17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate  * CDDL HEADER START
37c478bd9Sstevel@tonic-gate  *
47c478bd9Sstevel@tonic-gate  * The contents of this file are subject to the terms of the
5da1b9cd5Sjwahlig  * Common Development and Distribution License (the "License").
6da1b9cd5Sjwahlig  * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate  * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate  * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate  * and limitations under the License.
127c478bd9Sstevel@tonic-gate  *
137c478bd9Sstevel@tonic-gate  * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate  * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate  * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate  * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate  *
197c478bd9Sstevel@tonic-gate  * CDDL HEADER END
207c478bd9Sstevel@tonic-gate  */
21*59927d31SYuri Pankov 
227c478bd9Sstevel@tonic-gate /*
23878aca8dSDai Ngo  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
247c478bd9Sstevel@tonic-gate  * Use is subject to license terms.
25*59927d31SYuri Pankov  * Copyright 2014 Nexenta Systems, Inc.  All rights reserved.
267c478bd9Sstevel@tonic-gate  */
277c478bd9Sstevel@tonic-gate 
287c478bd9Sstevel@tonic-gate #include <sys/systm.h>
297c478bd9Sstevel@tonic-gate #include <rpc/auth.h>
307c478bd9Sstevel@tonic-gate #include <rpc/clnt.h>
317c478bd9Sstevel@tonic-gate #include <nfs/nfs4_kprot.h>
327c478bd9Sstevel@tonic-gate #include <nfs/nfs4.h>
337c478bd9Sstevel@tonic-gate #include <nfs/lm.h>
347c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h>
357c478bd9Sstevel@tonic-gate #include <sys/disp.h>
36f3b585ceSsamf #include <sys/sdt.h>
377c478bd9Sstevel@tonic-gate 
387c478bd9Sstevel@tonic-gate #include <sys/pathname.h>
397c478bd9Sstevel@tonic-gate 
407c478bd9Sstevel@tonic-gate #include <sys/strsubr.h>
417c478bd9Sstevel@tonic-gate #include <sys/ddi.h>
427c478bd9Sstevel@tonic-gate 
437c478bd9Sstevel@tonic-gate #include <sys/vnode.h>
44ed57cab9Srg #include <sys/sdt.h>
457c478bd9Sstevel@tonic-gate #include <inet/common.h>
467c478bd9Sstevel@tonic-gate #include <inet/ip.h>
477c478bd9Sstevel@tonic-gate #include <inet/ip6.h>
487c478bd9Sstevel@tonic-gate 
497c478bd9Sstevel@tonic-gate #define	MAX_READ_DELEGATIONS 5
507c478bd9Sstevel@tonic-gate 
517c478bd9Sstevel@tonic-gate krwlock_t rfs4_deleg_policy_lock;
527c478bd9Sstevel@tonic-gate srv_deleg_policy_t rfs4_deleg_policy = SRV_NEVER_DELEGATE;
537c478bd9Sstevel@tonic-gate static int rfs4_deleg_wlp = 5;
547c478bd9Sstevel@tonic-gate kmutex_t rfs4_deleg_lock;
557c478bd9Sstevel@tonic-gate static int rfs4_deleg_disabled;
56878aca8dSDai Ngo static int rfs4_max_setup_cb_tries = 5;
577c478bd9Sstevel@tonic-gate 
587c478bd9Sstevel@tonic-gate #ifdef DEBUG
597c478bd9Sstevel@tonic-gate 
607c478bd9Sstevel@tonic-gate static int rfs4_test_cbgetattr_fail = 0;
617c478bd9Sstevel@tonic-gate int rfs4_cb_null;
627c478bd9Sstevel@tonic-gate int rfs4_cb_debug;
637c478bd9Sstevel@tonic-gate int rfs4_deleg_debug;
647c478bd9Sstevel@tonic-gate 
657c478bd9Sstevel@tonic-gate #endif
667c478bd9Sstevel@tonic-gate 
677c478bd9Sstevel@tonic-gate static void rfs4_recall_file(rfs4_file_t *,
68d216dff5SRobert Mastors     void (*recall)(rfs4_deleg_state_t *, bool_t),
69d216dff5SRobert Mastors     bool_t, rfs4_client_t *);
707c478bd9Sstevel@tonic-gate static	void		rfs4_revoke_file(rfs4_file_t *);
717c478bd9Sstevel@tonic-gate static	void		rfs4_cb_chflush(rfs4_cbinfo_t *);
727c478bd9Sstevel@tonic-gate static	CLIENT		*rfs4_cb_getch(rfs4_cbinfo_t *);
737c478bd9Sstevel@tonic-gate static	void		rfs4_cb_freech(rfs4_cbinfo_t *, CLIENT *, bool_t);
747c478bd9Sstevel@tonic-gate static rfs4_deleg_state_t *rfs4_deleg_state(rfs4_state_t *,
75d216dff5SRobert Mastors     open_delegation_type4, int *);
767c478bd9Sstevel@tonic-gate 
777c478bd9Sstevel@tonic-gate /*
787c478bd9Sstevel@tonic-gate  * Convert a universal address to an transport specific
797c478bd9Sstevel@tonic-gate  * address using inet_pton.
807c478bd9Sstevel@tonic-gate  */
817c478bd9Sstevel@tonic-gate static int
827c478bd9Sstevel@tonic-gate uaddr2sockaddr(int af, char *ua, void *ap, in_port_t *pp)
837c478bd9Sstevel@tonic-gate {
847c478bd9Sstevel@tonic-gate 	int dots = 0, i, j, len, k;
857c478bd9Sstevel@tonic-gate 	unsigned char c;
867c478bd9Sstevel@tonic-gate 	in_port_t port = 0;
877c478bd9Sstevel@tonic-gate 
887c478bd9Sstevel@tonic-gate 	len = strlen(ua);
897c478bd9Sstevel@tonic-gate 
907c478bd9Sstevel@tonic-gate 	for (i = len-1; i >= 0; i--) {
917c478bd9Sstevel@tonic-gate 
927c478bd9Sstevel@tonic-gate 		if (ua[i] == '.')
937c478bd9Sstevel@tonic-gate 			dots++;
947c478bd9Sstevel@tonic-gate 
957c478bd9Sstevel@tonic-gate 		if (dots == 2) {
967c478bd9Sstevel@tonic-gate 
977c478bd9Sstevel@tonic-gate 			ua[i] = '\0';
987c478bd9Sstevel@tonic-gate 			/*
997c478bd9Sstevel@tonic-gate 			 * We use k to remember were to stick '.' back, since
1007c478bd9Sstevel@tonic-gate 			 * ua was kmem_allocateded from the pool len+1.
1017c478bd9Sstevel@tonic-gate 			 */
1027c478bd9Sstevel@tonic-gate 			k = i;
1037c478bd9Sstevel@tonic-gate 			if (inet_pton(af, ua, ap) == 1) {
1047c478bd9Sstevel@tonic-gate 
1057c478bd9Sstevel@tonic-gate 				c = 0;
1067c478bd9Sstevel@tonic-gate 
1077c478bd9Sstevel@tonic-gate 				for (j = i+1; j < len; j++) {
1087c478bd9Sstevel@tonic-gate 					if (ua[j] == '.') {
1097c478bd9Sstevel@tonic-gate 						port = c << 8;
1107c478bd9Sstevel@tonic-gate 						c = 0;
1117c478bd9Sstevel@tonic-gate 					} else if (ua[j] >= '0' &&
1127c478bd9Sstevel@tonic-gate 					    ua[j] <= '9') {
1137c478bd9Sstevel@tonic-gate 						c *= 10;
1147c478bd9Sstevel@tonic-gate 						c += ua[j] - '0';
1157c478bd9Sstevel@tonic-gate 					} else {
1167c478bd9Sstevel@tonic-gate 						ua[k] = '.';
1177c478bd9Sstevel@tonic-gate 						return (EINVAL);
1187c478bd9Sstevel@tonic-gate 					}
1197c478bd9Sstevel@tonic-gate 				}
1207c478bd9Sstevel@tonic-gate 				port += c;
1217c478bd9Sstevel@tonic-gate 
122*59927d31SYuri Pankov 				*pp = htons(port);
1237c478bd9Sstevel@tonic-gate 
1247c478bd9Sstevel@tonic-gate 				ua[k] = '.';
1257c478bd9Sstevel@tonic-gate 				return (0);
1267c478bd9Sstevel@tonic-gate 			} else {
1277c478bd9Sstevel@tonic-gate 				ua[k] = '.';
1287c478bd9Sstevel@tonic-gate 				return (EINVAL);
1297c478bd9Sstevel@tonic-gate 			}
1307c478bd9Sstevel@tonic-gate 		}
1317c478bd9Sstevel@tonic-gate 	}
1327c478bd9Sstevel@tonic-gate 
1337c478bd9Sstevel@tonic-gate 	return (EINVAL);
1347c478bd9Sstevel@tonic-gate }
1357c478bd9Sstevel@tonic-gate 
1367c478bd9Sstevel@tonic-gate /*
1377c478bd9Sstevel@tonic-gate  * Update the delegation policy with the
1387c478bd9Sstevel@tonic-gate  * value of "new_policy"
1397c478bd9Sstevel@tonic-gate  */
1407c478bd9Sstevel@tonic-gate void
1417c478bd9Sstevel@tonic-gate rfs4_set_deleg_policy(srv_deleg_policy_t new_policy)
1427c478bd9Sstevel@tonic-gate {
1437c478bd9Sstevel@tonic-gate 	rw_enter(&rfs4_deleg_policy_lock, RW_WRITER);
1447c478bd9Sstevel@tonic-gate 	rfs4_deleg_policy = new_policy;
1457c478bd9Sstevel@tonic-gate 	rw_exit(&rfs4_deleg_policy_lock);
1467c478bd9Sstevel@tonic-gate }
1477c478bd9Sstevel@tonic-gate 
1487c478bd9Sstevel@tonic-gate void
1497c478bd9Sstevel@tonic-gate rfs4_hold_deleg_policy(void)
1507c478bd9Sstevel@tonic-gate {
1517c478bd9Sstevel@tonic-gate 	rw_enter(&rfs4_deleg_policy_lock, RW_READER);
1527c478bd9Sstevel@tonic-gate }
1537c478bd9Sstevel@tonic-gate 
1547c478bd9Sstevel@tonic-gate void
1557c478bd9Sstevel@tonic-gate rfs4_rele_deleg_policy(void)
1567c478bd9Sstevel@tonic-gate {
1577c478bd9Sstevel@tonic-gate 	rw_exit(&rfs4_deleg_policy_lock);
1587c478bd9Sstevel@tonic-gate }
1597c478bd9Sstevel@tonic-gate 
1607c478bd9Sstevel@tonic-gate 
1617c478bd9Sstevel@tonic-gate /*
1627c478bd9Sstevel@tonic-gate  * This free function is to be used when the client struct is being
1637c478bd9Sstevel@tonic-gate  * released and nothing at all is needed of the callback info any
1647c478bd9Sstevel@tonic-gate  * longer.
1657c478bd9Sstevel@tonic-gate  */
1667c478bd9Sstevel@tonic-gate void
1677c478bd9Sstevel@tonic-gate rfs4_cbinfo_free(rfs4_cbinfo_t *cbp)
1687c478bd9Sstevel@tonic-gate {
1697c478bd9Sstevel@tonic-gate 	char *addr = cbp->cb_callback.cb_location.r_addr;
1707c478bd9Sstevel@tonic-gate 	char *netid = cbp->cb_callback.cb_location.r_netid;
1717c478bd9Sstevel@tonic-gate 
1727c478bd9Sstevel@tonic-gate 	/* Free old address if any */
1737c478bd9Sstevel@tonic-gate 
1747c478bd9Sstevel@tonic-gate 	if (addr)
1757c478bd9Sstevel@tonic-gate 		kmem_free(addr, strlen(addr) + 1);
1767c478bd9Sstevel@tonic-gate 	if (netid)
1777c478bd9Sstevel@tonic-gate 		kmem_free(netid, strlen(netid) + 1);
1787c478bd9Sstevel@tonic-gate 
1797c478bd9Sstevel@tonic-gate 	addr = cbp->cb_newer.cb_callback.cb_location.r_addr;
1807c478bd9Sstevel@tonic-gate 	netid = cbp->cb_newer.cb_callback.cb_location.r_netid;
1817c478bd9Sstevel@tonic-gate 
1827c478bd9Sstevel@tonic-gate 	if (addr)
1837c478bd9Sstevel@tonic-gate 		kmem_free(addr, strlen(addr) + 1);
1847c478bd9Sstevel@tonic-gate 	if (netid)
1857c478bd9Sstevel@tonic-gate 		kmem_free(netid, strlen(netid) + 1);
1867c478bd9Sstevel@tonic-gate 
1877c478bd9Sstevel@tonic-gate 	if (cbp->cb_chc_free) {
1887c478bd9Sstevel@tonic-gate 		rfs4_cb_chflush(cbp);
1897c478bd9Sstevel@tonic-gate 	}
1907c478bd9Sstevel@tonic-gate }
1917c478bd9Sstevel@tonic-gate 
1927c478bd9Sstevel@tonic-gate /*
1937c478bd9Sstevel@tonic-gate  * The server uses this to check the callback path supplied by the
1947c478bd9Sstevel@tonic-gate  * client.  The callback connection is marked "in progress" while this
1957c478bd9Sstevel@tonic-gate  * work is going on and then eventually marked either OK or FAILED.
1967c478bd9Sstevel@tonic-gate  * This work can be done as part of a separate thread and at the end
1977c478bd9Sstevel@tonic-gate  * of this the thread will exit or it may be done such that the caller
1987c478bd9Sstevel@tonic-gate  * will continue with other work.
1997c478bd9Sstevel@tonic-gate  */
2007c478bd9Sstevel@tonic-gate static void
2017c478bd9Sstevel@tonic-gate rfs4_do_cb_null(rfs4_client_t *cp)
2027c478bd9Sstevel@tonic-gate {
2037c478bd9Sstevel@tonic-gate 	struct timeval tv;
2047c478bd9Sstevel@tonic-gate 	CLIENT *ch;
2057c478bd9Sstevel@tonic-gate 	rfs4_cbstate_t newstate;
206d216dff5SRobert Mastors 	rfs4_cbinfo_t *cbp = &cp->rc_cbinfo;
2077c478bd9Sstevel@tonic-gate 
2087c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
2097c478bd9Sstevel@tonic-gate 	/* If another thread is doing CB_NULL RPC then return */
2107c478bd9Sstevel@tonic-gate 	if (cbp->cb_nullcaller == TRUE) {
2117c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
2127c478bd9Sstevel@tonic-gate 		rfs4_client_rele(cp);
2137c478bd9Sstevel@tonic-gate 		return;
2147c478bd9Sstevel@tonic-gate 	}
2157c478bd9Sstevel@tonic-gate 
2167c478bd9Sstevel@tonic-gate 	/* Mark the cbinfo as having a thread in the NULL callback */
2177c478bd9Sstevel@tonic-gate 	cbp->cb_nullcaller = TRUE;
2187c478bd9Sstevel@tonic-gate 
2197c478bd9Sstevel@tonic-gate 	/*
2207c478bd9Sstevel@tonic-gate 	 * Are there other threads still using the cbinfo client
2217c478bd9Sstevel@tonic-gate 	 * handles?  If so, this thread must wait before going and
2227c478bd9Sstevel@tonic-gate 	 * mucking aroiund with the callback information
2237c478bd9Sstevel@tonic-gate 	 */
224a31a5cfdSsamf 	while (cbp->cb_refcnt != 0)
2257c478bd9Sstevel@tonic-gate 		cv_wait(cbp->cb_cv_nullcaller, cbp->cb_lock);
2267c478bd9Sstevel@tonic-gate 
2277c478bd9Sstevel@tonic-gate 	/*
2287c478bd9Sstevel@tonic-gate 	 * This thread itself may find that new callback info has
2297c478bd9Sstevel@tonic-gate 	 * arrived and is set up to handle this case and redrive the
2307c478bd9Sstevel@tonic-gate 	 * call to the client's callback server.
