1b9238976Sth /* 2b9238976Sth * CDDL HEADER START 3b9238976Sth * 4b9238976Sth * The contents of this file are subject to the terms of the 5b9238976Sth * Common Development and Distribution License (the "License"). 6b9238976Sth * You may not use this file except in compliance with the License. 7b9238976Sth * 8b9238976Sth * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9b9238976Sth * or http://www.opensolaris.org/os/licensing. 10b9238976Sth * See the License for the specific language governing permissions 11b9238976Sth * and limitations under the License. 12b9238976Sth * 13b9238976Sth * When distributing Covered Code, include this CDDL HEADER in each 14b9238976Sth * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15b9238976Sth * If applicable, add the following below this CDDL HEADER, with the 16b9238976Sth * fields enclosed by brackets "[]" replaced with your own identifying 17b9238976Sth * information: Portions Copyright [yyyy] [name of copyright owner] 18b9238976Sth * 19b9238976Sth * CDDL HEADER END 20b9238976Sth */ 21b9238976Sth 22b9238976Sth /* 23b9238976Sth * Copyright 2007 Sun Microsystems, Inc. All rights reserved. 24b9238976Sth * Use is subject to license terms. 25b9238976Sth */ 26b9238976Sth 27b9238976Sth #pragma ident "%Z%%M% %I% %E% SMI" 28b9238976Sth 29b9238976Sth /* 30b9238976Sth * Support for ephemeral mounts, e.g. mirror-mounts. These mounts are 31b9238976Sth * triggered from a "stub" rnode via a special set of vnodeops. 32b9238976Sth */ 33b9238976Sth 34b9238976Sth #include <sys/param.h> 35b9238976Sth #include <sys/types.h> 36b9238976Sth #include <sys/systm.h> 37b9238976Sth #include <sys/cred.h> 38b9238976Sth #include <sys/time.h> 39b9238976Sth #include <sys/vnode.h> 40b9238976Sth #include <sys/vfs.h> 41b9238976Sth #include <sys/vfs_opreg.h> 42b9238976Sth #include <sys/file.h> 43b9238976Sth #include <sys/filio.h> 44b9238976Sth #include <sys/uio.h> 45b9238976Sth #include <sys/buf.h> 46b9238976Sth #include <sys/mman.h> 47b9238976Sth #include <sys/pathname.h> 48b9238976Sth #include <sys/dirent.h> 49b9238976Sth #include <sys/debug.h> 50b9238976Sth #include <sys/vmsystm.h> 51b9238976Sth #include <sys/fcntl.h> 52b9238976Sth #include <sys/flock.h> 53b9238976Sth #include <sys/swap.h> 54b9238976Sth #include <sys/errno.h> 55b9238976Sth #include <sys/strsubr.h> 56b9238976Sth #include <sys/sysmacros.h> 57b9238976Sth #include <sys/kmem.h> 58b9238976Sth #include <sys/mount.h> 59b9238976Sth #include <sys/cmn_err.h> 60b9238976Sth #include <sys/pathconf.h> 61b9238976Sth #include <sys/utsname.h> 62b9238976Sth #include <sys/dnlc.h> 63b9238976Sth #include <sys/acl.h> 64b9238976Sth #include <sys/systeminfo.h> 65b9238976Sth #include <sys/policy.h> 66b9238976Sth #include <sys/sdt.h> 67b9238976Sth #include <sys/list.h> 68b9238976Sth #include <sys/stat.h> 69b9238976Sth #include <sys/mntent.h> 70b9238976Sth 71b9238976Sth #include <rpc/types.h> 72b9238976Sth #include <rpc/auth.h> 73b9238976Sth #include <rpc/clnt.h> 74b9238976Sth 75b9238976Sth #include <nfs/nfs.h> 76b9238976Sth #include <nfs/nfs_clnt.h> 77b9238976Sth #include <nfs/nfs_acl.h> 78b9238976Sth #include <nfs/lm.h> 79b9238976Sth #include <nfs/nfs4.h> 80b9238976Sth #include <nfs/nfs4_kprot.h> 81b9238976Sth #include <nfs/rnode4.h> 82b9238976Sth #include <nfs/nfs4_clnt.h> 83b9238976Sth 84b9238976Sth #include <vm/hat.h> 85b9238976Sth #include <vm/as.h> 86b9238976Sth #include <vm/page.h> 87b9238976Sth #include <vm/pvn.h> 88b9238976Sth #include <vm/seg.h> 89b9238976Sth #include <vm/seg_map.h> 90b9238976Sth #include <vm/seg_kpm.h> 91b9238976Sth #include <vm/seg_vn.h> 92b9238976Sth 93b9238976Sth #include <fs/fs_subr.h> 94b9238976Sth 95b9238976Sth #include <sys/ddi.h> 96b9238976Sth #include <sys/int_fmtio.h> 97b9238976Sth 98f39b8789Sth #include <sys/sunddi.h> 99b9238976Sth 100b9238976Sth /* 101b9238976Sth * The automatic unmounter thread stuff! 102b9238976Sth */ 103b9238976Sth static int nfs4_trigger_thread_timer = 20; /* in seconds */ 104b9238976Sth 105b9238976Sth /* 106b9238976Sth * Just a default.... 107b9238976Sth */ 108b9238976Sth static uint_t nfs4_trigger_mount_to = 240; 109b9238976Sth 110b9238976Sth typedef struct nfs4_trigger_globals { 111b9238976Sth kmutex_t ntg_forest_lock; 112b9238976Sth uint_t ntg_mount_to; 113b9238976Sth int ntg_thread_started; 114b9238976Sth nfs4_ephemeral_tree_t *ntg_forest; 115b9238976Sth } nfs4_trigger_globals_t; 116b9238976Sth 117b9238976Sth kmutex_t nfs4_ephemeral_thread_lock; 118b9238976Sth 119b9238976Sth zone_key_t nfs4_ephemeral_key = ZONE_KEY_UNINITIALIZED; 120b9238976Sth 121b9238976Sth static void nfs4_ephemeral_start_harvester(nfs4_trigger_globals_t *); 122b9238976Sth 123b9238976Sth /* 124b9238976Sth * Used for ephemeral mounts; contains data either duplicated from 125b9238976Sth * servinfo4_t, or hand-crafted, depending on type of ephemeral mount. 126b9238976Sth * 127b9238976Sth * It's intended that this structure is used solely for ephemeral 128b9238976Sth * mount-type specific data, for passing this data to 129b9238976Sth * nfs4_trigger_nargs_create(). 130b9238976Sth */ 131b9238976Sth typedef struct ephemeral_servinfo { 132b9238976Sth char *esi_hostname; 133b9238976Sth char *esi_netname; 134b9238976Sth char *esi_path; 135b9238976Sth int esi_path_len; 136b9238976Sth int esi_mount_flags; 137b9238976Sth struct netbuf *esi_addr; 138b9238976Sth struct netbuf *esi_syncaddr; 139b9238976Sth struct knetconfig *esi_knconf; 140b9238976Sth } ephemeral_servinfo_t; 141b9238976Sth 142b9238976Sth /* 143b9238976Sth * Collect together the mount-type specific and generic data args. 144b9238976Sth */ 145b9238976Sth typedef struct domount_args { 146b9238976Sth ephemeral_servinfo_t *dma_esi; 147b9238976Sth char *dma_hostlist; /* comma-sep. for RO failover */ 148b9238976Sth struct nfs_args *dma_nargs; 149b9238976Sth } domount_args_t; 150b9238976Sth 151b9238976Sth 152b9238976Sth /* 153b9238976Sth * The vnode ops functions for a trigger stub vnode 154b9238976Sth */ 155*da6c28aaSamw static int nfs4_trigger_open(vnode_t **, int, cred_t *, caller_context_t *); 156*da6c28aaSamw static int nfs4_trigger_getattr(vnode_t *, struct vattr *, int, cred_t *, 157*da6c28aaSamw caller_context_t *); 158*da6c28aaSamw static int nfs4_trigger_setattr(vnode_t *, struct vattr *, int, cred_t *, 159*da6c28aaSamw caller_context_t *); 160*da6c28aaSamw static int nfs4_trigger_access(vnode_t *, int, int, cred_t *, 161*da6c28aaSamw caller_context_t *); 162*da6c28aaSamw static int nfs4_trigger_readlink(vnode_t *, struct uio *, cred_t *, 163*da6c28aaSamw caller_context_t *); 164*da6c28aaSamw static int nfs4_trigger_lookup(vnode_t *, char *, vnode_t **, 165*da6c28aaSamw struct pathname *, int, vnode_t *, cred_t *, caller_context_t *, 166*da6c28aaSamw int *, pathname_t *); 167*da6c28aaSamw static int nfs4_trigger_create(vnode_t *, char *, struct vattr *, 168*da6c28aaSamw enum vcexcl, int, vnode_t **, cred_t *, int, caller_context_t *, 169*da6c28aaSamw vsecattr_t *); 170*da6c28aaSamw static int nfs4_trigger_remove(vnode_t *, char *, cred_t *, caller_context_t *, 171*da6c28aaSamw int); 172*da6c28aaSamw static int nfs4_trigger_link(vnode_t *, vnode_t *, char *, cred_t *, 173*da6c28aaSamw caller_context_t *, int); 174*da6c28aaSamw static int nfs4_trigger_rename(vnode_t *, char *, vnode_t *, char *, 175*da6c28aaSamw cred_t *, caller_context_t *, int); 176*da6c28aaSamw static int nfs4_trigger_mkdir(vnode_t *, char *, struct vattr *, 177*da6c28aaSamw vnode_t **, cred_t *, caller_context_t *, int, vsecattr_t *vsecp); 178*da6c28aaSamw static int nfs4_trigger_rmdir(vnode_t *, char *, vnode_t *, cred_t *, 179*da6c28aaSamw caller_context_t *, int); 180*da6c28aaSamw static int nfs4_trigger_symlink(vnode_t *, char *, struct vattr *, char *, 181*da6c28aaSamw cred_t *, caller_context_t *, int); 182*da6c28aaSamw static int nfs4_trigger_cmp(vnode_t *, vnode_t *, caller_context_t *); 183b9238976Sth 184b9238976Sth /* 185b9238976Sth * Regular NFSv4 vnodeops that we need to reference directly 186b9238976Sth */ 187*da6c28aaSamw extern int nfs4_getattr(vnode_t *, struct vattr *, int, cred_t *, 188*da6c28aaSamw caller_context_t *); 189*da6c28aaSamw extern void nfs4_inactive(vnode_t *, cred_t *, caller_context_t *); 190b9238976Sth extern int nfs4_rwlock(vnode_t *, int, caller_context_t *); 191b9238976Sth extern void nfs4_rwunlock(vnode_t *, int, caller_context_t *); 192b9238976Sth extern int nfs4_lookup(vnode_t *, char *, vnode_t **, 193*da6c28aaSamw struct pathname *, int, vnode_t *, cred_t *, 194*da6c28aaSamw caller_context_t *, int *, pathname_t *); 195*da6c28aaSamw extern int nfs4_pathconf(vnode_t *, int, ulong_t *, cred_t *, 196*da6c28aaSamw caller_context_t *); 197*da6c28aaSamw extern int nfs4_getsecattr(vnode_t *, vsecattr_t *, int, cred_t *, 198*da6c28aaSamw caller_context_t *); 199*da6c28aaSamw extern int nfs4_fid(vnode_t *, fid_t *, caller_context_t *); 200*da6c28aaSamw extern int nfs4_realvp(vnode_t *, vnode_t **, caller_context_t *); 201b9238976Sth 202b9238976Sth static int nfs4_trigger_mount(vnode_t *, vnode_t **); 203b9238976Sth static int nfs4_trigger_domount(vnode_t *, domount_args_t *, vfs_t **, 204b9238976Sth cred_t *); 205b9238976Sth static domount_args_t *nfs4_trigger_domount_args_create(vnode_t *); 206b9238976Sth static void nfs4_trigger_domount_args_destroy(domount_args_t *dma, 207b9238976Sth vnode_t *vp); 208b9238976Sth static ephemeral_servinfo_t *nfs4_trigger_esi_create(vnode_t *, servinfo4_t *); 209b9238976Sth static void nfs4_trigger_esi_destroy(ephemeral_servinfo_t *, vnode_t *); 210b9238976Sth static ephemeral_servinfo_t *nfs4_trigger_esi_create_mirrormount(vnode_t *, 211b9238976Sth servinfo4_t *); 212b9238976Sth static struct nfs_args *nfs4_trigger_nargs_create(mntinfo4_t *, servinfo4_t *, 213b9238976Sth ephemeral_servinfo_t *); 214b9238976Sth static void nfs4_trigger_nargs_destroy(struct nfs_args *); 215b9238976Sth static char *nfs4_trigger_create_mntopts(vfs_t *); 216b9238976Sth static void nfs4_trigger_destroy_mntopts(char *); 217b9238976Sth static int nfs4_trigger_add_mntopt(char *, char *, vfs_t *); 218b9238976Sth static enum clnt_stat nfs4_trigger_ping_server(servinfo4_t *, int); 219b9238976Sth 220b9238976Sth extern int umount2_engine(vfs_t *, int, cred_t *, int); 221b9238976Sth 222b9238976Sth 223b9238976Sth vnodeops_t *nfs4_trigger_vnodeops; 224b9238976Sth 225b9238976Sth /* 226b9238976Sth * These are the vnodeops that we must define for stub vnodes. 227b9238976Sth * 228b9238976Sth * 229b9238976Sth * Many of the VOPs defined for NFSv4 do not need to be defined here, 230b9238976Sth * for various reasons. This will result in the VFS default function being 231b9238976Sth * used: 232b9238976Sth * 233b9238976Sth * - These VOPs require a previous VOP_OPEN to have occurred. That will have 234b9238976Sth * lost the reference to the stub vnode, meaning these should not be called: 235b9238976Sth * close, read, write, ioctl, readdir, seek. 236b9238976Sth * 237b9238976Sth * - These VOPs are meaningless for vnodes without data pages. Since the 238b9238976Sth * stub vnode is of type VDIR, these should not be called: 239b9238976Sth * space, getpage, putpage, map, addmap, delmap, pageio, fsync. 240b9238976Sth * 241b9238976Sth * - These VOPs are otherwise not applicable, and should not be called: 242b9238976Sth * dump, setsecattr. 243b9238976Sth * 244b9238976Sth * 245b9238976Sth * These VOPs we do not want to define, but nor do we want the VFS default 246b9238976Sth * action. Instead, we specify the VFS error function, with fs_error(), but 247b9238976Sth * note that fs_error() is not actually called. Instead it results in the 248b9238976Sth * use of the error function defined for the particular VOP, in vn_ops_table[]: 249b9238976Sth * 250b9238976Sth * - frlock, dispose, shrlock. 251b9238976Sth * 252b9238976Sth * 253b9238976Sth * These VOPs we define to use the corresponding regular NFSv4 vnodeop. 254b9238976Sth * NOTE: if any of these ops involve an OTW call with the stub FH, then 255b9238976Sth * that call must be wrapped with save_mnt_secinfo()/check_mnt_secinfo() 256b9238976Sth * to protect the security data in the servinfo4_t for the "parent" 257b9238976Sth * filesystem that contains the stub. 258b9238976Sth * 259b9238976Sth * - These VOPs should not trigger a mount, so that "ls -l" does not: 260b9238976Sth * pathconf, getsecattr. 