17c478bd9Sstevel@tonic-gate /* 27c478bd9Sstevel@tonic-gate * CDDL HEADER START 37c478bd9Sstevel@tonic-gate * 47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the 5da1b9cd5Sjwahlig * Common Development and Distribution License (the "License"). 6da1b9cd5Sjwahlig * You may not use this file except in compliance with the License. 77c478bd9Sstevel@tonic-gate * 87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing. 107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions 117c478bd9Sstevel@tonic-gate * and limitations under the License. 127c478bd9Sstevel@tonic-gate * 137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each 147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the 167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying 177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner] 187c478bd9Sstevel@tonic-gate * 197c478bd9Sstevel@tonic-gate * CDDL HEADER END 207c478bd9Sstevel@tonic-gate */ 21*59927d31SYuri Pankov 227c478bd9Sstevel@tonic-gate /* 23878aca8dSDai Ngo * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 247c478bd9Sstevel@tonic-gate * Use is subject to license terms. 25*59927d31SYuri Pankov * Copyright 2014 Nexenta Systems, Inc. All rights reserved. 267c478bd9Sstevel@tonic-gate */ 277c478bd9Sstevel@tonic-gate 287c478bd9Sstevel@tonic-gate #include <sys/systm.h> 297c478bd9Sstevel@tonic-gate #include <rpc/auth.h> 307c478bd9Sstevel@tonic-gate #include <rpc/clnt.h> 317c478bd9Sstevel@tonic-gate #include <nfs/nfs4_kprot.h> 327c478bd9Sstevel@tonic-gate #include <nfs/nfs4.h> 337c478bd9Sstevel@tonic-gate #include <nfs/lm.h> 347c478bd9Sstevel@tonic-gate #include <sys/cmn_err.h> 357c478bd9Sstevel@tonic-gate #include <sys/disp.h> 36f3b585ceSsamf #include <sys/sdt.h> 377c478bd9Sstevel@tonic-gate 387c478bd9Sstevel@tonic-gate #include <sys/pathname.h> 397c478bd9Sstevel@tonic-gate 407c478bd9Sstevel@tonic-gate #include <sys/strsubr.h> 417c478bd9Sstevel@tonic-gate #include <sys/ddi.h> 427c478bd9Sstevel@tonic-gate 437c478bd9Sstevel@tonic-gate #include <sys/vnode.h> 44ed57cab9Srg #include <sys/sdt.h> 457c478bd9Sstevel@tonic-gate #include <inet/common.h> 467c478bd9Sstevel@tonic-gate #include <inet/ip.h> 477c478bd9Sstevel@tonic-gate #include <inet/ip6.h> 487c478bd9Sstevel@tonic-gate 497c478bd9Sstevel@tonic-gate #define MAX_READ_DELEGATIONS 5 507c478bd9Sstevel@tonic-gate 517c478bd9Sstevel@tonic-gate krwlock_t rfs4_deleg_policy_lock; 527c478bd9Sstevel@tonic-gate srv_deleg_policy_t rfs4_deleg_policy = SRV_NEVER_DELEGATE; 537c478bd9Sstevel@tonic-gate static int rfs4_deleg_wlp = 5; 547c478bd9Sstevel@tonic-gate kmutex_t rfs4_deleg_lock; 557c478bd9Sstevel@tonic-gate static int rfs4_deleg_disabled; 56878aca8dSDai Ngo static int rfs4_max_setup_cb_tries = 5; 577c478bd9Sstevel@tonic-gate 587c478bd9Sstevel@tonic-gate #ifdef DEBUG 597c478bd9Sstevel@tonic-gate 607c478bd9Sstevel@tonic-gate static int rfs4_test_cbgetattr_fail = 0; 617c478bd9Sstevel@tonic-gate int rfs4_cb_null; 627c478bd9Sstevel@tonic-gate int rfs4_cb_debug; 637c478bd9Sstevel@tonic-gate int rfs4_deleg_debug; 647c478bd9Sstevel@tonic-gate 657c478bd9Sstevel@tonic-gate #endif 667c478bd9Sstevel@tonic-gate 677c478bd9Sstevel@tonic-gate static void rfs4_recall_file(rfs4_file_t *, 68d216dff5SRobert Mastors void (*recall)(rfs4_deleg_state_t *, bool_t), 69d216dff5SRobert Mastors bool_t, rfs4_client_t *); 707c478bd9Sstevel@tonic-gate static void rfs4_revoke_file(rfs4_file_t *); 717c478bd9Sstevel@tonic-gate static void rfs4_cb_chflush(rfs4_cbinfo_t *); 727c478bd9Sstevel@tonic-gate static CLIENT *rfs4_cb_getch(rfs4_cbinfo_t *); 737c478bd9Sstevel@tonic-gate static void rfs4_cb_freech(rfs4_cbinfo_t *, CLIENT *, bool_t); 747c478bd9Sstevel@tonic-gate static rfs4_deleg_state_t *rfs4_deleg_state(rfs4_state_t *, 75d216dff5SRobert Mastors open_delegation_type4, int *); 767c478bd9Sstevel@tonic-gate 777c478bd9Sstevel@tonic-gate /* 787c478bd9Sstevel@tonic-gate * Convert a universal address to an transport specific 797c478bd9Sstevel@tonic-gate * address using inet_pton. 807c478bd9Sstevel@tonic-gate */ 817c478bd9Sstevel@tonic-gate static int 827c478bd9Sstevel@tonic-gate uaddr2sockaddr(int af, char *ua, void *ap, in_port_t *pp) 837c478bd9Sstevel@tonic-gate { 847c478bd9Sstevel@tonic-gate int dots = 0, i, j, len, k; 857c478bd9Sstevel@tonic-gate unsigned char c; 867c478bd9Sstevel@tonic-gate in_port_t port = 0; 877c478bd9Sstevel@tonic-gate 887c478bd9Sstevel@tonic-gate len = strlen(ua); 897c478bd9Sstevel@tonic-gate 907c478bd9Sstevel@tonic-gate for (i = len-1; i >= 0; i--) { 917c478bd9Sstevel@tonic-gate 927c478bd9Sstevel@tonic-gate if (ua[i] == '.') 937c478bd9Sstevel@tonic-gate dots++; 947c478bd9Sstevel@tonic-gate 957c478bd9Sstevel@tonic-gate if (dots == 2) { 967c478bd9Sstevel@tonic-gate 977c478bd9Sstevel@tonic-gate ua[i] = '\0'; 987c478bd9Sstevel@tonic-gate /* 997c478bd9Sstevel@tonic-gate * We use k to remember were to stick '.' back, since 1007c478bd9Sstevel@tonic-gate * ua was kmem_allocateded from the pool len+1. 