2317c478bd9Sstevel@tonic-gate 	 */
2327c478bd9Sstevel@tonic-gate retry:
2337c478bd9Sstevel@tonic-gate 	if (cbp->cb_newer.cb_new == TRUE &&
2347c478bd9Sstevel@tonic-gate 	    cbp->cb_newer.cb_confirmed == TRUE) {
2357c478bd9Sstevel@tonic-gate 		char *addr = cbp->cb_callback.cb_location.r_addr;
2367c478bd9Sstevel@tonic-gate 		char *netid = cbp->cb_callback.cb_location.r_netid;
2377c478bd9Sstevel@tonic-gate 
2387c478bd9Sstevel@tonic-gate 		/*
2397c478bd9Sstevel@tonic-gate 		 * Free the old stuff if it exists; may be the first
2407c478bd9Sstevel@tonic-gate 		 * time through this path
2417c478bd9Sstevel@tonic-gate 		 */
2427c478bd9Sstevel@tonic-gate 		if (addr)
2437c478bd9Sstevel@tonic-gate 			kmem_free(addr, strlen(addr) + 1);
2447c478bd9Sstevel@tonic-gate 		if (netid)
2457c478bd9Sstevel@tonic-gate 			kmem_free(netid, strlen(netid) + 1);
2467c478bd9Sstevel@tonic-gate 
2477c478bd9Sstevel@tonic-gate 		/* Move over the addr/netid */
2487c478bd9Sstevel@tonic-gate 		cbp->cb_callback.cb_location.r_addr =
249ed57cab9Srg 		    cbp->cb_newer.cb_callback.cb_location.r_addr;
2507c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_callback.cb_location.r_addr = NULL;
2517c478bd9Sstevel@tonic-gate 		cbp->cb_callback.cb_location.r_netid =
252ed57cab9Srg 		    cbp->cb_newer.cb_callback.cb_location.r_netid;
2537c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_callback.cb_location.r_netid = NULL;
2547c478bd9Sstevel@tonic-gate 
2557c478bd9Sstevel@tonic-gate 		/* Get the program number */
2567c478bd9Sstevel@tonic-gate 		cbp->cb_callback.cb_program =
257ed57cab9Srg 		    cbp->cb_newer.cb_callback.cb_program;
2587c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_callback.cb_program = 0;
2597c478bd9Sstevel@tonic-gate 
2607c478bd9Sstevel@tonic-gate 		/* Don't forget the protocol's "cb_ident" field */
2617c478bd9Sstevel@tonic-gate 		cbp->cb_ident = cbp->cb_newer.cb_ident;
2627c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_ident = 0;
2637c478bd9Sstevel@tonic-gate 
2647c478bd9Sstevel@tonic-gate 		/* no longer new */
2657c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_new = FALSE;
2667c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_confirmed = FALSE;
2677c478bd9Sstevel@tonic-gate 
2687c478bd9Sstevel@tonic-gate 		/* get rid of the old client handles that may exist */
2697c478bd9Sstevel@tonic-gate 		rfs4_cb_chflush(cbp);
2707c478bd9Sstevel@tonic-gate 
2717c478bd9Sstevel@tonic-gate 		cbp->cb_state = CB_NONE;
2727c478bd9Sstevel@tonic-gate 		cbp->cb_timefailed = 0; /* reset the clock */
2737c478bd9Sstevel@tonic-gate 		cbp->cb_notified_of_cb_path_down = TRUE;
2747c478bd9Sstevel@tonic-gate 	}
2757c478bd9Sstevel@tonic-gate 
2767c478bd9Sstevel@tonic-gate 	if (cbp->cb_state != CB_NONE) {
2777c478bd9Sstevel@tonic-gate 		cv_broadcast(cbp->cb_cv);	/* let the others know */
2787c478bd9Sstevel@tonic-gate 		cbp->cb_nullcaller = FALSE;
2797c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
2807c478bd9Sstevel@tonic-gate 		rfs4_client_rele(cp);
2817c478bd9Sstevel@tonic-gate 		return;
2827c478bd9Sstevel@tonic-gate 	}
2837c478bd9Sstevel@tonic-gate 
2847c478bd9Sstevel@tonic-gate 	/* mark rfs4_client_t as CALLBACK NULL in progress */
2857c478bd9Sstevel@tonic-gate 	cbp->cb_state = CB_INPROG;
2867c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
2877c478bd9Sstevel@tonic-gate 
2887c478bd9Sstevel@tonic-gate 	/* get/generate a client handle */
2897c478bd9Sstevel@tonic-gate 	if ((ch = rfs4_cb_getch(cbp)) == NULL) {
2907c478bd9Sstevel@tonic-gate 		mutex_enter(cbp->cb_lock);
2917c478bd9Sstevel@tonic-gate 		cbp->cb_state = CB_BAD;
2927c478bd9Sstevel@tonic-gate 		cbp->cb_timefailed = gethrestime_sec(); /* observability */
2937c478bd9Sstevel@tonic-gate 		goto retry;
2947c478bd9Sstevel@tonic-gate 	}
2957c478bd9Sstevel@tonic-gate 
2967c478bd9Sstevel@tonic-gate 
2977c478bd9Sstevel@tonic-gate 	tv.tv_sec = 30;
2987c478bd9Sstevel@tonic-gate 	tv.tv_usec = 0;
2997c478bd9Sstevel@tonic-gate 	if (clnt_call(ch, CB_NULL, xdr_void, NULL, xdr_void, NULL, tv) != 0) {
3007c478bd9Sstevel@tonic-gate 		newstate = CB_BAD;
3017c478bd9Sstevel@tonic-gate 	} else {
3027c478bd9Sstevel@tonic-gate 		newstate = CB_OK;
3037c478bd9Sstevel@tonic-gate #ifdef	DEBUG
3047c478bd9Sstevel@tonic-gate 		rfs4_cb_null++;
3057c478bd9Sstevel@tonic-gate #endif
3067c478bd9Sstevel@tonic-gate 	}
3077c478bd9Sstevel@tonic-gate 
3087c478bd9Sstevel@tonic-gate 	/* Check to see if the client has specified new callback info */
3097c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
3107c478bd9Sstevel@tonic-gate 	rfs4_cb_freech(cbp, ch, TRUE);
3117c478bd9Sstevel@tonic-gate 	if (cbp->cb_newer.cb_new == TRUE &&
3127c478bd9Sstevel@tonic-gate 	    cbp->cb_newer.cb_confirmed == TRUE) {
3137c478bd9Sstevel@tonic-gate 		goto retry;	/* give the CB_NULL another chance */
3147c478bd9Sstevel@tonic-gate 	}
3157c478bd9Sstevel@tonic-gate 
3167c478bd9Sstevel@tonic-gate 	cbp->cb_state = newstate;
3177c478bd9Sstevel@tonic-gate 	if (cbp->cb_state == CB_BAD)
3187c478bd9Sstevel@tonic-gate 		cbp->cb_timefailed = gethrestime_sec(); /* observability */
3197c478bd9Sstevel@tonic-gate 
3207c478bd9Sstevel@tonic-gate 	cv_broadcast(cbp->cb_cv);	/* start up the other threads */
3217c478bd9Sstevel@tonic-gate 	cbp->cb_nullcaller = FALSE;
3227c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
3237c478bd9Sstevel@tonic-gate 
3247c478bd9Sstevel@tonic-gate 	rfs4_client_rele(cp);
3257c478bd9Sstevel@tonic-gate }
3267c478bd9Sstevel@tonic-gate 
3277c478bd9Sstevel@tonic-gate /*
3287c478bd9Sstevel@tonic-gate  * Given a client struct, inspect the callback info to see if the
329878aca8dSDai Ngo  * callback path is up and available.
330878aca8dSDai Ngo  *
331878aca8dSDai Ngo  * If new callback path is available and no one has set it up then
332878aca8dSDai Ngo  * try to set it up. If setup is not successful after 5 tries (5 secs)
333878aca8dSDai Ngo  * then gives up and returns NULL.
334878aca8dSDai Ngo  *
335878aca8dSDai Ngo  * If callback path is being initialized, then wait for the CB_NULL RPC
336878aca8dSDai Ngo  * call to occur.
3377c478bd9Sstevel@tonic-gate  */
3387c478bd9Sstevel@tonic-gate static rfs4_cbinfo_t *
3397c478bd9Sstevel@tonic-gate rfs4_cbinfo_hold(rfs4_client_t *cp)
3407c478bd9Sstevel@tonic-gate {
341d216dff5SRobert Mastors 	rfs4_cbinfo_t *cbp = &cp->rc_cbinfo;
342878aca8dSDai Ngo 	int retries = 0;
3437c478bd9Sstevel@tonic-gate 
3447c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
3457c478bd9Sstevel@tonic-gate 
346878aca8dSDai Ngo 	while (cbp->cb_newer.cb_new == TRUE && cbp->cb_nullcaller == FALSE) {
3477c478bd9Sstevel@tonic-gate 		/*
3487c478bd9Sstevel@tonic-gate 		 * Looks like a new callback path may be available and
3497c478bd9Sstevel@tonic-gate 		 * noone has set it up.
3507c478bd9Sstevel@tonic-gate 		 */
3517c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
352d216dff5SRobert Mastors 		rfs4_dbe_hold(cp->rc_dbe);
3537c478bd9Sstevel@tonic-gate 		rfs4_do_cb_null(cp); /* caller will release client hold */
354878aca8dSDai Ngo 
355878aca8dSDai Ngo 		mutex_enter(cbp->cb_lock);
356878aca8dSDai Ngo 		/*
357878aca8dSDai Ngo 		 * If callback path is no longer new, or it's being setup
358878aca8dSDai Ngo 		 * then stop and wait for it to be done.
359878aca8dSDai Ngo 		 */
360878aca8dSDai Ngo 		if (cbp->cb_newer.cb_new == FALSE || cbp->cb_nullcaller == TRUE)
361878aca8dSDai Ngo 			break;
362878aca8dSDai Ngo 		mutex_exit(cbp->cb_lock);
363878aca8dSDai Ngo 
364878aca8dSDai Ngo 		if (++retries >= rfs4_max_setup_cb_tries)
365878aca8dSDai Ngo 			return (NULL);
366878aca8dSDai Ngo 		delay(hz);
367878aca8dSDai Ngo 		mutex_enter(cbp->cb_lock);
3687c478bd9Sstevel@tonic-gate 	}
3697c478bd9Sstevel@tonic-gate 
3707c478bd9Sstevel@tonic-gate 	/* Is there a thread working on doing the CB_NULL RPC? */
3717c478bd9Sstevel@tonic-gate 	if (cbp->cb_nullcaller == TRUE)
3727c478bd9Sstevel@tonic-gate 		cv_wait(cbp->cb_cv, cbp->cb_lock);  /* if so, wait on it */
3737c478bd9Sstevel@tonic-gate 
3747c478bd9Sstevel@tonic-gate 	/* If the callback path is not okay (up and running), just quit */
3757c478bd9Sstevel@tonic-gate 	if (cbp->cb_state != CB_OK) {
3767c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
3777c478bd9Sstevel@tonic-gate 		return (NULL);
3787c478bd9Sstevel@tonic-gate 	}
3797c478bd9Sstevel@tonic-gate 
3807c478bd9Sstevel@tonic-gate 	/* Let someone know we are using the current callback info */
3817c478bd9Sstevel@tonic-gate 	cbp->cb_refcnt++;
3827c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
3837c478bd9Sstevel@tonic-gate 	return (cbp);
3847c478bd9Sstevel@tonic-gate }
3857c478bd9Sstevel@tonic-gate 
3867c478bd9Sstevel@tonic-gate /*
3877c478bd9Sstevel@tonic-gate  * The caller is done with the callback info.  It may be that the
3887c478bd9Sstevel@tonic-gate  * caller's RPC failed and the NFSv4 client has actually provided new
3897c478bd9Sstevel@tonic-gate  * callback information.  If so, let the caller know so they can
3907c478bd9Sstevel@tonic-gate  * advantage of this and maybe retry the RPC that originally failed.
3917c478bd9Sstevel@tonic-gate  */
3927c478bd9Sstevel@tonic-gate static int
3937c478bd9Sstevel@tonic-gate rfs4_cbinfo_rele(rfs4_cbinfo_t *cbp, rfs4_cbstate_t newstate)
3947c478bd9Sstevel@tonic-gate {
3957c478bd9Sstevel@tonic-gate 	int cb_new = FALSE;
3967c478bd9Sstevel@tonic-gate 
3977c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
3987c478bd9Sstevel@tonic-gate 
3997c478bd9Sstevel@tonic-gate 	/* The caller gets a chance to mark the callback info as bad */
4007c478bd9Sstevel@tonic-gate 	if (newstate != CB_NOCHANGE)
4017c478bd9Sstevel@tonic-gate 		cbp->cb_state = newstate;
4027c478bd9Sstevel@tonic-gate 	if (newstate == CB_FAILED) {
4037c478bd9Sstevel@tonic-gate 		cbp->cb_timefailed = gethrestime_sec(); /* observability */
4047c478bd9Sstevel@tonic-gate 		cbp->cb_notified_of_cb_path_down = FALSE;
4057c478bd9Sstevel@tonic-gate 	}
4067c478bd9Sstevel@tonic-gate 
4077c478bd9Sstevel@tonic-gate 	cbp->cb_refcnt--;	/* no longer using the information */
4087c478bd9Sstevel@tonic-gate 
4097c478bd9Sstevel@tonic-gate 	/*
4107c478bd9Sstevel@tonic-gate 	 * A thread may be waiting on this one to finish and if so,
4117c478bd9Sstevel@tonic-gate 	 * let it know that it is okay to do the CB_NULL to the
4127c478bd9Sstevel@tonic-gate 	 * client's callback server.
4137c478bd9Sstevel@tonic-gate 	 */
4147c478bd9Sstevel@tonic-gate 	if (cbp->cb_refcnt == 0 && cbp->cb_nullcaller)
4157c478bd9Sstevel@tonic-gate 		cv_broadcast(cbp->cb_cv_nullcaller);
4167c478bd9Sstevel@tonic-gate 
4177c478bd9Sstevel@tonic-gate 	/*
4187c478bd9Sstevel@tonic-gate 	 * If this is the last thread to use the callback info and
4197c478bd9Sstevel@tonic-gate 	 * there is new callback information to try and no thread is
4207c478bd9Sstevel@tonic-gate 	 * there ready to do the CB_NULL, then return true to teh
4217c478bd9Sstevel@tonic-gate 	 * caller so they can do the CB_NULL
4227c478bd9Sstevel@tonic-gate 	 */
4237c478bd9Sstevel@tonic-gate 	if (cbp->cb_refcnt == 0 &&
424ed57cab9Srg 	    cbp->cb_nullcaller == FALSE &&
425ed57cab9Srg 	    cbp->cb_newer.cb_new == TRUE &&
426ed57cab9Srg 	    cbp->cb_newer.cb_confirmed == TRUE)
4277c478bd9Sstevel@tonic-gate 		cb_new = TRUE;
4287c478bd9Sstevel@tonic-gate 
4297c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
4307c478bd9Sstevel@tonic-gate 
4317c478bd9Sstevel@tonic-gate 	return (cb_new);
4327c478bd9Sstevel@tonic-gate }
4337c478bd9Sstevel@tonic-gate 
4347c478bd9Sstevel@tonic-gate /*
4357c478bd9Sstevel@tonic-gate  * Given the information in the callback info struct, create a client
4367c478bd9Sstevel@tonic-gate  * handle that can be used by the server for its callback path.
4377c478bd9Sstevel@tonic-gate  */
4387c478bd9Sstevel@tonic-gate static CLIENT *
4397c478bd9Sstevel@tonic-gate rfs4_cbch_init(rfs4_cbinfo_t *cbp)
4407c478bd9Sstevel@tonic-gate {
4417c478bd9Sstevel@tonic-gate 	struct knetconfig knc;
4427c478bd9Sstevel@tonic-gate 	vnode_t *vp;
4437c478bd9Sstevel@tonic-gate 	struct sockaddr_in addr4;
4447c478bd9Sstevel@tonic-gate 	struct sockaddr_in6 addr6;
4457c478bd9Sstevel@tonic-gate 	void *addr, *taddr;
4467c478bd9Sstevel@tonic-gate 	in_port_t *pp;
4477c478bd9Sstevel@tonic-gate 	int af;
4487c478bd9Sstevel@tonic-gate 	char *devnam;
4497c478bd9Sstevel@tonic-gate 	struct netbuf nb;
4507c478bd9Sstevel@tonic-gate 	int size;
4517c478bd9Sstevel@tonic-gate 	CLIENT *ch = NULL;
4527c478bd9Sstevel@tonic-gate 	int useresvport = 0;
4537c478bd9Sstevel@tonic-gate 
4547c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
4557c478bd9Sstevel@tonic-gate 
4567c478bd9Sstevel@tonic-gate 	if (cbp->cb_callback.cb_location.r_netid == NULL ||
4577c478bd9Sstevel@tonic-gate 	    cbp->cb_callback.cb_location.r_addr == NULL) {
4587c478bd9Sstevel@tonic-gate 		goto cb_init_out;
4597c478bd9Sstevel@tonic-gate 	}
4607c478bd9Sstevel@tonic-gate 
4617c478bd9Sstevel@tonic-gate 	if (strcmp(cbp->cb_callback.cb_location.r_netid, "tcp") == 0) {
4627c478bd9Sstevel@tonic-gate 		knc.knc_semantics = NC_TPI_COTS;
4637c478bd9Sstevel@tonic-gate 		knc.knc_protofmly = "inet";
4647c478bd9Sstevel@tonic-gate 		knc.knc_proto = "tcp";
4657c478bd9Sstevel@tonic-gate 		devnam = "/dev/tcp";
4667c478bd9Sstevel@tonic-gate 		af = AF_INET;
4677c478bd9Sstevel@tonic-gate 	} else if (strcmp(cbp->cb_callback.cb_location.r_netid, "udp")
468ed57cab9Srg 	    == 0) {
4697c478bd9Sstevel@tonic-gate 		knc.knc_semantics = NC_TPI_CLTS;
4707c478bd9Sstevel@tonic-gate 		knc.knc_protofmly = "inet";
4717c478bd9Sstevel@tonic-gate 		knc.knc_proto = "udp";
4727c478bd9Sstevel@tonic-gate 		devnam = "/dev/udp";
4737c478bd9Sstevel@tonic-gate 		af = AF_INET;
4747c478bd9Sstevel@tonic-gate 	} else if (strcmp(cbp->cb_callback.cb_location.r_netid, "tcp6")
475ed57cab9Srg 	    == 0) {
4767c478bd9Sstevel@tonic-gate 		knc.knc_semantics = NC_TPI_COTS;
4777c478bd9Sstevel@tonic-gate 		knc.knc_protofmly = "inet6";
4787c478bd9Sstevel@tonic-gate 		knc.knc_proto = "tcp";
4797c478bd9Sstevel@tonic-gate 		devnam = "/dev/tcp6";
4807c478bd9Sstevel@tonic-gate 		af = AF_INET6;
4817c478bd9Sstevel@tonic-gate 	} else if (strcmp(cbp->cb_callback.cb_location.r_netid, "udp6")
482ed57cab9Srg 	    == 0) {
4837c478bd9Sstevel@tonic-gate 		knc.knc_semantics = NC_TPI_CLTS;
4847c478bd9Sstevel@tonic-gate 		knc.knc_protofmly = "inet6";
4857c478bd9Sstevel@tonic-gate 		knc.knc_proto = "udp";
4867c478bd9Sstevel@tonic-gate 		devnam = "/dev/udp6";
4877c478bd9Sstevel@tonic-gate 		af = AF_INET6;
4887c478bd9Sstevel@tonic-gate 	} else {
4897c478bd9Sstevel@tonic-gate 		goto cb_init_out;
4907c478bd9Sstevel@tonic-gate 	}
4917c478bd9Sstevel@tonic-gate 
492c52d60d4Srg 	if (lookupname(devnam, UIO_SYSSPACE, FOLLOW, NULLVPP, &vp) != 0) {
4937c478bd9Sstevel@tonic-gate 
4947c478bd9Sstevel@tonic-gate 		goto cb_init_out;
4957c478bd9Sstevel@tonic-gate 	}
4967c478bd9Sstevel@tonic-gate 
4977c478bd9Sstevel@tonic-gate 	if (vp->v_type != VCHR) {
4987c478bd9Sstevel@tonic-gate 		VN_RELE(vp);
4997c478bd9Sstevel@tonic-gate 		goto cb_init_out;
5007c478bd9Sstevel@tonic-gate 	}
5017c478bd9Sstevel@tonic-gate 
5027c478bd9Sstevel@tonic-gate 	knc.knc_rdev = vp->v_rdev;
5037c478bd9Sstevel@tonic-gate 
5047c478bd9Sstevel@tonic-gate 	VN_RELE(vp);
5057c478bd9Sstevel@tonic-gate 
5067c478bd9Sstevel@tonic-gate 	if (af == AF_INET) {
5077c478bd9Sstevel@tonic-gate 		size = sizeof (addr4);
5087c478bd9Sstevel@tonic-gate 		bzero(&addr4, size);
5097c478bd9Sstevel@tonic-gate 		addr4.sin_family = (sa_family_t)af;
5107c478bd9Sstevel@tonic-gate 		addr = &addr4.sin_addr;
5117c478bd9Sstevel@tonic-gate 		pp = &addr4.sin_port;
5127c478bd9Sstevel@tonic-gate 		taddr = &addr4;
5137c478bd9Sstevel@tonic-gate 	} else /* AF_INET6 */ {
5147c478bd9Sstevel@tonic-gate 		size = sizeof (addr6);
5157c478bd9Sstevel@tonic-gate 		bzero(&addr6, size);
5167c478bd9Sstevel@tonic-gate 		addr6.sin6_family = (sa_family_t)af;
5177c478bd9Sstevel@tonic-gate 		addr = &addr6.sin6_addr;
5187c478bd9Sstevel@tonic-gate 		pp = &addr6.sin6_port;
5197c478bd9Sstevel@tonic-gate 		taddr = &addr6;
5207c478bd9Sstevel@tonic-gate 	}
5217c478bd9Sstevel@tonic-gate 
5227c478bd9Sstevel@tonic-gate 	if (uaddr2sockaddr(af,
523ed57cab9Srg 	    cbp->cb_callback.cb_location.r_addr, addr, pp)) {
5247c478bd9Sstevel@tonic-gate 
5257c478bd9Sstevel@tonic-gate 		goto cb_init_out;
5267c478bd9Sstevel@tonic-gate 	}
5277c478bd9Sstevel@tonic-gate 
5287c478bd9Sstevel@tonic-gate 
5297c478bd9Sstevel@tonic-gate 	nb.maxlen = nb.len = size;
5307c478bd9Sstevel@tonic-gate 	nb.buf = (char *)taddr;
5317c478bd9Sstevel@tonic-gate 
532c52d60d4Srg 	if (clnt_tli_kcreate(&knc, &nb, cbp->cb_callback.cb_program,
5337c478bd9Sstevel@tonic-gate 	    NFS_CB, 0, 0, curthread->t_cred, &ch)) {
5347c478bd9Sstevel@tonic-gate 
5357c478bd9Sstevel@tonic-gate 		ch = NULL;
5367c478bd9Sstevel@tonic-gate 	}
5377c478bd9Sstevel@tonic-gate 
5387c478bd9Sstevel@tonic-gate 	/* turn off reserved port usage */
5397c478bd9Sstevel@tonic-gate 	(void) CLNT_CONTROL(ch, CLSET_BINDRESVPORT, (char *)&useresvport);
5407c478bd9Sstevel@tonic-gate 
5417c478bd9Sstevel@tonic-gate cb_init_out:
5427c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
5437c478bd9Sstevel@tonic-gate 	return (ch);
5447c478bd9Sstevel@tonic-gate }
5457c478bd9Sstevel@tonic-gate 
5467c478bd9Sstevel@tonic-gate /*
5477c478bd9Sstevel@tonic-gate  * Iterate over the client handle cache and
5487c478bd9Sstevel@tonic-gate  * destroy it.