261b9238976Sth * 262b9238976Sth * - These VOPs would not make sense to trigger: 263b9238976Sth * inactive, rwlock, rwunlock, fid, realvp. 264b9238976Sth */ 265b9238976Sth const fs_operation_def_t nfs4_trigger_vnodeops_template[] = { 266b9238976Sth VOPNAME_OPEN, { .vop_open = nfs4_trigger_open }, 267b9238976Sth VOPNAME_GETATTR, { .vop_getattr = nfs4_trigger_getattr }, 268b9238976Sth VOPNAME_SETATTR, { .vop_setattr = nfs4_trigger_setattr }, 269b9238976Sth VOPNAME_ACCESS, { .vop_access = nfs4_trigger_access }, 270b9238976Sth VOPNAME_LOOKUP, { .vop_lookup = nfs4_trigger_lookup }, 271b9238976Sth VOPNAME_CREATE, { .vop_create = nfs4_trigger_create }, 272b9238976Sth VOPNAME_REMOVE, { .vop_remove = nfs4_trigger_remove }, 273b9238976Sth VOPNAME_LINK, { .vop_link = nfs4_trigger_link }, 274b9238976Sth VOPNAME_RENAME, { .vop_rename = nfs4_trigger_rename }, 275b9238976Sth VOPNAME_MKDIR, { .vop_mkdir = nfs4_trigger_mkdir }, 276b9238976Sth VOPNAME_RMDIR, { .vop_rmdir = nfs4_trigger_rmdir }, 277b9238976Sth VOPNAME_SYMLINK, { .vop_symlink = nfs4_trigger_symlink }, 278b9238976Sth VOPNAME_READLINK, { .vop_readlink = nfs4_trigger_readlink }, 279b9238976Sth VOPNAME_INACTIVE, { .vop_inactive = nfs4_inactive }, 280b9238976Sth VOPNAME_FID, { .vop_fid = nfs4_fid }, 281b9238976Sth VOPNAME_RWLOCK, { .vop_rwlock = nfs4_rwlock }, 282b9238976Sth VOPNAME_RWUNLOCK, { .vop_rwunlock = nfs4_rwunlock }, 283b9238976Sth VOPNAME_REALVP, { .vop_realvp = nfs4_realvp }, 284b9238976Sth VOPNAME_GETSECATTR, { .vop_getsecattr = nfs4_getsecattr }, 285b9238976Sth VOPNAME_PATHCONF, { .vop_pathconf = nfs4_pathconf }, 286b9238976Sth VOPNAME_FRLOCK, { .error = fs_error }, 287b9238976Sth VOPNAME_DISPOSE, { .error = fs_error }, 288b9238976Sth VOPNAME_SHRLOCK, { .error = fs_error }, 289b9238976Sth VOPNAME_VNEVENT, { .vop_vnevent = fs_vnevent_support }, 290b9238976Sth NULL, NULL 291b9238976Sth }; 292b9238976Sth 293b9238976Sth /* 294b9238976Sth * Trigger ops for stub vnodes; for mirror mounts, etc. 295b9238976Sth * 296b9238976Sth * The general idea is that a "triggering" op will first call 297b9238976Sth * nfs4_trigger_mount(), which will find out whether a mount has already 298b9238976Sth * been triggered. 299b9238976Sth * 300b9238976Sth * If it has, then nfs4_trigger_mount() sets newvp to the root vnode 301b9238976Sth * of the covering vfs. 302b9238976Sth * 303b9238976Sth * If a mount has not yet been triggered, nfs4_trigger_mount() will do so, 304b9238976Sth * and again set newvp, as above. 305b9238976Sth * 306b9238976Sth * The triggering op may then re-issue the VOP by calling it on newvp. 307b9238976Sth * 308b9238976Sth * Note that some ops may perform custom action, and may or may not need 309b9238976Sth * to trigger a mount. 310b9238976Sth * 311b9238976Sth * Some ops need to call the regular NFSv4 vnodeop for a stub vnode. We 312b9238976Sth * obviously can't do this with VOP_<whatever>, since it's a stub vnode 313b9238976Sth * and that would just recurse. Instead, we call the v4 op directly, 314b9238976Sth * by name. This is OK, since we know that the vnode is for NFSv4, 315b9238976Sth * otherwise it couldn't be a stub. 316b9238976Sth * 317b9238976Sth */ 318b9238976Sth 319b9238976Sth static int 320*da6c28aaSamw nfs4_trigger_open(vnode_t **vpp, int flag, cred_t *cr, caller_context_t *ct) 321b9238976Sth { 322b9238976Sth int error; 323b9238976Sth vnode_t *newvp; 324b9238976Sth 325b9238976Sth error = nfs4_trigger_mount(*vpp, &newvp); 326b9238976Sth if (error) 327b9238976Sth return (error); 328b9238976Sth 329b9238976Sth /* Release the stub vnode, as we're losing the reference to it */ 330b9238976Sth VN_RELE(*vpp); 331b9238976Sth 332b9238976Sth /* Give the caller the root vnode of the newly-mounted fs */ 333b9238976Sth *vpp = newvp; 334b9238976Sth 335b9238976Sth /* return with VN_HELD(newvp) */ 336*da6c28aaSamw return (VOP_OPEN(vpp, flag, cr, ct)); 337b9238976Sth } 338b9238976Sth 339b9238976Sth /* 340b9238976Sth * For the majority of cases, nfs4_trigger_getattr() will not trigger 341b9238976Sth * a mount. However, if ATTR_TRIGGER is set, we are being informed 342b9238976Sth * that we need to force the mount before we attempt to determine 343b9238976Sth * the attributes. The intent is an atomic operation for security 344b9238976Sth * testing. 345b9238976Sth */ 346b9238976Sth static int 347*da6c28aaSamw nfs4_trigger_getattr(vnode_t *vp, struct vattr *vap, int flags, cred_t *cr, 348*da6c28aaSamw caller_context_t *ct) 349b9238976Sth { 350b9238976Sth int error; 351b9238976Sth 352b9238976Sth if (flags & ATTR_TRIGGER) { 353b9238976Sth vnode_t *newvp; 354b9238976Sth 355b9238976Sth error = nfs4_trigger_mount(vp, &newvp); 356b9238976Sth if (error) 357b9238976Sth return (error); 358b9238976Sth 359*da6c28aaSamw error = VOP_GETATTR(newvp, vap, flags, cr, ct); 360b9238976Sth VN_RELE(newvp); 361b9238976Sth } else { 362*da6c28aaSamw error = nfs4_getattr(vp, vap, flags, cr, ct); 363b9238976Sth } 364b9238976Sth 365b9238976Sth return (error); 366b9238976Sth } 367b9238976Sth 368b9238976Sth static int 369b9238976Sth nfs4_trigger_setattr(vnode_t *vp, struct vattr *vap, int flags, cred_t *cr, 370b9238976Sth caller_context_t *ct) 371b9238976Sth { 372b9238976Sth int error; 373b9238976Sth vnode_t *newvp; 374b9238976Sth 375b9238976Sth error = nfs4_trigger_mount(vp, &newvp); 376b9238976Sth if (error) 377b9238976Sth return (error); 378b9238976Sth 379b9238976Sth error = VOP_SETATTR(newvp, vap, flags, cr, ct); 380b9238976Sth VN_RELE(newvp); 381b9238976Sth 382b9238976Sth return (error); 383b9238976Sth } 384b9238976Sth 385b9238976Sth static int 386*da6c28aaSamw nfs4_trigger_access(vnode_t *vp, int mode, int flags, cred_t *cr, 387*da6c28aaSamw caller_context_t *ct) 388b9238976Sth { 389b9238976Sth int error; 390b9238976Sth vnode_t *newvp; 391b9238976Sth 392b9238976Sth error = nfs4_trigger_mount(vp, &newvp); 393b9238976Sth if (error) 394b9238976Sth return (error); 395b9238976Sth 396*da6c28aaSamw error = VOP_ACCESS(newvp, mode, flags, cr, ct); 397b9238976Sth VN_RELE(newvp); 398b9238976Sth 399b9238976Sth return (error); 400b9238976Sth } 401b9238976Sth 402b9238976Sth static int 403*da6c28aaSamw nfs4_trigger_lookup(vnode_t *dvp, char *nm, vnode_t **vpp, 404*da6c28aaSamw struct pathname *pnp, int flags, vnode_t *rdir, cred_t *cr, 405*da6c28aaSamw caller_context_t *ct, int *deflags, pathname_t *rpnp) 406b9238976Sth { 407b9238976Sth int error; 408b9238976Sth vnode_t *newdvp; 409b9238976Sth rnode4_t *drp = VTOR4(dvp); 410b9238976Sth 411b9238976Sth ASSERT(RP_ISSTUB(drp)); 412b9238976Sth 413b9238976Sth /* for now, we only support mirror-mounts */ 414b9238976Sth ASSERT(RP_ISSTUB_MIRRORMOUNT(drp)); 415b9238976Sth 416b9238976Sth /* 417b9238976Sth * It's not legal to lookup ".." for an fs root, so we mustn't pass 418b9238976Sth * that up. Instead, pass onto the regular op, regardless of whether 419b9238976Sth * we've triggered a mount. 420b9238976Sth */ 421b9238976Sth if (strcmp(nm, "..") == 0) 422*da6c28aaSamw return (nfs4_lookup(dvp, nm, vpp, pnp, flags, rdir, cr, 423*da6c28aaSamw ct, deflags, rpnp)); 424b9238976Sth 425b9238976Sth error = nfs4_trigger_mount(dvp, &newdvp); 426b9238976Sth if (error) 427b9238976Sth return (error); 428b9238976Sth 429*da6c28aaSamw error = VOP_LOOKUP(newdvp, nm, vpp, pnp, flags, rdir, cr, ct, 430*da6c28aaSamw deflags, rpnp); 431b9238976Sth VN_RELE(newdvp); 432b9238976Sth 433b9238976Sth return (error); 434b9238976Sth } 435b9238976Sth 436b9238976Sth static int 437b9238976Sth nfs4_trigger_create(vnode_t *dvp, char *nm, struct vattr *va, 438*da6c28aaSamw enum vcexcl exclusive, int mode, vnode_t **vpp, cred_t *cr, 439*da6c28aaSamw int flags, caller_context_t *ct, vsecattr_t *vsecp) 440b9238976Sth { 441b9238976Sth int error; 442b9238976Sth vnode_t *newdvp; 443b9238976Sth 444b9238976Sth error = nfs4_trigger_mount(dvp, &newdvp); 445b9238976Sth if (error) 446b9238976Sth return (error); 447b9238976Sth 448*da6c28aaSamw error = VOP_CREATE(newdvp, nm, va, exclusive, mode, vpp, cr, 449*da6c28aaSamw flags, ct, vsecp); 450b9238976Sth VN_RELE(newdvp); 451b9238976Sth 452b9238976Sth return (error); 453b9238976Sth } 454b9238976Sth 455b9238976Sth static int 456*da6c28aaSamw nfs4_trigger_remove(vnode_t *dvp, char *nm, cred_t *cr, caller_context_t *ct, 457*da6c28aaSamw int flags) 458b9238976Sth { 459b9238976Sth int error; 460b9238976Sth vnode_t *newdvp; 461b9238976Sth 462b9238976Sth error = nfs4_trigger_mount(dvp, &newdvp); 463b9238976Sth if (error) 464b9238976Sth return (error); 465b9238976Sth 466*da6c28aaSamw error = VOP_REMOVE(newdvp, nm, cr, ct, flags); 467b9238976Sth VN_RELE(newdvp); 468b9238976Sth 469b9238976Sth return (error); 470b9238976Sth } 471b9238976Sth 472b9238976Sth static int 473*da6c28aaSamw nfs4_trigger_link(vnode_t *tdvp, vnode_t *svp, char *tnm, cred_t *cr, 474*da6c28aaSamw caller_context_t *ct, int flags) 475b9238976Sth { 476b9238976Sth int error; 477b9238976Sth vnode_t *newtdvp; 478b9238976Sth 479b9238976Sth error = nfs4_trigger_mount(tdvp, &newtdvp); 480b9238976Sth if (error) 481b9238976Sth return (error); 482b9238976Sth 483b9238976Sth /* 484b9238976Sth * We don't check whether svp is a stub. Let the NFSv4 code 485b9238976Sth * detect that error, and return accordingly. 486b9238976Sth */ 487*da6c28aaSamw error = VOP_LINK(newtdvp, svp, tnm, cr, ct, flags); 488b9238976Sth VN_RELE(newtdvp); 489b9238976Sth 490b9238976Sth return (error); 491b9238976Sth } 492b9238976Sth 493b9238976Sth static int 494b9238976Sth nfs4_trigger_rename(vnode_t *sdvp, char *snm, vnode_t *tdvp, char *tnm, 495*da6c28aaSamw cred_t *cr, caller_context_t *ct, int flags) 496b9238976Sth { 497b9238976Sth int error; 498b9238976Sth vnode_t *newsdvp; 499b9238976Sth rnode4_t *tdrp = VTOR4(tdvp); 500b9238976Sth 501b9238976Sth /* 502b9238976Sth * We know that sdvp is a stub, otherwise we would not be here. 503b9238976Sth * 504b9238976Sth * If tdvp is also be a stub, there are two possibilities: it 505b9238976Sth * is either the same stub as sdvp [i.e. VN_CMP(sdvp, tdvp)] 506b9238976Sth * or it is a different stub [!VN_CMP(sdvp, tdvp)]. 507b9238976Sth * 508b9238976Sth * In the former case, just trigger sdvp, and treat tdvp as 509b9238976Sth * though it were not a stub. 510b9238976Sth * 511b9238976Sth * In the latter case, it might be a different stub for the 512b9238976Sth * same server fs as sdvp, or for a different server fs. 513b9238976Sth * Regardless, from the client perspective this would still 514b9238976Sth * be a cross-filesystem rename, and should not be allowed, 515b9238976Sth * so return EXDEV, without triggering either mount. 516b9238976Sth */ 517b9238976Sth if (RP_ISSTUB(tdrp) && !VN_CMP(sdvp, tdvp)) 518b9238976Sth return (EXDEV); 519b9238976Sth 520b9238976Sth error = nfs4_trigger_mount(sdvp, &newsdvp); 521b9238976Sth if (error) 522b9238976Sth return (error); 523b9238976Sth 524*da6c28aaSamw error = VOP_RENAME(newsdvp, snm, tdvp, tnm, cr, ct, flags); 525b9238976Sth 526b9238976Sth VN_RELE(newsdvp); 527b9238976Sth 528b9238976Sth return (error); 529b9238976Sth } 530b9238976Sth 531*da6c28aaSamw /* ARGSUSED */ 532b9238976Sth static int 533b9238976Sth nfs4_trigger_mkdir(vnode_t *dvp, char *nm, struct vattr *va, vnode_t **vpp, 534*da6c28aaSamw cred_t *cr, caller_context_t *ct, int flags, vsecattr_t *vsecp) 535b9238976Sth { 536b9238976Sth int error; 537b9238976Sth vnode_t *newdvp; 538b9238976Sth 539b9238976Sth error = nfs4_trigger_mount(dvp, &newdvp); 540b9238976Sth if (error) 541b9238976Sth return (error); 542b9238976Sth 543*da6c28aaSamw error = VOP_MKDIR(newdvp, nm, va, vpp, cr, ct, flags, vsecp); 544b9238976Sth VN_RELE(newdvp); 545b9238976Sth 546b9238976Sth return (error); 547b9238976Sth } 548b9238976Sth 549b9238976Sth static int 550*da6c28aaSamw nfs4_trigger_rmdir(vnode_t *dvp, char *nm, vnode_t *cdir, cred_t *cr, 551*da6c28aaSamw caller_context_t *ct, int flags) 552b9238976Sth { 553b9238976Sth int error; 554b9238976Sth vnode_t *newdvp; 555b9238976Sth 556b9238976Sth error = nfs4_trigger_mount(dvp, &newdvp); 557b9238976Sth if (error) 558b9238976Sth return (error); 559b9238976Sth 560*da6c28aaSamw error = VOP_RMDIR(newdvp, nm, cdir, cr, ct, flags); 561b9238976Sth VN_RELE(newdvp); 562b9238976Sth 563b9238976Sth return (error); 564b9238976Sth } 565b9238976Sth 566b9238976Sth static int 567b9238976Sth nfs4_trigger_symlink(vnode_t *dvp, char *lnm, struct vattr *tva, char *tnm, 568*da6c28aaSamw cred_t *cr, caller_context_t *ct, int flags) 569b9238976Sth { 570b9238976Sth int error; 571b9238976Sth vnode_t *newdvp; 572b9238976Sth 573b9238976Sth error = nfs4_trigger_mount(dvp, &newdvp); 574b9238976Sth if (error) 575b9238976Sth return (error); 576b9238976Sth 577*da6c28aaSamw error = VOP_SYMLINK(newdvp, lnm, tva, tnm, cr, ct, flags); 578b9238976Sth VN_RELE(newdvp); 579b9238976Sth 580b9238976Sth return (error); 581b9238976Sth } 582b9238976Sth 583b9238976Sth static int 584*da6c28aaSamw nfs4_trigger_readlink(vnode_t *vp, struct uio *uiop, cred_t *cr, 585*da6c28aaSamw caller_context_t *ct) 586b9238976Sth { 587b9238976Sth int error; 588b9238976Sth vnode_t *newvp; 589b9238976Sth 590b9238976Sth error = nfs4_trigger_mount(vp, &newvp); 591b9238976Sth if (error) 592b9238976Sth return (error); 593b9238976Sth 594*da6c28aaSamw error = VOP_READLINK(newvp, uiop, cr, ct); 595b9238976Sth VN_RELE(newvp); 596b9238976Sth 597b9238976Sth return (error); 598b9238976Sth } 599b9238976Sth 600b9238976Sth /* end of trigger vnode ops */ 601b9238976Sth 602b9238976Sth 603b9238976Sth /* 604b9238976Sth * Mount upon a trigger vnode; for mirror-mounts, etc. 605b9238976Sth * 606b9238976Sth * The mount may have already occurred, via another thread. If not, 607b9238976Sth * assemble the location information - which may require fetching - and 608b9238976Sth * perform the mount. 