1017c478bd9Sstevel@tonic-gate */ 1027c478bd9Sstevel@tonic-gate k = i; 1037c478bd9Sstevel@tonic-gate if (inet_pton(af, ua, ap) == 1) { 1047c478bd9Sstevel@tonic-gate 1057c478bd9Sstevel@tonic-gate c = 0; 1067c478bd9Sstevel@tonic-gate 1077c478bd9Sstevel@tonic-gate for (j = i+1; j < len; j++) { 1087c478bd9Sstevel@tonic-gate if (ua[j] == '.') { 1097c478bd9Sstevel@tonic-gate port = c << 8; 1107c478bd9Sstevel@tonic-gate c = 0; 1117c478bd9Sstevel@tonic-gate } else if (ua[j] >= '0' && 1127c478bd9Sstevel@tonic-gate ua[j] <= '9') { 1137c478bd9Sstevel@tonic-gate c *= 10; 1147c478bd9Sstevel@tonic-gate c += ua[j] - '0'; 1157c478bd9Sstevel@tonic-gate } else { 1167c478bd9Sstevel@tonic-gate ua[k] = '.'; 1177c478bd9Sstevel@tonic-gate return (EINVAL); 1187c478bd9Sstevel@tonic-gate } 1197c478bd9Sstevel@tonic-gate } 1207c478bd9Sstevel@tonic-gate port += c; 1217c478bd9Sstevel@tonic-gate 122*59927d31SYuri Pankov *pp = htons(port); 1237c478bd9Sstevel@tonic-gate 1247c478bd9Sstevel@tonic-gate ua[k] = '.'; 1257c478bd9Sstevel@tonic-gate return (0); 1267c478bd9Sstevel@tonic-gate } else { 1277c478bd9Sstevel@tonic-gate ua[k] = '.'; 1287c478bd9Sstevel@tonic-gate return (EINVAL); 1297c478bd9Sstevel@tonic-gate } 1307c478bd9Sstevel@tonic-gate } 1317c478bd9Sstevel@tonic-gate } 1327c478bd9Sstevel@tonic-gate 1337c478bd9Sstevel@tonic-gate return (EINVAL); 1347c478bd9Sstevel@tonic-gate } 1357c478bd9Sstevel@tonic-gate 1367c478bd9Sstevel@tonic-gate /* 1377c478bd9Sstevel@tonic-gate * Update the delegation policy with the 1387c478bd9Sstevel@tonic-gate * value of "new_policy" 1397c478bd9Sstevel@tonic-gate */ 1407c478bd9Sstevel@tonic-gate void 1417c478bd9Sstevel@tonic-gate rfs4_set_deleg_policy(srv_deleg_policy_t new_policy) 1427c478bd9Sstevel@tonic-gate { 1437c478bd9Sstevel@tonic-gate rw_enter(&rfs4_deleg_policy_lock, RW_WRITER); 1447c478bd9Sstevel@tonic-gate rfs4_deleg_policy = new_policy; 1457c478bd9Sstevel@tonic-gate rw_exit(&rfs4_deleg_policy_lock); 1467c478bd9Sstevel@tonic-gate } 1477c478bd9Sstevel@tonic-gate 1487c478bd9Sstevel@tonic-gate void 1497c478bd9Sstevel@tonic-gate rfs4_hold_deleg_policy(void) 1507c478bd9Sstevel@tonic-gate { 1517c478bd9Sstevel@tonic-gate rw_enter(&rfs4_deleg_policy_lock, RW_READER); 1527c478bd9Sstevel@tonic-gate } 1537c478bd9Sstevel@tonic-gate 1547c478bd9Sstevel@tonic-gate void 1557c478bd9Sstevel@tonic-gate rfs4_rele_deleg_policy(void) 1567c478bd9Sstevel@tonic-gate { 1577c478bd9Sstevel@tonic-gate rw_exit(&rfs4_deleg_policy_lock); 1587c478bd9Sstevel@tonic-gate } 1597c478bd9Sstevel@tonic-gate 1607c478bd9Sstevel@tonic-gate 1617c478bd9Sstevel@tonic-gate /* 1627c478bd9Sstevel@tonic-gate * This free function is to be used when the client struct is being 1637c478bd9Sstevel@tonic-gate * released and nothing at all is needed of the callback info any 1647c478bd9Sstevel@tonic-gate * longer. 1657c478bd9Sstevel@tonic-gate */ 1667c478bd9Sstevel@tonic-gate void 1677c478bd9Sstevel@tonic-gate rfs4_cbinfo_free(rfs4_cbinfo_t *cbp) 1687c478bd9Sstevel@tonic-gate { 1697c478bd9Sstevel@tonic-gate char *addr = cbp->cb_callback.cb_location.r_addr; 1707c478bd9Sstevel@tonic-gate char *netid = cbp->cb_callback.cb_location.r_netid; 1717c478bd9Sstevel@tonic-gate 1727c478bd9Sstevel@tonic-gate /* Free old address if any */ 1737c478bd9Sstevel@tonic-gate 1747c478bd9Sstevel@tonic-gate if (addr) 1757c478bd9Sstevel@tonic-gate kmem_free(addr, strlen(addr) + 1); 1767c478bd9Sstevel@tonic-gate if (netid) 1777c478bd9Sstevel@tonic-gate kmem_free(netid, strlen(netid) + 1); 1787c478bd9Sstevel@tonic-gate 1797c478bd9Sstevel@tonic-gate addr = cbp->cb_newer.cb_callback.cb_location.r_addr; 1807c478bd9Sstevel@tonic-gate netid = cbp->cb_newer.cb_callback.cb_location.r_netid; 1817c478bd9Sstevel@tonic-gate 1827c478bd9Sstevel@tonic-gate if (addr) 1837c478bd9Sstevel@tonic-gate kmem_free(addr, strlen(addr) + 1); 1847c478bd9Sstevel@tonic-gate if (netid) 1857c478bd9Sstevel@tonic-gate kmem_free(netid, strlen(netid) + 1); 1867c478bd9Sstevel@tonic-gate 1877c478bd9Sstevel@tonic-gate if (cbp->cb_chc_free) { 1887c478bd9Sstevel@tonic-gate rfs4_cb_chflush(cbp); 1897c478bd9Sstevel@tonic-gate } 1907c478bd9Sstevel@tonic-gate } 1917c478bd9Sstevel@tonic-gate 1927c478bd9Sstevel@tonic-gate /* 1937c478bd9Sstevel@tonic-gate * The server uses this to check the callback path supplied by the 1947c478bd9Sstevel@tonic-gate * client. The callback connection is marked "in progress" while this 1957c478bd9Sstevel@tonic-gate * work is going on and then eventually marked either OK or FAILED. 1967c478bd9Sstevel@tonic-gate * This work can be done as part of a separate thread and at the end 1977c478bd9Sstevel@tonic-gate * of this the thread will exit or it may be done such that the caller 1987c478bd9Sstevel@tonic-gate * will continue with other work. 1997c478bd9Sstevel@tonic-gate */ 2007c478bd9Sstevel@tonic-gate static void 2017c478bd9Sstevel@tonic-gate rfs4_do_cb_null(rfs4_client_t *cp) 2027c478bd9Sstevel@tonic-gate { 2037c478bd9Sstevel@tonic-gate struct timeval tv; 2047c478bd9Sstevel@tonic-gate CLIENT *ch; 2057c478bd9Sstevel@tonic-gate rfs4_cbstate_t newstate; 206d216dff5SRobert Mastors rfs4_cbinfo_t *cbp = &cp->rc_cbinfo; 2077c478bd9Sstevel@tonic-gate 2087c478bd9Sstevel@tonic-gate mutex_enter(cbp->cb_lock); 2097c478bd9Sstevel@tonic-gate /* If another thread is doing CB_NULL RPC then return */ 2107c478bd9Sstevel@tonic-gate if (cbp->cb_nullcaller == TRUE) { 2117c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 2127c478bd9Sstevel@tonic-gate rfs4_client_rele(cp); 2137c478bd9Sstevel@tonic-gate return; 2147c478bd9Sstevel@tonic-gate } 2157c478bd9Sstevel@tonic-gate 2167c478bd9Sstevel@tonic-gate /* Mark the cbinfo as having a thread in the NULL callback */ 2177c478bd9Sstevel@tonic-gate cbp->cb_nullcaller = TRUE; 2187c478bd9Sstevel@tonic-gate 2197c478bd9Sstevel@tonic-gate /* 2207c478bd9Sstevel@tonic-gate * Are there other threads still using the cbinfo client 2217c478bd9Sstevel@tonic-gate * handles? If so, this thread must wait before going and 2227c478bd9Sstevel@tonic-gate * mucking aroiund with the callback information 2237c478bd9Sstevel@tonic-gate */ 224a31a5cfdSsamf while (cbp->cb_refcnt != 0) 2257c478bd9Sstevel@tonic-gate cv_wait(cbp->cb_cv_nullcaller, cbp->cb_lock); 2267c478bd9Sstevel@tonic-gate 2277c478bd9Sstevel@tonic-gate /* 2287c478bd9Sstevel@tonic-gate * This thread itself may find that new callback info has 2297c478bd9Sstevel@tonic-gate * arrived and is set up to handle this case and redrive the 2307c478bd9Sstevel@tonic-gate * call to the client's callback server. 