5497c478bd9Sstevel@tonic-gate  */
5507c478bd9Sstevel@tonic-gate static void
5517c478bd9Sstevel@tonic-gate rfs4_cb_chflush(rfs4_cbinfo_t *cbp)
5527c478bd9Sstevel@tonic-gate {
5537c478bd9Sstevel@tonic-gate 	CLIENT *ch;
5547c478bd9Sstevel@tonic-gate 
5557c478bd9Sstevel@tonic-gate 	while (cbp->cb_chc_free) {
5567c478bd9Sstevel@tonic-gate 		cbp->cb_chc_free--;
5577c478bd9Sstevel@tonic-gate 		ch = cbp->cb_chc[cbp->cb_chc_free];
5587c478bd9Sstevel@tonic-gate 		cbp->cb_chc[cbp->cb_chc_free] = NULL;
5597c478bd9Sstevel@tonic-gate 		if (ch) {
5607c478bd9Sstevel@tonic-gate 			if (ch->cl_auth)
5617c478bd9Sstevel@tonic-gate 				auth_destroy(ch->cl_auth);
5627c478bd9Sstevel@tonic-gate 			clnt_destroy(ch);
5637c478bd9Sstevel@tonic-gate 		}
5647c478bd9Sstevel@tonic-gate 	}
5657c478bd9Sstevel@tonic-gate }
5667c478bd9Sstevel@tonic-gate 
5677c478bd9Sstevel@tonic-gate /*
5687c478bd9Sstevel@tonic-gate  * Return a client handle, either from a the small
5697c478bd9Sstevel@tonic-gate  * rfs4_client_t cache or one that we just created.
5707c478bd9Sstevel@tonic-gate  */
5717c478bd9Sstevel@tonic-gate static CLIENT *
5727c478bd9Sstevel@tonic-gate rfs4_cb_getch(rfs4_cbinfo_t *cbp)
5737c478bd9Sstevel@tonic-gate {
5747c478bd9Sstevel@tonic-gate 	CLIENT *cbch = NULL;
5757c478bd9Sstevel@tonic-gate 	uint32_t zilch = 0;
5767c478bd9Sstevel@tonic-gate 
5777c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
5787c478bd9Sstevel@tonic-gate 
5797c478bd9Sstevel@tonic-gate 	if (cbp->cb_chc_free) {
5807c478bd9Sstevel@tonic-gate 		cbp->cb_chc_free--;
5817c478bd9Sstevel@tonic-gate 		cbch = cbp->cb_chc[ cbp->cb_chc_free ];
5827c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
5837c478bd9Sstevel@tonic-gate 		(void) CLNT_CONTROL(cbch, CLSET_XID, (char *)&zilch);
5847c478bd9Sstevel@tonic-gate 		return (cbch);
5857c478bd9Sstevel@tonic-gate 	}
5867c478bd9Sstevel@tonic-gate 
5877c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
5887c478bd9Sstevel@tonic-gate 
5897c478bd9Sstevel@tonic-gate 	/* none free so make it now */
5907c478bd9Sstevel@tonic-gate 	cbch = rfs4_cbch_init(cbp);
5917c478bd9Sstevel@tonic-gate 
5927c478bd9Sstevel@tonic-gate 	return (cbch);
5937c478bd9Sstevel@tonic-gate }
5947c478bd9Sstevel@tonic-gate 
5957c478bd9Sstevel@tonic-gate /*
5967c478bd9Sstevel@tonic-gate  * Return the client handle to the small cache or
5977c478bd9Sstevel@tonic-gate  * destroy it.
5987c478bd9Sstevel@tonic-gate  */
5997c478bd9Sstevel@tonic-gate static void
6007c478bd9Sstevel@tonic-gate rfs4_cb_freech(rfs4_cbinfo_t *cbp, CLIENT *ch, bool_t lockheld)
6017c478bd9Sstevel@tonic-gate {
6027c478bd9Sstevel@tonic-gate 	if (lockheld == FALSE)
6037c478bd9Sstevel@tonic-gate 		mutex_enter(cbp->cb_lock);
6047c478bd9Sstevel@tonic-gate 
6057c478bd9Sstevel@tonic-gate 	if (cbp->cb_chc_free < RFS4_CBCH_MAX) {
6067c478bd9Sstevel@tonic-gate 		cbp->cb_chc[ cbp->cb_chc_free++ ] = ch;
6077c478bd9Sstevel@tonic-gate 		if (lockheld == FALSE)
6087c478bd9Sstevel@tonic-gate 			mutex_exit(cbp->cb_lock);
6097c478bd9Sstevel@tonic-gate 		return;
6107c478bd9Sstevel@tonic-gate 	}
6117c478bd9Sstevel@tonic-gate 	if (lockheld == FALSE)
6127c478bd9Sstevel@tonic-gate 		mutex_exit(cbp->cb_lock);
6137c478bd9Sstevel@tonic-gate 
6147c478bd9Sstevel@tonic-gate 	/*
6157c478bd9Sstevel@tonic-gate 	 * cache maxed out of free entries, obliterate
6167c478bd9Sstevel@tonic-gate 	 * this client handle, destroy it, throw it away.
6177c478bd9Sstevel@tonic-gate 	 */
6187c478bd9Sstevel@tonic-gate 	if (ch->cl_auth)
6197c478bd9Sstevel@tonic-gate 		auth_destroy(ch->cl_auth);
6207c478bd9Sstevel@tonic-gate 	clnt_destroy(ch);
6217c478bd9Sstevel@tonic-gate }
6227c478bd9Sstevel@tonic-gate 
6237c478bd9Sstevel@tonic-gate /*
6247c478bd9Sstevel@tonic-gate  * With the supplied callback information - initialize the client
6257c478bd9Sstevel@tonic-gate  * callback data.  If there is a callback in progress, save the
6267c478bd9Sstevel@tonic-gate  * callback info so that a thread can pick it up in the future.
6277c478bd9Sstevel@tonic-gate  */
6287c478bd9Sstevel@tonic-gate void
6297c478bd9Sstevel@tonic-gate rfs4_client_setcb(rfs4_client_t *cp, cb_client4 *cb, uint32_t cb_ident)
6307c478bd9Sstevel@tonic-gate {
6317c478bd9Sstevel@tonic-gate 	char *addr = NULL;
6327c478bd9Sstevel@tonic-gate 	char *netid = NULL;
633d216dff5SRobert Mastors 	rfs4_cbinfo_t *cbp = &cp->rc_cbinfo;
6347c478bd9Sstevel@tonic-gate 	size_t len;
6357c478bd9Sstevel@tonic-gate 
6367c478bd9Sstevel@tonic-gate 	/* Set the call back for the client */
637a31a5cfdSsamf 	if (cb->cb_location.r_addr && cb->cb_location.r_addr[0] != '\0' &&
638a31a5cfdSsamf 	    cb->cb_location.r_netid && cb->cb_location.r_netid[0] != '\0') {
6397c478bd9Sstevel@tonic-gate 		len = strlen(cb->cb_location.r_addr) + 1;
6407c478bd9Sstevel@tonic-gate 		addr = kmem_alloc(len, KM_SLEEP);
6417c478bd9Sstevel@tonic-gate 		bcopy(cb->cb_location.r_addr, addr, len);
6427c478bd9Sstevel@tonic-gate 		len = strlen(cb->cb_location.r_netid) + 1;
6437c478bd9Sstevel@tonic-gate 		netid = kmem_alloc(len, KM_SLEEP);
6447c478bd9Sstevel@tonic-gate 		bcopy(cb->cb_location.r_netid, netid, len);
6457c478bd9Sstevel@tonic-gate 	}
6467c478bd9Sstevel@tonic-gate 	/* ready to save the new information but first free old, if exists */
6477c478bd9Sstevel@tonic-gate 	mutex_enter(cbp->cb_lock);
6487c478bd9Sstevel@tonic-gate 
6497c478bd9Sstevel@tonic-gate 	cbp->cb_newer.cb_callback.cb_program = cb->cb_program;
650a31a5cfdSsamf 
651a31a5cfdSsamf 	if (cbp->cb_newer.cb_callback.cb_location.r_addr != NULL)
652a31a5cfdSsamf 		kmem_free(cbp->cb_newer.cb_callback.cb_location.r_addr,
653a31a5cfdSsamf 		    strlen(cbp->cb_newer.cb_callback.cb_location.r_addr) + 1);
6547c478bd9Sstevel@tonic-gate 	cbp->cb_newer.cb_callback.cb_location.r_addr = addr;
655a31a5cfdSsamf 
656a31a5cfdSsamf 	if (cbp->cb_newer.cb_callback.cb_location.r_netid != NULL)
657a31a5cfdSsamf 		kmem_free(cbp->cb_newer.cb_callback.cb_location.r_netid,
658a31a5cfdSsamf 		    strlen(cbp->cb_newer.cb_callback.cb_location.r_netid) + 1);
6597c478bd9Sstevel@tonic-gate 	cbp->cb_newer.cb_callback.cb_location.r_netid = netid;
6607c478bd9Sstevel@tonic-gate 
6617c478bd9Sstevel@tonic-gate 	cbp->cb_newer.cb_ident = cb_ident;
6627c478bd9Sstevel@tonic-gate 
6637c478bd9Sstevel@tonic-gate 	if (addr && *addr && netid && *netid) {
6647c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_new = TRUE;
6657c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_confirmed = FALSE;
6667c478bd9Sstevel@tonic-gate 	} else {
6677c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_new = FALSE;
6687c478bd9Sstevel@tonic-gate 		cbp->cb_newer.cb_confirmed = FALSE;
6697c478bd9Sstevel@tonic-gate 	}
6707c478bd9Sstevel@tonic-gate 
6717c478bd9Sstevel@tonic-gate 	mutex_exit(cbp->cb_lock);
6727c478bd9Sstevel@tonic-gate }
6737c478bd9Sstevel@tonic-gate 
6747c478bd9Sstevel@tonic-gate /*
6757c478bd9Sstevel@tonic-gate  * The server uses this when processing SETCLIENTID_CONFIRM.  Callback
6767c478bd9Sstevel@tonic-gate  * information may have been provided on SETCLIENTID and this call
6777c478bd9Sstevel@tonic-gate  * marks that information as confirmed and then starts a thread to
6787c478bd9Sstevel@tonic-gate  * test the callback path.
6797c478bd9Sstevel@tonic-gate  */
6807c478bd9Sstevel@tonic-gate void
6817c478bd9Sstevel@tonic-gate rfs4_deleg_cb_check(rfs4_client_t *cp)
6827c478bd9Sstevel@tonic-gate {
683d216dff5SRobert Mastors 	if (cp->rc_cbinfo.cb_newer.cb_new == FALSE)
6847c478bd9Sstevel@tonic-gate 		return;
6857c478bd9Sstevel@tonic-gate 
686d216dff5SRobert Mastors 	cp->rc_cbinfo.cb_newer.cb_confirmed = TRUE;
6877c478bd9Sstevel@tonic-gate 
688d216dff5SRobert Mastors 	rfs4_dbe_hold(cp->rc_dbe); /* hold the client struct for thread */
6897c478bd9Sstevel@tonic-gate 
6907c478bd9Sstevel@tonic-gate 	(void) thread_create(NULL, 0, rfs4_do_cb_null, cp, 0, &p0, TS_RUN,
691ed57cab9Srg 	    minclsyspri);
6927c478bd9Sstevel@tonic-gate }
6937c478bd9Sstevel@tonic-gate 
6947c478bd9Sstevel@tonic-gate static void
6957c478bd9Sstevel@tonic-gate rfs4args_cb_recall_free(nfs_cb_argop4 *argop)
6967c478bd9Sstevel@tonic-gate {
6977c478bd9Sstevel@tonic-gate 	CB_RECALL4args	*rec_argp;
6987c478bd9Sstevel@tonic-gate 
6997c478bd9Sstevel@tonic-gate 	rec_argp = &argop->nfs_cb_argop4_u.opcbrecall;
7007c478bd9Sstevel@tonic-gate 	if (rec_argp->fh.nfs_fh4_val)
7017c478bd9Sstevel@tonic-gate 		kmem_free(rec_argp->fh.nfs_fh4_val, rec_argp->fh.nfs_fh4_len);
7027c478bd9Sstevel@tonic-gate }
7037c478bd9Sstevel@tonic-gate 
7047c478bd9Sstevel@tonic-gate /* ARGSUSED */
7057c478bd9Sstevel@tonic-gate static void
7067c478bd9Sstevel@tonic-gate rfs4args_cb_getattr_free(nfs_cb_argop4 *argop)
7077c478bd9Sstevel@tonic-gate {
7087c478bd9Sstevel@tonic-gate 	CB_GETATTR4args *argp;
7097c478bd9Sstevel@tonic-gate 
7107c478bd9Sstevel@tonic-gate 	argp = &argop->nfs_cb_argop4_u.opcbgetattr;
7117c478bd9Sstevel@tonic-gate 	if (argp->fh.nfs_fh4_val)
7127c478bd9Sstevel@tonic-gate 		kmem_free(argp->fh.nfs_fh4_val, argp->fh.nfs_fh4_len);
7137c478bd9Sstevel@tonic-gate }
7147c478bd9Sstevel@tonic-gate 
7157c478bd9Sstevel@tonic-gate static void
7167c478bd9Sstevel@tonic-gate rfs4freeargres(CB_COMPOUND4args *args, CB_COMPOUND4res *resp)
7177c478bd9Sstevel@tonic-gate {
7187c478bd9Sstevel@tonic-gate 	int i, arglen;
7197c478bd9Sstevel@tonic-gate 	nfs_cb_argop4 *argop;
7207c478bd9Sstevel@tonic-gate 
7217c478bd9Sstevel@tonic-gate 	/*
7227c478bd9Sstevel@tonic-gate 	 * First free any special args alloc'd for specific ops.