609b9238976Sth * 610b9238976Sth * Sets newvp to be the root of the fs that is now covering vp. Note 611b9238976Sth * that we return with VN_HELD(*newvp). 612b9238976Sth * 613b9238976Sth * The caller is responsible for passing the VOP onto the covering fs. 614b9238976Sth */ 615b9238976Sth static int 616b9238976Sth nfs4_trigger_mount(vnode_t *vp, vnode_t **newvpp) 617b9238976Sth { 618b9238976Sth int error; 619b9238976Sth vfs_t *vfsp; 620b9238976Sth rnode4_t *rp = VTOR4(vp); 621b9238976Sth mntinfo4_t *mi = VTOMI4(vp); 622b9238976Sth domount_args_t *dma; 623b9238976Sth 624b9238976Sth nfs4_ephemeral_tree_t *net; 625b9238976Sth 626b9238976Sth bool_t must_unlock = FALSE; 627b9238976Sth bool_t is_building = FALSE; 628b9238976Sth 629b9238976Sth cred_t *zcred; 630b9238976Sth 631b9238976Sth nfs4_trigger_globals_t *ntg; 632b9238976Sth 633b9238976Sth zone_t *zone = curproc->p_zone; 634b9238976Sth 635b9238976Sth ASSERT(RP_ISSTUB(rp)); 636b9238976Sth 637b9238976Sth /* for now, we only support mirror-mounts */ 638b9238976Sth ASSERT(RP_ISSTUB_MIRRORMOUNT(rp)); 639b9238976Sth 640b9238976Sth *newvpp = NULL; 641b9238976Sth 642b9238976Sth /* 643b9238976Sth * Has the mount already occurred? 644b9238976Sth */ 645b9238976Sth error = vn_vfsrlock_wait(vp); 646b9238976Sth if (error) 647b9238976Sth goto done; 648b9238976Sth vfsp = vn_mountedvfs(vp); 649b9238976Sth if (vfsp != NULL) { 650b9238976Sth /* the mount has already occurred */ 651b9238976Sth error = VFS_ROOT(vfsp, newvpp); 652b9238976Sth if (!error) { 653b9238976Sth /* need to update the reference time */ 654b9238976Sth mutex_enter(&mi->mi_lock); 655b9238976Sth if (mi->mi_ephemeral) 656b9238976Sth mi->mi_ephemeral->ne_ref_time = 657b9238976Sth gethrestime_sec(); 658b9238976Sth mutex_exit(&mi->mi_lock); 659b9238976Sth } 660b9238976Sth 661b9238976Sth vn_vfsunlock(vp); 662b9238976Sth goto done; 663b9238976Sth } 664b9238976Sth vn_vfsunlock(vp); 665b9238976Sth 666b9238976Sth ntg = zone_getspecific(nfs4_ephemeral_key, zone); 667b9238976Sth ASSERT(ntg != NULL); 668b9238976Sth 669b9238976Sth mutex_enter(&mi->mi_lock); 670b9238976Sth 671b9238976Sth /* 672b9238976Sth * We need to lock down the ephemeral tree. 673b9238976Sth */ 674b9238976Sth if (mi->mi_ephemeral_tree == NULL) { 675b9238976Sth net = kmem_zalloc(sizeof (*net), KM_SLEEP); 676b9238976Sth mutex_init(&net->net_tree_lock, NULL, MUTEX_DEFAULT, NULL); 677b9238976Sth mutex_init(&net->net_cnt_lock, NULL, MUTEX_DEFAULT, NULL); 678b9238976Sth net->net_refcnt = 1; 679b9238976Sth net->net_status = NFS4_EPHEMERAL_TREE_BUILDING; 680b9238976Sth is_building = TRUE; 681b9238976Sth 682b9238976Sth /* 683b9238976Sth * We need to add it to the zone specific list for 684b9238976Sth * automatic unmounting and harvesting of deadwood. 685b9238976Sth */ 686b9238976Sth mutex_enter(&ntg->ntg_forest_lock); 687b9238976Sth if (ntg->ntg_forest != NULL) 688b9238976Sth net->net_next = ntg->ntg_forest; 689b9238976Sth ntg->ntg_forest = net; 690b9238976Sth mutex_exit(&ntg->ntg_forest_lock); 691b9238976Sth 692b9238976Sth /* 693b9238976Sth * No lock order confusion with mi_lock because no 694b9238976Sth * other node could have grabbed net_tree_lock. 695b9238976Sth */ 696b9238976Sth mutex_enter(&net->net_tree_lock); 697b9238976Sth mi->mi_ephemeral_tree = net; 698b9238976Sth net->net_mount = mi; 699b9238976Sth mutex_exit(&mi->mi_lock); 700b9238976Sth } else { 701b9238976Sth net = mi->mi_ephemeral_tree; 702b9238976Sth mutex_exit(&mi->mi_lock); 703b9238976Sth 704b9238976Sth mutex_enter(&net->net_cnt_lock); 705b9238976Sth net->net_refcnt++; 706b9238976Sth mutex_exit(&net->net_cnt_lock); 707b9238976Sth 708b9238976Sth /* 709b9238976Sth * Note that we do not do any checks to 710b9238976Sth * see if the parent has been nuked. 711b9238976Sth * We count on the vfs layer having protected 712b9238976Sth * us from feet shooters. 713b9238976Sth */ 714b9238976Sth mutex_enter(&net->net_tree_lock); 715b9238976Sth } 716b9238976Sth 717b9238976Sth mutex_enter(&net->net_cnt_lock); 718b9238976Sth net->net_status |= NFS4_EPHEMERAL_TREE_MOUNTING; 719b9238976Sth mutex_exit(&net->net_cnt_lock); 720b9238976Sth 721b9238976Sth must_unlock = TRUE; 722b9238976Sth 723b9238976Sth dma = nfs4_trigger_domount_args_create(vp); 724b9238976Sth if (dma == NULL) { 725b9238976Sth error = EINVAL; 726b9238976Sth goto done; 727b9238976Sth } 728b9238976Sth 729b9238976Sth /* 730b9238976Sth * Need to be root for this call to make mount work. 731b9238976Sth * Note that since we define mirror mounts to work 732b9238976Sth * for any user, we allow the mount to proceed. And 733b9238976Sth * we realize that the server will perform security 734b9238976Sth * checks to make sure that the client is allowed 735b9238976Sth * access. Finally, once the mount takes place, 736b9238976Sth * directory permissions will ensure that the 737b9238976Sth * content is secure. 738b9238976Sth */ 739b9238976Sth zcred = zone_get_kcred(getzoneid()); 740b9238976Sth ASSERT(zcred != NULL); 741b9238976Sth 742b9238976Sth error = nfs4_trigger_domount(vp, dma, &vfsp, zcred); 743b9238976Sth nfs4_trigger_domount_args_destroy(dma, vp); 744b9238976Sth 745b9238976Sth crfree(zcred); 746b9238976Sth 747b9238976Sth if (!error) 748b9238976Sth error = VFS_ROOT(vfsp, newvpp); 749b9238976Sth done: 750b9238976Sth if (must_unlock) { 751b9238976Sth mutex_enter(&net->net_cnt_lock); 752b9238976Sth net->net_status &= ~NFS4_EPHEMERAL_TREE_MOUNTING; 753b9238976Sth if (is_building) 754b9238976Sth net->net_status &= ~NFS4_EPHEMERAL_TREE_BUILDING; 755b9238976Sth net->net_refcnt--; 756b9238976Sth mutex_exit(&net->net_cnt_lock); 757b9238976Sth 758b9238976Sth mutex_exit(&net->net_tree_lock); 759b9238976Sth } 760b9238976Sth 761b9238976Sth if (!error && (newvpp == NULL || *newvpp == NULL)) 762b9238976Sth error = ENOSYS; 763b9238976Sth 764b9238976Sth return (error); 765b9238976Sth } 766b9238976Sth 767b9238976Sth /* 768b9238976Sth * Collect together both the generic & mount-type specific args. 769b9238976Sth */ 770b9238976Sth static domount_args_t * 771b9238976Sth nfs4_trigger_domount_args_create(vnode_t *vp) 772b9238976Sth { 773b9238976Sth int nointr; 774b9238976Sth char *hostlist; 775b9238976Sth servinfo4_t *svp; 776b9238976Sth struct nfs_args *nargs, *nargs_head; 777b9238976Sth enum clnt_stat status; 778b9238976Sth ephemeral_servinfo_t *esi, *esi_first; 779b9238976Sth domount_args_t *dma; 780b9238976Sth mntinfo4_t *mi = VTOMI4(vp); 781b9238976Sth 782b9238976Sth nointr = !(mi->mi_flags & MI4_INT); 783b9238976Sth hostlist = kmem_zalloc(MAXPATHLEN, KM_SLEEP); 784b9238976Sth 785b9238976Sth svp = mi->mi_curr_serv; 786b9238976Sth /* check if the current server is responding */ 787b9238976Sth status = nfs4_trigger_ping_server(svp, nointr); 788b9238976Sth if (status == RPC_SUCCESS) { 789b9238976Sth esi_first = nfs4_trigger_esi_create(vp, svp); 790b9238976Sth if (esi_first == NULL) { 791b9238976Sth kmem_free(hostlist, MAXPATHLEN); 792b9238976Sth return (NULL); 793b9238976Sth } 794b9238976Sth 795b9238976Sth (void) strlcpy(hostlist, esi_first->esi_hostname, MAXPATHLEN); 796b9238976Sth 797b9238976Sth nargs_head = nfs4_trigger_nargs_create(mi, svp, esi_first); 798b9238976Sth } else { 799b9238976Sth /* current server did not respond */ 800b9238976Sth esi_first = NULL; 801b9238976Sth nargs_head = NULL; 802b9238976Sth } 803b9238976Sth nargs = nargs_head; 804b9238976Sth 805b9238976Sth /* 806b9238976Sth * NFS RO failover. 807b9238976Sth * 808b9238976Sth * If we have multiple servinfo4 structures, linked via sv_next, 809b9238976Sth * we must create one nfs_args for each, linking the nfs_args via 810b9238976Sth * nfs_ext_u.nfs_extB.next. 811b9238976Sth * 812b9238976Sth * We need to build a corresponding esi for each, too, but that is 813b9238976Sth * used solely for building nfs_args, and may be immediately 814b9238976Sth * discarded, as domount() requires the info from just one esi, 815b9238976Sth * but all the nfs_args. 816b9238976Sth * 817b9238976Sth * Currently, the NFS mount code will hang if not all servers 818b9238976Sth * requested are available. To avoid that, we need to ping each 819b9238976Sth * server, here, and remove it from the list if it is not 820b9238976Sth * responding. This has the side-effect of that server then 821b9238976Sth * being permanently unavailable for this failover mount, even if 822b9238976Sth * it recovers. That's unfortunate, but the best we can do until 823b9238976Sth * the mount code path is fixed. 824b9238976Sth */ 825b9238976Sth 826b9238976Sth /* 827b9238976Sth * If the current server was down, loop indefinitely until we find 828b9238976Sth * at least one responsive server. 829b9238976Sth */ 830b9238976Sth do { 831b9238976Sth /* no locking needed for sv_next; it is only set at fs mount */ 832b9238976Sth for (svp = mi->mi_servers; svp != NULL; svp = svp->sv_next) { 833b9238976Sth struct nfs_args *next; 834b9238976Sth 835b9238976Sth /* 836b9238976Sth * nargs_head: the head of the nfs_args list 837b9238976Sth * nargs: the current tail of the list 838b9238976Sth * next: the newly-created element to be added 839b9238976Sth */ 840b9238976Sth 841b9238976Sth /* 842b9238976Sth * We've already tried the current server, above; 843b9238976Sth * if it was responding, we have already included it 844b9238976Sth * and it may now be ignored. 845b9238976Sth * 846b9238976Sth * Otherwise, try it again, since it may now have 847b9238976Sth * recovered. 848b9238976Sth */ 849b9238976Sth if (svp == mi->mi_curr_serv && esi_first != NULL) 850b9238976Sth continue; 851b9238976Sth 852b9238976Sth (void) nfs_rw_enter_sig(&svp->sv_lock, RW_READER, 0); 853b9238976Sth if (svp->sv_flags & SV4_NOTINUSE) { 854b9238976Sth nfs_rw_exit(&svp->sv_lock); 855b9238976Sth continue; 856b9238976Sth } 857b9238976Sth nfs_rw_exit(&svp->sv_lock); 858b9238976Sth 859b9238976Sth /* check if the server is responding */ 860b9238976Sth status = nfs4_trigger_ping_server(svp, nointr); 861b9238976Sth /* if the server did not respond, ignore it */ 862b9238976Sth if (status != RPC_SUCCESS) 863b9238976Sth continue; 864b9238976Sth 865b9238976Sth esi = nfs4_trigger_esi_create(vp, svp); 866b9238976Sth if (esi == NULL) 867b9238976Sth continue; 868b9238976Sth 869b9238976Sth /* 870b9238976Sth * If the original current server (mi_curr_serv) 871b9238976Sth * was down when when we first tried it, 872b9238976Sth * (i.e. esi_first == NULL), 873b9238976Sth * we select this new server (svp) to be the server 874b9238976Sth * that we will actually contact (esi_first). 875b9238976Sth * 876b9238976Sth * Note that it's possible that mi_curr_serv == svp, 877b9238976Sth * if that mi_curr_serv was down but has now recovered. 