2317c478bd9Sstevel@tonic-gate */ 2327c478bd9Sstevel@tonic-gate retry: 2337c478bd9Sstevel@tonic-gate if (cbp->cb_newer.cb_new == TRUE && 2347c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_confirmed == TRUE) { 2357c478bd9Sstevel@tonic-gate char *addr = cbp->cb_callback.cb_location.r_addr; 2367c478bd9Sstevel@tonic-gate char *netid = cbp->cb_callback.cb_location.r_netid; 2377c478bd9Sstevel@tonic-gate 2387c478bd9Sstevel@tonic-gate /* 2397c478bd9Sstevel@tonic-gate * Free the old stuff if it exists; may be the first 2407c478bd9Sstevel@tonic-gate * time through this path 2417c478bd9Sstevel@tonic-gate */ 2427c478bd9Sstevel@tonic-gate if (addr) 2437c478bd9Sstevel@tonic-gate kmem_free(addr, strlen(addr) + 1); 2447c478bd9Sstevel@tonic-gate if (netid) 2457c478bd9Sstevel@tonic-gate kmem_free(netid, strlen(netid) + 1); 2467c478bd9Sstevel@tonic-gate 2477c478bd9Sstevel@tonic-gate /* Move over the addr/netid */ 2487c478bd9Sstevel@tonic-gate cbp->cb_callback.cb_location.r_addr = 249ed57cab9Srg cbp->cb_newer.cb_callback.cb_location.r_addr; 2507c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_callback.cb_location.r_addr = NULL; 2517c478bd9Sstevel@tonic-gate cbp->cb_callback.cb_location.r_netid = 252ed57cab9Srg cbp->cb_newer.cb_callback.cb_location.r_netid; 2537c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_callback.cb_location.r_netid = NULL; 2547c478bd9Sstevel@tonic-gate 2557c478bd9Sstevel@tonic-gate /* Get the program number */ 2567c478bd9Sstevel@tonic-gate cbp->cb_callback.cb_program = 257ed57cab9Srg cbp->cb_newer.cb_callback.cb_program; 2587c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_callback.cb_program = 0; 2597c478bd9Sstevel@tonic-gate 2607c478bd9Sstevel@tonic-gate /* Don't forget the protocol's "cb_ident" field */ 2617c478bd9Sstevel@tonic-gate cbp->cb_ident = cbp->cb_newer.cb_ident; 2627c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_ident = 0; 2637c478bd9Sstevel@tonic-gate 2647c478bd9Sstevel@tonic-gate /* no longer new */ 2657c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_new = FALSE; 2667c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_confirmed = FALSE; 2677c478bd9Sstevel@tonic-gate 2687c478bd9Sstevel@tonic-gate /* get rid of the old client handles that may exist */ 2697c478bd9Sstevel@tonic-gate rfs4_cb_chflush(cbp); 2707c478bd9Sstevel@tonic-gate 2717c478bd9Sstevel@tonic-gate cbp->cb_state = CB_NONE; 2727c478bd9Sstevel@tonic-gate cbp->cb_timefailed = 0; /* reset the clock */ 2737c478bd9Sstevel@tonic-gate cbp->cb_notified_of_cb_path_down = TRUE; 2747c478bd9Sstevel@tonic-gate } 2757c478bd9Sstevel@tonic-gate 2767c478bd9Sstevel@tonic-gate if (cbp->cb_state != CB_NONE) { 2777c478bd9Sstevel@tonic-gate cv_broadcast(cbp->cb_cv); /* let the others know */ 2787c478bd9Sstevel@tonic-gate cbp->cb_nullcaller = FALSE; 2797c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 2807c478bd9Sstevel@tonic-gate rfs4_client_rele(cp); 2817c478bd9Sstevel@tonic-gate return; 2827c478bd9Sstevel@tonic-gate } 2837c478bd9Sstevel@tonic-gate 2847c478bd9Sstevel@tonic-gate /* mark rfs4_client_t as CALLBACK NULL in progress */ 2857c478bd9Sstevel@tonic-gate cbp->cb_state = CB_INPROG; 2867c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 2877c478bd9Sstevel@tonic-gate 2887c478bd9Sstevel@tonic-gate /* get/generate a client handle */ 2897c478bd9Sstevel@tonic-gate if ((ch = rfs4_cb_getch(cbp)) == NULL) { 2907c478bd9Sstevel@tonic-gate mutex_enter(cbp->cb_lock); 2917c478bd9Sstevel@tonic-gate cbp->cb_state = CB_BAD; 2927c478bd9Sstevel@tonic-gate cbp->cb_timefailed = gethrestime_sec(); /* observability */ 2937c478bd9Sstevel@tonic-gate goto retry; 2947c478bd9Sstevel@tonic-gate } 2957c478bd9Sstevel@tonic-gate 2967c478bd9Sstevel@tonic-gate 2977c478bd9Sstevel@tonic-gate tv.tv_sec = 30; 2987c478bd9Sstevel@tonic-gate tv.tv_usec = 0; 2997c478bd9Sstevel@tonic-gate if (clnt_call(ch, CB_NULL, xdr_void, NULL, xdr_void, NULL, tv) != 0) { 3007c478bd9Sstevel@tonic-gate newstate = CB_BAD; 3017c478bd9Sstevel@tonic-gate } else { 3027c478bd9Sstevel@tonic-gate newstate = CB_OK; 3037c478bd9Sstevel@tonic-gate #ifdef DEBUG 3047c478bd9Sstevel@tonic-gate rfs4_cb_null++; 3057c478bd9Sstevel@tonic-gate #endif 3067c478bd9Sstevel@tonic-gate } 3077c478bd9Sstevel@tonic-gate 3087c478bd9Sstevel@tonic-gate /* Check to see if the client has specified new callback info */ 3097c478bd9Sstevel@tonic-gate mutex_enter(cbp->cb_lock); 3107c478bd9Sstevel@tonic-gate rfs4_cb_freech(cbp, ch, TRUE); 3117c478bd9Sstevel@tonic-gate if (cbp->cb_newer.cb_new == TRUE && 3127c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_confirmed == TRUE) { 3137c478bd9Sstevel@tonic-gate goto retry; /* give the CB_NULL another chance */ 3147c478bd9Sstevel@tonic-gate } 3157c478bd9Sstevel@tonic-gate 3167c478bd9Sstevel@tonic-gate cbp->cb_state = newstate; 3177c478bd9Sstevel@tonic-gate if (cbp->cb_state == CB_BAD) 3187c478bd9Sstevel@tonic-gate cbp->cb_timefailed = gethrestime_sec(); /* observability */ 3197c478bd9Sstevel@tonic-gate 3207c478bd9Sstevel@tonic-gate cv_broadcast(cbp->cb_cv); /* start up the other threads */ 3217c478bd9Sstevel@tonic-gate cbp->cb_nullcaller = FALSE; 3227c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 3237c478bd9Sstevel@tonic-gate 3247c478bd9Sstevel@tonic-gate rfs4_client_rele(cp); 3257c478bd9Sstevel@tonic-gate } 3267c478bd9Sstevel@tonic-gate 3277c478bd9Sstevel@tonic-gate /* 3287c478bd9Sstevel@tonic-gate * Given a client struct, inspect the callback info to see if the 329878aca8dSDai Ngo * callback path is up and available. 330878aca8dSDai Ngo * 331878aca8dSDai Ngo * If new callback path is available and no one has set it up then 332878aca8dSDai Ngo * try to set it up. If setup is not successful after 5 tries (5 secs) 333878aca8dSDai Ngo * then gives up and returns NULL. 334878aca8dSDai Ngo * 335878aca8dSDai Ngo * If callback path is being initialized, then wait for the CB_NULL RPC 336878aca8dSDai Ngo * call to occur. 