7237c478bd9Sstevel@tonic-gate 	 */
7247c478bd9Sstevel@tonic-gate 	arglen = args->array_len;
7257c478bd9Sstevel@tonic-gate 	argop = args->array;
7267c478bd9Sstevel@tonic-gate 	for (i = 0; i < arglen; i++, argop++) {
7277c478bd9Sstevel@tonic-gate 
7287c478bd9Sstevel@tonic-gate 		switch (argop->argop) {
7297c478bd9Sstevel@tonic-gate 		case OP_CB_RECALL:
7307c478bd9Sstevel@tonic-gate 			rfs4args_cb_recall_free(argop);
7317c478bd9Sstevel@tonic-gate 			break;
7327c478bd9Sstevel@tonic-gate 
7337c478bd9Sstevel@tonic-gate 		case OP_CB_GETATTR:
7347c478bd9Sstevel@tonic-gate 			rfs4args_cb_getattr_free(argop);
7357c478bd9Sstevel@tonic-gate 			break;
7367c478bd9Sstevel@tonic-gate 
7377c478bd9Sstevel@tonic-gate 		default:
7387c478bd9Sstevel@tonic-gate 			return;
7397c478bd9Sstevel@tonic-gate 		}
7407c478bd9Sstevel@tonic-gate 	}
7417c478bd9Sstevel@tonic-gate 
7427c478bd9Sstevel@tonic-gate 	if (args->tag.utf8string_len > 0)
7437c478bd9Sstevel@tonic-gate 		UTF8STRING_FREE(args->tag)
7447c478bd9Sstevel@tonic-gate 
7457c478bd9Sstevel@tonic-gate 	kmem_free(args->array, arglen * sizeof (nfs_cb_argop4));
7467c478bd9Sstevel@tonic-gate 	if (resp)
7477c478bd9Sstevel@tonic-gate 		(void) xdr_free(xdr_CB_COMPOUND4res, (caddr_t)resp);
7487c478bd9Sstevel@tonic-gate }
7497c478bd9Sstevel@tonic-gate 
7507c478bd9Sstevel@tonic-gate /*
7517c478bd9Sstevel@tonic-gate  * General callback routine for the server to the client.
7527c478bd9Sstevel@tonic-gate  */
7537c478bd9Sstevel@tonic-gate static enum clnt_stat
754d216dff5SRobert Mastors rfs4_do_callback(rfs4_client_t *cp, CB_COMPOUND4args *args,
755d216dff5SRobert Mastors     CB_COMPOUND4res *res, struct timeval timeout)
7567c478bd9Sstevel@tonic-gate {
7577c478bd9Sstevel@tonic-gate 	rfs4_cbinfo_t *cbp;
7587c478bd9Sstevel@tonic-gate 	CLIENT *ch;
7597c478bd9Sstevel@tonic-gate 	/* start with this in case cb_getch() fails */
7607c478bd9Sstevel@tonic-gate 	enum clnt_stat	stat = RPC_FAILED;
7617c478bd9Sstevel@tonic-gate 
7627c478bd9Sstevel@tonic-gate 	res->tag.utf8string_val = NULL;
7637c478bd9Sstevel@tonic-gate 	res->array = NULL;
7647c478bd9Sstevel@tonic-gate 
7657c478bd9Sstevel@tonic-gate retry:
7667c478bd9Sstevel@tonic-gate 	cbp = rfs4_cbinfo_hold(cp);
7677c478bd9Sstevel@tonic-gate 	if (cbp == NULL)
7687c478bd9Sstevel@tonic-gate 		return (stat);
7697c478bd9Sstevel@tonic-gate 
7707c478bd9Sstevel@tonic-gate 	/* get a client handle */
7717c478bd9Sstevel@tonic-gate 	if ((ch = rfs4_cb_getch(cbp)) != NULL) {
7727c478bd9Sstevel@tonic-gate 		/*
7737c478bd9Sstevel@tonic-gate 		 * reset the cb_ident since it may have changed in
7747c478bd9Sstevel@tonic-gate 		 * rfs4_cbinfo_hold()
7757c478bd9Sstevel@tonic-gate 		 */
7767c478bd9Sstevel@tonic-gate 		args->callback_ident = cbp->cb_ident;
7777c478bd9Sstevel@tonic-gate 
778eac3aab7Srobinson 		stat = clnt_call(ch, CB_COMPOUND, xdr_CB_COMPOUND4args_srv,
779ed57cab9Srg 		    (caddr_t)args, xdr_CB_COMPOUND4res,
780ed57cab9Srg 		    (caddr_t)res, timeout);
7817c478bd9Sstevel@tonic-gate 
7827c478bd9Sstevel@tonic-gate 		/* free client handle */
7837c478bd9Sstevel@tonic-gate 		rfs4_cb_freech(cbp, ch, FALSE);
7847c478bd9Sstevel@tonic-gate 	}
7857c478bd9Sstevel@tonic-gate 
7867c478bd9Sstevel@tonic-gate 	/*
7877c478bd9Sstevel@tonic-gate 	 * If the rele says that there may be new callback info then
7887c478bd9Sstevel@tonic-gate 	 * retry this sequence and it may succeed as a result of the
7897c478bd9Sstevel@tonic-gate 	 * new callback path
7907c478bd9Sstevel@tonic-gate 	 */
7917c478bd9Sstevel@tonic-gate 	if (rfs4_cbinfo_rele(cbp,
792ed57cab9Srg 	    (stat == RPC_SUCCESS ? CB_NOCHANGE : CB_FAILED)) == TRUE)
7937c478bd9Sstevel@tonic-gate 		goto retry;
7947c478bd9Sstevel@tonic-gate 
7957c478bd9Sstevel@tonic-gate 	return (stat);
7967c478bd9Sstevel@tonic-gate }
7977c478bd9Sstevel@tonic-gate 
7987c478bd9Sstevel@tonic-gate /*
7997c478bd9Sstevel@tonic-gate  * Used by the NFSv4 server to get attributes for a file while
8007c478bd9Sstevel@tonic-gate  * handling the case where a file has been write delegated.  For the
8017c478bd9Sstevel@tonic-gate  * time being, VOP_GETATTR() is called and CB_GETATTR processing is
8027c478bd9Sstevel@tonic-gate  * not undertaken.  This call site is maintained in case the server is
8037c478bd9Sstevel@tonic-gate  * updated in the future to handle write delegation space guarantees.
8047c478bd9Sstevel@tonic-gate  */
8057c478bd9Sstevel@tonic-gate nfsstat4
8067c478bd9Sstevel@tonic-gate rfs4_vop_getattr(vnode_t *vp, vattr_t *vap, int flag, cred_t *cr)
8077c478bd9Sstevel@tonic-gate {
80800ba712dSGarima Tripathi 
8097c478bd9Sstevel@tonic-gate 	int error;
8107c478bd9Sstevel@tonic-gate 
811da6c28aaSamw 	error = VOP_GETATTR(vp, vap, flag, cr, NULL);
8127c478bd9Sstevel@tonic-gate 	return (puterrno4(error));
8137c478bd9Sstevel@tonic-gate }
8147c478bd9Sstevel@tonic-gate 
8157c478bd9Sstevel@tonic-gate /*
8167c478bd9Sstevel@tonic-gate  * This is used everywhere in the v2/v3 server to allow the
8177c478bd9Sstevel@tonic-gate  * integration of all NFS versions and the support of delegation.  For
8187c478bd9Sstevel@tonic-gate  * now, just call the VOP_GETATTR().  If the NFSv4 server is enhanced
8197c478bd9Sstevel@tonic-gate  * in the future to provide space guarantees for write delegations
8207c478bd9Sstevel@tonic-gate  * then this call site should be expanded to interact with the client.
8217c478bd9Sstevel@tonic-gate  */
8227c478bd9Sstevel@tonic-gate int
8237c478bd9Sstevel@tonic-gate rfs4_delegated_getattr(vnode_t *vp, vattr_t *vap, int flag, cred_t *cr)
8247c478bd9Sstevel@tonic-gate {
825da6c28aaSamw 	return (VOP_GETATTR(vp, vap, flag, cr, NULL));
8267c478bd9Sstevel@tonic-gate }
8277c478bd9Sstevel@tonic-gate 
8287c478bd9Sstevel@tonic-gate /*
8297c478bd9Sstevel@tonic-gate  * Place the actual cb_recall otw call to client.
8307c478bd9Sstevel@tonic-gate  */
8317c478bd9Sstevel@tonic-gate static void
8327c478bd9Sstevel@tonic-gate rfs4_do_cb_recall(rfs4_deleg_state_t *dsp, bool_t trunc)
8337c478bd9Sstevel@tonic-gate {
8347c478bd9Sstevel@tonic-gate 	CB_COMPOUND4args	cb4_args;
8357c478bd9Sstevel@tonic-gate 	CB_COMPOUND4res		cb4_res;
8367c478bd9Sstevel@tonic-gate 	CB_RECALL4args		*rec_argp;
837f3b585ceSsamf 	CB_RECALL4res		*rec_resp;
8387c478bd9Sstevel@tonic-gate 	nfs_cb_argop4		*argop;
8397c478bd9Sstevel@tonic-gate 	int			numops;
8407c478bd9Sstevel@tonic-gate 	int			argoplist_size;
8417c478bd9Sstevel@tonic-gate 	struct timeval		timeout;
8427c478bd9Sstevel@tonic-gate 	nfs_fh4			*fhp;
8437c478bd9Sstevel@tonic-gate 	enum clnt_stat		call_stat;
8447c478bd9Sstevel@tonic-gate 
8457c478bd9Sstevel@tonic-gate 	/*
8467c478bd9Sstevel@tonic-gate 	 * set up the compound args
8477c478bd9Sstevel@tonic-gate 	 */
8487c478bd9Sstevel@tonic-gate 	numops = 1;	/* CB_RECALL only */
8497c478bd9Sstevel@tonic-gate 
8507c478bd9Sstevel@tonic-gate 	argoplist_size = numops * sizeof (nfs_cb_argop4);
8517c478bd9Sstevel@tonic-gate 	argop = kmem_zalloc(argoplist_size, KM_SLEEP);
8527c478bd9Sstevel@tonic-gate 	argop->argop = OP_CB_RECALL;
8537c478bd9Sstevel@tonic-gate 	rec_argp = &argop->nfs_cb_argop4_u.opcbrecall;
8547c478bd9Sstevel@tonic-gate 
8557c478bd9Sstevel@tonic-gate 	(void) str_to_utf8("cb_recall", &cb4_args.tag);
8567c478bd9Sstevel@tonic-gate 	cb4_args.minorversion = CB4_MINORVERSION;
8577c478bd9Sstevel@tonic-gate 	/* cb4_args.callback_ident is set in rfs4_do_callback() */
8587c478bd9Sstevel@tonic-gate 	cb4_args.array_len = numops;
8597c478bd9Sstevel@tonic-gate 	cb4_args.array = argop;
8607c478bd9Sstevel@tonic-gate 
8617c478bd9Sstevel@tonic-gate 	/*
8627c478bd9Sstevel@tonic-gate 	 * fill in the args struct
8637c478bd9Sstevel@tonic-gate 	 */
864d216dff5SRobert Mastors 	bcopy(&dsp->rds_delegid.stateid, &rec_argp->stateid, sizeof (stateid4));
8657c478bd9Sstevel@tonic-gate 	rec_argp->truncate = trunc;
8667c478bd9Sstevel@tonic-gate 
867d216dff5SRobert Mastors 	fhp = &dsp->rds_finfo->rf_filehandle;
8687c478bd9Sstevel@tonic-gate 	rec_argp->fh.nfs_fh4_val = kmem_alloc(sizeof (char) *
869ed57cab9Srg 	    fhp->nfs_fh4_len, KM_SLEEP);
8707c478bd9Sstevel@tonic-gate 	nfs_fh4_copy(fhp, &rec_argp->fh);
8717c478bd9Sstevel@tonic-gate 
8727c478bd9Sstevel@tonic-gate 	/* Keep track of when we did this for observability */
873d216dff5SRobert Mastors 	dsp->rds_time_recalled = gethrestime_sec();
8747c478bd9Sstevel@tonic-gate 
8757c478bd9Sstevel@tonic-gate 	/*
8767c478bd9Sstevel@tonic-gate 	 * Set up the timeout for the callback and make the actual call.
8777c478bd9Sstevel@tonic-gate 	 * Timeout will be 80% of the lease period for this server.
8787c478bd9Sstevel@tonic-gate 	 */
8797c478bd9Sstevel@tonic-gate 	timeout.tv_sec = (rfs4_lease_time * 80) / 100;
8807c478bd9Sstevel@tonic-gate 	timeout.tv_usec = 0;
8817c478bd9Sstevel@tonic-gate 
882d216dff5SRobert Mastors 	DTRACE_NFSV4_3(cb__recall__start, rfs4_client_t *, dsp->rds_client,
883f3b585ceSsamf 	    rfs4_deleg_state_t *, dsp, CB_RECALL4args *, rec_argp);
884f3b585ceSsamf 
885d216dff5SRobert Mastors 	call_stat = rfs4_do_callback(dsp->rds_client, &cb4_args, &cb4_res,
886d216dff5SRobert Mastors 	    timeout);
8877c478bd9Sstevel@tonic-gate 
888f3b585ceSsamf 	rec_resp = (cb4_res.array_len == 0) ? NULL :
889f3b585ceSsamf 	    &cb4_res.array[0].nfs_cb_resop4_u.opcbrecall;
890f3b585ceSsamf 
891d216dff5SRobert Mastors 	DTRACE_NFSV4_3(cb__recall__done, rfs4_client_t *, dsp->rds_client,
892f3b585ceSsamf 	    rfs4_deleg_state_t *, dsp, CB_RECALL4res *, rec_resp);
893f3b585ceSsamf 
8947c478bd9Sstevel@tonic-gate 	if (call_stat != RPC_SUCCESS || cb4_res.status != NFS4_OK) {
895d216dff5SRobert Mastors 		rfs4_return_deleg(dsp, TRUE);
8967c478bd9Sstevel@tonic-gate 	}
8977c478bd9Sstevel@tonic-gate 
8987c478bd9Sstevel@tonic-gate 	rfs4freeargres(&cb4_args, &cb4_res);
8997c478bd9Sstevel@tonic-gate }
9007c478bd9Sstevel@tonic-gate 
9017c478bd9Sstevel@tonic-gate struct recall_arg {
9027c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
9037c478bd9Sstevel@tonic-gate 	void (*recall)(rfs4_deleg_state_t *, bool_t trunc);
9047c478bd9Sstevel@tonic-gate 	bool_t trunc;
9057c478bd9Sstevel@tonic-gate };
9067c478bd9Sstevel@tonic-gate 
9077c478bd9Sstevel@tonic-gate static void
9087c478bd9Sstevel@tonic-gate do_recall(struct recall_arg *arg)
9097c478bd9Sstevel@tonic-gate {
9107c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp = arg->dsp;
911d216dff5SRobert Mastors 	rfs4_file_t *fp = dsp->rds_finfo;
9127c478bd9Sstevel@tonic-gate 	callb_cpr_t cpr_info;
9137c478bd9Sstevel@tonic-gate 	kmutex_t cpr_lock;
9147c478bd9Sstevel@tonic-gate 
9157c478bd9Sstevel@tonic-gate 	mutex_init(&cpr_lock, NULL, MUTEX_DEFAULT, NULL);
9167c478bd9Sstevel@tonic-gate 	CALLB_CPR_INIT(&cpr_info, &cpr_lock, callb_generic_cpr, "nfsv4Recall");
9177c478bd9Sstevel@tonic-gate 
9187c478bd9Sstevel@tonic-gate 	/*
9197c478bd9Sstevel@tonic-gate 	 * It is possible that before this thread starts
9207c478bd9Sstevel@tonic-gate 	 * the client has send us a return_delegation, and
9217c478bd9Sstevel@tonic-gate 	 * if that is the case we do not need to send the
9227c478bd9Sstevel@tonic-gate 	 * recall callback.
