675522fSDoug Rabson
2308c675522fSDoug Rabson mtx_lock(&nlm_global_lock);
2309c675522fSDoug Rabson TAILQ_FOREACH(nw, &nlm_waiting_locks, nw_link) {
2310c675522fSDoug Rabson if (!nw->nw_waiting)
2311c675522fSDoug Rabson continue;
2312c675522fSDoug Rabson if (argp->alock.svid == nw->nw_lock.svid
2313c675522fSDoug Rabson && argp->alock.l_offset == nw->nw_lock.l_offset
2314c675522fSDoug Rabson && argp->alock.l_len == nw->nw_lock.l_len
2315c675522fSDoug Rabson && argp->alock.fh.n_len == nw->nw_lock.fh.n_len
2316c675522fSDoug Rabson && !memcmp(argp->alock.fh.n_bytes, nw->nw_lock.fh.n_bytes,
2317c675522fSDoug Rabson nw->nw_lock.fh.n_len)) {
2318c675522fSDoug Rabson nw->nw_waiting = FALSE;
2319c675522fSDoug Rabson wakeup(nw);
2320c675522fSDoug Rabson result->stat.stat = nlm4_granted;
2321c675522fSDoug Rabson break;
2322c675522fSDoug Rabson }
2323c675522fSDoug Rabson }
2324c675522fSDoug Rabson mtx_unlock(&nlm_global_lock);
2325fbaa591fSZachary Loafman
2326fbaa591fSZachary Loafman out:
2327c675522fSDoug Rabson if (rpcp)
2328a9148abdSDoug Rabson *rpcp = nlm_host_get_rpc(host, TRUE);
2329c675522fSDoug Rabson nlm_host_release(host);
2330c675522fSDoug Rabson return (0);
2331dfdcada3SDoug Rabson }
2332dfdcada3SDoug Rabson
2333dfdcada3SDoug Rabson void
nlm_do_granted_res(nlm4_res * argp,struct svc_req * rqstp)2334fbaa591fSZachary Loafman nlm_do_granted_res(nlm4_res *argp, struct svc_req *rqstp)
2335fbaa591fSZachary Loafman {
2336fbaa591fSZachary Loafman struct nlm_host *host = NULL;
2337fbaa591fSZachary Loafman struct nlm_async_lock *af = NULL;
2338fbaa591fSZachary Loafman int error;
2339fbaa591fSZachary Loafman
2340fbaa591fSZachary Loafman if (argp->cookie.n_len != sizeof(struct nlm_grantcookie)) {
2341fbaa591fSZachary Loafman NLM_DEBUG(1, "NLM: bogus grant cookie");
2342fbaa591fSZachary Loafman goto out;
2343fbaa591fSZachary Loafman }
2344fbaa591fSZachary Loafman
2345fbaa591fSZachary Loafman host = nlm_find_host_by_sysid(ng_sysid(&argp->cookie));
2346fbaa591fSZachary Loafman if (!host) {
2347fbaa591fSZachary Loafman NLM_DEBUG(1, "NLM: Unknown host rejected our grant");
2348fbaa591fSZachary Loafman goto out;
2349fbaa591fSZachary Loafman }
2350fbaa591fSZachary Loafman
2351fbaa591fSZachary Loafman mtx_lock(&host->nh_lock);
2352fbaa591fSZachary Loafman TAILQ_FOREACH(af, &host->nh_granted, af_link)
2353fbaa591fSZachary Loafman if (ng_cookie(&argp->cookie) ==
2354fbaa591fSZachary Loafman ng_cookie(&af->af_granted.cookie))
2355fbaa591fSZachary Loafman break;
2356fbaa591fSZachary Loafman if (af)
2357fbaa591fSZachary Loafman TAILQ_REMOVE(&host->nh_granted, af, af_link);
2358fbaa591fSZachary Loafman mtx_unlock(&host->nh_lock);
2359fbaa591fSZachary Loafman
2360fbaa591fSZachary Loafman if (!af) {
2361fbaa591fSZachary Loafman NLM_DEBUG(1, "NLM: host %s (sysid %d) replied to our grant "
2362fbaa591fSZachary Loafman "with unrecognized cookie %d:%d", host->nh_caller_name,
2363fbaa591fSZachary Loafman host->nh_sysid, ng_sysid(&argp->cookie),
2364fbaa591fSZachary Loafman ng_cookie(&argp->cookie));
2365fbaa591fSZachary Loafman goto out;
2366fbaa591fSZachary Loafman }
2367fbaa591fSZachary Loafman
2368fbaa591fSZachary Loafman if (argp->stat.stat != nlm4_granted) {
2369fbaa591fSZachary Loafman af->af_fl.l_type = F_UNLCK;