3377c478bd9Sstevel@tonic-gate */ 3387c478bd9Sstevel@tonic-gate static rfs4_cbinfo_t * 3397c478bd9Sstevel@tonic-gate rfs4_cbinfo_hold(rfs4_client_t *cp) 3407c478bd9Sstevel@tonic-gate { 341d216dff5SRobert Mastors rfs4_cbinfo_t *cbp = &cp->rc_cbinfo; 342878aca8dSDai Ngo int retries = 0; 3437c478bd9Sstevel@tonic-gate 3447c478bd9Sstevel@tonic-gate mutex_enter(cbp->cb_lock); 3457c478bd9Sstevel@tonic-gate 346878aca8dSDai Ngo while (cbp->cb_newer.cb_new == TRUE && cbp->cb_nullcaller == FALSE) { 3477c478bd9Sstevel@tonic-gate /* 3487c478bd9Sstevel@tonic-gate * Looks like a new callback path may be available and 3497c478bd9Sstevel@tonic-gate * noone has set it up. 3507c478bd9Sstevel@tonic-gate */ 3517c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 352d216dff5SRobert Mastors rfs4_dbe_hold(cp->rc_dbe); 3537c478bd9Sstevel@tonic-gate rfs4_do_cb_null(cp); /* caller will release client hold */ 354878aca8dSDai Ngo 355878aca8dSDai Ngo mutex_enter(cbp->cb_lock); 356878aca8dSDai Ngo /* 357878aca8dSDai Ngo * If callback path is no longer new, or it's being setup 358878aca8dSDai Ngo * then stop and wait for it to be done. 359878aca8dSDai Ngo */ 360878aca8dSDai Ngo if (cbp->cb_newer.cb_new == FALSE || cbp->cb_nullcaller == TRUE) 361878aca8dSDai Ngo break; 362878aca8dSDai Ngo mutex_exit(cbp->cb_lock); 363878aca8dSDai Ngo 364878aca8dSDai Ngo if (++retries >= rfs4_max_setup_cb_tries) 365878aca8dSDai Ngo return (NULL); 366878aca8dSDai Ngo delay(hz); 367878aca8dSDai Ngo mutex_enter(cbp->cb_lock); 3687c478bd9Sstevel@tonic-gate } 3697c478bd9Sstevel@tonic-gate 3707c478bd9Sstevel@tonic-gate /* Is there a thread working on doing the CB_NULL RPC? */ 3717c478bd9Sstevel@tonic-gate if (cbp->cb_nullcaller == TRUE) 3727c478bd9Sstevel@tonic-gate cv_wait(cbp->cb_cv, cbp->cb_lock); /* if so, wait on it */ 3737c478bd9Sstevel@tonic-gate 3747c478bd9Sstevel@tonic-gate /* If the callback path is not okay (up and running), just quit */ 3757c478bd9Sstevel@tonic-gate if (cbp->cb_state != CB_OK) { 3767c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 3777c478bd9Sstevel@tonic-gate return (NULL); 3787c478bd9Sstevel@tonic-gate } 3797c478bd9Sstevel@tonic-gate 3807c478bd9Sstevel@tonic-gate /* Let someone know we are using the current callback info */ 3817c478bd9Sstevel@tonic-gate cbp->cb_refcnt++; 3827c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 3837c478bd9Sstevel@tonic-gate return (cbp); 3847c478bd9Sstevel@tonic-gate } 3857c478bd9Sstevel@tonic-gate 3867c478bd9Sstevel@tonic-gate /* 3877c478bd9Sstevel@tonic-gate * The caller is done with the callback info. It may be that the 3887c478bd9Sstevel@tonic-gate * caller's RPC failed and the NFSv4 client has actually provided new 3897c478bd9Sstevel@tonic-gate * callback information. If so, let the caller know so they can 3907c478bd9Sstevel@tonic-gate * advantage of this and maybe retry the RPC that originally failed. 3917c478bd9Sstevel@tonic-gate */ 3927c478bd9Sstevel@tonic-gate static int 3937c478bd9Sstevel@tonic-gate rfs4_cbinfo_rele(rfs4_cbinfo_t *cbp, rfs4_cbstate_t newstate) 3947c478bd9Sstevel@tonic-gate { 3957c478bd9Sstevel@tonic-gate int cb_new = FALSE; 3967c478bd9Sstevel@tonic-gate 3977c478bd9Sstevel@tonic-gate mutex_enter(cbp->cb_lock); 3987c478bd9Sstevel@tonic-gate 3997c478bd9Sstevel@tonic-gate /* The caller gets a chance to mark the callback info as bad */ 4007c478bd9Sstevel@tonic-gate if (newstate != CB_NOCHANGE) 4017c478bd9Sstevel@tonic-gate cbp->cb_state = newstate; 4027c478bd9Sstevel@tonic-gate if (newstate == CB_FAILED) { 4037c478bd9Sstevel@tonic-gate cbp->cb_timefailed = gethrestime_sec(); /* observability */ 4047c478bd9Sstevel@tonic-gate cbp->cb_notified_of_cb_path_down = FALSE; 4057c478bd9Sstevel@tonic-gate } 4067c478bd9Sstevel@tonic-gate 4077c478bd9Sstevel@tonic-gate cbp->cb_refcnt--; /* no longer using the information */ 4087c478bd9Sstevel@tonic-gate 4097c478bd9Sstevel@tonic-gate /* 4107c478bd9Sstevel@tonic-gate * A thread may be waiting on this one to finish and if so, 4117c478bd9Sstevel@tonic-gate * let it know that it is okay to do the CB_NULL to the 4127c478bd9Sstevel@tonic-gate * client's callback server. 4137c478bd9Sstevel@tonic-gate */ 4147c478bd9Sstevel@tonic-gate if (cbp->cb_refcnt == 0 && cbp->cb_nullcaller) 4157c478bd9Sstevel@tonic-gate cv_broadcast(cbp->cb_cv_nullcaller); 4167c478bd9Sstevel@tonic-gate 4177c478bd9Sstevel@tonic-gate /* 4187c478bd9Sstevel@tonic-gate * If this is the last thread to use the callback info and 4197c478bd9Sstevel@tonic-gate * there is new callback information to try and no thread is 4207c478bd9Sstevel@tonic-gate * there ready to do the CB_NULL, then return true to teh 4217c478bd9Sstevel@tonic-gate * caller so they can do the CB_NULL 4227c478bd9Sstevel@tonic-gate */ 4237c478bd9Sstevel@tonic-gate if (cbp->cb_refcnt == 0 && 424ed57cab9Srg cbp->cb_nullcaller == FALSE && 425ed57cab9Srg cbp->cb_newer.cb_new == TRUE && 426ed57cab9Srg cbp->cb_newer.cb_confirmed == TRUE) 4277c478bd9Sstevel@tonic-gate cb_new = TRUE; 4287c478bd9Sstevel@tonic-gate 4297c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 4307c478bd9Sstevel@tonic-gate 4317c478bd9Sstevel@tonic-gate return (cb_new); 4327c478bd9Sstevel@tonic-gate } 4337c478bd9Sstevel@tonic-gate 4347c478bd9Sstevel@tonic-gate /* 4357c478bd9Sstevel@tonic-gate * Given the information in the callback info struct, create a client 4367c478bd9Sstevel@tonic-gate * handle that can be used by the server for its callback path. 4377c478bd9Sstevel@tonic-gate */ 4387c478bd9Sstevel@tonic-gate static CLIENT * 4397c478bd9Sstevel@tonic-gate rfs4_cbch_init(rfs4_cbinfo_t *cbp) 4407c478bd9Sstevel@tonic-gate { 4417c478bd9Sstevel@tonic-gate struct knetconfig knc; 4427c478bd9Sstevel@tonic-gate vnode_t *vp; 4437c478bd9Sstevel@tonic-gate struct sockaddr_in addr4; 4447c478bd9Sstevel@tonic-gate