9237c478bd9Sstevel@tonic-gate 	 */
924d216dff5SRobert Mastors 	if (dsp->rds_dtype != OPEN_DELEGATE_NONE) {
925ed57cab9Srg 		DTRACE_PROBE3(nfss__i__recall,
926ed57cab9Srg 		    struct recall_arg *, arg,
927ed57cab9Srg 		    struct rfs4_deleg_state_t *, dsp,
928ed57cab9Srg 		    struct rfs4_file_t *, fp);
9297c478bd9Sstevel@tonic-gate 
9307c478bd9Sstevel@tonic-gate 		if (arg->recall)
9317c478bd9Sstevel@tonic-gate 			(void) (*arg->recall)(dsp, arg->trunc);
9327c478bd9Sstevel@tonic-gate 	}
9337c478bd9Sstevel@tonic-gate 
934d216dff5SRobert Mastors 	mutex_enter(fp->rf_dinfo.rd_recall_lock);
9357c478bd9Sstevel@tonic-gate 	/*
9367c478bd9Sstevel@tonic-gate 	 * Recall count may go negative if the parent thread that is
9377c478bd9Sstevel@tonic-gate 	 * creating the individual callback threads does not modify
9387c478bd9Sstevel@tonic-gate 	 * the recall_count field before the callback thread actually
9397c478bd9Sstevel@tonic-gate 	 * gets a response from the CB_RECALL
9407c478bd9Sstevel@tonic-gate 	 */
941d216dff5SRobert Mastors 	fp->rf_dinfo.rd_recall_count--;
942d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_recall_count == 0)
943d216dff5SRobert Mastors 		cv_signal(fp->rf_dinfo.rd_recall_cv);
944d216dff5SRobert Mastors 	mutex_exit(fp->rf_dinfo.rd_recall_lock);
9457c478bd9Sstevel@tonic-gate 
9467c478bd9Sstevel@tonic-gate 	mutex_enter(&cpr_lock);
9477c478bd9Sstevel@tonic-gate 	CALLB_CPR_EXIT(&cpr_info);
9487c478bd9Sstevel@tonic-gate 	mutex_destroy(&cpr_lock);
9497c478bd9Sstevel@tonic-gate 
9507c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_rele(dsp); /* release the hold for this thread */
9517c478bd9Sstevel@tonic-gate 
9527c478bd9Sstevel@tonic-gate 	kmem_free(arg, sizeof (struct recall_arg));
9537c478bd9Sstevel@tonic-gate }
9547c478bd9Sstevel@tonic-gate 
9557c478bd9Sstevel@tonic-gate struct master_recall_args {
9567c478bd9Sstevel@tonic-gate     rfs4_file_t *fp;
9577c478bd9Sstevel@tonic-gate     void (*recall)(rfs4_deleg_state_t *, bool_t);
9587c478bd9Sstevel@tonic-gate     bool_t trunc;
9597c478bd9Sstevel@tonic-gate };
9607c478bd9Sstevel@tonic-gate 
9617c478bd9Sstevel@tonic-gate static void
9627c478bd9Sstevel@tonic-gate do_recall_file(struct master_recall_args *map)
9637c478bd9Sstevel@tonic-gate {
9647c478bd9Sstevel@tonic-gate 	rfs4_file_t *fp = map->fp;
9657c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
9667c478bd9Sstevel@tonic-gate 	struct recall_arg *arg;
9677c478bd9Sstevel@tonic-gate 	callb_cpr_t cpr_info;
9687c478bd9Sstevel@tonic-gate 	kmutex_t cpr_lock;
9697c478bd9Sstevel@tonic-gate 	int32_t recall_count;
9707c478bd9Sstevel@tonic-gate 
971d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
972ed57cab9Srg 
973ed57cab9Srg 	/* Recall already in progress ? */
974d216dff5SRobert Mastors 	mutex_enter(fp->rf_dinfo.rd_recall_lock);
975d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_recall_count != 0) {
976d216dff5SRobert Mastors 		mutex_exit(fp->rf_dinfo.rd_recall_lock);
977d216dff5SRobert Mastors 		rfs4_dbe_rele_nolock(fp->rf_dbe);
978d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
9797c478bd9Sstevel@tonic-gate 		kmem_free(map, sizeof (struct master_recall_args));
9807c478bd9Sstevel@tonic-gate 		return;
9817c478bd9Sstevel@tonic-gate 	}
9827c478bd9Sstevel@tonic-gate 
983d216dff5SRobert Mastors 	mutex_exit(fp->rf_dinfo.rd_recall_lock);
984ed57cab9Srg 
9857c478bd9Sstevel@tonic-gate 	mutex_init(&cpr_lock, NULL, MUTEX_DEFAULT, NULL);
986ed57cab9Srg 	CALLB_CPR_INIT(&cpr_info, &cpr_lock, callb_generic_cpr,	"v4RecallFile");
9877c478bd9Sstevel@tonic-gate 
9887c478bd9Sstevel@tonic-gate 	recall_count = 0;
989d216dff5SRobert Mastors 	for (dsp = list_head(&fp->rf_delegstatelist); dsp != NULL;
990d216dff5SRobert Mastors 	    dsp = list_next(&fp->rf_delegstatelist, dsp)) {
991ed57cab9Srg 
992d216dff5SRobert Mastors 		rfs4_dbe_lock(dsp->rds_dbe);
993ed57cab9Srg 		/*
994ed57cab9Srg 		 * if this delegation state
995ed57cab9Srg 		 * is being reaped skip it
996ed57cab9Srg 		 */
997d216dff5SRobert Mastors 		if (rfs4_dbe_is_invalid(dsp->rds_dbe)) {
998d216dff5SRobert Mastors 			rfs4_dbe_unlock(dsp->rds_dbe);
999ed57cab9Srg 			continue;
1000ed57cab9Srg 		}
1001ed57cab9Srg 
1002ed57cab9Srg 		/* hold for receiving thread */
1003d216dff5SRobert Mastors 		rfs4_dbe_hold(dsp->rds_dbe);
1004d216dff5SRobert Mastors 		rfs4_dbe_unlock(dsp->rds_dbe);
1005ed57cab9Srg 
10067c478bd9Sstevel@tonic-gate 		arg = kmem_alloc(sizeof (struct recall_arg), KM_SLEEP);
10077c478bd9Sstevel@tonic-gate 		arg->recall = map->recall;
10087c478bd9Sstevel@tonic-gate 		arg->trunc = map->trunc;
10097c478bd9Sstevel@tonic-gate 		arg->dsp = dsp;
10107c478bd9Sstevel@tonic-gate 
10117c478bd9Sstevel@tonic-gate 		recall_count++;
10127c478bd9Sstevel@tonic-gate 
10137c478bd9Sstevel@tonic-gate 		(void) thread_create(NULL, 0, do_recall, arg, 0, &p0, TS_RUN,
1014ed57cab9Srg 		    minclsyspri);
10157c478bd9Sstevel@tonic-gate 	}
1016ed57cab9Srg 
1017d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
10187c478bd9Sstevel@tonic-gate 
1019d216dff5SRobert Mastors 	mutex_enter(fp->rf_dinfo.rd_recall_lock);
10207c478bd9Sstevel@tonic-gate 	/*
10217c478bd9Sstevel@tonic-gate 	 * Recall count may go negative if the parent thread that is
10227c478bd9Sstevel@tonic-gate 	 * creating the individual callback threads does not modify
10237c478bd9Sstevel@tonic-gate 	 * the recall_count field before the callback thread actually
10247c478bd9Sstevel@tonic-gate 	 * gets a response from the CB_RECALL
10257c478bd9Sstevel@tonic-gate 	 */
1026d216dff5SRobert Mastors 	fp->rf_dinfo.rd_recall_count += recall_count;
1027d216dff5SRobert Mastors 	while (fp->rf_dinfo.rd_recall_count)
1028d216dff5SRobert Mastors 		cv_wait(fp->rf_dinfo.rd_recall_cv, fp->rf_dinfo.rd_recall_lock);
10297c478bd9Sstevel@tonic-gate 
1030d216dff5SRobert Mastors 	mutex_exit(fp->rf_dinfo.rd_recall_lock);
10317c478bd9Sstevel@tonic-gate 
1032ed57cab9Srg 	DTRACE_PROBE1(nfss__i__recall_done, rfs4_file_t *, fp);
10337c478bd9Sstevel@tonic-gate 	rfs4_file_rele(fp);
10347c478bd9Sstevel@tonic-gate 	kmem_free(map, sizeof (struct master_recall_args));
10357c478bd9Sstevel@tonic-gate 	mutex_enter(&cpr_lock);
10367c478bd9Sstevel@tonic-gate 	CALLB_CPR_EXIT(&cpr_info);
10377c478bd9Sstevel@tonic-gate 	mutex_destroy(&cpr_lock);
10387c478bd9Sstevel@tonic-gate }
10397c478bd9Sstevel@tonic-gate 
10407c478bd9Sstevel@tonic-gate static void
10417c478bd9Sstevel@tonic-gate rfs4_recall_file(rfs4_file_t *fp,
1042d216dff5SRobert Mastors     void (*recall)(rfs4_deleg_state_t *, bool_t trunc),
1043d216dff5SRobert Mastors     bool_t trunc, rfs4_client_t *cp)
10447c478bd9Sstevel@tonic-gate {
10457c478bd9Sstevel@tonic-gate 	struct master_recall_args *args;
10467c478bd9Sstevel@tonic-gate 
1047d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
1048d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_NONE) {
1049d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
10507c478bd9Sstevel@tonic-gate 		return;
10517c478bd9Sstevel@tonic-gate 	}
1052d216dff5SRobert Mastors 	rfs4_dbe_hold(fp->rf_dbe);	/* hold for new thread */
10537c478bd9Sstevel@tonic-gate 
10547c478bd9Sstevel@tonic-gate 	/*
10557c478bd9Sstevel@tonic-gate 	 * Mark the time we started the recall processing.
10567c478bd9Sstevel@tonic-gate 	 * If it has been previously recalled, do not reset the
10577c478bd9Sstevel@tonic-gate 	 * timer since this is used for the revocation decision.
10587c478bd9Sstevel@tonic-gate 	 */
1059d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_time_recalled == 0)
1060d216dff5SRobert Mastors 		fp->rf_dinfo.rd_time_recalled = gethrestime_sec();
1061d216dff5SRobert Mastors 	fp->rf_dinfo.rd_ever_recalled = TRUE; /* used for policy decision */
10627c478bd9Sstevel@tonic-gate 	/* Client causing recall not always available */
10637c478bd9Sstevel@tonic-gate 	if (cp)
1064d216dff5SRobert Mastors 		fp->rf_dinfo.rd_conflicted_client = cp->rc_clientid;
10657c478bd9Sstevel@tonic-gate 
1066d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
10677c478bd9Sstevel@tonic-gate 
10687c478bd9Sstevel@tonic-gate 	args = kmem_alloc(sizeof (struct master_recall_args), KM_SLEEP);
10697c478bd9Sstevel@tonic-gate 	args->fp = fp;
10707c478bd9Sstevel@tonic-gate 	args->recall = recall;
10717c478bd9Sstevel@tonic-gate 	args->trunc = trunc;
10727c478bd9Sstevel@tonic-gate 
10737c478bd9Sstevel@tonic-gate 	(void) thread_create(NULL, 0, do_recall_file, args, 0, &p0, TS_RUN,
1074ed57cab9Srg 	    minclsyspri);
10757c478bd9Sstevel@tonic-gate }
10767c478bd9Sstevel@tonic-gate 
10777c478bd9Sstevel@tonic-gate void
10787c478bd9Sstevel@tonic-gate rfs4_recall_deleg(rfs4_file_t *fp, bool_t trunc, rfs4_client_t *cp)
10797c478bd9Sstevel@tonic-gate {
10807c478bd9Sstevel@tonic-gate 	time_t elapsed1, elapsed2;
10817c478bd9Sstevel@tonic-gate 
1082d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_time_recalled != 0) {
1083d216dff5SRobert Mastors 		elapsed1 = gethrestime_sec() - fp->rf_dinfo.rd_time_recalled;
1084d216dff5SRobert Mastors 		elapsed2 = gethrestime_sec() - fp->rf_dinfo.rd_time_lastwrite;
10857c478bd9Sstevel@tonic-gate 		/* First check to see if a revocation should occur */
10867c478bd9Sstevel@tonic-gate 		if (elapsed1 > rfs4_lease_time &&
1087ed57cab9Srg 		    elapsed2 > rfs4_lease_time) {
10887c478bd9Sstevel@tonic-gate 			rfs4_revoke_file(fp);
10897c478bd9Sstevel@tonic-gate 			return;
10907c478bd9Sstevel@tonic-gate 		}
10917c478bd9Sstevel@tonic-gate 		/*
10927c478bd9Sstevel@tonic-gate 		 * Next check to see if a recall should be done again
10937c478bd9Sstevel@tonic-gate 		 * so quickly.
10947c478bd9Sstevel@tonic-gate 		 */
10957c478bd9Sstevel@tonic-gate 		if (elapsed1 <= ((rfs4_lease_time * 20) / 100))
10967c478bd9Sstevel@tonic-gate 			return;
10977c478bd9Sstevel@tonic-gate 	}
10987c478bd9Sstevel@tonic-gate 	rfs4_recall_file(fp, rfs4_do_cb_recall, trunc, cp);
10997c478bd9Sstevel@tonic-gate }
11007c478bd9Sstevel@tonic-gate 
11017c478bd9Sstevel@tonic-gate /*
11027c478bd9Sstevel@tonic-gate  * rfs4_check_recall is called from rfs4_do_open to determine if the current
11037c478bd9Sstevel@tonic-gate  * open conflicts with the delegation.
11047c478bd9Sstevel@tonic-gate  * Return true if we need recall otherwise false.
1105d216dff5SRobert Mastors  * Assumes entry locks for sp and sp->rs_finfo are held.
11067c478bd9Sstevel@tonic-gate  */
11077c478bd9Sstevel@tonic-gate bool_t
11087c478bd9Sstevel@tonic-gate rfs4_check_recall(rfs4_state_t *sp, uint32_t access)
11097c478bd9Sstevel@tonic-gate {
1110d216dff5SRobert Mastors 	open_delegation_type4 dtype = sp->rs_finfo->rf_dinfo.rd_dtype;
11117c478bd9Sstevel@tonic-gate 
11127c478bd9Sstevel@tonic-gate 	switch (dtype) {
11137c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_NONE:
11147c478bd9Sstevel@tonic-gate 		/* Not currently delegated so there is nothing to do */
11157c478bd9Sstevel@tonic-gate 		return (FALSE);
11167c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_READ:
11177c478bd9Sstevel@tonic-gate 		/*
11187c478bd9Sstevel@tonic-gate 		 * If the access is only asking for READ then there is
11197c478bd9Sstevel@tonic-gate 		 * no conflict and nothing to do.  If it is asking
11207c478bd9Sstevel@tonic-gate 		 * for write, then there will be conflict and the read
11217c478bd9Sstevel@tonic-gate 		 * delegation should be recalled.
11227c478bd9Sstevel@tonic-gate 		 */
11237c478bd9Sstevel@tonic-gate 		if (access == OPEN4_SHARE_ACCESS_READ)
11247c478bd9Sstevel@tonic-gate 			return (FALSE);
11257c478bd9Sstevel@tonic-gate 		else
11267c478bd9Sstevel@tonic-gate 			return (TRUE);
11277c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_WRITE:
11287c478bd9Sstevel@tonic-gate 		/* Check to see if this client has the delegation */
11297c478bd9Sstevel@tonic-gate 		return (rfs4_is_deleg(sp));
11307c478bd9Sstevel@tonic-gate 	}
11317c478bd9Sstevel@tonic-gate 
11327c478bd9Sstevel@tonic-gate 	return (FALSE);
11337c478bd9Sstevel@tonic-gate }
11347c478bd9Sstevel@tonic-gate 
11357c478bd9Sstevel@tonic-gate /*
11367c478bd9Sstevel@tonic-gate  * Return the "best" allowable delegation available given the current
11377c478bd9Sstevel@tonic-gate  * delegation type and the desired access and deny modes on the file.
11387c478bd9Sstevel@tonic-gate  * At the point that this routine is called we know that the access and
11397c478bd9Sstevel@tonic-gate  * deny modes are consistent with the file modes.
11407c478bd9Sstevel@tonic-gate  */
11417c478bd9Sstevel@tonic-gate static open_delegation_type4
11427c478bd9Sstevel@tonic-gate rfs4_check_delegation(rfs4_state_t *sp, rfs4_file_t *fp)
11437c478bd9Sstevel@tonic-gate {
1144d216dff5SRobert Mastors 	open_delegation_type4 dtype = fp->rf_dinfo.rd_dtype;
1145d216dff5SRobert Mastors 	uint32_t access = sp->rs_share_access;
1146d216dff5SRobert Mastors 	uint32_t deny = sp->rs_share_deny;
11477c478bd9Sstevel@tonic-gate 	int readcnt = 0;
11487c478bd9Sstevel@tonic-gate 	int writecnt = 0;
11497c478bd9Sstevel@tonic-gate 
11507c478bd9Sstevel@tonic-gate 	switch (dtype) {
11517c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_NONE:
11527c478bd9Sstevel@tonic-gate 		/*
11537c478bd9Sstevel@tonic-gate 		 * Determine if more than just this OPEN have the file
11547c478bd9Sstevel@tonic-gate 		 * open and if so, no delegation may be provided to
11557c478bd9Sstevel@tonic-gate 		 * the client.
11567c478bd9Sstevel@tonic-gate 		 */
11577c478bd9Sstevel@tonic-gate 		if (access & OPEN4_SHARE_ACCESS_WRITE)
11587c478bd9Sstevel@tonic-gate 			writecnt++;
11597c478bd9Sstevel@tonic-gate 		if (access & OPEN4_SHARE_ACCESS_READ)
11607c478bd9Sstevel@tonic-gate 			readcnt++;
11617c478bd9Sstevel@tonic-gate 
1162d216dff5SRobert Mastors 		if (fp->rf_access_read > readcnt ||
1163d216dff5SRobert Mastors 		    fp->rf_access_write > writecnt)
11647c478bd9Sstevel@tonic-gate 			return (OPEN_DELEGATE_NONE);
11657c478bd9Sstevel@tonic-gate 
11667c478bd9Sstevel@tonic-gate 		/*
11677c478bd9Sstevel@tonic-gate 		 * If the client is going to write, or if the client
11687c478bd9Sstevel@tonic-gate 		 * has exclusive access, return a write delegation.
11697c478bd9Sstevel@tonic-gate 		 */
11707c478bd9Sstevel@tonic-gate 		if ((access & OPEN4_SHARE_ACCESS_WRITE) ||
11717c478bd9Sstevel@tonic-gate 		    (deny & (OPEN4_SHARE_DENY_READ | OPEN4_SHARE_DENY_WRITE)))
11727c478bd9Sstevel@tonic-gate 			return (OPEN_DELEGATE_WRITE);
11737c478bd9Sstevel@tonic-gate 		/*
11747c478bd9Sstevel@tonic-gate 		 * If we don't want to write or we've haven't denied read
11757c478bd9Sstevel@tonic-gate 		 * access to others, return a read delegation.
11767c478bd9Sstevel@tonic-gate 		 */
11777c478bd9Sstevel@tonic-gate 		if ((access & ~OPEN4_SHARE_ACCESS_WRITE) ||
1178ed57cab9Srg 		    (deny & ~OPEN4_SHARE_DENY_READ))
11797c478bd9Sstevel@tonic-gate 			return (OPEN_DELEGATE_READ);
11807c478bd9Sstevel@tonic-gate 
11817c478bd9Sstevel@tonic-gate 		/* Shouldn't get here */
11827c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_NONE);
11837c478bd9Sstevel@tonic-gate 
11847c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_READ:
11857c478bd9Sstevel@tonic-gate 		/*
11867c478bd9Sstevel@tonic-gate 		 * If the file is delegated for read but we wan't to
11877c478bd9Sstevel@tonic-gate 		 * write or deny others to read then we can't delegate
11887c478bd9Sstevel@tonic-gate 		 * the file. We shouldn't get here since the delegation should
11897c478bd9Sstevel@tonic-gate 		 * have been recalled already.