878b9238976Sth */ 879b9238976Sth next = nfs4_trigger_nargs_create(mi, svp, esi); 880b9238976Sth if (esi_first == NULL) { 881b9238976Sth ASSERT(nargs == NULL); 882b9238976Sth ASSERT(nargs_head == NULL); 883b9238976Sth nargs_head = next; 884b9238976Sth esi_first = esi; 885b9238976Sth (void) strlcpy(hostlist, 886b9238976Sth esi_first->esi_hostname, MAXPATHLEN); 887b9238976Sth } else { 888b9238976Sth ASSERT(nargs_head != NULL); 889b9238976Sth nargs->nfs_ext_u.nfs_extB.next = next; 890b9238976Sth (void) strlcat(hostlist, ",", MAXPATHLEN); 891b9238976Sth (void) strlcat(hostlist, esi->esi_hostname, 892b9238976Sth MAXPATHLEN); 893b9238976Sth /* esi was only needed for hostname & nargs */ 894b9238976Sth nfs4_trigger_esi_destroy(esi, vp); 895b9238976Sth } 896b9238976Sth 897b9238976Sth nargs = next; 898b9238976Sth } 899b9238976Sth 900b9238976Sth /* if we've had no response at all, wait a second */ 901b9238976Sth if (esi_first == NULL) 902b9238976Sth delay(drv_usectohz(1000000)); 903b9238976Sth 904b9238976Sth } while (esi_first == NULL); 905b9238976Sth ASSERT(nargs_head != NULL); 906b9238976Sth 907b9238976Sth dma = kmem_zalloc(sizeof (domount_args_t), KM_SLEEP); 908b9238976Sth dma->dma_esi = esi_first; 909b9238976Sth dma->dma_hostlist = hostlist; 910b9238976Sth dma->dma_nargs = nargs_head; 911b9238976Sth 912b9238976Sth return (dma); 913b9238976Sth } 914b9238976Sth 915b9238976Sth static void 916b9238976Sth nfs4_trigger_domount_args_destroy(domount_args_t *dma, vnode_t *vp) 917b9238976Sth { 918b9238976Sth if (dma != NULL) { 919b9238976Sth if (dma->dma_esi != NULL && vp != NULL) 920b9238976Sth nfs4_trigger_esi_destroy(dma->dma_esi, vp); 921b9238976Sth 922b9238976Sth if (dma->dma_hostlist != NULL) 923b9238976Sth kmem_free(dma->dma_hostlist, MAXPATHLEN); 924b9238976Sth 925b9238976Sth if (dma->dma_nargs != NULL) { 926b9238976Sth struct nfs_args *nargs = dma->dma_nargs; 927b9238976Sth 928b9238976Sth do { 929b9238976Sth struct nfs_args *next = 930b9238976Sth nargs->nfs_ext_u.nfs_extB.next; 931b9238976Sth 932b9238976Sth nfs4_trigger_nargs_destroy(nargs); 933b9238976Sth nargs = next; 934b9238976Sth } while (nargs != NULL); 935b9238976Sth } 936b9238976Sth 937b9238976Sth kmem_free(dma, sizeof (domount_args_t)); 938b9238976Sth } 939b9238976Sth } 940b9238976Sth 941b9238976Sth /* 942b9238976Sth * The ephemeral_servinfo_t struct contains basic information we will need to 943b9238976Sth * perform the mount. Whilst the structure is generic across different 944b9238976Sth * types of ephemeral mount, the way we gather its contents differs. 945b9238976Sth */ 946b9238976Sth static ephemeral_servinfo_t * 947b9238976Sth nfs4_trigger_esi_create(vnode_t *vp, servinfo4_t *svp) 948b9238976Sth { 949b9238976Sth ephemeral_servinfo_t *esi; 950b9238976Sth rnode4_t *rp = VTOR4(vp); 951b9238976Sth 952b9238976Sth ASSERT(RP_ISSTUB(rp)); 953b9238976Sth 954b9238976Sth /* Call the ephemeral type-specific routine */ 955b9238976Sth if (RP_ISSTUB_MIRRORMOUNT(rp)) 956b9238976Sth esi = nfs4_trigger_esi_create_mirrormount(vp, svp); 957b9238976Sth else 958b9238976Sth esi = NULL; 959b9238976Sth 960b9238976Sth /* for now, we only support mirror-mounts */ 961b9238976Sth ASSERT(esi != NULL); 962b9238976Sth 963b9238976Sth return (esi); 964b9238976Sth } 965b9238976Sth 966b9238976Sth static void 967b9238976Sth nfs4_trigger_esi_destroy(ephemeral_servinfo_t *esi, vnode_t *vp) 968b9238976Sth { 969b9238976Sth rnode4_t *rp = VTOR4(vp); 970b9238976Sth 971b9238976Sth ASSERT(RP_ISSTUB(rp)); 972b9238976Sth 973b9238976Sth /* for now, we only support mirror-mounts */ 974b9238976Sth ASSERT(RP_ISSTUB_MIRRORMOUNT(rp)); 975b9238976Sth 976b9238976Sth /* Currently, no need for an ephemeral type-specific routine */ 977b9238976Sth 978b9238976Sth /* 979b9238976Sth * The contents of ephemeral_servinfo_t goes into nfs_args, 980b9238976Sth * and will be handled by nfs4_trigger_nargs_destroy(). 981b9238976Sth * We need only free the structure itself. 982b9238976Sth */ 983b9238976Sth if (esi != NULL) 984b9238976Sth kmem_free(esi, sizeof (ephemeral_servinfo_t)); 985b9238976Sth } 986b9238976Sth 987b9238976Sth /* 988b9238976Sth * Some of this may turn out to be common with other ephemeral types, 989b9238976Sth * in which case it should be moved to nfs4_trigger_esi_create(), or a 990b9238976Sth * common function called. 991b9238976Sth */ 992b9238976Sth static ephemeral_servinfo_t * 993b9238976Sth nfs4_trigger_esi_create_mirrormount(vnode_t *vp, servinfo4_t *svp) 994b9238976Sth { 995b9238976Sth char *stubpath; 996b9238976Sth struct knetconfig *sikncp, *svkncp; 997b9238976Sth struct netbuf *bufp; 998b9238976Sth ephemeral_servinfo_t *esi; 999b9238976Sth 1000b9238976Sth esi = kmem_zalloc(sizeof (ephemeral_servinfo_t), KM_SLEEP); 1001b9238976Sth 1002b9238976Sth /* initially set to be our type of ephemeral mount; may be added to */ 1003b9238976Sth esi->esi_mount_flags = NFSMNT_MIRRORMOUNT; 1004b9238976Sth 1005b9238976Sth /* 1006b9238976Sth * We're copying info from the stub rnode's servinfo4, but 1007b9238976Sth * we must create new copies, not pointers, since this information 1008b9238976Sth * is to be associated with the new mount, which will be 1009b9238976Sth * unmounted (and its structures freed) separately 1010b9238976Sth */ 1011b9238976Sth 1012b9238976Sth /* 1013b9238976Sth * Sizes passed to kmem_[z]alloc here must match those freed 1014b9238976Sth * in nfs4_free_args() 1015b9238976Sth */ 1016b9238976Sth 1017b9238976Sth /* 1018b9238976Sth * We hold sv_lock across kmem_zalloc() calls that may sleep, but this 1019b9238976Sth * is difficult to avoid: as we need to read svp to calculate the 1020b9238976Sth * sizes to be allocated. 1021b9238976Sth */ 1022b9238976Sth (void) nfs_rw_enter_sig(&svp->sv_lock, RW_READER, 0); 1023b9238976Sth 1024b9238976Sth esi->esi_hostname = kmem_zalloc(strlen(svp->sv_hostname) + 1, KM_SLEEP); 1025b9238976Sth (void) strcat(esi->esi_hostname, svp->sv_hostname); 1026b9238976Sth 1027b9238976Sth esi->esi_addr = kmem_zalloc(sizeof (struct netbuf), KM_SLEEP); 1028b9238976Sth bufp = esi->esi_addr; 1029b9238976Sth bufp->len = svp->sv_addr.len; 1030b9238976Sth bufp->maxlen = svp->sv_addr.maxlen; 1031b9238976Sth bufp->buf = kmem_zalloc(bufp->len, KM_SLEEP); 1032b9238976Sth bcopy(svp->sv_addr.buf, bufp->buf, bufp->len); 1033b9238976Sth 1034b9238976Sth esi->esi_knconf = kmem_zalloc(sizeof (*esi->esi_knconf), KM_SLEEP); 1035b9238976Sth sikncp = esi->esi_knconf; 1036b9238976Sth svkncp = svp->sv_knconf; 1037b9238976Sth sikncp->knc_semantics = svkncp->knc_semantics; 1038b9238976Sth sikncp->knc_protofmly = (caddr_t)kmem_zalloc(KNC_STRSIZE, KM_SLEEP); 1039b9238976Sth (void) strcat((char *)sikncp->knc_protofmly, 1040b9238976Sth (char *)svkncp->knc_protofmly); 1041b9238976Sth sikncp->knc_proto = (caddr_t)kmem_zalloc(KNC_STRSIZE, KM_SLEEP); 1042b9238976Sth (void) strcat((char *)sikncp->knc_proto, (char *)svkncp->knc_proto); 1043b9238976Sth sikncp->knc_rdev = svkncp->knc_rdev; 1044b9238976Sth 1045b9238976Sth /* 1046b9238976Sth * Used when AUTH_DH is negotiated. 1047b9238976Sth * 1048b9238976Sth * This is ephemeral mount-type specific, since it contains the 1049b9238976Sth * server's time-sync syncaddr. 1050b9238976Sth */ 1051b9238976Sth if (svp->sv_dhsec) { 1052b9238976Sth struct netbuf *bufp; 1053b9238976Sth sec_data_t *sdata; 1054b9238976Sth dh_k4_clntdata_t *data; 1055b9238976Sth 1056b9238976Sth sdata = svp->sv_dhsec; 1057b9238976Sth data = (dh_k4_clntdata_t *)sdata->data; 1058b9238976Sth ASSERT(sdata->rpcflavor == AUTH_DH); 1059b9238976Sth 1060b9238976Sth bufp = kmem_zalloc(sizeof (struct netbuf), KM_SLEEP); 1061b9238976Sth bufp->len = data->syncaddr.len; 1062b9238976Sth bufp->maxlen = data->syncaddr.maxlen; 1063b9238976Sth bufp->buf = kmem_zalloc(bufp->len, KM_SLEEP); 1064b9238976Sth bcopy(data->syncaddr.buf, bufp->buf, bufp->len); 1065b9238976Sth esi->esi_syncaddr = bufp; 1066b9238976Sth 1067b9238976Sth if (data->netname != NULL) { 1068b9238976Sth int nmlen = data->netnamelen; 1069b9238976Sth 1070b9238976Sth /* 1071b9238976Sth * We need to copy from a dh_k4_clntdata_t 1072b9238976Sth * netname/netnamelen pair to a NUL-terminated 1073b9238976Sth * netname string suitable for putting in nfs_args, 1074b9238976Sth * where the latter has no netnamelen field. 1075b9238976Sth */ 1076b9238976Sth esi->esi_netname = kmem_zalloc(nmlen + 1, KM_SLEEP); 1077b9238976Sth bcopy(data->netname, esi->esi_netname, nmlen); 1078b9238976Sth } 1079b9238976Sth } else { 1080b9238976Sth esi->esi_syncaddr = NULL; 1081b9238976Sth esi->esi_netname = NULL; 1082b9238976Sth } 1083b9238976Sth 1084b9238976Sth stubpath = fn_path(VTOSV(vp)->sv_name); 1085b9238976Sth /* step over initial '.', to avoid e.g. sv_path: "/tank./ws" */ 1086b9238976Sth ASSERT(*stubpath == '.'); 1087b9238976Sth stubpath += 1; 1088b9238976Sth 1089b9238976Sth /* for nfs_args->fh */ 1090b9238976Sth esi->esi_path_len = strlen(svp->sv_path) + strlen(stubpath) + 1; 1091b9238976Sth esi->esi_path = kmem_zalloc(esi->esi_path_len, KM_SLEEP); 1092b9238976Sth (void) strcat(esi->esi_path, svp->sv_path); 1093b9238976Sth (void) strcat(esi->esi_path, stubpath); 1094b9238976Sth 1095b9238976Sth stubpath -= 1; 1096b9238976Sth /* stubpath allocated by fn_path() */ 1097b9238976Sth kmem_free(stubpath, strlen(stubpath) + 1); 1098b9238976Sth 1099b9238976Sth nfs_rw_exit(&svp->sv_lock); 1100b9238976Sth 1101b9238976Sth return (esi); 1102b9238976Sth } 1103b9238976Sth 1104b9238976Sth /* 1105b9238976Sth * Assemble the args, and call the generic VFS mount function to 1106b9238976Sth * finally perform the ephemeral mount. 1107b9238976Sth */ 1108b9238976Sth static int 1109b9238976Sth nfs4_trigger_domount(vnode_t *stubvp, domount_args_t *dma, vfs_t **vfsp, 1110b9238976Sth cred_t *cr) 1111b9238976Sth { 1112b9238976Sth struct mounta *uap; 1113b9238976Sth char *mntpt, *orig_path, *path; 1114b9238976Sth const char *orig_mntpt; 1115b9238976Sth int retval; 1116b9238976Sth int mntpt_len; 1117b9238976Sth int spec_len; 1118b9238976Sth zone_t *zone = curproc->p_zone; 1119b9238976Sth bool_t has_leading_slash; 1120b9238976Sth 1121b9238976Sth vfs_t *stubvfsp = stubvp->v_vfsp; 1122b9238976Sth ephemeral_servinfo_t *esi = dma->dma_esi; 1123b9238976Sth struct nfs_args *nargs = dma->dma_nargs; 1124b9238976Sth 1125b9238976Sth /* first, construct the mount point for the ephemeral mount */ 1126b9238976Sth orig_path = path = fn_path(VTOSV(stubvp)->sv_name); 1127b9238976Sth orig_mntpt = (char *)refstr_value(stubvfsp->vfs_mntpt); 1128b9238976Sth 1129b9238976Sth if (*orig_path == '.') 1130b9238976Sth orig_path++; 1131b9238976Sth 1132b9238976Sth /* 1133b9238976Sth * Get rid of zone's root path 1134b9238976Sth */ 1135b9238976Sth if (zone != global_zone) { 1136b9238976Sth /* 1137b9238976Sth * -1 for trailing '/' and -1 for EOS. 1138b9238976Sth */ 1139b9238976Sth if (strncmp(zone->zone_rootpath, orig_mntpt, 1140b9238976Sth zone->zone_rootpathlen - 1) == 0) { 1141b9238976Sth orig_mntpt += (zone->zone_rootpathlen - 2); 1142b9238976Sth } 1143b9238976Sth } 1144b9238976Sth 1145b9238976Sth mntpt_len = strlen(orig_mntpt) + strlen(orig_path); 1146b9238976Sth mntpt = kmem_zalloc(mntpt_len + 1, KM_SLEEP); 1147b9238976Sth (void) strcat(mntpt, orig_mntpt); 1148b9238976Sth (void) strcat(mntpt, orig_path); 1149b9238976Sth 1150b9238976Sth kmem_free(path, strlen(path) + 1); 1151b9238976Sth path = esi->esi_path; 1152b9238976Sth if (*path == '.') 