struct sockaddr_in6 addr6; 4457c478bd9Sstevel@tonic-gate void *addr, *taddr; 4467c478bd9Sstevel@tonic-gate in_port_t *pp; 4477c478bd9Sstevel@tonic-gate int af; 4487c478bd9Sstevel@tonic-gate char *devnam; 4497c478bd9Sstevel@tonic-gate struct netbuf nb; 4507c478bd9Sstevel@tonic-gate int size; 4517c478bd9Sstevel@tonic-gate CLIENT *ch = NULL; 4527c478bd9Sstevel@tonic-gate int useresvport = 0; 4537c478bd9Sstevel@tonic-gate 4547c478bd9Sstevel@tonic-gate mutex_enter(cbp->cb_lock); 4557c478bd9Sstevel@tonic-gate 4567c478bd9Sstevel@tonic-gate if (cbp->cb_callback.cb_location.r_netid == NULL || 4577c478bd9Sstevel@tonic-gate cbp->cb_callback.cb_location.r_addr == NULL) { 4587c478bd9Sstevel@tonic-gate goto cb_init_out; 4597c478bd9Sstevel@tonic-gate } 4607c478bd9Sstevel@tonic-gate 4617c478bd9Sstevel@tonic-gate if (strcmp(cbp->cb_callback.cb_location.r_netid, "tcp") == 0) { 4627c478bd9Sstevel@tonic-gate knc.knc_semantics = NC_TPI_COTS; 4637c478bd9Sstevel@tonic-gate knc.knc_protofmly = "inet"; 4647c478bd9Sstevel@tonic-gate knc.knc_proto = "tcp"; 4657c478bd9Sstevel@tonic-gate devnam = "/dev/tcp"; 4667c478bd9Sstevel@tonic-gate af = AF_INET; 4677c478bd9Sstevel@tonic-gate } else if (strcmp(cbp->cb_callback.cb_location.r_netid, "udp") 468ed57cab9Srg == 0) { 4697c478bd9Sstevel@tonic-gate knc.knc_semantics = NC_TPI_CLTS; 4707c478bd9Sstevel@tonic-gate knc.knc_protofmly = "inet"; 4717c478bd9Sstevel@tonic-gate knc.knc_proto = "udp"; 4727c478bd9Sstevel@tonic-gate devnam = "/dev/udp"; 4737c478bd9Sstevel@tonic-gate af = AF_INET; 4747c478bd9Sstevel@tonic-gate } else if (strcmp(cbp->cb_callback.cb_location.r_netid, "tcp6") 475ed57cab9Srg == 0) { 4767c478bd9Sstevel@tonic-gate knc.knc_semantics = NC_TPI_COTS; 4777c478bd9Sstevel@tonic-gate knc.knc_protofmly = "inet6"; 4787c478bd9Sstevel@tonic-gate knc.knc_proto = "tcp"; 4797c478bd9Sstevel@tonic-gate devnam = "/dev/tcp6"; 4807c478bd9Sstevel@tonic-gate af = AF_INET6; 4817c478bd9Sstevel@tonic-gate } else if (strcmp(cbp->cb_callback.cb_location.r_netid, "udp6") 482ed57cab9Srg == 0) { 4837c478bd9Sstevel@tonic-gate knc.knc_semantics = NC_TPI_CLTS; 4847c478bd9Sstevel@tonic-gate knc.knc_protofmly = "inet6"; 4857c478bd9Sstevel@tonic-gate knc.knc_proto = "udp"; 4867c478bd9Sstevel@tonic-gate devnam = "/dev/udp6"; 4877c478bd9Sstevel@tonic-gate af = AF_INET6; 4887c478bd9Sstevel@tonic-gate } else { 4897c478bd9Sstevel@tonic-gate goto cb_init_out; 4907c478bd9Sstevel@tonic-gate } 4917c478bd9Sstevel@tonic-gate 492c52d60d4Srg if (lookupname(devnam, UIO_SYSSPACE, FOLLOW, NULLVPP, &vp) != 0) { 4937c478bd9Sstevel@tonic-gate 4947c478bd9Sstevel@tonic-gate goto cb_init_out; 4957c478bd9Sstevel@tonic-gate } 4967c478bd9Sstevel@tonic-gate 4977c478bd9Sstevel@tonic-gate if (vp->v_type != VCHR) { 4987c478bd9Sstevel@tonic-gate VN_RELE(vp); 4997c478bd9Sstevel@tonic-gate goto cb_init_out; 5007c478bd9Sstevel@tonic-gate } 5017c478bd9Sstevel@tonic-gate 5027c478bd9Sstevel@tonic-gate knc.knc_rdev = vp->v_rdev; 5037c478bd9Sstevel@tonic-gate 5047c478bd9Sstevel@tonic-gate VN_RELE(vp); 5057c478bd9Sstevel@tonic-gate 5067c478bd9Sstevel@tonic-gate if (af == AF_INET) { 5077c478bd9Sstevel@tonic-gate size = sizeof (addr4); 5087c478bd9Sstevel@tonic-gate bzero(&addr4, size); 5097c478bd9Sstevel@tonic-gate addr4.sin_family = (sa_family_t)af; 5107c478bd9Sstevel@tonic-gate addr = &addr4.sin_addr; 5117c478bd9Sstevel@tonic-gate pp = &addr4.sin_port; 5127c478bd9Sstevel@tonic-gate taddr = &addr4; 5137c478bd9Sstevel@tonic-gate } else /* AF_INET6 */ { 5147c478bd9Sstevel@tonic-gate size = sizeof (addr6); 5157c478bd9Sstevel@tonic-gate bzero(&addr6, size); 5167c478bd9Sstevel@tonic-gate addr6.sin6_family = (sa_family_t)af; 5177c478bd9Sstevel@tonic-gate addr = &addr6.sin6_addr; 5187c478bd9Sstevel@tonic-gate pp = &addr6.sin6_port; 5197c478bd9Sstevel@tonic-gate taddr = &addr6; 5207c478bd9Sstevel@tonic-gate } 5217c478bd9Sstevel@tonic-gate 5227c478bd9Sstevel@tonic-gate if (uaddr2sockaddr(af, 523ed57cab9Srg cbp->cb_callback.cb_location.r_addr, addr, pp)) { 5247c478bd9Sstevel@tonic-gate 5257c478bd9Sstevel@tonic-gate goto cb_init_out; 5267c478bd9Sstevel@tonic-gate } 5277c478bd9Sstevel@tonic-gate 5287c478bd9Sstevel@tonic-gate 5297c478bd9Sstevel@tonic-gate nb.maxlen = nb.len = size; 5307c478bd9Sstevel@tonic-gate nb.buf = (char *)taddr; 5317c478bd9Sstevel@tonic-gate 532c52d60d4Srg if (clnt_tli_kcreate(&knc, &nb, cbp->cb_callback.cb_program, 5337c478bd9Sstevel@tonic-gate NFS_CB, 0, 0, curthread->t_cred, &ch)) { 5347c478bd9Sstevel@tonic-gate 5357c478bd9Sstevel@tonic-gate ch = NULL; 5367c478bd9Sstevel@tonic-gate } 5377c478bd9Sstevel@tonic-gate 5387c478bd9Sstevel@tonic-gate /* turn off reserved port usage */ 5397c478bd9Sstevel@tonic-gate (void) CLNT_CONTROL(ch, CLSET_BINDRESVPORT, (char *)&useresvport); 5407c478bd9Sstevel@tonic-gate 5417c478bd9Sstevel@tonic-gate cb_init_out: 5427c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 5437c478bd9Sstevel@tonic-gate return (ch); 5447c478bd9Sstevel@tonic-gate } 5457c478bd9Sstevel@tonic-gate 5467c478bd9Sstevel@tonic-gate /* 5477c478bd9Sstevel@tonic-gate * Iterate over the client handle cache and 5487c478bd9Sstevel@tonic-gate * destroy it. 5497c478bd9Sstevel@tonic-gate */ 5507c478bd9Sstevel@tonic-gate static void 5517c478bd9Sstevel@tonic-gate rfs4_cb_chflush(rfs4_cbinfo_t *cbp) 5527c478bd9Sstevel@tonic-gate { 5537c478bd9Sstevel@tonic-gate CLIENT *ch; 5547c478bd9Sstevel@tonic-gate 5557c478bd9Sstevel@tonic-gate while (cbp->cb_chc_free) { 5567c478bd9Sstevel@tonic-gate cbp->cb_chc_free--; 5577c478bd9Sstevel@tonic-gate ch = cbp->cb_chc[cbp->cb_chc_free]; 5587c478bd9Sstevel@tonic-gate cbp->cb_chc[cbp->cb_chc_free] = NULL; 5597c478bd9Sstevel@tonic-gate if (ch) { 5607c478bd9Sstevel@tonic-gate if (ch->cl_auth) 5617c478bd9Sstevel@tonic-gate auth_destroy(ch->cl_auth); 5627c478bd9Sstevel@tonic-gate clnt_destroy(ch); 5637c478bd9Sstevel@tonic-gate } 5647c478bd9Sstevel@tonic-gate } 5657c478bd9Sstevel@tonic-gate } 5667c478bd9Sstevel@tonic-gate 5677c478bd9Sstevel@tonic-gate /* 5687c478bd9Sstevel@tonic-gate * Return a client handle, either from a the small 5697c478bd9Sstevel@tonic-gate * rfs4_client_t cache or one that we just created. 