11907c478bd9Sstevel@tonic-gate 		 */
11917c478bd9Sstevel@tonic-gate 		if ((access & OPEN4_SHARE_ACCESS_WRITE) ||
11927c478bd9Sstevel@tonic-gate 		    (deny & OPEN4_SHARE_DENY_READ))
1193ed57cab9Srg 			return (OPEN_DELEGATE_NONE);
11947c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_READ);
11957c478bd9Sstevel@tonic-gate 
11967c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_WRITE:
11977c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_WRITE);
11987c478bd9Sstevel@tonic-gate 	}
11997c478bd9Sstevel@tonic-gate 
12007c478bd9Sstevel@tonic-gate 	/* Shouldn't get here */
12017c478bd9Sstevel@tonic-gate 	return (OPEN_DELEGATE_NONE);
12027c478bd9Sstevel@tonic-gate }
12037c478bd9Sstevel@tonic-gate 
12047c478bd9Sstevel@tonic-gate /*
12057c478bd9Sstevel@tonic-gate  * Given the desired delegation type and the "history" of the file
12067c478bd9Sstevel@tonic-gate  * determine the actual delegation type to return.
12077c478bd9Sstevel@tonic-gate  */
12087c478bd9Sstevel@tonic-gate static open_delegation_type4
12097c478bd9Sstevel@tonic-gate rfs4_delegation_policy(open_delegation_type4 dtype,
1210d216dff5SRobert Mastors     rfs4_dinfo_t *dinfo, clientid4 cid)
12117c478bd9Sstevel@tonic-gate {
12127c478bd9Sstevel@tonic-gate 	time_t elapsed;
12137c478bd9Sstevel@tonic-gate 
12147c478bd9Sstevel@tonic-gate 	if (rfs4_deleg_policy != SRV_NORMAL_DELEGATE)
12157c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_NONE);
12167c478bd9Sstevel@tonic-gate 
12177c478bd9Sstevel@tonic-gate 	/*
12187c478bd9Sstevel@tonic-gate 	 * Has this file/delegation ever been recalled?  If not then
1219d216dff5SRobert Mastors 	 * no further checks for a delegation race need to be done.
12207c478bd9Sstevel@tonic-gate 	 * However if a recall has occurred, then check to see if a
12217c478bd9Sstevel@tonic-gate 	 * client has caused its own delegation recall to occur.  If
12227c478bd9Sstevel@tonic-gate 	 * not, then has a delegation for this file been returned
12237c478bd9Sstevel@tonic-gate 	 * recently?  If so, then do not assign a new delegation to
12247c478bd9Sstevel@tonic-gate 	 * avoid a "delegation race" between the original client and
12257c478bd9Sstevel@tonic-gate 	 * the new/conflicting client.
12267c478bd9Sstevel@tonic-gate 	 */
1227d216dff5SRobert Mastors 	if (dinfo->rd_ever_recalled == TRUE) {
1228d216dff5SRobert Mastors 		if (dinfo->rd_conflicted_client != cid) {
1229d216dff5SRobert Mastors 			elapsed = gethrestime_sec() - dinfo->rd_time_returned;
12307c478bd9Sstevel@tonic-gate 			if (elapsed < rfs4_lease_time)
12317c478bd9Sstevel@tonic-gate 				return (OPEN_DELEGATE_NONE);
12327c478bd9Sstevel@tonic-gate 		}
12337c478bd9Sstevel@tonic-gate 	}
12347c478bd9Sstevel@tonic-gate 
12357c478bd9Sstevel@tonic-gate 	/* Limit the number of read grants */
12367c478bd9Sstevel@tonic-gate 	if (dtype == OPEN_DELEGATE_READ &&
1237d216dff5SRobert Mastors 	    dinfo->rd_rdgrants > MAX_READ_DELEGATIONS)
12387c478bd9Sstevel@tonic-gate 		return (OPEN_DELEGATE_NONE);
12397c478bd9Sstevel@tonic-gate 
12407c478bd9Sstevel@tonic-gate 	/*
12417c478bd9Sstevel@tonic-gate 	 * Should consider limiting total number of read/write
12427c478bd9Sstevel@tonic-gate 	 * delegations the server will permit.
12437c478bd9Sstevel@tonic-gate 	 */
12447c478bd9Sstevel@tonic-gate 
12457c478bd9Sstevel@tonic-gate 	return (dtype);
12467c478bd9Sstevel@tonic-gate }
12477c478bd9Sstevel@tonic-gate 
12487c478bd9Sstevel@tonic-gate /*
12497c478bd9Sstevel@tonic-gate  * Try and grant a delegation for an open give the state. The routine
12507c478bd9Sstevel@tonic-gate  * returns the delegation type granted. This could be OPEN_DELEGATE_NONE.
12517c478bd9Sstevel@tonic-gate  *
12527c478bd9Sstevel@tonic-gate  * The state and associate file entry must be locked
12537c478bd9Sstevel@tonic-gate  */
12547c478bd9Sstevel@tonic-gate rfs4_deleg_state_t *
12557c478bd9Sstevel@tonic-gate rfs4_grant_delegation(delegreq_t dreq, rfs4_state_t *sp, int *recall)
12567c478bd9Sstevel@tonic-gate {
1257d216dff5SRobert Mastors 	rfs4_file_t *fp = sp->rs_finfo;
12587c478bd9Sstevel@tonic-gate 	open_delegation_type4 dtype;
12597c478bd9Sstevel@tonic-gate 	int no_delegation;
12607c478bd9Sstevel@tonic-gate 
1261d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(sp->rs_dbe));
1262d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(fp->rf_dbe));
12637c478bd9Sstevel@tonic-gate 
12647c478bd9Sstevel@tonic-gate 	/* Is the server even providing delegations? */
12657c478bd9Sstevel@tonic-gate 	if (rfs4_deleg_policy == SRV_NEVER_DELEGATE || dreq == DELEG_NONE)
12667c478bd9Sstevel@tonic-gate 		return (NULL);
12677c478bd9Sstevel@tonic-gate 
12687c478bd9Sstevel@tonic-gate 	/* Check to see if delegations have been temporarily disabled */
12697c478bd9Sstevel@tonic-gate 	mutex_enter(&rfs4_deleg_lock);
12707c478bd9Sstevel@tonic-gate 	no_delegation = rfs4_deleg_disabled;
12717c478bd9Sstevel@tonic-gate 	mutex_exit(&rfs4_deleg_lock);
12727c478bd9Sstevel@tonic-gate 
12737c478bd9Sstevel@tonic-gate 	if (no_delegation)
12747c478bd9Sstevel@tonic-gate 		return (NULL);
12757c478bd9Sstevel@tonic-gate 
12767c478bd9Sstevel@tonic-gate 	/* Don't grant a delegation if a deletion is impending. */
1277d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_hold_grant > 0) {
12787c478bd9Sstevel@tonic-gate 		return (NULL);
12797c478bd9Sstevel@tonic-gate 	}
12807c478bd9Sstevel@tonic-gate 
12817c478bd9Sstevel@tonic-gate 	/*
12827c478bd9Sstevel@tonic-gate 	 * Don't grant a delegation if there are any lock manager
12837c478bd9Sstevel@tonic-gate 	 * (NFSv2/v3) locks for the file.  This is a bit of a hack (e.g.,
12847c478bd9Sstevel@tonic-gate 	 * if there are only read locks we should be able to grant a
12857c478bd9Sstevel@tonic-gate 	 * read-only delegation), but it's good enough for now.
12867c478bd9Sstevel@tonic-gate 	 *
12877c478bd9Sstevel@tonic-gate 	 * MT safety: the lock manager checks for conflicting delegations
12887c478bd9Sstevel@tonic-gate 	 * before processing a lock request.  That check will block until
12897c478bd9Sstevel@tonic-gate 	 * we are done here.  So if the lock manager acquires a lock after
12907c478bd9Sstevel@tonic-gate 	 * we decide to grant the delegation, the delegation will get
12917c478bd9Sstevel@tonic-gate 	 * immediately recalled (if there's a conflict), so we're safe.
12927c478bd9Sstevel@tonic-gate 	 */
1293d216dff5SRobert Mastors 	if (lm_vp_active(fp->rf_vp)) {
12947c478bd9Sstevel@tonic-gate 		return (NULL);
12957c478bd9Sstevel@tonic-gate 	}
12967c478bd9Sstevel@tonic-gate 
12977c478bd9Sstevel@tonic-gate 	/*
12987c478bd9Sstevel@tonic-gate 	 * Based on the type of delegation request passed in, take the
12997c478bd9Sstevel@tonic-gate 	 * appropriate action (DELEG_NONE is handled above)
13007c478bd9Sstevel@tonic-gate 	 */
13017c478bd9Sstevel@tonic-gate 	switch (dreq) {
13027c478bd9Sstevel@tonic-gate 
13037c478bd9Sstevel@tonic-gate 	case DELEG_READ:
13047c478bd9Sstevel@tonic-gate 	case DELEG_WRITE:
13057c478bd9Sstevel@tonic-gate 		/*
13067c478bd9Sstevel@tonic-gate 		 * The server "must" grant the delegation in this case.
13077c478bd9Sstevel@tonic-gate 		 * Client is using open previous
13087c478bd9Sstevel@tonic-gate 		 */
13097c478bd9Sstevel@tonic-gate 		dtype = (open_delegation_type4)dreq;
13107c478bd9Sstevel@tonic-gate 		*recall = 1;
13117c478bd9Sstevel@tonic-gate 		break;
13127c478bd9Sstevel@tonic-gate 	case DELEG_ANY:
13137c478bd9Sstevel@tonic-gate 		/*
13147c478bd9Sstevel@tonic-gate 		 * If a valid callback path does not exist, no delegation may
13157c478bd9Sstevel@tonic-gate 		 * be granted.
13167c478bd9Sstevel@tonic-gate 		 */
1317d216dff5SRobert Mastors 		if (sp->rs_owner->ro_client->rc_cbinfo.cb_state != CB_OK)
13187c478bd9Sstevel@tonic-gate 			return (NULL);
13197c478bd9Sstevel@tonic-gate 
13207c478bd9Sstevel@tonic-gate 		/*
13217c478bd9Sstevel@tonic-gate 		 * If the original operation which caused time_rm_delayed
13227c478bd9Sstevel@tonic-gate 		 * to be set hasn't been retried and completed for one
13237c478bd9Sstevel@tonic-gate 		 * full lease period, clear it and allow delegations to
13247c478bd9Sstevel@tonic-gate 		 * get granted again.
13257c478bd9Sstevel@tonic-gate 		 */
1326d216dff5SRobert Mastors 		if (fp->rf_dinfo.rd_time_rm_delayed > 0 &&
13277c478bd9Sstevel@tonic-gate 		    gethrestime_sec() >
1328d216dff5SRobert Mastors 		    fp->rf_dinfo.rd_time_rm_delayed + rfs4_lease_time)
1329d216dff5SRobert Mastors 			fp->rf_dinfo.rd_time_rm_delayed = 0;
13307c478bd9Sstevel@tonic-gate 
13317c478bd9Sstevel@tonic-gate 		/*
13327c478bd9Sstevel@tonic-gate 		 * If we are waiting for a delegation to be returned then
13337c478bd9Sstevel@tonic-gate 		 * don't delegate this file. We do this for correctness as
13347c478bd9Sstevel@tonic-gate 		 * well as if the file is being recalled we would likely
13357c478bd9Sstevel@tonic-gate 		 * recall this file again.
13367c478bd9Sstevel@tonic-gate 		 */
13377c478bd9Sstevel@tonic-gate 
1338d216dff5SRobert Mastors 		if (fp->rf_dinfo.rd_time_recalled != 0 ||
1339d216dff5SRobert Mastors 		    fp->rf_dinfo.rd_time_rm_delayed != 0)
13407c478bd9Sstevel@tonic-gate 			return (NULL);
13417c478bd9Sstevel@tonic-gate 
13427c478bd9Sstevel@tonic-gate 		/* Get the "best" delegation candidate */
13437c478bd9Sstevel@tonic-gate 		dtype = rfs4_check_delegation(sp, fp);
13447c478bd9Sstevel@tonic-gate 
13457c478bd9Sstevel@tonic-gate 		if (dtype == OPEN_DELEGATE_NONE)
13467c478bd9Sstevel@tonic-gate 			return (NULL);
13477c478bd9Sstevel@tonic-gate 
13487c478bd9Sstevel@tonic-gate 		/*
13497c478bd9Sstevel@tonic-gate 		 * Based on policy and the history of the file get the
13507c478bd9Sstevel@tonic-gate 		 * actual delegation.
13517c478bd9Sstevel@tonic-gate 		 */
1352d216dff5SRobert Mastors 		dtype = rfs4_delegation_policy(dtype, &fp->rf_dinfo,
1353d216dff5SRobert Mastors 		    sp->rs_owner->ro_client->rc_clientid);
13547c478bd9Sstevel@tonic-gate 
13557c478bd9Sstevel@tonic-gate 		if (dtype == OPEN_DELEGATE_NONE)
13567c478bd9Sstevel@tonic-gate 			return (NULL);
13577c478bd9Sstevel@tonic-gate 		break;
13587c478bd9Sstevel@tonic-gate 	default:
13597c478bd9Sstevel@tonic-gate 		return (NULL);
13607c478bd9Sstevel@tonic-gate 	}
13617c478bd9Sstevel@tonic-gate 
13627c478bd9Sstevel@tonic-gate 	/* set the delegation for the state */
13637c478bd9Sstevel@tonic-gate 	return (rfs4_deleg_state(sp, dtype, recall));
13647c478bd9Sstevel@tonic-gate }
13657c478bd9Sstevel@tonic-gate 
13667c478bd9Sstevel@tonic-gate void
13677c478bd9Sstevel@tonic-gate rfs4_set_deleg_response(rfs4_deleg_state_t *dsp, open_delegation4 *dp,
1368d216dff5SRobert Mastors     nfsace4 *ace,  int recall)
13697c478bd9Sstevel@tonic-gate {
13707c478bd9Sstevel@tonic-gate 	open_write_delegation4 *wp;
13717c478bd9Sstevel@tonic-gate 	open_read_delegation4 *rp;
13727c478bd9Sstevel@tonic-gate 	nfs_space_limit4 *spl;
13737c478bd9Sstevel@tonic-gate 	nfsace4 nace;
13747c478bd9Sstevel@tonic-gate 
13757c478bd9Sstevel@tonic-gate 	/*
13767c478bd9Sstevel@tonic-gate 	 * We need to allocate a new copy of the who string.
13777c478bd9Sstevel@tonic-gate 	 * this string will be freed by the rfs4_op_open dis_resfree
13787c478bd9Sstevel@tonic-gate 	 * routine. We need to do this allocation since replays will
13797c478bd9Sstevel@tonic-gate 	 * be allocated and rfs4_compound can't tell the difference from
13807c478bd9Sstevel@tonic-gate 	 * a replay and an inital open. N.B. if an ace is passed in, it
13817c478bd9Sstevel@tonic-gate 	 * the caller's responsibility to free it.
13827c478bd9Sstevel@tonic-gate 	 */
13837c478bd9Sstevel@tonic-gate 
13847c478bd9Sstevel@tonic-gate 	if (ace == NULL) {
13857c478bd9Sstevel@tonic-gate 		/*
13867c478bd9Sstevel@tonic-gate 		 * Default is to deny all access, the client will have
13877c478bd9Sstevel@tonic-gate 		 * to contact the server.  XXX Do we want to actually
13887c478bd9Sstevel@tonic-gate 		 * set a deny for every one, or do we simply want to
13897c478bd9Sstevel@tonic-gate 		 * construct an entity that will match no one?
13907c478bd9Sstevel@tonic-gate 		 */
13917c478bd9Sstevel@tonic-gate 		nace.type = ACE4_ACCESS_DENIED_ACE_TYPE;
13927c478bd9Sstevel@tonic-gate 		nace.flag = 0;
13937c478bd9Sstevel@tonic-gate 		nace.access_mask = ACE4_VALID_MASK_BITS;
13947c478bd9Sstevel@tonic-gate 		(void) str_to_utf8(ACE4_WHO_EVERYONE, &nace.who);
13957c478bd9Sstevel@tonic-gate 	} else {
13967c478bd9Sstevel@tonic-gate 		nace.type = ace->type;
13977c478bd9Sstevel@tonic-gate 		nace.flag = ace->flag;
13987c478bd9Sstevel@tonic-gate 		nace.access_mask = ace->access_mask;
13997c478bd9Sstevel@tonic-gate 		(void) utf8_copy(&ace->who, &nace.who);
14007c478bd9Sstevel@tonic-gate 	}
14017c478bd9Sstevel@tonic-gate 
1402d216dff5SRobert Mastors 	dp->delegation_type = dsp->rds_dtype;
14037c478bd9Sstevel@tonic-gate 
1404d216dff5SRobert Mastors 	switch (dsp->rds_dtype) {
14057c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_NONE:
14067c478bd9Sstevel@tonic-gate 		break;
14077c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_READ:
14087c478bd9Sstevel@tonic-gate 		rp = &dp->open_delegation4_u.read;
1409d216dff5SRobert Mastors 		rp->stateid = dsp->rds_delegid.stateid;
14107c478bd9Sstevel@tonic-gate 		rp->recall = (bool_t)recall;
14117c478bd9Sstevel@tonic-gate 		rp->permissions = nace;
14127c478bd9Sstevel@tonic-gate 		break;
14137c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_WRITE:
14147c478bd9Sstevel@tonic-gate 		wp = &dp->open_delegation4_u.write;
1415d216dff5SRobert Mastors 		wp->stateid = dsp->rds_delegid.stateid;
14167c478bd9Sstevel@tonic-gate 		wp->recall = (bool_t)recall;
14177c478bd9Sstevel@tonic-gate 		spl = &wp->space_limit;
14187c478bd9Sstevel@tonic-gate 		spl->limitby = NFS_LIMIT_SIZE;
14197c478bd9Sstevel@tonic-gate 		spl->nfs_space_limit4_u.filesize = 0;
14207c478bd9Sstevel@tonic-gate 		wp->permissions = nace;
14217c478bd9Sstevel@tonic-gate 		break;
14227c478bd9Sstevel@tonic-gate 	}
14237c478bd9Sstevel@tonic-gate }
14247c478bd9Sstevel@tonic-gate 
14257c478bd9Sstevel@tonic-gate /*
14267c478bd9Sstevel@tonic-gate  * Check if the file is delegated via the provided file struct.