1153b9238976Sth path++; 1154b9238976Sth if (path[0] == '/' && path[1] == '/') 1155b9238976Sth path++; 1156b9238976Sth has_leading_slash = (*path == '/'); 1157b9238976Sth 1158b9238976Sth spec_len = strlen(dma->dma_hostlist); 1159b9238976Sth spec_len += strlen(path); 1160b9238976Sth 1161b9238976Sth /* We are going to have to add this in */ 1162b9238976Sth if (!has_leading_slash) 1163b9238976Sth spec_len++; 1164b9238976Sth 1165b9238976Sth /* We need to get the ':' for dma_hostlist:esi_path */ 1166b9238976Sth spec_len++; 1167b9238976Sth 1168b9238976Sth uap = kmem_zalloc(sizeof (struct mounta), KM_SLEEP); 1169b9238976Sth uap->spec = kmem_zalloc(spec_len + 1, KM_SLEEP); 1170b9238976Sth (void) snprintf(uap->spec, spec_len + 1, "%s:%s%s", dma->dma_hostlist, 1171b9238976Sth has_leading_slash ? "" : "/", path); 1172b9238976Sth 1173b9238976Sth uap->dir = mntpt; 1174b9238976Sth 1175b9238976Sth uap->flags = MS_SYSSPACE | MS_DATA; 1176b9238976Sth /* fstype-independent mount options not covered elsewhere */ 1177b9238976Sth /* copy parent's mount(1M) "-m" flag */ 1178b9238976Sth if (stubvfsp->vfs_flag & VFS_NOMNTTAB) 1179b9238976Sth uap->flags |= MS_NOMNTTAB; 1180b9238976Sth 1181b9238976Sth uap->fstype = MNTTYPE_NFS4; 1182b9238976Sth uap->dataptr = (char *)nargs; 1183b9238976Sth /* not needed for MS_SYSSPACE */ 1184b9238976Sth uap->datalen = 0; 1185b9238976Sth 1186b9238976Sth /* use optptr to pass in extra mount options */ 1187b9238976Sth uap->flags |= MS_OPTIONSTR; 1188b9238976Sth uap->optptr = nfs4_trigger_create_mntopts(stubvfsp); 1189b9238976Sth if (uap->optptr == NULL) { 1190b9238976Sth retval = EINVAL; 1191b9238976Sth goto done; 1192b9238976Sth } 1193b9238976Sth /* domount() expects us to count the trailing NUL */ 1194b9238976Sth uap->optlen = strlen(uap->optptr) + 1; 1195b9238976Sth 1196b9238976Sth retval = domount(NULL, uap, stubvp, cr, vfsp); 1197b9238976Sth if (retval == 0) 1198b9238976Sth VFS_RELE(*vfsp); 1199b9238976Sth done: 1200b9238976Sth if (uap->optptr) 1201b9238976Sth nfs4_trigger_destroy_mntopts(uap->optptr); 1202b9238976Sth 1203b9238976Sth kmem_free(uap->spec, spec_len + 1); 1204b9238976Sth kmem_free(uap, sizeof (struct mounta)); 1205b9238976Sth kmem_free(mntpt, mntpt_len + 1); 1206b9238976Sth 1207b9238976Sth return (retval); 1208b9238976Sth } 1209b9238976Sth 1210b9238976Sth /* 1211b9238976Sth * Build an nfs_args structure for passing to domount(). 1212b9238976Sth * 1213b9238976Sth * Ephemeral mount-type specific data comes from the ephemeral_servinfo_t; 1214b9238976Sth * generic data - common to all ephemeral mount types - is read directly 1215b9238976Sth * from the parent mount's servinfo4_t and mntinfo4_t, via the stub vnode. 1216b9238976Sth */ 1217b9238976Sth static struct nfs_args * 1218b9238976Sth nfs4_trigger_nargs_create(mntinfo4_t *mi, servinfo4_t *svp, 1219b9238976Sth ephemeral_servinfo_t *esi) 1220b9238976Sth { 1221b9238976Sth sec_data_t *secdata; 1222b9238976Sth struct nfs_args *nargs; 1223b9238976Sth 1224b9238976Sth /* setup the nfs args */ 1225b9238976Sth nargs = kmem_zalloc(sizeof (struct nfs_args), KM_SLEEP); 1226b9238976Sth 1227b9238976Sth (void) nfs_rw_enter_sig(&svp->sv_lock, RW_READER, 0); 1228b9238976Sth 1229b9238976Sth nargs->addr = esi->esi_addr; 1230b9238976Sth 1231b9238976Sth /* for AUTH_DH by negotiation */ 1232b9238976Sth if (esi->esi_syncaddr || esi->esi_netname) { 1233b9238976Sth nargs->flags |= NFSMNT_SECURE; 1234b9238976Sth nargs->syncaddr = esi->esi_syncaddr; 1235b9238976Sth nargs->netname = esi->esi_netname; 1236b9238976Sth } 1237b9238976Sth 1238b9238976Sth nargs->flags |= NFSMNT_KNCONF; 1239b9238976Sth nargs->knconf = esi->esi_knconf; 1240b9238976Sth nargs->flags |= NFSMNT_HOSTNAME; 1241b9238976Sth nargs->hostname = esi->esi_hostname; 1242b9238976Sth nargs->fh = esi->esi_path; 1243b9238976Sth 1244b9238976Sth /* general mount settings, all copied from parent mount */ 1245b9238976Sth mutex_enter(&mi->mi_lock); 1246b9238976Sth 1247b9238976Sth if (!(mi->mi_flags & MI4_HARD)) 1248b9238976Sth nargs->flags |= NFSMNT_SOFT; 1249b9238976Sth 1250b9238976Sth nargs->flags |= NFSMNT_WSIZE | NFSMNT_RSIZE | NFSMNT_TIMEO | 1251b9238976Sth NFSMNT_RETRANS; 1252b9238976Sth nargs->wsize = mi->mi_stsize; 1253b9238976Sth nargs->rsize = mi->mi_tsize; 1254b9238976Sth nargs->timeo = mi->mi_timeo; 1255b9238976Sth nargs->retrans = mi->mi_retrans; 1256b9238976Sth 1257b9238976Sth if (mi->mi_flags & MI4_INT) 1258b9238976Sth nargs->flags |= NFSMNT_INT; 1259b9238976Sth if (mi->mi_flags & MI4_NOAC) 1260b9238976Sth nargs->flags |= NFSMNT_NOAC; 1261b9238976Sth 1262b9238976Sth nargs->flags |= NFSMNT_ACREGMIN | NFSMNT_ACREGMAX | NFSMNT_ACDIRMIN | 1263b9238976Sth NFSMNT_ACDIRMAX; 1264b9238976Sth nargs->acregmin = HR2SEC(mi->mi_acregmin); 1265b9238976Sth nargs->acregmax = HR2SEC(mi->mi_acregmax); 1266b9238976Sth nargs->acdirmin = HR2SEC(mi->mi_acdirmin); 1267b9238976Sth nargs->acdirmax = HR2SEC(mi->mi_acdirmax); 1268b9238976Sth 1269b9238976Sth if (mi->mi_flags & MI4_NOCTO) 1270b9238976Sth nargs->flags |= NFSMNT_NOCTO; 1271b9238976Sth if (mi->mi_flags & MI4_GRPID) 1272b9238976Sth nargs->flags |= NFSMNT_GRPID; 1273b9238976Sth if (mi->mi_flags & MI4_LLOCK) 1274b9238976Sth nargs->flags |= NFSMNT_LLOCK; 1275b9238976Sth if (mi->mi_flags & MI4_NOPRINT) 1276b9238976Sth nargs->flags |= NFSMNT_NOPRINT; 1277b9238976Sth if (mi->mi_flags & MI4_DIRECTIO) 1278b9238976Sth nargs->flags |= NFSMNT_DIRECTIO; 1279b9238976Sth if (mi->mi_flags & MI4_PUBLIC) 1280b9238976Sth nargs->flags |= NFSMNT_PUBLIC; 1281b9238976Sth 1282b9238976Sth mutex_exit(&mi->mi_lock); 1283b9238976Sth 1284b9238976Sth /* add any specific flags for this type of ephemeral mount */ 1285b9238976Sth nargs->flags |= esi->esi_mount_flags; 1286b9238976Sth 1287b9238976Sth /* 1288b9238976Sth * Security data & negotiation policy. 1289b9238976Sth * 1290b9238976Sth * We need to preserve the parent mount's preference for security 1291b9238976Sth * negotiation, translating SV4_TRYSECDEFAULT -> NFSMNT_SECDEFAULT. 1292b9238976Sth * 1293b9238976Sth * If SV4_TRYSECDEFAULT is not set, that indicates that a specific 1294b9238976Sth * security flavour was requested, with data in sv_secdata, and that 1295b9238976Sth * no negotiation should occur. If this specified flavour fails, that's 1296b9238976Sth * it. We will copy sv_secdata, and not set NFSMNT_SECDEFAULT. 1297b9238976Sth * 1298b9238976Sth * If SV4_TRYSECDEFAULT is set, then we start with a passed-in 1299b9238976Sth * default flavour, in sv_secdata, but then negotiate a new flavour. 1300b9238976Sth * Possible flavours are recorded in an array in sv_secinfo, with 1301b9238976Sth * currently in-use flavour pointed to by sv_currsec. 1302b9238976Sth * 1303b9238976Sth * If sv_currsec is set, i.e. if negotiation has already occurred, 1304b9238976Sth * we will copy sv_currsec. Otherwise, copy sv_secdata. Regardless, 1305b9238976Sth * we will set NFSMNT_SECDEFAULT, to enable negotiation. 1306b9238976Sth */ 1307b9238976Sth if (svp->sv_flags & SV4_TRYSECDEFAULT) { 1308b9238976Sth /* enable negotiation for ephemeral mount */ 1309b9238976Sth nargs->flags |= NFSMNT_SECDEFAULT; 1310b9238976Sth 1311b9238976Sth /* 1312b9238976Sth * As a starting point for negotiation, copy parent 1313b9238976Sth * mount's negotiated flavour (sv_currsec) if available, 1314b9238976Sth * or its passed-in flavour (sv_secdata) if not. 1315b9238976Sth */ 1316b9238976Sth if (svp->sv_currsec != NULL) 1317b9238976Sth secdata = copy_sec_data(svp->sv_currsec); 1318b9238976Sth else if (svp->sv_secdata != NULL) 1319b9238976Sth secdata = copy_sec_data(svp->sv_secdata); 1320b9238976Sth else 1321b9238976Sth secdata = NULL; 1322b9238976Sth } else { 1323b9238976Sth /* do not enable negotiation; copy parent's passed-in flavour */ 1324b9238976Sth if (svp->sv_secdata != NULL) 1325b9238976Sth secdata = copy_sec_data(svp->sv_secdata); 1326b9238976Sth else 1327b9238976Sth secdata = NULL; 1328b9238976Sth } 1329b9238976Sth 1330b9238976Sth nfs_rw_exit(&svp->sv_lock); 1331b9238976Sth 1332b9238976Sth nargs->flags |= NFSMNT_NEWARGS; 1333b9238976Sth nargs->nfs_args_ext = NFS_ARGS_EXTB; 1334b9238976Sth nargs->nfs_ext_u.nfs_extB.secdata = secdata; 1335b9238976Sth 1336b9238976Sth /* for NFS RO failover; caller will set if necessary */ 1337b9238976Sth nargs->nfs_ext_u.nfs_extB.next = NULL; 1338b9238976Sth 1339b9238976Sth return (nargs); 1340b9238976Sth } 1341b9238976Sth 1342b9238976Sth static void 1343b9238976Sth nfs4_trigger_nargs_destroy(struct nfs_args *nargs) 1344b9238976Sth { 1345b9238976Sth /* 1346b9238976Sth * Either the mount failed, in which case the data is not needed, or 1347b9238976Sth * nfs4_mount() has either taken copies of what it needs or, 1348b9238976Sth * where it has merely copied the ptr, it has set *our* ptr to NULL, 1349b9238976Sth * whereby nfs4_free_args() will ignore it. 1350b9238976Sth */ 1351b9238976Sth nfs4_free_args(nargs); 1352b9238976Sth kmem_free(nargs, sizeof (struct nfs_args)); 1353b9238976Sth } 1354b9238976Sth 1355b9238976Sth /* 1356b9238976Sth * When we finally get into the mounting, we need to add this 1357b9238976Sth * node to the ephemeral tree. 1358b9238976Sth * 1359b9238976Sth * This is called from nfs4_mount(). 1360b9238976Sth */ 1361b9238976Sth void 1362b9238976Sth nfs4_record_ephemeral_mount(mntinfo4_t *mi, vnode_t *mvp) 1363b9238976Sth { 1364b9238976Sth mntinfo4_t *mi_parent; 1365b9238976Sth nfs4_ephemeral_t *eph; 1366b9238976Sth nfs4_ephemeral_tree_t *net; 1367b9238976Sth 1368b9238976Sth nfs4_ephemeral_t *prior; 1369b9238976Sth nfs4_ephemeral_t *child; 1370b9238976Sth 1371b9238976Sth nfs4_ephemeral_t *peer; 1372b9238976Sth 1373b9238976Sth nfs4_trigger_globals_t *ntg; 1374b9238976Sth zone_t *zone = curproc->p_zone; 1375b9238976Sth 1376b9238976Sth mi_parent = VTOMI4(mvp); 1377b9238976Sth 1378b9238976Sth /* 1379b9238976Sth * Get this before grabbing anything else! 1380b9238976Sth */ 1381b9238976Sth ntg = zone_getspecific(nfs4_ephemeral_key, zone); 1382b9238976Sth if (!ntg->ntg_thread_started) { 1383b9238976Sth nfs4_ephemeral_start_harvester(ntg); 1384b9238976Sth } 1385b9238976Sth 1386b9238976Sth mutex_enter(&mi_parent->mi_lock); 1387b9238976Sth mutex_enter(&mi->mi_lock); 1388b9238976Sth 1389b9238976Sth /* 1390b9238976Sth * We need to tack together the ephemeral mount 1391b9238976Sth * with this new mntinfo. 1392b9238976Sth */ 1393b9238976Sth eph = kmem_zalloc(sizeof (*eph), KM_SLEEP); 1394b9238976Sth eph->ne_mount = mi; 1395b9238976Sth eph->ne_ref_time = gethrestime_sec(); 1396b9238976Sth 1397b9238976Sth /* 1398b9238976Sth * We need to tell the ephemeral mount when 1399b9238976Sth * to time out. 1400b9238976Sth */ 1401b9238976Sth eph->ne_mount_to = ntg->ntg_mount_to; 1402b9238976Sth 1403b9238976Sth mi->mi_flags |= MI4_EPHEMERAL; 1404b9238976Sth mi->mi_ephemeral = eph; 1405b9238976Sth 1406b9238976Sth net = mi->mi_ephemeral_tree = 1407b9238976Sth mi_parent->mi_ephemeral_tree; 1408b9238976Sth ASSERT(net != NULL); 1409b9238976Sth 1410b9238976Sth /* 1411b9238976Sth * If the enclosing mntinfo4 is also ephemeral, 1412b9238976Sth * then we need to point to its enclosing parent. 1413b9238976Sth * Else the enclosing mntinfo4 is the enclosing parent. 1414b9238976Sth * 1415b9238976Sth * We also need to weave this ephemeral node 1416b9238976Sth * into the tree. 1417b9238976Sth */ 1418b9238976Sth if (mi_parent->mi_flags & MI4_EPHEMERAL) { 1419b9238976Sth /* 1420b9238976Sth * We need to decide if we are 1421b9238976Sth * the root node of this branch 1422b9238976Sth * or if we are a sibling of this 1423b9238976Sth * branch. 1424b9238976Sth */ 1425b9238976Sth prior = mi_parent->mi_ephemeral; 1426b9238976Sth ASSERT(prior != NULL); 1427b9238976Sth if (prior->ne_child == NULL) { 1428b9238976Sth prior->ne_child = eph; 1429b9238976Sth } else { 1430b9238976Sth child = prior->ne_child; 1431b9238976Sth 1432b9238976Sth prior->ne_child = eph; 1433b9238976Sth eph->ne_peer = child; 1434b9238976Sth 1435b9238976Sth child->ne_prior = eph; 1436b9238976Sth } 1437b9238976Sth 1438b9238976Sth eph->ne_prior = prior; 1439b9238976Sth } else { 1440b9238976Sth /* 1441b9238976Sth * The parent mntinfo4 is the non-ephemeral 1442b9238976Sth * root of the ephemeral tree. We 1443b9238976Sth * need to decide if we are the root 1444b9238976Sth * node of that tree or if we are a 1445b9238976Sth * sibling of the root node. 1446b9238976Sth * 1447b9238976Sth * We are the root if there is no 1448b9238976Sth * other node. 1449b9238976Sth */ 1450b9238976Sth if (net->net_root == NULL) { 1451b9238976Sth net->net_root = eph; 1452b9238976Sth } else { 1453b9238976Sth eph->ne_peer = peer = net->net_root; 1454b9238976Sth ASSERT(peer != NULL); 1455b9238976Sth net->net_root = eph; 1456b9238976Sth 1457b9238976Sth peer->ne_prior = eph; 1458b9238976Sth } 1459b9238976Sth 1460b9238976Sth eph->ne_prior = NULL; 1461b9238976Sth } 1462b9238976Sth 1463b9238976Sth mutex_exit(&mi->mi_lock); 1464b9238976Sth mutex_exit(&mi_parent->mi_lock); 1465b9238976Sth } 1466b9238976Sth 1467b9238976Sth /* 1468b9238976Sth * Commit the changes to the ephemeral tree for removing this node. 1469b9238976Sth */ 1470b9238976Sth static void 1471b9238976Sth nfs4_ephemeral_umount_cleanup(nfs4_ephemeral_t *eph) 1472b9238976Sth { 1473b9238976Sth nfs4_ephemeral_t *e = eph; 1474b9238976Sth nfs4_ephemeral_t *peer; 1475b9238976Sth nfs4_ephemeral_t *prior; 1476b9238976Sth 1477b9238976Sth peer = eph->ne_peer; 1478b9238976Sth prior = e->ne_prior; 1479b9238976Sth 1480b9238976Sth /* 1481b9238976Sth * If this branch root was not the 1482b9238976Sth * tree root, then we need to fix back pointers. 