5707c478bd9Sstevel@tonic-gate */ 5717c478bd9Sstevel@tonic-gate static CLIENT * 5727c478bd9Sstevel@tonic-gate rfs4_cb_getch(rfs4_cbinfo_t *cbp) 5737c478bd9Sstevel@tonic-gate { 5747c478bd9Sstevel@tonic-gate CLIENT *cbch = NULL; 5757c478bd9Sstevel@tonic-gate uint32_t zilch = 0; 5767c478bd9Sstevel@tonic-gate 5777c478bd9Sstevel@tonic-gate mutex_enter(cbp->cb_lock); 5787c478bd9Sstevel@tonic-gate 5797c478bd9Sstevel@tonic-gate if (cbp->cb_chc_free) { 5807c478bd9Sstevel@tonic-gate cbp->cb_chc_free--; 5817c478bd9Sstevel@tonic-gate cbch = cbp->cb_chc[ cbp->cb_chc_free ]; 5827c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 5837c478bd9Sstevel@tonic-gate (void) CLNT_CONTROL(cbch, CLSET_XID, (char *)&zilch); 5847c478bd9Sstevel@tonic-gate return (cbch); 5857c478bd9Sstevel@tonic-gate } 5867c478bd9Sstevel@tonic-gate 5877c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 5887c478bd9Sstevel@tonic-gate 5897c478bd9Sstevel@tonic-gate /* none free so make it now */ 5907c478bd9Sstevel@tonic-gate cbch = rfs4_cbch_init(cbp); 5917c478bd9Sstevel@tonic-gate 5927c478bd9Sstevel@tonic-gate return (cbch); 5937c478bd9Sstevel@tonic-gate } 5947c478bd9Sstevel@tonic-gate 5957c478bd9Sstevel@tonic-gate /* 5967c478bd9Sstevel@tonic-gate * Return the client handle to the small cache or 5977c478bd9Sstevel@tonic-gate * destroy it. 5987c478bd9Sstevel@tonic-gate */ 5997c478bd9Sstevel@tonic-gate static void 6007c478bd9Sstevel@tonic-gate rfs4_cb_freech(rfs4_cbinfo_t *cbp, CLIENT *ch, bool_t lockheld) 6017c478bd9Sstevel@tonic-gate { 6027c478bd9Sstevel@tonic-gate if (lockheld == FALSE) 6037c478bd9Sstevel@tonic-gate mutex_enter(cbp->cb_lock); 6047c478bd9Sstevel@tonic-gate 6057c478bd9Sstevel@tonic-gate if (cbp->cb_chc_free < RFS4_CBCH_MAX) { 6067c478bd9Sstevel@tonic-gate cbp->cb_chc[ cbp->cb_chc_free++ ] = ch; 6077c478bd9Sstevel@tonic-gate if (lockheld == FALSE) 6087c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 6097c478bd9Sstevel@tonic-gate return; 6107c478bd9Sstevel@tonic-gate } 6117c478bd9Sstevel@tonic-gate if (lockheld == FALSE) 6127c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 6137c478bd9Sstevel@tonic-gate 6147c478bd9Sstevel@tonic-gate /* 6157c478bd9Sstevel@tonic-gate * cache maxed out of free entries, obliterate 6167c478bd9Sstevel@tonic-gate * this client handle, destroy it, throw it away. 6177c478bd9Sstevel@tonic-gate */ 6187c478bd9Sstevel@tonic-gate if (ch->cl_auth) 6197c478bd9Sstevel@tonic-gate auth_destroy(ch->cl_auth); 6207c478bd9Sstevel@tonic-gate clnt_destroy(ch); 6217c478bd9Sstevel@tonic-gate } 6227c478bd9Sstevel@tonic-gate 6237c478bd9Sstevel@tonic-gate /* 6247c478bd9Sstevel@tonic-gate * With the supplied callback information - initialize the client 6257c478bd9Sstevel@tonic-gate * callback data. If there is a callback in progress, save the 6267c478bd9Sstevel@tonic-gate * callback info so that a thread can pick it up in the future. 6277c478bd9Sstevel@tonic-gate */ 6287c478bd9Sstevel@tonic-gate void 6297c478bd9Sstevel@tonic-gate rfs4_client_setcb(rfs4_client_t *cp, cb_client4 *cb, uint32_t cb_ident) 6307c478bd9Sstevel@tonic-gate { 6317c478bd9Sstevel@tonic-gate char *addr = NULL; 6327c478bd9Sstevel@tonic-gate char *netid = NULL; 633d216dff5SRobert Mastors rfs4_cbinfo_t *cbp = &cp->rc_cbinfo; 6347c478bd9Sstevel@tonic-gate size_t len; 6357c478bd9Sstevel@tonic-gate 6367c478bd9Sstevel@tonic-gate /* Set the call back for the client */ 637a31a5cfdSsamf if (cb->cb_location.r_addr && cb->cb_location.r_addr[0] != '\0' && 638a31a5cfdSsamf cb->cb_location.r_netid && cb->cb_location.r_netid[0] != '\0') { 6397c478bd9Sstevel@tonic-gate len = strlen(cb->cb_location.r_addr) + 1; 6407c478bd9Sstevel@tonic-gate addr = kmem_alloc(len, KM_SLEEP); 6417c478bd9Sstevel@tonic-gate bcopy(cb->cb_location.r_addr, addr, len); 6427c478bd9Sstevel@tonic-gate len = strlen(cb->cb_location.r_netid) + 1; 6437c478bd9Sstevel@tonic-gate netid = kmem_alloc(len, KM_SLEEP); 6447c478bd9Sstevel@tonic-gate bcopy(cb->cb_location.r_netid, netid, len); 6457c478bd9Sstevel@tonic-gate } 6467c478bd9Sstevel@tonic-gate /* ready to save the new information but first free old, if exists */ 6477c478bd9Sstevel@tonic-gate mutex_enter(cbp->cb_lock); 6487c478bd9Sstevel@tonic-gate 6497c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_callback.cb_program = cb->cb_program; 650a31a5cfdSsamf 651a31a5cfdSsamf if (cbp->cb_newer.cb_callback.cb_location.r_addr != NULL) 652a31a5cfdSsamf kmem_free(cbp->cb_newer.cb_callback.cb_location.r_addr, 653a31a5cfdSsamf strlen(cbp->cb_newer.cb_callback.cb_location.r_addr) + 1); 6547c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_callback.cb_location.r_addr = addr; 655a31a5cfdSsamf 656a31a5cfdSsamf if (cbp->cb_newer.cb_callback.cb_location.r_netid != NULL) 657a31a5cfdSsamf kmem_free(cbp->cb_newer.cb_callback.cb_location.r_netid, 658a31a5cfdSsamf strlen(cbp->cb_newer.cb_callback.cb_location.r_netid) + 1); 6597c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_callback.cb_location.r_netid = netid; 6607c478bd9Sstevel@tonic-gate 6617c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_ident = cb_ident; 6627c478bd9Sstevel@tonic-gate 6637c478bd9Sstevel@tonic-gate if (addr && *addr && netid && *netid) { 6647c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_new = TRUE; 6657c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_confirmed = FALSE; 6667c478bd9Sstevel@tonic-gate } else { 6677c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_new = FALSE; 