14277c478bd9Sstevel@tonic-gate  * Return TRUE if it is delegated.  This is intended for use by
14287c478bd9Sstevel@tonic-gate  * the v4 server.  The v2/v3 server code should use rfs4_check_delegated().
14297c478bd9Sstevel@tonic-gate  *
14307c478bd9Sstevel@tonic-gate  * Note that if the file is found to have a delegation, it is
14317c478bd9Sstevel@tonic-gate  * recalled, unless the clientid of the caller matches the clientid of the
14327c478bd9Sstevel@tonic-gate  * delegation. If the caller has specified, there is a slight delay
14337c478bd9Sstevel@tonic-gate  * inserted in the hopes that the delegation will be returned quickly.
14347c478bd9Sstevel@tonic-gate  */
14357c478bd9Sstevel@tonic-gate bool_t
14367c478bd9Sstevel@tonic-gate rfs4_check_delegated_byfp(int mode, rfs4_file_t *fp,
1437d216dff5SRobert Mastors     bool_t trunc, bool_t do_delay, bool_t is_rm, clientid4 *cp)
14387c478bd9Sstevel@tonic-gate {
14397c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
14407c478bd9Sstevel@tonic-gate 
14417c478bd9Sstevel@tonic-gate 	/* Is delegation enabled? */
14427c478bd9Sstevel@tonic-gate 	if (rfs4_deleg_policy == SRV_NEVER_DELEGATE)
14437c478bd9Sstevel@tonic-gate 		return (FALSE);
14447c478bd9Sstevel@tonic-gate 
14457c478bd9Sstevel@tonic-gate 	/* do we have a delegation on this file? */
1446d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
1447d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_NONE) {
14487c478bd9Sstevel@tonic-gate 		if (is_rm)
1449d216dff5SRobert Mastors 			fp->rf_dinfo.rd_hold_grant++;
1450d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
14517c478bd9Sstevel@tonic-gate 		return (FALSE);
14527c478bd9Sstevel@tonic-gate 	}
14537c478bd9Sstevel@tonic-gate 	/*
14547c478bd9Sstevel@tonic-gate 	 * do we have a write delegation on this file or are we
14557c478bd9Sstevel@tonic-gate 	 * requesting write access to a file with any type of existing
14567c478bd9Sstevel@tonic-gate 	 * delegation?
14577c478bd9Sstevel@tonic-gate 	 */
1458d216dff5SRobert Mastors 	if (mode == FWRITE || fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_WRITE) {
14597c478bd9Sstevel@tonic-gate 		if (cp != NULL) {
1460d216dff5SRobert Mastors 			dsp = list_head(&fp->rf_delegstatelist);
14617c478bd9Sstevel@tonic-gate 			if (dsp == NULL) {
1462d216dff5SRobert Mastors 				rfs4_dbe_unlock(fp->rf_dbe);
14637c478bd9Sstevel@tonic-gate 				return (FALSE);
14647c478bd9Sstevel@tonic-gate 			}
14657c478bd9Sstevel@tonic-gate 			/*
14667c478bd9Sstevel@tonic-gate 			 * Does the requestor already own the delegation?
14677c478bd9Sstevel@tonic-gate 			 */
1468d216dff5SRobert Mastors 			if (dsp->rds_client->rc_clientid == *(cp)) {
1469d216dff5SRobert Mastors 				rfs4_dbe_unlock(fp->rf_dbe);
14707c478bd9Sstevel@tonic-gate 				return (FALSE);
14717c478bd9Sstevel@tonic-gate 			}
14727c478bd9Sstevel@tonic-gate 		}
14737c478bd9Sstevel@tonic-gate 
1474d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
14757c478bd9Sstevel@tonic-gate 		rfs4_recall_deleg(fp, trunc, NULL);
14767c478bd9Sstevel@tonic-gate 
14777c478bd9Sstevel@tonic-gate 		if (!do_delay) {
1478d216dff5SRobert Mastors 			rfs4_dbe_lock(fp->rf_dbe);
1479d216dff5SRobert Mastors 			fp->rf_dinfo.rd_time_rm_delayed = gethrestime_sec();
1480d216dff5SRobert Mastors 			rfs4_dbe_unlock(fp->rf_dbe);
14817c478bd9Sstevel@tonic-gate 			return (TRUE);
14827c478bd9Sstevel@tonic-gate 		}
14837c478bd9Sstevel@tonic-gate 
14847c478bd9Sstevel@tonic-gate 		delay(NFS4_DELEGATION_CONFLICT_DELAY);
14857c478bd9Sstevel@tonic-gate 
1486d216dff5SRobert Mastors 		rfs4_dbe_lock(fp->rf_dbe);
1487d216dff5SRobert Mastors 		if (fp->rf_dinfo.rd_dtype != OPEN_DELEGATE_NONE) {
1488d216dff5SRobert Mastors 			fp->rf_dinfo.rd_time_rm_delayed = gethrestime_sec();
1489d216dff5SRobert Mastors 			rfs4_dbe_unlock(fp->rf_dbe);
14907c478bd9Sstevel@tonic-gate 			return (TRUE);
14917c478bd9Sstevel@tonic-gate 		}
14927c478bd9Sstevel@tonic-gate 	}
14937c478bd9Sstevel@tonic-gate 	if (is_rm)
1494d216dff5SRobert Mastors 		fp->rf_dinfo.rd_hold_grant++;
1495d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
14967c478bd9Sstevel@tonic-gate 	return (FALSE);
14977c478bd9Sstevel@tonic-gate }
14987c478bd9Sstevel@tonic-gate 
14997c478bd9Sstevel@tonic-gate /*
15007c478bd9Sstevel@tonic-gate  * Check if the file is delegated in the case of a v2 or v3 access.
15017c478bd9Sstevel@tonic-gate  * Return TRUE if it is delegated which in turn means that v2 should
15027c478bd9Sstevel@tonic-gate  * drop the request and in the case of v3 JUKEBOX should be returned.
15037c478bd9Sstevel@tonic-gate  */
15047c478bd9Sstevel@tonic-gate bool_t
15057c478bd9Sstevel@tonic-gate rfs4_check_delegated(int mode, vnode_t *vp, bool_t trunc)
15067c478bd9Sstevel@tonic-gate {
15077c478bd9Sstevel@tonic-gate 	rfs4_file_t *fp;
15087c478bd9Sstevel@tonic-gate 	bool_t create = FALSE;
15097c478bd9Sstevel@tonic-gate 	bool_t rc = FALSE;
15107c478bd9Sstevel@tonic-gate 
15117c478bd9Sstevel@tonic-gate 	rfs4_hold_deleg_policy();
15127c478bd9Sstevel@tonic-gate 
15137c478bd9Sstevel@tonic-gate 	/* Is delegation enabled? */
15147c478bd9Sstevel@tonic-gate 	if (rfs4_deleg_policy != SRV_NEVER_DELEGATE) {
15157c478bd9Sstevel@tonic-gate 		fp = rfs4_findfile(vp, NULL, &create);
15167c478bd9Sstevel@tonic-gate 		if (fp != NULL) {
15177c478bd9Sstevel@tonic-gate 			if (rfs4_check_delegated_byfp(mode, fp, trunc,
1518ed57cab9Srg 			    TRUE, FALSE, NULL)) {
15197c478bd9Sstevel@tonic-gate 				rc = TRUE;
15207c478bd9Sstevel@tonic-gate 			}
15217c478bd9Sstevel@tonic-gate 			rfs4_file_rele(fp);
15227c478bd9Sstevel@tonic-gate 		}
15237c478bd9Sstevel@tonic-gate 	}
15247c478bd9Sstevel@tonic-gate 	rfs4_rele_deleg_policy();
15257c478bd9Sstevel@tonic-gate 	return (rc);
15267c478bd9Sstevel@tonic-gate }
15277c478bd9Sstevel@tonic-gate 
15287c478bd9Sstevel@tonic-gate /*
15297c478bd9Sstevel@tonic-gate  * Release a hold on the hold_grant counter which
15307c478bd9Sstevel@tonic-gate  * prevents delegation from being granted while a remove
15317c478bd9Sstevel@tonic-gate  * or a rename is in progress.
15327c478bd9Sstevel@tonic-gate  */
15337c478bd9Sstevel@tonic-gate void
15347c478bd9Sstevel@tonic-gate rfs4_clear_dont_grant(rfs4_file_t *fp)
15357c478bd9Sstevel@tonic-gate {
15367c478bd9Sstevel@tonic-gate 	if (rfs4_deleg_policy == SRV_NEVER_DELEGATE)
15377c478bd9Sstevel@tonic-gate 		return;
1538d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
1539d216dff5SRobert Mastors 	ASSERT(fp->rf_dinfo.rd_hold_grant > 0);
1540d216dff5SRobert Mastors 	fp->rf_dinfo.rd_hold_grant--;
1541d216dff5SRobert Mastors 	fp->rf_dinfo.rd_time_rm_delayed = 0;
1542d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
15437c478bd9Sstevel@tonic-gate }
15447c478bd9Sstevel@tonic-gate 
15457c478bd9Sstevel@tonic-gate /*
15467c478bd9Sstevel@tonic-gate  * State support for delegation.
15477c478bd9Sstevel@tonic-gate  * Set the state delegation type for this state;
15487c478bd9Sstevel@tonic-gate  * This routine is called from open via rfs4_grant_delegation and the entry
1549d216dff5SRobert Mastors  * locks on sp and sp->rs_finfo are assumed.
15507c478bd9Sstevel@tonic-gate  */
15517c478bd9Sstevel@tonic-gate static rfs4_deleg_state_t *
15527c478bd9Sstevel@tonic-gate rfs4_deleg_state(rfs4_state_t *sp, open_delegation_type4 dtype, int *recall)
15537c478bd9Sstevel@tonic-gate {
1554d216dff5SRobert Mastors 	rfs4_file_t *fp = sp->rs_finfo;
15557c478bd9Sstevel@tonic-gate 	bool_t create = TRUE;
15567c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
15577c478bd9Sstevel@tonic-gate 	vnode_t *vp;
15587c478bd9Sstevel@tonic-gate 	int open_prev = *recall;
1559da6c28aaSamw 	int ret;
1560da6c28aaSamw 	int fflags = 0;
15617c478bd9Sstevel@tonic-gate 
1562d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(sp->rs_dbe));
1563d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(fp->rf_dbe));
15647c478bd9Sstevel@tonic-gate 
15657c478bd9Sstevel@tonic-gate 	/* Shouldn't happen */
1566d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_recall_count != 0 ||
1567d216dff5SRobert Mastors 	    (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_READ &&
1568ed57cab9Srg 	    dtype != OPEN_DELEGATE_READ)) {
15697c478bd9Sstevel@tonic-gate 		return (NULL);
15707c478bd9Sstevel@tonic-gate 	}
15717c478bd9Sstevel@tonic-gate 
15727c478bd9Sstevel@tonic-gate 	/* Unlock to avoid deadlock */
1573d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
1574d216dff5SRobert Mastors 	rfs4_dbe_unlock(sp->rs_dbe);
15757c478bd9Sstevel@tonic-gate 
15767c478bd9Sstevel@tonic-gate 	dsp = rfs4_finddeleg(sp, &create);
15777c478bd9Sstevel@tonic-gate 
1578d216dff5SRobert Mastors 	rfs4_dbe_lock(sp->rs_dbe);
1579d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
15807c478bd9Sstevel@tonic-gate 
15817c478bd9Sstevel@tonic-gate 	if (dsp == NULL)
15827c478bd9Sstevel@tonic-gate 		return (NULL);
15837c478bd9Sstevel@tonic-gate 
1584da1b9cd5Sjwahlig 	/*
1585da1b9cd5Sjwahlig 	 * It is possible that since we dropped the lock
1586da1b9cd5Sjwahlig 	 * in order to call finddeleg, the rfs4_file_t
1587da1b9cd5Sjwahlig 	 * was marked such that we should not grant a
1588da1b9cd5Sjwahlig 	 * delegation, if so bail out.
1589da1b9cd5Sjwahlig 	 */
1590d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_hold_grant > 0) {
1591da1b9cd5Sjwahlig 		rfs4_deleg_state_rele(dsp);
1592da1b9cd5Sjwahlig 		return (NULL);
1593da1b9cd5Sjwahlig 	}
1594da1b9cd5Sjwahlig 
15957c478bd9Sstevel@tonic-gate 	if (create == FALSE) {
1596d216dff5SRobert Mastors 		if (sp->rs_owner->ro_client == dsp->rds_client &&
1597d216dff5SRobert Mastors 		    dsp->rds_dtype == dtype) {
15987c478bd9Sstevel@tonic-gate 			return (dsp);
15997c478bd9Sstevel@tonic-gate 		} else {
16007c478bd9Sstevel@tonic-gate 			rfs4_deleg_state_rele(dsp);
16017c478bd9Sstevel@tonic-gate 			return (NULL);
16027c478bd9Sstevel@tonic-gate 		}
16037c478bd9Sstevel@tonic-gate 	}
16047c478bd9Sstevel@tonic-gate 
16057c478bd9Sstevel@tonic-gate 	/*
16067c478bd9Sstevel@tonic-gate 	 * Check that this file has not been delegated to another
16077c478bd9Sstevel@tonic-gate 	 * client
16087c478bd9Sstevel@tonic-gate 	 */
1609d216dff5SRobert Mastors 	if (fp->rf_dinfo.rd_recall_count != 0 ||
1610d216dff5SRobert Mastors 	    fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_WRITE ||
1611d216dff5SRobert Mastors 	    (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_READ &&
1612ed57cab9Srg 	    dtype != OPEN_DELEGATE_READ)) {
16137c478bd9Sstevel@tonic-gate 		rfs4_deleg_state_rele(dsp);
16147c478bd9Sstevel@tonic-gate 		return (NULL);
16157c478bd9Sstevel@tonic-gate 	}
16167c478bd9Sstevel@tonic-gate 
1617d216dff5SRobert Mastors 	vp = fp->rf_vp;
16187c478bd9Sstevel@tonic-gate 	/* vnevent_support returns 0 if file system supports vnevents */
1619da6c28aaSamw 	if (vnevent_support(vp, NULL)) {
16207c478bd9Sstevel@tonic-gate 		rfs4_deleg_state_rele(dsp);
16217c478bd9Sstevel@tonic-gate 		return (NULL);
16227c478bd9Sstevel@tonic-gate 	}
16237c478bd9Sstevel@tonic-gate 
1624da6c28aaSamw 	/* Calculate the fflags for this OPEN. */
1625d216dff5SRobert Mastors 	if (sp->rs_share_access & OPEN4_SHARE_ACCESS_READ)
1626da6c28aaSamw 		fflags |= FREAD;
1627d216dff5SRobert Mastors 	if (sp->rs_share_access & OPEN4_SHARE_ACCESS_WRITE)
1628da6c28aaSamw 		fflags |= FWRITE;
1629da6c28aaSamw 
16307c478bd9Sstevel@tonic-gate 	*recall = 0;
1631da6c28aaSamw 	/*
1632da6c28aaSamw 	 * Before granting a delegation we need to know if anyone else has
1633da6c28aaSamw 	 * opened the file in a conflicting mode.  However, first we need to
1634da6c28aaSamw 	 * know how we opened the file to check the counts properly.
1635da6c28aaSamw 	 */
16367c478bd9Sstevel@tonic-gate 	if (dtype == OPEN_DELEGATE_READ) {
1637da6c28aaSamw 		if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) ||
1638da6c28aaSamw 		    (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) ||
1639da6c28aaSamw 		    vn_is_mapped(vp, V_WRITE)) {
16407c478bd9Sstevel@tonic-gate 			if (open_prev) {
16417c478bd9Sstevel@tonic-gate 				*recall = 1;
16427c478bd9Sstevel@tonic-gate 			} else {
16437c478bd9Sstevel@tonic-gate 				rfs4_deleg_state_rele(dsp);
16447c478bd9Sstevel@tonic-gate 				return (NULL);
16457c478bd9Sstevel@tonic-gate 			}
16467c478bd9Sstevel@tonic-gate 		}
1647da6c28aaSamw 		ret = fem_install(vp, deleg_rdops, (void *)fp, OPUNIQ,
1648ed57cab9Srg 		    rfs4_mon_hold, rfs4_mon_rele);
1649da6c28aaSamw 		if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) ||
1650da6c28aaSamw 		    (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) ||
1651da6c28aaSamw 		    vn_is_mapped(vp, V_WRITE)) {
16527c478bd9Sstevel@tonic-gate 			if (open_prev) {
16537c478bd9Sstevel@tonic-gate 				*recall = 1;
16547c478bd9Sstevel@tonic-gate 			} else {
16557c478bd9Sstevel@tonic-gate 				(void) fem_uninstall(vp, deleg_rdops,
1656ed57cab9Srg 				    (void *)fp);
16577c478bd9Sstevel@tonic-gate 				rfs4_deleg_state_rele(dsp);
16587c478bd9Sstevel@tonic-gate 				return (NULL);
16597c478bd9Sstevel@tonic-gate 			}
16607c478bd9Sstevel@tonic-gate 		}
1661da6c28aaSamw 		/*
1662da6c28aaSamw 		 * Because a client can hold onto a delegation after the
1663da6c28aaSamw 		 * file has been closed, we need to keep track of the
1664da6c28aaSamw 		 * access to this file.  Otherwise the CIFS server would
1665da6c28aaSamw 		 * not know about the client accessing the file and could
1666da6c28aaSamw 		 * inappropriately grant an OPLOCK.