2370fbaa591fSZachary Loafman error = VOP_ADVLOCK(af->af_vp, NULL, F_UNLCK, &af->af_fl, F_REMOTE);
2371fbaa591fSZachary Loafman if (error) {
2372fbaa591fSZachary Loafman NLM_DEBUG(1, "NLM: host %s (sysid %d) rejected our grant "
2373fbaa591fSZachary Loafman "and we failed to unlock (%d)", host->nh_caller_name,
2374fbaa591fSZachary Loafman host->nh_sysid, error);
2375fbaa591fSZachary Loafman goto out;
2376fbaa591fSZachary Loafman }
2377fbaa591fSZachary Loafman
2378fbaa591fSZachary Loafman NLM_DEBUG(5, "NLM: async lock %p rejected by host %s (sysid %d)",
2379fbaa591fSZachary Loafman af, host->nh_caller_name, host->nh_sysid);
2380fbaa591fSZachary Loafman } else {
2381fbaa591fSZachary Loafman NLM_DEBUG(5, "NLM: async lock %p accepted by host %s (sysid %d)",
2382fbaa591fSZachary Loafman af, host->nh_caller_name, host->nh_sysid);
2383fbaa591fSZachary Loafman }
2384fbaa591fSZachary Loafman
2385fbaa591fSZachary Loafman out:
2386fbaa591fSZachary Loafman if (af)
2387fbaa591fSZachary Loafman nlm_free_async_lock(af);
2388fbaa591fSZachary Loafman if (host)
2389fbaa591fSZachary Loafman nlm_host_release(host);
2390fbaa591fSZachary Loafman }
2391fbaa591fSZachary Loafman
2392fbaa591fSZachary Loafman void
nlm_do_free_all(nlm4_notify * argp)2393dfdcada3SDoug Rabson nlm_do_free_all(nlm4_notify *argp)
2394dfdcada3SDoug Rabson {
2395dfdcada3SDoug Rabson struct nlm_host *host, *thost;
2396dfdcada3SDoug Rabson
2397dfdcada3SDoug Rabson TAILQ_FOREACH_SAFE(host, &nlm_hosts, nh_link, thost) {
2398dfdcada3SDoug Rabson if (!strcmp(host->nh_caller_name, argp->name))
2399c675522fSDoug Rabson nlm_host_notify(host, argp->state);
2400dfdcada3SDoug Rabson }
2401dfdcada3SDoug Rabson }
2402dfdcada3SDoug Rabson
2403fa9d9930SDoug Rabson /*
2404fa9d9930SDoug Rabson * Kernel module glue
2405fa9d9930SDoug Rabson */
2406fa9d9930SDoug Rabson static int
nfslockd_modevent(module_t mod,int type,void * data)2407fa9d9930SDoug Rabson nfslockd_modevent(module_t mod, int type, void *data)
2408fa9d9930SDoug Rabson {
2409fa9d9930SDoug Rabson
24105ee5ec75SRick Macklem switch (type) {
24115ee5ec75SRick Macklem case MOD_LOAD:
2412946c028eSBrooks Davis return (nlm_init());
2413946c028eSBrooks Davis
24145ee5ec75SRick Macklem case MOD_UNLOAD:
2415946c028eSBrooks Davis nlm_uninit();
24165ee5ec75SRick Macklem /* The NLM module cannot be safely unloaded. */
24175ee5ec75SRick Macklem /* FALLTHROUGH */
24185ee5ec75SRick Macklem default:
24195ee5ec75SRick Macklem return (EOPNOTSUPP);
24205ee5ec75SRick Macklem }
2421fa9d9930SDoug Rabson }
2422fa9d9930SDoug Rabson static moduledata_t nfslockd_mod = {
2423fa9d9930SDoug Rabson "nfslockd",
2424fa9d9930SDoug Rabson nfslockd_modevent,
2425fa9d9930SDoug Rabson NULL,
2426fa9d9930SDoug Rabson };
2427fa9d9930SDoug Rabson DECLARE_MODULE(nfslockd, nfslockd_mod, SI_SUB_VFS, SI_ORDER_ANY);
2428fa9d9930SDoug Rabson
2429fa9d9930SDoug Rabson /* So that loader and kldload(2) can find us, wherever we are.. */
2430283a8608SKonstantin Belousov MODULE_DEPEND(nfslockd, xdr, 1, 1, 1);
2431fa9d9930SDoug Rabson MODULE_DEPEND(nfslockd, krpc, 1, 1, 1);
24328de97f39SRick Macklem MODULE_DEPEND(nfslockd, nfscommon, 1, 1, 1);
2433fa9d9930SDoug Rabson MODULE_VERSION(nfslockd, 1);
2434