6687c478bd9Sstevel@tonic-gate cbp->cb_newer.cb_confirmed = FALSE; 6697c478bd9Sstevel@tonic-gate } 6707c478bd9Sstevel@tonic-gate 6717c478bd9Sstevel@tonic-gate mutex_exit(cbp->cb_lock); 6727c478bd9Sstevel@tonic-gate } 6737c478bd9Sstevel@tonic-gate 6747c478bd9Sstevel@tonic-gate /* 6757c478bd9Sstevel@tonic-gate * The server uses this when processing SETCLIENTID_CONFIRM. Callback 6767c478bd9Sstevel@tonic-gate * information may have been provided on SETCLIENTID and this call 6777c478bd9Sstevel@tonic-gate * marks that information as confirmed and then starts a thread to 6787c478bd9Sstevel@tonic-gate * test the callback path. 6797c478bd9Sstevel@tonic-gate */ 6807c478bd9Sstevel@tonic-gate void 6817c478bd9Sstevel@tonic-gate rfs4_deleg_cb_check(rfs4_client_t *cp) 6827c478bd9Sstevel@tonic-gate { 683d216dff5SRobert Mastors if (cp->rc_cbinfo.cb_newer.cb_new == FALSE) 6847c478bd9Sstevel@tonic-gate return; 6857c478bd9Sstevel@tonic-gate 686d216dff5SRobert Mastors cp->rc_cbinfo.cb_newer.cb_confirmed = TRUE; 6877c478bd9Sstevel@tonic-gate 688d216dff5SRobert Mastors rfs4_dbe_hold(cp->rc_dbe); /* hold the client struct for thread */ 6897c478bd9Sstevel@tonic-gate 6907c478bd9Sstevel@tonic-gate (void) thread_create(NULL, 0, rfs4_do_cb_null, cp, 0, &p0, TS_RUN, 691ed57cab9Srg minclsyspri); 6927c478bd9Sstevel@tonic-gate } 6937c478bd9Sstevel@tonic-gate 6947c478bd9Sstevel@tonic-gate static void 6957c478bd9Sstevel@tonic-gate rfs4args_cb_recall_free(nfs_cb_argop4 *argop) 6967c478bd9Sstevel@tonic-gate { 6977c478bd9Sstevel@tonic-gate CB_RECALL4args *rec_argp; 6987c478bd9Sstevel@tonic-gate 6997c478bd9Sstevel@tonic-gate rec_argp = &argop->nfs_cb_argop4_u.opcbrecall; 7007c478bd9Sstevel@tonic-gate if (rec_argp->fh.nfs_fh4_val) 7017c478bd9Sstevel@tonic-gate kmem_free(rec_argp->fh.nfs_fh4_val, rec_argp->fh.nfs_fh4_len); 7027c478bd9Sstevel@tonic-gate } 7037c478bd9Sstevel@tonic-gate 7047c478bd9Sstevel@tonic-gate /* ARGSUSED */ 7057c478bd9Sstevel@tonic-gate static void 7067c478bd9Sstevel@tonic-gate rfs4args_cb_getattr_free(nfs_cb_argop4 *argop) 7077c478bd9Sstevel@tonic-gate { 7087c478bd9Sstevel@tonic-gate CB_GETATTR4args *argp; 7097c478bd9Sstevel@tonic-gate 7107c478bd9Sstevel@tonic-gate argp = &argop->nfs_cb_argop4_u.opcbgetattr; 7117c478bd9Sstevel@tonic-gate if (argp->fh.nfs_fh4_val) 7127c478bd9Sstevel@tonic-gate kmem_free(argp->fh.nfs_fh4_val, argp->fh.nfs_fh4_len); 7137c478bd9Sstevel@tonic-gate } 7147c478bd9Sstevel@tonic-gate 7157c478bd9Sstevel@tonic-gate static void 7167c478bd9Sstevel@tonic-gate rfs4freeargres(CB_COMPOUND4args *args, CB_COMPOUND4res *resp) 7177c478bd9Sstevel@tonic-gate { 7187c478bd9Sstevel@tonic-gate int i, arglen; 7197c478bd9Sstevel@tonic-gate nfs_cb_argop4 *argop; 7207c478bd9Sstevel@tonic-gate 7217c478bd9Sstevel@tonic-gate /* 7227c478bd9Sstevel@tonic-gate * First free any special args alloc'd for specific ops. 7237c478bd9Sstevel@tonic-gate */ 7247c478bd9Sstevel@tonic-gate arglen = args->array_len; 7257c478bd9Sstevel@tonic-gate argop = args->array; 7267c478bd9Sstevel@tonic-gate for (i = 0; i < arglen; i++, argop++) { 7277c478bd9Sstevel@tonic-gate 7287c478bd9Sstevel@tonic-gate switch (argop->argop) { 7297c478bd9Sstevel@tonic-gate case OP_CB_RECALL: 7307c478bd9Sstevel@tonic-gate rfs4args_cb_recall_free(argop); 7317c478bd9Sstevel@tonic-gate break; 7327c478bd9Sstevel@tonic-gate 7337c478bd9Sstevel@tonic-gate case OP_CB_GETATTR: 7347c478bd9Sstevel@tonic-gate rfs4args_cb_getattr_free(argop); 7357c478bd9Sstevel@tonic-gate break; 7367c478bd9Sstevel@tonic-gate 7377c478bd9Sstevel@tonic-gate default: 7387c478bd9Sstevel@tonic-gate return; 7397c478bd9Sstevel@tonic-gate } 7407c478bd9Sstevel@tonic-gate } 7417c478bd9Sstevel@tonic-gate 7427c478bd9Sstevel@tonic-gate if (args->tag.utf8string_len > 0) 7437c478bd9Sstevel@tonic-gate UTF8STRING_FREE(args->tag) 7447c478bd9Sstevel@tonic-gate 7457c478bd9Sstevel@tonic-gate kmem_free(args->array, arglen * sizeof (nfs_cb_argop4)); 7467c478bd9Sstevel@tonic-gate if (resp) 7477c478bd9Sstevel@tonic-gate (void) xdr_free(xdr_CB_COMPOUND4res, (caddr_t)resp); 7487c478bd9Sstevel@tonic-gate } 7497c478bd9Sstevel@tonic-gate 7507c478bd9Sstevel@tonic-gate /* 7517c478bd9Sstevel@tonic-gate * General callback routine for the server to the client. 7527c478bd9Sstevel@tonic-gate */ 7537c478bd9Sstevel@tonic-gate static enum clnt_stat 754d216dff5SRobert Mastors rfs4_do_callback(rfs4_client_t *cp, CB_COMPOUND4args *args, 755d216dff5SRobert Mastors CB_COMPOUND4res *res, struct timeval timeout) 7567c478bd9Sstevel@tonic-gate { 7577c478bd9Sstevel@tonic-gate rfs4_cbinfo_t *cbp; 7587c478bd9Sstevel@tonic-gate CLIENT *ch; 7597c478bd9Sstevel@tonic-gate /* start with this in case cb_getch() fails */ 7607c478bd9Sstevel@tonic-gate enum clnt_stat stat = RPC_FAILED; 7617c478bd9Sstevel@tonic-gate 7627c478bd9Sstevel@tonic-gate res->tag.utf8string_val = NULL; 7637c478bd9Sstevel@tonic-gate res->array = NULL; 7647c478bd9Sstevel@tonic-gate 7657c478bd9Sstevel@tonic-gate retry: 7667c478bd9Sstevel@tonic-gate cbp = rfs4_cbinfo_hold(cp); 7677c478bd9Sstevel@tonic-gate if (cbp == NULL) 7687c478bd9Sstevel@tonic-gate return (stat); 7697c478bd9Sstevel@tonic-gate 7707c478bd9Sstevel@tonic-gate /* get a client handle */ 7717c478bd9Sstevel@tonic-gate if ((ch = rfs4_cb_getch(cbp)) != NULL) { 7727c478bd9Sstevel@tonic-gate /* 7737c478bd9Sstevel@tonic-gate * reset the cb_ident since it may have changed in 7747c478bd9Sstevel@tonic-gate * rfs4_cbinfo_hold() 7757c478bd9Sstevel@tonic-gate */ 7767c478bd9Sstevel@tonic-gate args->callback_ident = cbp->cb_ident; 7777c478bd9Sstevel@tonic-gate 778eac3aab7Srobinson stat = clnt_call(ch, CB_COMPOUND, xdr_CB_COMPOUND4args_srv, 779ed57cab9Srg (caddr_t)args, xdr_CB_COMPOUND4res, 780ed57cab9Srg (caddr_t)res, timeout); 7817c478bd9Sstevel@tonic-gate 7827c478bd9Sstevel@tonic-gate /* free client