1667da6c28aaSamw 		 * fem_install() returns EBUSY when asked to install a
1668da6c28aaSamw 		 * OPUNIQ monitor more than once.  Therefore, check the
1669da6c28aaSamw 		 * return code because we only want this done once.
1670da6c28aaSamw 		 */
1671da6c28aaSamw 		if (ret == 0)
1672da6c28aaSamw 			vn_open_upgrade(vp, FREAD);
16737c478bd9Sstevel@tonic-gate 	} else { /* WRITE */
1674da6c28aaSamw 		if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) ||
1675da6c28aaSamw 		    (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) ||
1676da6c28aaSamw 		    ((fflags & FREAD) && vn_has_other_opens(vp, V_READ)) ||
1677da6c28aaSamw 		    (((fflags & FREAD) == 0) && vn_is_opened(vp, V_READ)) ||
1678da6c28aaSamw 		    vn_is_mapped(vp, V_RDORWR)) {
16797c478bd9Sstevel@tonic-gate 			if (open_prev) {
16807c478bd9Sstevel@tonic-gate 				*recall = 1;
16817c478bd9Sstevel@tonic-gate 			} else {
16827c478bd9Sstevel@tonic-gate 				rfs4_deleg_state_rele(dsp);
16837c478bd9Sstevel@tonic-gate 				return (NULL);
16847c478bd9Sstevel@tonic-gate 			}
16857c478bd9Sstevel@tonic-gate 		}
1686da6c28aaSamw 		ret = fem_install(vp, deleg_wrops, (void *)fp, OPUNIQ,
1687ed57cab9Srg 		    rfs4_mon_hold, rfs4_mon_rele);
1688da6c28aaSamw 		if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) ||
1689da6c28aaSamw 		    (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) ||
1690da6c28aaSamw 		    ((fflags & FREAD) && vn_has_other_opens(vp, V_READ)) ||
1691da6c28aaSamw 		    (((fflags & FREAD) == 0) && vn_is_opened(vp, V_READ)) ||
1692da6c28aaSamw 		    vn_is_mapped(vp, V_RDORWR)) {
16937c478bd9Sstevel@tonic-gate 			if (open_prev) {
16947c478bd9Sstevel@tonic-gate 				*recall = 1;
16957c478bd9Sstevel@tonic-gate 			} else {
16967c478bd9Sstevel@tonic-gate 				(void) fem_uninstall(vp, deleg_wrops,
1697ed57cab9Srg 				    (void *)fp);
16987c478bd9Sstevel@tonic-gate 				rfs4_deleg_state_rele(dsp);
16997c478bd9Sstevel@tonic-gate 				return (NULL);
17007c478bd9Sstevel@tonic-gate 			}
17017c478bd9Sstevel@tonic-gate 		}
1702da6c28aaSamw 		/*
1703da6c28aaSamw 		 * Because a client can hold onto a delegation after the
1704da6c28aaSamw 		 * file has been closed, we need to keep track of the
1705da6c28aaSamw 		 * access to this file.  Otherwise the CIFS server would
1706da6c28aaSamw 		 * not know about the client accessing the file and could
1707da6c28aaSamw 		 * inappropriately grant an OPLOCK.
1708da6c28aaSamw 		 * fem_install() returns EBUSY when asked to install a
1709da6c28aaSamw 		 * OPUNIQ monitor more than once.  Therefore, check the
1710da6c28aaSamw 		 * return code because we only want this done once.
1711da6c28aaSamw 		 */
1712da6c28aaSamw 		if (ret == 0)
1713da6c28aaSamw 			vn_open_upgrade(vp, FREAD|FWRITE);
17147c478bd9Sstevel@tonic-gate 	}
17157c478bd9Sstevel@tonic-gate 	/* Place on delegation list for file */
1716d216dff5SRobert Mastors 	ASSERT(!list_link_active(&dsp->rds_node));
1717d216dff5SRobert Mastors 	list_insert_tail(&fp->rf_delegstatelist, dsp);
17187c478bd9Sstevel@tonic-gate 
1719d216dff5SRobert Mastors 	dsp->rds_dtype = fp->rf_dinfo.rd_dtype = dtype;
17207c478bd9Sstevel@tonic-gate 
17217c478bd9Sstevel@tonic-gate 	/* Update delegation stats for this file */
1722d216dff5SRobert Mastors 	fp->rf_dinfo.rd_time_lastgrant = gethrestime_sec();
17237c478bd9Sstevel@tonic-gate 
17247c478bd9Sstevel@tonic-gate 	/* reset since this is a new delegation */
1725d216dff5SRobert Mastors 	fp->rf_dinfo.rd_conflicted_client = 0;
1726d216dff5SRobert Mastors 	fp->rf_dinfo.rd_ever_recalled = FALSE;
17277c478bd9Sstevel@tonic-gate 
17287c478bd9Sstevel@tonic-gate 	if (dtype == OPEN_DELEGATE_READ)
1729d216dff5SRobert Mastors 		fp->rf_dinfo.rd_rdgrants++;
17307c478bd9Sstevel@tonic-gate 	else
1731d216dff5SRobert Mastors 		fp->rf_dinfo.rd_wrgrants++;
17327c478bd9Sstevel@tonic-gate 
17337c478bd9Sstevel@tonic-gate 	return (dsp);
17347c478bd9Sstevel@tonic-gate }
17357c478bd9Sstevel@tonic-gate 
17367c478bd9Sstevel@tonic-gate /*
17377c478bd9Sstevel@tonic-gate  * State routine for the server when a delegation is returned.
17387c478bd9Sstevel@tonic-gate  */
17397c478bd9Sstevel@tonic-gate void
17407c478bd9Sstevel@tonic-gate rfs4_return_deleg(rfs4_deleg_state_t *dsp, bool_t revoked)
17417c478bd9Sstevel@tonic-gate {
1742d216dff5SRobert Mastors 	rfs4_file_t *fp = dsp->rds_finfo;
17437c478bd9Sstevel@tonic-gate 	open_delegation_type4 dtypewas;
17447c478bd9Sstevel@tonic-gate 
1745d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
17467c478bd9Sstevel@tonic-gate 
1747d216dff5SRobert Mastors 	/* nothing to do if no longer on list */
1748d216dff5SRobert Mastors 	if (!list_link_active(&dsp->rds_node)) {
1749d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
1750d216dff5SRobert Mastors 		return;
1751d216dff5SRobert Mastors 	}
1752d216dff5SRobert Mastors 
1753d216dff5SRobert Mastors 	/* Remove state from recall list */
1754d216dff5SRobert Mastors 	list_remove(&fp->rf_delegstatelist, dsp);
17557c478bd9Sstevel@tonic-gate 
1756d216dff5SRobert Mastors 	if (list_is_empty(&fp->rf_delegstatelist)) {
1757d216dff5SRobert Mastors 		dtypewas = fp->rf_dinfo.rd_dtype;
1758d216dff5SRobert Mastors 		fp->rf_dinfo.rd_dtype = OPEN_DELEGATE_NONE;
1759d216dff5SRobert Mastors 		rfs4_dbe_cv_broadcast(fp->rf_dbe);
17607c478bd9Sstevel@tonic-gate 
17617c478bd9Sstevel@tonic-gate 		/* if file system was unshared, the vp will be NULL */
1762d216dff5SRobert Mastors 		if (fp->rf_vp != NULL) {
1763da6c28aaSamw 			/*
1764da6c28aaSamw 			 * Once a delegation is no longer held by any client,
1765da6c28aaSamw 			 * the monitor is uninstalled.  At this point, the
1766da6c28aaSamw 			 * client must send OPEN otw, so we don't need the
1767da6c28aaSamw 			 * reference on the vnode anymore.  The open
1768da6c28aaSamw 			 * downgrade removes the reference put on earlier.
1769da6c28aaSamw 			 */
1770da6c28aaSamw 			if (dtypewas == OPEN_DELEGATE_READ) {
1771d216dff5SRobert Mastors 				(void) fem_uninstall(fp->rf_vp, deleg_rdops,
1772ed57cab9Srg 				    (void *)fp);
1773d216dff5SRobert Mastors 				vn_open_downgrade(fp->rf_vp, FREAD);
1774da6c28aaSamw 			} else if (dtypewas == OPEN_DELEGATE_WRITE) {
1775d216dff5SRobert Mastors 				(void) fem_uninstall(fp->rf_vp, deleg_wrops,
1776ed57cab9Srg 				    (void *)fp);
1777d216dff5SRobert Mastors 				vn_open_downgrade(fp->rf_vp, FREAD|FWRITE);
1778da6c28aaSamw 			}
17797c478bd9Sstevel@tonic-gate 		}
17807c478bd9Sstevel@tonic-gate 	}
17817c478bd9Sstevel@tonic-gate 
1782d216dff5SRobert Mastors 	switch (dsp->rds_dtype) {
17837c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_READ:
1784d216dff5SRobert Mastors 		fp->rf_dinfo.rd_rdgrants--;
17857c478bd9Sstevel@tonic-gate 		break;
17867c478bd9Sstevel@tonic-gate 	case OPEN_DELEGATE_WRITE:
1787d216dff5SRobert Mastors 		fp->rf_dinfo.rd_wrgrants--;
17887c478bd9Sstevel@tonic-gate 		break;
17897c478bd9Sstevel@tonic-gate 	default:
17907c478bd9Sstevel@tonic-gate 		break;
17917c478bd9Sstevel@tonic-gate 	}
17927c478bd9Sstevel@tonic-gate 
17937c478bd9Sstevel@tonic-gate 	/* used in the policy decision */
1794d216dff5SRobert Mastors 	fp->rf_dinfo.rd_time_returned = gethrestime_sec();
17957c478bd9Sstevel@tonic-gate 
17967c478bd9Sstevel@tonic-gate 	/*
17977c478bd9Sstevel@tonic-gate 	 * reset the time_recalled field so future delegations are not
17987c478bd9Sstevel@tonic-gate 	 * accidentally revoked
17997c478bd9Sstevel@tonic-gate 	 */
1800d216dff5SRobert Mastors 	if ((fp->rf_dinfo.rd_rdgrants + fp->rf_dinfo.rd_wrgrants) == 0)
1801d216dff5SRobert Mastors 		fp->rf_dinfo.rd_time_recalled = 0;
18027c478bd9Sstevel@tonic-gate 
1803d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
18047c478bd9Sstevel@tonic-gate 
1805d216dff5SRobert Mastors 	rfs4_dbe_lock(dsp->rds_dbe);
18067c478bd9Sstevel@tonic-gate 
1807d216dff5SRobert Mastors 	dsp->rds_dtype = OPEN_DELEGATE_NONE;
18087c478bd9Sstevel@tonic-gate 
18097c478bd9Sstevel@tonic-gate 	if (revoked == TRUE)
1810d216dff5SRobert Mastors 		dsp->rds_time_revoked = gethrestime_sec();
18117c478bd9Sstevel@tonic-gate 
1812d216dff5SRobert Mastors 	rfs4_dbe_invalidate(dsp->rds_dbe);
18137c478bd9Sstevel@tonic-gate 
1814d216dff5SRobert Mastors 	rfs4_dbe_unlock(dsp->rds_dbe);
18157c478bd9Sstevel@tonic-gate 
18167c478bd9Sstevel@tonic-gate 	if (revoked == TRUE) {
1817d216dff5SRobert Mastors 		rfs4_dbe_lock(dsp->rds_client->rc_dbe);
1818d216dff5SRobert Mastors 		dsp->rds_client->rc_deleg_revoked++;	/* observability */
1819d216dff5SRobert Mastors 		rfs4_dbe_unlock(dsp->rds_client->rc_dbe);
18207c478bd9Sstevel@tonic-gate 	}
18217c478bd9Sstevel@tonic-gate }
18227c478bd9Sstevel@tonic-gate 
18237c478bd9Sstevel@tonic-gate static void
18247c478bd9Sstevel@tonic-gate rfs4_revoke_file(rfs4_file_t *fp)
18257c478bd9Sstevel@tonic-gate {
18267c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
18277c478bd9Sstevel@tonic-gate 
18287c478bd9Sstevel@tonic-gate 	/*
18297c478bd9Sstevel@tonic-gate 	 * The lock for rfs4_file_t must be held when traversing the
18307c478bd9Sstevel@tonic-gate 	 * delegation list but that lock needs to be released to call
1831d216dff5SRobert Mastors 	 * rfs4_return_deleg()
18327c478bd9Sstevel@tonic-gate 	 */
1833d216dff5SRobert Mastors 	rfs4_dbe_lock(fp->rf_dbe);
1834d216dff5SRobert Mastors 	while (dsp = list_head(&fp->rf_delegstatelist)) {
1835d216dff5SRobert Mastors 		rfs4_dbe_hold(dsp->rds_dbe);
1836d216dff5SRobert Mastors 		rfs4_dbe_unlock(fp->rf_dbe);
1837d216dff5SRobert Mastors 		rfs4_return_deleg(dsp, TRUE);
18387c478bd9Sstevel@tonic-gate 		rfs4_deleg_state_rele(dsp);
1839d216dff5SRobert Mastors 		rfs4_dbe_lock(fp->rf_dbe);
18407c478bd9Sstevel@tonic-gate 	}
1841d216dff5SRobert Mastors 	rfs4_dbe_unlock(fp->rf_dbe);
18427c478bd9Sstevel@tonic-gate }
18437c478bd9Sstevel@tonic-gate 
18447c478bd9Sstevel@tonic-gate /*
18457c478bd9Sstevel@tonic-gate  * A delegation is assumed to be present on the file associated with
1846d216dff5SRobert Mastors  * "sp".  Check to see if the delegation matches is associated with
1847d216dff5SRobert Mastors  * the same client as referenced by "sp".  If it is not, TRUE is
18487c478bd9Sstevel@tonic-gate  * returned.  If the delegation DOES match the client (or no
18497c478bd9Sstevel@tonic-gate  * delegation is present), return FALSE.
18507c478bd9Sstevel@tonic-gate  * Assume the state entry and file entry are locked.
18517c478bd9Sstevel@tonic-gate  */
18527c478bd9Sstevel@tonic-gate bool_t
1853d216dff5SRobert Mastors rfs4_is_deleg(rfs4_state_t *sp)
18547c478bd9Sstevel@tonic-gate {
18557c478bd9Sstevel@tonic-gate 	rfs4_deleg_state_t *dsp;
1856d216dff5SRobert Mastors 	rfs4_file_t *fp = sp->rs_finfo;
1857d216dff5SRobert Mastors 	rfs4_client_t *cp = sp->rs_owner->ro_client;
18587c478bd9Sstevel@tonic-gate 
1859d216dff5SRobert Mastors 	ASSERT(rfs4_dbe_islocked(fp->rf_dbe));
1860d216dff5SRobert Mastors 	for (dsp = list_head(&fp->rf_delegstatelist); dsp != NULL;
1861d216dff5SRobert Mastors 	    dsp = list_next(&fp->rf_delegstatelist, dsp)) {
1862d216dff5SRobert Mastors 		if (cp != dsp->rds_client) {
18637c478bd9Sstevel@tonic-gate 			return (TRUE);
18647c478bd9Sstevel@tonic-gate 		}
18657c478bd9Sstevel@tonic-gate 	}
18667c478bd9Sstevel@tonic-gate 	return (FALSE);
18677c478bd9Sstevel@tonic-gate }
18687c478bd9Sstevel@tonic-gate 
18697c478bd9Sstevel@tonic-gate void
18707c478bd9Sstevel@tonic-gate rfs4_disable_delegation(void)
18717c478bd9Sstevel@tonic-gate {
18727c478bd9Sstevel@tonic-gate 	mutex_enter(&rfs4_deleg_lock);
18737c478bd9Sstevel@tonic-gate 	rfs4_deleg_disabled++;
18747c478bd9Sstevel@tonic-gate 	mutex_exit(&rfs4_deleg_lock);
18757c478bd9Sstevel@tonic-gate }
18767c478bd9Sstevel@tonic-gate 
18777c478bd9Sstevel@tonic-gate void
18787c478bd9Sstevel@tonic-gate rfs4_enable_delegation(void)
18797c478bd9Sstevel@tonic-gate {
18807c478bd9Sstevel@tonic-gate 	mutex_enter(&rfs4_deleg_lock);
18817c478bd9Sstevel@tonic-gate 	ASSERT(rfs4_deleg_disabled > 0);
18827c478bd9Sstevel@tonic-gate 	rfs4_deleg_disabled--;
18837c478bd9Sstevel@tonic-gate 	mutex_exit(&rfs4_deleg_lock);
18847c478bd9Sstevel@tonic-gate }
18857c478bd9Sstevel@tonic-gate 
18867c478bd9Sstevel@tonic-gate void
18877c478bd9Sstevel@tonic-gate rfs4_mon_hold(void *arg)
18887c478bd9Sstevel@tonic-gate {
18897c478bd9Sstevel@tonic-gate 	rfs4_file_t *fp = arg;
18907c478bd9Sstevel@tonic-gate 
1891d216dff5SRobert Mastors 	rfs4_dbe_hold(fp->rf_dbe);
18927c478bd9Sstevel@tonic-gate }
18937c478bd9Sstevel@tonic-gate 
18947c478bd9Sstevel@tonic-gate void
18957c478bd9Sstevel@tonic-gate rfs4_mon_rele(void *arg)
18967c478bd9Sstevel@tonic-gate {
18977c478bd9Sstevel@tonic-gate 	rfs4_file_t *fp = arg;
18987c478bd9Sstevel@tonic-gate 
1899d216dff5SRobert Mastors 	rfs4_dbe_rele_nolock(fp->rf_dbe);
19007c478bd9Sstevel@tonic-gate }
1901