1483b9238976Sth */ 1484b9238976Sth if (prior) { 1485b9238976Sth if (prior->ne_child == e) { 1486b9238976Sth prior->ne_child = peer; 1487b9238976Sth } else { 1488b9238976Sth prior->ne_peer = peer; 1489b9238976Sth } 1490b9238976Sth 1491b9238976Sth if (peer) 1492b9238976Sth peer->ne_prior = prior; 1493b9238976Sth } else if (peer) { 1494b9238976Sth peer->ne_mount->mi_ephemeral_tree->net_root = peer; 1495b9238976Sth peer->ne_prior = NULL; 1496b9238976Sth } else { 1497b9238976Sth e->ne_mount->mi_ephemeral_tree->net_root = NULL; 1498b9238976Sth } 1499b9238976Sth } 1500b9238976Sth 1501b9238976Sth /* 1502b9238976Sth * We want to avoid recursion at all costs. So we need to 1503b9238976Sth * unroll the tree. We do this by a depth first traversal to 1504b9238976Sth * leaf nodes. We blast away the leaf and work our way back 1505b9238976Sth * up and down the tree. 1506b9238976Sth */ 1507b9238976Sth static int 1508b9238976Sth nfs4_ephemeral_unmount_engine(nfs4_ephemeral_t *eph, 1509b9238976Sth int isTreeRoot, int flag, cred_t *cr) 1510b9238976Sth { 1511b9238976Sth nfs4_ephemeral_t *e = eph; 1512b9238976Sth nfs4_ephemeral_t *prior; 1513b9238976Sth mntinfo4_t *mi; 1514b9238976Sth vfs_t *vfsp; 1515b9238976Sth int error; 1516b9238976Sth 1517b9238976Sth /* 1518b9238976Sth * We use the loop while unrolling the ephemeral tree. 1519b9238976Sth */ 1520b9238976Sth for (;;) { 1521b9238976Sth /* 1522b9238976Sth * First we walk down the child. 1523b9238976Sth */ 1524b9238976Sth if (e->ne_child) { 1525b9238976Sth prior = e; 1526b9238976Sth e = e->ne_child; 1527b9238976Sth continue; 1528b9238976Sth } 1529b9238976Sth 1530b9238976Sth /* 1531b9238976Sth * If we are the root of the branch we are removing, 1532b9238976Sth * we end it here. But if the branch is the root of 1533b9238976Sth * the tree, we have to forge on. We do not consider 1534b9238976Sth * the peer list for the root because while it may 1535b9238976Sth * be okay to remove, it is both extra work and a 1536b9238976Sth * potential for a false-positive error to stall the 1537b9238976Sth * unmount attempt. 1538b9238976Sth */ 1539b9238976Sth if (e == eph && isTreeRoot == FALSE) 1540b9238976Sth return (0); 1541b9238976Sth 1542b9238976Sth /* 1543b9238976Sth * Next we walk down the peer list. 1544b9238976Sth */ 1545b9238976Sth if (e->ne_peer) { 1546b9238976Sth prior = e; 1547b9238976Sth e = e->ne_peer; 1548b9238976Sth continue; 1549b9238976Sth } 1550b9238976Sth 1551b9238976Sth /* 1552b9238976Sth * We can only remove the node passed in by the 1553b9238976Sth * caller if it is the root of the ephemeral tree. 1554b9238976Sth * Otherwise, the caller will remove it. 1555b9238976Sth */ 1556b9238976Sth if (e == eph && isTreeRoot == FALSE) 1557b9238976Sth return (0); 1558b9238976Sth 1559b9238976Sth /* 1560b9238976Sth * Okay, we have a leaf node, time 1561b9238976Sth * to prune it! 1562b9238976Sth * 1563b9238976Sth * Note that prior can only be NULL if 1564b9238976Sth * and only if it is the root of the 1565b9238976Sth * ephemeral tree. 1566b9238976Sth */ 1567b9238976Sth prior = e->ne_prior; 1568b9238976Sth 1569b9238976Sth mi = e->ne_mount; 1570b9238976Sth mutex_enter(&mi->mi_lock); 1571b9238976Sth vfsp = mi->mi_vfsp; 1572b9238976Sth 1573b9238976Sth /* 1574b9238976Sth * Cleared by umount2_engine. 1575b9238976Sth */ 1576b9238976Sth VFS_HOLD(vfsp); 1577b9238976Sth 1578b9238976Sth /* 1579b9238976Sth * Inform nfs4_unmount to not recursively 1580b9238976Sth * descend into this node's children when it 1581b9238976Sth * gets processed. 1582b9238976Sth */ 1583b9238976Sth mi->mi_flags |= MI4_EPHEMERAL_RECURSED; 1584b9238976Sth mutex_exit(&mi->mi_lock); 1585b9238976Sth 1586b9238976Sth error = umount2_engine(vfsp, flag, cr, FALSE); 1587b9238976Sth if (error) { 1588b9238976Sth /* 1589b9238976Sth * We need to reenable nfs4_unmount's ability 1590b9238976Sth * to recursively descend on this node. 1591b9238976Sth */ 1592b9238976Sth mutex_enter(&mi->mi_lock); 1593b9238976Sth mi->mi_flags &= ~MI4_EPHEMERAL_RECURSED; 1594b9238976Sth mutex_exit(&mi->mi_lock); 1595b9238976Sth 1596b9238976Sth return (error); 1597b9238976Sth } 1598b9238976Sth 1599b9238976Sth /* 1600b9238976Sth * If we are the current node, we do not want to 1601b9238976Sth * touch anything else. At this point, the only 1602b9238976Sth * way the current node can have survived to here 1603b9238976Sth * is if it is the root of the ephemeral tree and 1604b9238976Sth * we are unmounting the enclosing mntinfo4. 1605b9238976Sth */ 1606b9238976Sth if (e == eph) { 1607b9238976Sth ASSERT(prior == NULL); 1608b9238976Sth return (0); 1609b9238976Sth } 1610b9238976Sth 1611b9238976Sth /* 1612b9238976Sth * Stitch up the prior node. Note that since 1613b9238976Sth * we have handled the root of the tree, prior 1614b9238976Sth * must be non-NULL. 1615b9238976Sth */ 1616b9238976Sth ASSERT(prior != NULL); 1617b9238976Sth if (prior->ne_child == e) { 1618b9238976Sth prior->ne_child = NULL; 1619b9238976Sth } else { 1620b9238976Sth ASSERT(prior->ne_peer == e); 1621b9238976Sth 1622b9238976Sth prior->ne_peer = NULL; 1623b9238976Sth } 1624b9238976Sth 1625b9238976Sth e = prior; 1626b9238976Sth } 1627b9238976Sth 1628b9238976Sth /* NOTREACHED */ 1629b9238976Sth } 1630b9238976Sth 1631b9238976Sth /* 1632b9238976Sth * Common code to safely release net_cnt_lock and net_tree_lock 1633b9238976Sth */ 1634b9238976Sth void 1635b9238976Sth nfs4_ephemeral_umount_unlock(bool_t *pmust_unlock, 1636b9238976Sth nfs4_ephemeral_tree_t **pnet) 1637b9238976Sth { 1638b9238976Sth nfs4_ephemeral_tree_t *net = *pnet; 1639b9238976Sth 1640b9238976Sth if (*pmust_unlock) { 1641b9238976Sth mutex_enter(&net->net_cnt_lock); 1642b9238976Sth net->net_refcnt--; 1643b9238976Sth net->net_status &= ~NFS4_EPHEMERAL_TREE_UMOUNTING; 1644b9238976Sth mutex_exit(&net->net_cnt_lock); 1645b9238976Sth 1646b9238976Sth mutex_exit(&net->net_tree_lock); 1647b9238976Sth 1648b9238976Sth *pmust_unlock = FALSE; 1649b9238976Sth } 1650b9238976Sth } 1651b9238976Sth 1652b9238976Sth /* 1653b9238976Sth * While we may have removed any child or sibling nodes of this 1654b9238976Sth * ephemeral node, we can not nuke it until we know that there 1655b9238976Sth * were no actived vnodes on it. This will do that final 1656b9238976Sth * work once we know it is not busy. 1657b9238976Sth */ 1658b9238976Sth void 1659b9238976Sth nfs4_ephemeral_umount_activate(mntinfo4_t *mi, bool_t *pmust_unlock, 1660b9238976Sth nfs4_ephemeral_tree_t **pnet) 1661b9238976Sth { 1662b9238976Sth /* 1663b9238976Sth * Now we need to get rid of the ephemeral data if it exists. 1664b9238976Sth */ 1665b9238976Sth mutex_enter(&mi->mi_lock); 1666b9238976Sth if (mi->mi_ephemeral) { 1667b9238976Sth /* 1668b9238976Sth * If we are the root node of an ephemeral branch 1669b9238976Sth * which is being removed, then we need to fixup 1670b9238976Sth * pointers into and out of the node. 1671b9238976Sth */ 1672b9238976Sth if (!(mi->mi_flags & MI4_EPHEMERAL_RECURSED)) 1673b9238976Sth nfs4_ephemeral_umount_cleanup(mi->mi_ephemeral); 1674b9238976Sth 1675b9238976Sth ASSERT(mi->mi_ephemeral != NULL); 1676b9238976Sth 1677b9238976Sth kmem_free(mi->mi_ephemeral, sizeof (*mi->mi_ephemeral)); 1678b9238976Sth mi->mi_ephemeral = NULL; 1679b9238976Sth } 1680b9238976Sth mutex_exit(&mi->mi_lock); 1681b9238976Sth 1682b9238976Sth nfs4_ephemeral_umount_unlock(pmust_unlock, pnet); 1683b9238976Sth } 1684b9238976Sth 1685b9238976Sth /* 1686b9238976Sth * Unmount an ephemeral node. 1687b9238976Sth */ 1688b9238976Sth int 1689b9238976Sth nfs4_ephemeral_umount(mntinfo4_t *mi, int flag, cred_t *cr, 1690b9238976Sth bool_t *pmust_unlock, nfs4_ephemeral_tree_t **pnet) 1691b9238976Sth { 1692b9238976Sth int error = 0; 1693b9238976Sth nfs4_ephemeral_t *eph; 1694b9238976Sth nfs4_ephemeral_tree_t *net; 1695b9238976Sth int is_derooting = FALSE; 1696b9238976Sth int is_recursed = FALSE; 1697b9238976Sth int was_locked = FALSE; 1698b9238976Sth 1699b9238976Sth /* 1700b9238976Sth * The active vnodes on this file system may be ephemeral 1701b9238976Sth * children. We need to check for and try to unmount them 1702b9238976Sth * here. If any can not be unmounted, we are going 1703b9238976Sth * to return EBUSY. 1704b9238976Sth */ 1705b9238976Sth mutex_enter(&mi->mi_lock); 1706b9238976Sth 1707b9238976Sth /* 1708b9238976Sth * If an ephemeral tree, we need to check to see if 1709b9238976Sth * the lock is already held. If it is, then we need 1710b9238976Sth * to see if we are being called as a result of 1711b9238976Sth * the recursive removal of some node of the tree or 1712b9238976Sth * if we are another attempt to remove the tree. 1713b9238976Sth * 1714b9238976Sth * mi_flags & MI4_EPHEMERAL indicates an ephemeral 1715b9238976Sth * node. mi_ephemeral being non-NULL also does this. 1716b9238976Sth * 1717b9238976Sth * mi_ephemeral_tree being non-NULL is sufficient 1718b9238976Sth * to also indicate either it is an ephemeral node 1719b9238976Sth * or the enclosing mntinfo4. 1720b9238976Sth * 1721b9238976Sth * Do we need MI4_EPHEMERAL? Yes, it is useful for 1722b9238976Sth * when we delete the ephemeral node and need to 1723b9238976Sth * differentiate from an ephemeral node and the 1724b9238976Sth * enclosing root node. 1725b9238976Sth */ 1726b9238976Sth *pnet = net = mi->mi_ephemeral_tree; 1727b9238976Sth eph = mi->mi_ephemeral; 1728b9238976Sth if (net) { 1729b9238976Sth is_recursed = mi->mi_flags & MI4_EPHEMERAL_RECURSED; 1730b9238976Sth is_derooting = (eph == NULL); 1731b9238976Sth mutex_exit(&mi->mi_lock); 1732b9238976Sth 1733b9238976Sth /* 1734b9238976Sth * If this is not recursion, then we need to 1735b9238976Sth * grab a ref count. 1736b9238976Sth * 1737b9238976Sth * But wait, we also do not want to do that 1738b9238976Sth * if a harvester thread has already grabbed 1739b9238976Sth * the lock. 1740b9238976Sth */ 1741b9238976Sth if (!is_recursed) { 1742b9238976Sth mutex_enter(&net->net_cnt_lock); 1743b9238976Sth if (net->net_status & 1744b9238976Sth NFS4_EPHEMERAL_TREE_LOCKED) 1745b9238976Sth was_locked = TRUE; 1746b9238976Sth else 1747b9238976Sth net->net_refcnt++; 1748b9238976Sth mutex_exit(&net->net_cnt_lock); 1749b9238976Sth } 1750b9238976Sth 1751b9238976Sth /* 1752b9238976Sth * If we grab the lock, it means that no other 1753b9238976Sth * operation is working on the tree. If we don't 1754b9238976Sth * grab it, we need to decide if this is because 1755b9238976Sth * we are a recursive call or a new operation. 1756b9238976Sth * 1757b9238976Sth * If we are a recursive call, we proceed without 1758b9238976Sth * the lock. 1759b9238976Sth * 1760b9238976Sth * Else we have to wait until the lock becomes free. 1761b9238976Sth */ 1762b9238976Sth if (was_locked == FALSE && 1763b9238976Sth !mutex_tryenter(&net->net_tree_lock)) { 1764b9238976Sth if (!is_recursed) { 1765b9238976Sth mutex_enter(&net->net_cnt_lock); 1766b9238976Sth if (net->net_status & 1767b9238976Sth (NFS4_EPHEMERAL_TREE_DEROOTING 1768b9238976Sth | NFS4_EPHEMERAL_TREE_INVALID)) { 1769b9238976Sth net->net_refcnt--; 1770b9238976Sth mutex_exit(&net->net_cnt_lock); 1771b9238976Sth goto is_busy; 1772b9238976Sth } 1773b9238976Sth mutex_exit(&net->net_cnt_lock); 1774b9238976Sth 1775b9238976Sth /* 1776b9238976Sth * We can't hold any other locks whilst 1777b9238976Sth * we wait on this to free up. 1778b9238976Sth */ 1779b9238976Sth mutex_enter(&net->net_tree_lock); 1780b9238976Sth 1781b9238976Sth /* 1782b9238976Sth * Note that while mi->mi_ephemeral 1783b9238976Sth * may change and thus we have to 1784b9238976Sth * update eph, it is the case that 1785b9238976Sth * we have tied down net and 1786b9238976Sth * do not care if mi->mi_ephemeral_tree 1787b9238976Sth * has changed. 1788b9238976Sth */ 1789b9238976Sth mutex_enter(&mi->mi_lock); 1790b9238976Sth eph = mi->mi_ephemeral; 1791b9238976Sth mutex_exit(&mi->mi_lock); 1792b9238976Sth 1793b9238976Sth /* 1794b9238976Sth * Okay, we need to see if either the 1795b9238976Sth * tree got nuked or the current node 1796b9238976Sth * got nuked. Both of which will cause 1797b9238976Sth * an error. 1798b9238976Sth * 1799b9238976Sth * Note that a subsequent retry of the 1800b9238976Sth * umount shall work. 1801b9238976Sth */ 1802b9238976Sth mutex_enter(&net->net_cnt_lock); 1803b9238976Sth if (net->net_status & 1804b9238976Sth NFS4_EPHEMERAL_TREE_INVALID || 1805b9238976Sth (!is_derooting && eph == NULL)) { 1806b9238976Sth net->net_refcnt--; 1807b9238976Sth mutex_exit(&net->net_cnt_lock); 1808b9238976Sth mutex_exit(&net->net_tree_lock); 1809b9238976Sth goto is_busy; 1810b9238976Sth } 1811b9238976Sth mutex_exit(&net->net_cnt_lock); 1812b9238976Sth *pmust_unlock = TRUE; 1813b9238976Sth } 1814b9238976Sth } else if (was_locked == FALSE) { 1815b9238976Sth /* 1816b9238976Sth * If we grab it right away, everything must 1817b9238976Sth * be great! 1818b9238976Sth */ 1819b9238976Sth *pmust_unlock = TRUE; 1820b9238976Sth } 1821b9238976Sth 1822b9238976Sth /* 1823b9238976Sth * Only once we have grabbed the lock can we mark what we 1824b9238976Sth * are planning on doing to the ephemeral tree. 1825b9238976Sth */ 1826b9238976Sth if (*pmust_unlock) { 1827b9238976Sth mutex_enter(&net->net_cnt_lock); 1828b9238976Sth net->net_status |= NFS4_EPHEMERAL_TREE_UMOUNTING; 1829b9238976Sth 1830b9238976Sth /* 1831b9238976Sth * Check to see if we are nuking the root. 1832b9238976Sth */ 1833b9238976Sth if (is_derooting) 1834b9238976Sth net->net_status |= 1835b9238976Sth NFS4_EPHEMERAL_TREE_DEROOTING; 1836b9238976Sth mutex_exit(&net->net_cnt_lock); 1837b9238976Sth } 1838b9238976Sth 1839b9238976Sth if (!is_derooting) { 1840b9238976Sth /* 1841b9238976Sth * Only work on children if the caller has not already 1842b9238976Sth * done so. 1843b9238976Sth */ 1844b9238976Sth if (!is_recursed) { 1845b9238976Sth ASSERT(eph != NULL); 1846b9238976Sth 1847b9238976Sth error = nfs4_ephemeral_unmount_engine(eph, 1848b9238976Sth FALSE, flag, cr); 1849b9238976Sth if (error) 1850b9238976Sth goto is_busy; 1851b9238976Sth } 1852b9238976Sth } else { 1853b9238976Sth eph = net->net_root; 1854b9238976Sth 1855b9238976Sth /* 1856b9238976Sth * Only work if there is something there. 1857b9238976Sth */ 1858b9238976Sth if (eph) { 1859b9238976Sth error = nfs4_ephemeral_unmount_engine(eph, TRUE, 1860b9238976Sth flag, cr); 1861b9238976Sth if (error) { 1862b9238976Sth mutex_enter(&net->net_cnt_lock); 1863b9238976Sth net->net_status &= 1864b9238976Sth ~NFS4_EPHEMERAL_TREE_DEROOTING; 1865b9238976Sth mutex_exit(&net->net_cnt_lock); 1866b9238976Sth goto is_busy; 1867b9238976Sth } 1868b9238976Sth 1869b9238976Sth /* 1870b9238976Sth * Nothing else which goes wrong will 1871b9238976Sth * invalidate the blowing away of the 1872b9238976Sth * ephmeral tree. 1873b9238976Sth */ 1874b9238976Sth net->net_root = NULL; 1875b9238976Sth } 1876b9238976Sth 1877b9238976Sth /* 1878b9238976Sth * We have derooted and we have caused the tree to be 1879b9238976Sth * invalid. 1880b9238976Sth */ 1881b9238976Sth mutex_enter(&net->net_cnt_lock); 1882b9238976Sth net->net_status &= ~NFS4_EPHEMERAL_TREE_DEROOTING; 1883b9238976Sth net->net_status |= NFS4_EPHEMERAL_TREE_INVALID; 1884b9238976Sth net->net_refcnt--; 1885b9238976Sth mutex_exit(&net->net_cnt_lock); 1886b9238976Sth 1887b9238976Sth /* 1888b9238976Sth * At this point, the tree should no 1889b9238976Sth * longer be associated with the 1890b9238976Sth * mntinfo4. We need to pull it off 1891b9238976Sth * there and let the harvester take 1892b9238976Sth * care of it once the refcnt drops. 1893b9238976Sth */ 1894b9238976Sth mutex_enter(&mi->mi_lock); 1895b9238976Sth mi->mi_ephemeral_tree = NULL; 1896b9238976Sth mutex_exit(&mi->mi_lock); 1897b9238976Sth } 1898b9238976Sth } else { 1899b9238976Sth mutex_exit(&mi->mi_lock); 1900b9238976Sth } 1901b9238976Sth 1902b9238976Sth return (0); 1903b9238976Sth 1904b9238976Sth is_busy: 1905b9238976Sth 1906b9238976Sth nfs4_ephemeral_umount_unlock(pmust_unlock, pnet); 1907b9238976Sth 1908b9238976Sth return (error); 1909b9238976Sth } 1910b9238976Sth 1911b9238976Sth /* 1912b9238976Sth * Do the umount and record any error in the parent. 1913b9238976Sth */ 1914b9238976Sth static void 1915b9238976Sth nfs4_ephemeral_record_umount(vfs_t *vfsp, int flag, 1916b9238976Sth nfs4_ephemeral_t *e, nfs4_ephemeral_t *prior) 1917b9238976Sth { 1918b9238976Sth int error; 1919b9238976Sth 1920b9238976Sth error = umount2_engine(vfsp, flag, kcred, FALSE); 1921b9238976Sth if (error) { 1922b9238976Sth if (prior) { 1923b9238976Sth if (prior->ne_child == e) 1924b9238976Sth prior->ne_state |= 1925b9238976Sth NFS4_EPHEMERAL_CHILD_ERROR; 1926b9238976Sth else 1927b9238976Sth prior->ne_state |= 1928b9238976Sth NFS4_EPHEMERAL_PEER_ERROR; 1929b9238976Sth } 1930b9238976Sth } 1931b9238976Sth } 1932b9238976Sth 1933b9238976Sth /* 1934b9238976Sth * For each tree in the forest (where the forest is in 1935b9238976Sth * effect all of the ephemeral trees for this zone), 1936b9238976Sth * scan to see if a node can be unmounted. Note that 1937b9238976Sth * unlike nfs4_ephemeral_unmount_engine(), we do 1938b9238976Sth * not process the current node before children or 1939b9238976Sth * siblings. I.e., if a node can be unmounted, we 1940b9238976Sth * do not recursively check to see if the nodes 1941b9238976Sth * hanging off of it can also be unmounted. 1942b9238976Sth * 1943b9238976Sth * Instead, we delve down deep to try and remove the 1944b9238976Sth * children first. Then, because we share code with 1945b9238976Sth * nfs4_ephemeral_unmount_engine(), we will try 1946b9238976Sth * them again. This could be a performance issue in 1947b9238976Sth * the future. 1948b9238976Sth * 1949b9238976Sth * Also note that unlike nfs4_ephemeral_unmount_engine(), 1950b9238976Sth * we do not halt on an error. We will not remove the 1951b9238976Sth * current node, but we will keep on trying to remove 1952b9238976Sth * the others. 1953b9238976Sth * 1954b9238976Sth * force indicates that we want the unmount to occur 1955b9238976Sth * even if there is something blocking it. 1956b9238976Sth * 1957b9238976Sth * time_check indicates that we want to see if the 1958b9238976Sth * mount has expired past mount_to or not. Typically 1959b9238976Sth * we want to do this and only on a shutdown of the 1960b9238976Sth * zone would we want to ignore the check. 1961b9238976Sth */ 1962b9238976Sth static void 1963b9238976Sth nfs4_ephemeral_harvest_forest(nfs4_trigger_globals_t *ntg, 1964b9238976Sth bool_t force, bool_t time_check) 1965b9238976Sth { 1966b9238976Sth nfs4_ephemeral_tree_t *net; 1967b9238976Sth nfs4_ephemeral_tree_t *prev = NULL; 1968b9238976Sth nfs4_ephemeral_tree_t *next; 1969b9238976Sth nfs4_ephemeral_t *e; 1970b9238976Sth nfs4_ephemeral_t *prior; 1971b9238976Sth time_t now = gethrestime_sec(); 1972b9238976Sth 1973b9238976Sth nfs4_ephemeral_tree_t *harvest = NULL; 1974b9238976Sth 1975b9238976Sth int flag; 1976b9238976Sth 1977b9238976Sth mntinfo4_t *mi; 1978b9238976Sth vfs_t *vfsp; 1979b9238976Sth 1980b9238976Sth if (force) 1981b9238976Sth flag = MS_FORCE; 1982b9238976Sth else 1983b9238976Sth flag = 0; 1984b9238976Sth 1985b9238976Sth mutex_enter(&ntg->ntg_forest_lock); 1986b9238976Sth for (net = ntg->ntg_forest; net != NULL; net = next) { 1987b9238976Sth next = net->net_next; 1988b9238976Sth 1989b9238976Sth mutex_enter(&net->net_cnt_lock); 1990b9238976Sth net->net_refcnt++; 1991b9238976Sth mutex_exit(&net->net_cnt_lock); 1992b9238976Sth 1993b9238976Sth mutex_enter(&net->net_tree_lock); 1994b9238976Sth 1995b9238976Sth /* 1996b9238976Sth * Let the unmount code know that the 1997b9238976Sth * tree is already locked! 1998b9238976Sth */ 1999b9238976Sth mutex_enter(&net->net_cnt_lock); 2000b9238976Sth net->net_status |= NFS4_EPHEMERAL_TREE_LOCKED; 2001b9238976Sth mutex_exit(&net->net_cnt_lock); 2002b9238976Sth 2003b9238976Sth /* 2004b9238976Sth * If the intent is force all ephemeral nodes to 2005b9238976Sth * be unmounted in this zone, we can short circuit a 2006b9238976Sth * lot of tree traversal and simply zap the root node. 2007b9238976Sth */ 2008b9238976Sth if (force) { 2009b9238976Sth if (net->net_root) { 2010b9238976Sth mi = net->net_root->ne_mount; 2011b9238976Sth vfsp = mi->mi_vfsp; 2012b9238976Sth 2013b9238976Sth /* 2014b9238976Sth * Cleared by umount2_engine. 2015b9238976Sth */ 2016b9238976Sth VFS_HOLD(vfsp); 2017b9238976Sth 2018b9238976Sth (void) umount2_engine(vfsp, flag, 2019b9238976Sth kcred, FALSE); 2020b9238976Sth 2021b9238976Sth goto check_done; 2022b9238976Sth } 2023b9238976Sth } 2024b9238976Sth 2025b9238976Sth e = net->net_root; 2026b9238976Sth if (e) 2027b9238976Sth e->ne_state = NFS4_EPHEMERAL_VISIT_CHILD; 2028b9238976Sth 2029b9238976Sth while (e) { 2030b9238976Sth if (e->ne_state == NFS4_EPHEMERAL_VISIT_CHILD) { 2031b9238976Sth e->ne_state = NFS4_EPHEMERAL_VISIT_SIBLING; 2032b9238976Sth if (e->ne_child) { 2033b9238976Sth e = e->ne_child; 2034b9238976Sth e->ne_state = 2035b9238976Sth NFS4_EPHEMERAL_VISIT_CHILD; 2036b9238976Sth } 2037b9238976Sth 2038b9238976Sth continue; 2039b9238976Sth } else if (e->ne_state == 2040b9238976Sth NFS4_EPHEMERAL_VISIT_SIBLING) { 2041b9238976Sth e->ne_state = NFS4_EPHEMERAL_PROCESS_ME; 2042b9238976Sth if (e->ne_peer) { 2043b9238976Sth e = e->ne_peer; 2044b9238976Sth e->ne_state = 2045b9238976Sth NFS4_EPHEMERAL_VISIT_CHILD; 2046b9238976Sth } 2047b9238976Sth 2048b9238976Sth continue; 2049b9238976Sth } else if (e->ne_state == 2050b9238976Sth NFS4_EPHEMERAL_CHILD_ERROR) { 2051b9238976Sth prior = e->ne_prior; 2052b9238976Sth 2053b9238976Sth /* 2054b9238976Sth * If a child reported an error, do 2055b9238976Sth * not bother trying to unmount. 2056b9238976Sth * 2057b9238976Sth * If your prior node is a parent, 2058b9238976Sth * pass the error up such that they 2059b9238976Sth * also do not try to unmount. 2060b9238976Sth * 2061b9238976Sth * However, if your prior is a sibling, 2062b9238976Sth * let them try to unmount if they can. 2063b9238976Sth */ 2064b9238976Sth if (prior) { 2065b9238976Sth if (prior->ne_child == e) 2066b9238976Sth prior->ne_state |= 2067b9238976Sth NFS4_EPHEMERAL_CHILD_ERROR; 2068b9238976Sth else 2069b9238976Sth prior->ne_state |= 2070b9238976Sth NFS4_EPHEMERAL_PEER_ERROR; 2071b9238976Sth } 2072b9238976Sth 2073b9238976Sth /* 2074b9238976Sth * Clear the error and if needed, process peers. 2075b9238976Sth * 2076b9238976Sth * Once we mask out the error, we know whether 2077b9238976Sth * or we have to process another node. 2078b9238976Sth */ 2079b9238976Sth e->ne_state &= ~NFS4_EPHEMERAL_CHILD_ERROR; 2080b9238976Sth if (e->ne_state == NFS4_EPHEMERAL_PROCESS_ME) 2081b9238976Sth e = prior; 2082b9238976Sth 2083b9238976Sth continue; 2084b9238976Sth } else if (e->ne_state == 2085b9238976Sth NFS4_EPHEMERAL_PEER_ERROR) { 2086b9238976Sth prior = e->ne_prior; 2087b9238976Sth 2088b9238976Sth if (prior) { 2089b9238976Sth if (prior->ne_child == e) 2090b9238976Sth prior->ne_state = 2091b9238976Sth NFS4_EPHEMERAL_CHILD_ERROR; 2092b9238976Sth else 2093b9238976Sth prior->ne_state = 2094b9238976Sth NFS4_EPHEMERAL_PEER_ERROR; 2095b9238976Sth } 2096b9238976Sth 2097b9238976Sth /* 2098b9238976Sth * Clear the error from this node and do the 2099b9238976Sth * correct processing. 2100b9238976Sth */ 2101b9238976Sth e->ne_state &= ~NFS4_EPHEMERAL_PEER_ERROR; 2102b9238976Sth continue; 2103b9238976Sth } 2104b9238976Sth 2105b9238976Sth prior = e->ne_prior; 2106b9238976Sth e->ne_state = NFS4_EPHEMERAL_OK; 2107b9238976Sth 2108b9238976Sth /* 2109b9238976Sth * It must be the case that we need to process 2110b9238976Sth * this node. 2111b9238976Sth */ 2112b9238976Sth if (!time_check || 2113b9238976Sth now - e->ne_ref_time > e->ne_mount_to) { 2114b9238976Sth mi = e->ne_mount; 2115b9238976Sth vfsp = mi->mi_vfsp; 2116b9238976Sth 2117b9238976Sth /* 2118b9238976Sth * Cleared by umount2_engine. 2119b9238976Sth */ 2120b9238976Sth VFS_HOLD(vfsp); 2121b9238976Sth 2122b9238976Sth /* 2123b9238976Sth * Note that we effectively work down to the 2124b9238976Sth * leaf nodes first, try to unmount them, 2125b9238976Sth * then work our way back up into the leaf 2126b9238976Sth * nodes. 2127b9238976Sth * 2128b9238976Sth * Also note that we deal with a lot of 2129b9238976Sth * complexity by sharing the work with 2130b9238976Sth * the manual unmount code. 2131b9238976Sth */ 2132b9238976Sth nfs4_ephemeral_record_umount(vfsp, flag, 2133b9238976Sth e, prior); 2134b9238976Sth } 2135b9238976Sth 2136b9238976Sth e = prior; 2137b9238976Sth } 2138b9238976Sth 2139b9238976Sth check_done: 2140b9238976Sth 2141b9238976Sth /* 2142b9238976Sth * Are we done with this tree? 2143b9238976Sth */ 2144b9238976Sth mutex_enter(&net->net_cnt_lock); 2145b9238976Sth if (net->net_refcnt == 1 && 2146b9238976Sth net->net_status & NFS4_EPHEMERAL_TREE_INVALID) { 2147b9238976Sth net->net_refcnt--; 2148b9238976Sth net->net_status &= ~NFS4_EPHEMERAL_TREE_LOCKED; 2149b9238976Sth mutex_exit(&net->net_cnt_lock); 2150b9238976Sth mutex_exit(&net->net_tree_lock); 2151b9238976Sth 2152b9238976Sth if (prev) 2153b9238976Sth prev->net_next = net->net_next; 2154b9238976Sth else 2155b9238976Sth ntg->ntg_forest = net->net_next; 2156b9238976Sth 2157b9238976Sth net->net_next = harvest; 2158b9238976Sth harvest = net; 2159b9238976Sth continue; 2160b9238976Sth } 2161b9238976Sth 2162b9238976Sth net->net_refcnt--; 2163b9238976Sth net->net_status &= ~NFS4_EPHEMERAL_TREE_LOCKED; 2164b9238976Sth mutex_exit(&net->net_cnt_lock); 2165b9238976Sth mutex_exit(&net->net_tree_lock); 2166b9238976Sth 2167b9238976Sth prev = net; 2168b9238976Sth } 2169b9238976Sth mutex_exit(&ntg->ntg_forest_lock); 2170b9238976Sth 2171b9238976Sth for (net = harvest; net != NULL; net = next) { 2172b9238976Sth next = net->net_next; 2173b9238976Sth 2174b9238976Sth mutex_destroy(&net->net_tree_lock); 2175b9238976Sth mutex_destroy(&net->net_cnt_lock); 2176b9238976Sth kmem_free(net, sizeof (*net)); 2177b9238976Sth } 2178b9238976Sth } 2179b9238976Sth 2180b9238976Sth /* 2181b9238976Sth * This is the thread which decides when the harvesting 2182b9238976Sth * can proceed and when to kill it off for this zone. 2183b9238976Sth */ 2184b9238976Sth static void 2185b9238976Sth nfs4_ephemeral_harvester(nfs4_trigger_globals_t *ntg) 2186b9238976Sth { 2187b9238976Sth clock_t timeleft; 2188b9238976Sth zone_t *zone = curproc->p_zone; 2189b9238976Sth 2190b9238976Sth for (;;) { 2191b9238976Sth timeleft = zone_status_timedwait(zone, lbolt + 2192b9238976Sth nfs4_trigger_thread_timer * hz, ZONE_IS_SHUTTING_DOWN); 2193b9238976Sth 2194b9238976Sth /* 2195b9238976Sth * zone is exiting... 2196b9238976Sth */ 2197b9238976Sth if (timeleft != -1) { 2198b9238976Sth ASSERT(zone_status_get(zone) >= ZONE_IS_SHUTTING_DOWN); 2199b9238976Sth zthread_exit(); 2200b9238976Sth /* NOTREACHED */ 2201b9238976Sth } 2202b9238976Sth 2203b9238976Sth /* 2204b9238976Sth * Only bother scanning if there is potential 2205b9238976Sth * work to be done. 2206b9238976Sth */ 2207b9238976Sth if (ntg->ntg_forest == NULL) 2208b9238976Sth continue; 2209b9238976Sth 2210b9238976Sth /* 2211b9238976Sth * Now scan the list and get rid of everything which 2212b9238976Sth * is old. 2213b9238976Sth */ 2214b9238976Sth nfs4_ephemeral_harvest_forest(ntg, FALSE, TRUE); 2215b9238976Sth } 2216b9238976Sth 2217b9238976Sth /* NOTREACHED */ 2218b9238976Sth } 2219b9238976Sth 2220b9238976Sth /* 2221b9238976Sth * The zone specific glue needed to start the unmount harvester. 2222b9238976Sth * 2223b9238976Sth * Note that we want to avoid holding the mutex as long as possible, 2224b9238976Sth * hence the multiple checks. 2225b9238976Sth * 2226b9238976Sth * The caller should avoid us getting down here in the first 2227b9238976Sth * place. 2228b9238976Sth */ 2229b9238976Sth static void 2230b9238976Sth nfs4_ephemeral_start_harvester(nfs4_trigger_globals_t *ntg) 2231b9238976Sth { 2232b9238976Sth /* 2233b9238976Sth * It got started before we got here... 2234b9238976Sth */ 2235b9238976Sth if (ntg->ntg_thread_started) 2236b9238976Sth return; 2237b9238976Sth 2238b9238976Sth mutex_enter(&nfs4_ephemeral_thread_lock); 2239b9238976Sth 2240b9238976Sth if (ntg->ntg_thread_started) { 2241b9238976Sth mutex_exit(&nfs4_ephemeral_thread_lock); 2242b9238976Sth return; 2243b9238976Sth } 2244b9238976Sth 2245b9238976Sth /* 2246b9238976Sth * Start the unmounter harvester thread for this zone. 2247b9238976Sth */ 2248b9238976Sth (void) zthread_create(NULL, 0, nfs4_ephemeral_harvester, 2249b9238976Sth ntg, 0, minclsyspri); 2250b9238976Sth 2251b9238976Sth ntg->ntg_thread_started = TRUE; 2252b9238976Sth mutex_exit(&nfs4_ephemeral_thread_lock); 2253b9238976Sth } 2254b9238976Sth 2255b9238976Sth /*ARGSUSED*/ 2256b9238976Sth static void * 2257b9238976Sth nfs4_ephemeral_zsd_create(zoneid_t zoneid) 2258b9238976Sth { 2259b9238976Sth nfs4_trigger_globals_t *ntg; 2260b9238976Sth 2261b9238976Sth ntg = kmem_zalloc(sizeof (*ntg), KM_SLEEP); 2262b9238976Sth ntg->ntg_thread_started = FALSE; 2263b9238976Sth 2264b9238976Sth /* 2265b9238976Sth * This is the default.... 2266b9238976Sth */ 2267b9238976Sth ntg->ntg_mount_to = nfs4_trigger_thread_timer; 2268b9238976Sth 2269b9238976Sth mutex_init(&ntg->ntg_forest_lock, NULL, 2270b9238976Sth MUTEX_DEFAULT, NULL); 2271b9238976Sth 2272b9238976Sth return (ntg); 2273b9238976Sth } 2274b9238976Sth 2275b9238976Sth /* 2276b9238976Sth * Try a nice gentle walk down the forest and convince 2277b9238976Sth * all of the trees to gracefully give it up. 2278b9238976Sth */ 2279b9238976Sth /*ARGSUSED*/ 2280b9238976Sth static void 2281b9238976Sth nfs4_ephemeral_zsd_shutdown(zoneid_t zoneid, void *arg) 2282b9238976Sth { 2283b9238976Sth nfs4_trigger_globals_t *ntg = arg; 2284b9238976Sth 2285b9238976Sth if (!ntg) 2286b9238976Sth return; 2287b9238976Sth 2288b9238976Sth nfs4_ephemeral_harvest_forest(ntg, FALSE, FALSE); 2289b9238976Sth } 2290b9238976Sth 2291b9238976Sth /* 2292b9238976Sth * Race along the forest and rip all of the trees out by 2293b9238976Sth * their rootballs! 2294b9238976Sth */ 2295b9238976Sth /*ARGSUSED*/ 2296b9238976Sth static void 2297b9238976Sth nfs4_ephemeral_zsd_destroy(zoneid_t zoneid, void *arg) 2298b9238976Sth { 2299b9238976Sth nfs4_trigger_globals_t *ntg = arg; 2300b9238976Sth 2301b9238976Sth if (!ntg) 2302b9238976Sth return; 2303b9238976Sth 2304b9238976Sth nfs4_ephemeral_harvest_forest(ntg, TRUE, FALSE); 2305b9238976Sth 2306b9238976Sth mutex_destroy(&ntg->ntg_forest_lock); 2307b9238976Sth kmem_free(ntg, sizeof (*ntg)); 2308b9238976Sth } 2309b9238976Sth 2310b9238976Sth /* 2311b9238976Sth * This is the zone independent cleanup needed for 2312b9238976Sth * emphemeral mount processing. 2313b9238976Sth */ 2314b9238976Sth void 2315b9238976Sth nfs4_ephemeral_fini(void) 2316b9238976Sth { 2317b9238976Sth (void) zone_key_delete(nfs4_ephemeral_key); 2318b9238976Sth mutex_destroy(&nfs4_ephemeral_thread_lock); 2319b9238976Sth } 2320b9238976Sth 2321b9238976Sth /* 2322b9238976Sth * This is the zone independent initialization needed for 2323b9238976Sth * emphemeral mount processing. 2324b9238976Sth */ 2325b9238976Sth void 2326b9238976Sth nfs4_ephemeral_init(void) 2327b9238976Sth { 2328b9238976Sth mutex_init(&nfs4_ephemeral_thread_lock, NULL, MUTEX_DEFAULT, 2329b9238976Sth NULL); 2330b9238976Sth 2331b9238976Sth zone_key_create(&nfs4_ephemeral_key, nfs4_ephemeral_zsd_create, 2332b9238976Sth nfs4_ephemeral_zsd_shutdown, nfs4_ephemeral_zsd_destroy); 2333b9238976Sth } 2334b9238976Sth 2335b9238976Sth /* 2336b9238976Sth * nfssys() calls this function to set the per-zone 2337b9238976Sth * value of mount_to to drive when an ephemeral mount is 2338b9238976Sth * timed out. Each mount will grab a copy of this value 2339b9238976Sth * when mounted. 2340b9238976Sth */ 2341b9238976Sth void 2342b9238976Sth nfs4_ephemeral_set_mount_to(uint_t mount_to) 2343b9238976Sth { 2344b9238976Sth nfs4_trigger_globals_t *ntg; 2345b9238976Sth zone_t *zone = curproc->p_zone; 2346b9238976Sth 2347b9238976Sth ntg = zone_getspecific(nfs4_ephemeral_key, zone); 2348b9238976Sth 2349b9238976Sth ntg->ntg_mount_to = mount_to; 2350b9238976Sth } 2351b9238976Sth 2352b9238976Sth /* 2353b9238976Sth * Walk the list of v4 mount options; if they are currently set in vfsp, 2354b9238976Sth * append them to a new comma-separated mount option string, and return it. 2355b9238976Sth * 2356b9238976Sth * Caller should free by calling nfs4_trigger_destroy_mntopts(). 2357b9238976Sth */ 2358b9238976Sth static char * 2359b9238976Sth nfs4_trigger_create_mntopts(vfs_t *vfsp) 2360b9238976Sth { 2361b9238976Sth uint_t i; 2362b9238976Sth char *mntopts; 2363b9238976Sth struct vfssw *vswp; 2364b9238976Sth mntopts_t *optproto; 2365b9238976Sth 2366b9238976Sth mntopts = kmem_zalloc(MAX_MNTOPT_STR, KM_SLEEP); 2367b9238976Sth 2368b9238976Sth /* get the list of applicable mount options for v4; locks *vswp */ 2369b9238976Sth vswp = vfs_getvfssw(MNTTYPE_NFS4); 2370b9238976Sth optproto = &vswp->vsw_optproto; 2371b9238976Sth 2372b9238976Sth for (i = 0; i < optproto->mo_count; i++) { 2373b9238976Sth struct mntopt *mop = &optproto->mo_list[i]; 2374b9238976Sth 2375b9238976Sth if (mop->mo_flags & MO_EMPTY) 2376b9238976Sth continue; 2377b9238976Sth 2378b9238976Sth if (nfs4_trigger_add_mntopt(mntopts, mop->mo_name, vfsp)) { 2379b9238976Sth kmem_free(mntopts, MAX_MNTOPT_STR); 2380b9238976Sth vfs_unrefvfssw(vswp); 2381b9238976Sth return (NULL); 2382b9238976Sth } 2383b9238976Sth } 2384b9238976Sth 2385b9238976Sth vfs_unrefvfssw(vswp); 2386b9238976Sth 2387b9238976Sth /* 2388b9238976Sth * MNTOPT_XATTR is not in the v4 mount opt proto list, 2389b9238976Sth * and it may only be passed via MS_OPTIONSTR, so we 2390b9238976Sth * must handle it here. 2391b9238976Sth * 2392b9238976Sth * Ideally, it would be in the list, but NFS does not specify its 2393b9238976Sth * own opt proto list, it uses instead the default one. Since 2394b9238976Sth * not all filesystems support extended attrs, it would not be 2395b9238976Sth * appropriate to add it there. 2396b9238976Sth */ 2397b9238976Sth if (nfs4_trigger_add_mntopt(mntopts, MNTOPT_XATTR, vfsp) || 2398b9238976Sth nfs4_trigger_add_mntopt(mntopts, MNTOPT_NOXATTR, vfsp)) { 2399b9238976Sth kmem_free(mntopts, MAX_MNTOPT_STR); 2400b9238976Sth return (NULL); 2401b9238976Sth } 2402b9238976Sth 2403b9238976Sth return (mntopts); 2404b9238976Sth } 2405b9238976Sth 2406b9238976Sth static void 2407b9238976Sth nfs4_trigger_destroy_mntopts(char *mntopts) 2408b9238976Sth { 2409b9238976Sth if (mntopts) 2410b9238976Sth kmem_free(mntopts, MAX_MNTOPT_STR); 2411b9238976Sth } 2412b9238976Sth 2413b9238976Sth /* 2414b9238976Sth * Check a single mount option (optname). Add to mntopts if it is set in VFS. 2415b9238976Sth */ 2416b9238976Sth static int 2417b9238976Sth nfs4_trigger_add_mntopt(char *mntopts, char *optname, vfs_t *vfsp) 2418b9238976Sth { 2419b9238976Sth if (mntopts == NULL || optname == NULL || vfsp == NULL) 2420b9238976Sth return (EINVAL); 2421b9238976Sth 2422b9238976Sth if (vfs_optionisset(vfsp, optname, NULL)) { 2423b9238976Sth size_t mntoptslen = strlen(mntopts); 2424b9238976Sth size_t optnamelen = strlen(optname); 2425b9238976Sth 2426b9238976Sth /* +1 for ',', +1 for NUL */ 2427b9238976Sth if (mntoptslen + optnamelen + 2 > MAX_MNTOPT_STR) 2428b9238976Sth return (EOVERFLOW); 2429b9238976Sth 2430b9238976Sth /* first or subsequent mount option? */ 2431b9238976Sth if (*mntopts != '\0') 2432b9238976Sth (void) strcat(mntopts, ","); 2433b9238976Sth 2434b9238976Sth (void) strcat(mntopts, optname); 2435b9238976Sth } 2436b9238976Sth 2437b9238976Sth return (0); 2438b9238976Sth } 2439b9238976Sth 2440b9238976Sth static enum clnt_stat 2441b9238976Sth nfs4_trigger_ping_server(servinfo4_t *svp, int nointr) 2442b9238976Sth { 2443b9238976Sth int retries, error; 2444b9238976Sth uint_t max_msgsize; 2445b9238976Sth enum clnt_stat status; 2446b9238976Sth CLIENT *cl; 2447b9238976Sth struct timeval timeout; 2448b9238976Sth 2449b9238976Sth /* as per recov_newserver() */ 2450b9238976Sth max_msgsize = 0; 2451b9238976Sth retries = 1; 2452b9238976Sth timeout.tv_sec = 2; 2453b9238976Sth timeout.tv_usec = 0; 2454b9238976Sth 2455b9238976Sth error = clnt_tli_kcreate(svp->sv_knconf, &svp->sv_addr, NFS_PROGRAM, 2456b9238976Sth NFS_V4, max_msgsize, retries, CRED(), &cl); 2457b9238976Sth if (error) 2458b9238976Sth return (RPC_FAILED); 2459b9238976Sth 2460b9238976Sth if (nointr) 2461b9238976Sth cl->cl_nosignal = TRUE; 2462b9238976Sth status = CLNT_CALL(cl, RFS_NULL, xdr_void, NULL, xdr_void, NULL, 2463b9238976Sth timeout); 2464b9238976Sth if (nointr) 2465b9238976Sth cl->cl_nosignal = FALSE; 2466b9238976Sth 2467b9238976Sth AUTH_DESTROY(cl->cl_auth); 2468b9238976Sth CLNT_DESTROY(cl); 2469b9238976Sth 2470b9238976Sth return (status); 2471b9238976Sth } 2472