handle */ 7837c478bd9Sstevel@tonic-gate rfs4_cb_freech(cbp, ch, FALSE); 7847c478bd9Sstevel@tonic-gate } 7857c478bd9Sstevel@tonic-gate 7867c478bd9Sstevel@tonic-gate /* 7877c478bd9Sstevel@tonic-gate * If the rele says that there may be new callback info then 7887c478bd9Sstevel@tonic-gate * retry this sequence and it may succeed as a result of the 7897c478bd9Sstevel@tonic-gate * new callback path 7907c478bd9Sstevel@tonic-gate */ 7917c478bd9Sstevel@tonic-gate if (rfs4_cbinfo_rele(cbp, 792ed57cab9Srg (stat == RPC_SUCCESS ? CB_NOCHANGE : CB_FAILED)) == TRUE) 7937c478bd9Sstevel@tonic-gate goto retry; 7947c478bd9Sstevel@tonic-gate 7957c478bd9Sstevel@tonic-gate return (stat); 7967c478bd9Sstevel@tonic-gate } 7977c478bd9Sstevel@tonic-gate 7987c478bd9Sstevel@tonic-gate /* 7997c478bd9Sstevel@tonic-gate * Used by the NFSv4 server to get attributes for a file while 8007c478bd9Sstevel@tonic-gate * handling the case where a file has been write delegated. For the 8017c478bd9Sstevel@tonic-gate * time being, VOP_GETATTR() is called and CB_GETATTR processing is 8027c478bd9Sstevel@tonic-gate * not undertaken. This call site is maintained in case the server is 8037c478bd9Sstevel@tonic-gate * updated in the future to handle write delegation space guarantees. 8047c478bd9Sstevel@tonic-gate */ 8057c478bd9Sstevel@tonic-gate nfsstat4 8067c478bd9Sstevel@tonic-gate rfs4_vop_getattr(vnode_t *vp, vattr_t *vap, int flag, cred_t *cr) 8077c478bd9Sstevel@tonic-gate { 80800ba712dSGarima Tripathi 8097c478bd9Sstevel@tonic-gate int error; 8107c478bd9Sstevel@tonic-gate 811da6c28aaSamw error = VOP_GETATTR(vp, vap, flag, cr, NULL); 8127c478bd9Sstevel@tonic-gate return (puterrno4(error)); 8137c478bd9Sstevel@tonic-gate } 8147c478bd9Sstevel@tonic-gate 8157c478bd9Sstevel@tonic-gate /* 8167c478bd9Sstevel@tonic-gate * This is used everywhere in the v2/v3 server to allow the 8177c478bd9Sstevel@tonic-gate * integration of all NFS versions and the support of delegation. For 8187c478bd9Sstevel@tonic-gate * now, just call the VOP_GETATTR(). If the NFSv4 server is enhanced 8197c478bd9Sstevel@tonic-gate * in the future to provide space guarantees for write delegations 8207c478bd9Sstevel@tonic-gate * then this call site should be expanded to interact with the client. 8217c478bd9Sstevel@tonic-gate */ 8227c478bd9Sstevel@tonic-gate int 8237c478bd9Sstevel@tonic-gate rfs4_delegated_getattr(vnode_t *vp, vattr_t *vap, int flag, cred_t *cr) 8247c478bd9Sstevel@tonic-gate { 825da6c28aaSamw return (VOP_GETATTR(vp, vap, flag, cr, NULL)); 8267c478bd9Sstevel@tonic-gate } 8277c478bd9Sstevel@tonic-gate 8287c478bd9Sstevel@tonic-gate /* 8297c478bd9Sstevel@tonic-gate * Place the actual cb_recall otw call to client. 8307c478bd9Sstevel@tonic-gate */ 8317c478bd9Sstevel@tonic-gate static void 8327c478bd9Sstevel@tonic-gate rfs4_do_cb_recall(rfs4_deleg_state_t *dsp, bool_t trunc) 8337c478bd9Sstevel@tonic-gate { 8347c478bd9Sstevel@tonic-gate CB_COMPOUND4args cb4_args; 8357c478bd9Sstevel@tonic-gate CB_COMPOUND4res cb4_res; 8367c478bd9Sstevel@tonic-gate CB_RECALL4args *rec_argp; 837f3b585ceSsamf CB_RECALL4res *rec_resp; 8387c478bd9Sstevel@tonic-gate nfs_cb_argop4 *argop; 8397c478bd9Sstevel@tonic-gate int numops; 8407c478bd9Sstevel@tonic-gate int argoplist_size; 8417c478bd9Sstevel@tonic-gate struct timeval timeout; 8427c478bd9Sstevel@tonic-gate nfs_fh4 *fhp; 8437c478bd9Sstevel@tonic-gate enum clnt_stat call_stat; 8447c478bd9Sstevel@tonic-gate 8457c478bd9Sstevel@tonic-gate /* 8467c478bd9Sstevel@tonic-gate * set up the compound args 8477c478bd9Sstevel@tonic-gate */ 8487c478bd9Sstevel@tonic-gate numops = 1; /* CB_RECALL only */ 8497c478bd9Sstevel@tonic-gate 8507c478bd9Sstevel@tonic-gate argoplist_size = numops * sizeof (nfs_cb_argop4); 8517c478bd9Sstevel@tonic-gate argop = kmem_zalloc(argoplist_size, KM_SLEEP); 8527c478bd9Sstevel@tonic-gate argop->argop = OP_CB_RECALL; 8537c478bd9Sstevel@tonic-gate rec_argp = &argop->nfs_cb_argop4_u.opcbrecall; 8547c478bd9Sstevel@tonic-gate 8557c478bd9Sstevel@tonic-gate (void) str_to_utf8("cb_recall", &cb4_args.tag); 8567c478bd9Sstevel@tonic-gate cb4_args.minorversion = CB4_MINORVERSION; 8577c478bd9Sstevel@tonic-gate /* cb4_args.callback_ident is set in rfs4_do_callback() */ 8587c478bd9Sstevel@tonic-gate cb4_args.array_len = numops; 8597c478bd9Sstevel@tonic-gate cb4_args.array = argop; 8607c478bd9Sstevel@tonic-gate 8617c478bd9Sstevel@tonic-gate /* 8627c478bd9Sstevel@tonic-gate * fill in the args struct 8637c478bd9Sstevel@tonic-gate */ 864d216dff5SRobert Mastors bcopy(&dsp->rds_delegid.stateid, &rec_argp->stateid, sizeof (stateid4)); 8657c478bd9Sstevel@tonic-gate rec_argp->truncate = trunc; 8667c478bd9Sstevel@tonic-gate 867d216dff5SRobert Mastors fhp = &dsp->rds_finfo->rf_filehandle; 8687c478bd9Sstevel@tonic-gate rec_argp->fh.nfs_fh4_val = kmem_alloc(sizeof (char) * 869ed57cab9Srg fhp->nfs_fh4_len, KM_SLEEP); 8707c478bd9Sstevel@tonic-gate nfs_fh4_copy(fhp, &rec_argp->fh); 8717c478bd9Sstevel@tonic-gate 8727c478bd9Sstevel@tonic-gate /* Keep track of when we did this for observability */ 873d216dff5SRobert Mastors dsp->rds_time_recalled = gethrestime_sec(); 8747c478bd9Sstevel@tonic-gate 8757c478bd9Sstevel@tonic-gate /* 8767c478bd9Sstevel@tonic-gate * Set up the timeout for the callback and make the actual call. 8777c478bd9Sstevel@tonic-gate * Timeout will be 80% of the lease period for this server. 8787c478bd9Sstevel@tonic-gate */ 8797c478bd9Sstevel@tonic-gate timeout.tv_sec = (rfs4_lease_time * 80) / 100; 8807c478bd9Sstevel@tonic-gate timeout.tv_usec = 0; 8817c478bd9Sstevel@tonic-gate 882d216dff5SRobert Mastors DTRACE_NFSV4_3(cb__recall__start, rfs4_client_t *, dsp->rds_client, 883f3b585ceSsamf rfs4_deleg_state_t *, dsp, CB_RECALL4args *, rec_argp); 884f3b585ceSsamf 885d216dff5SRobert Mastors call_stat = rfs4_do_callback(dsp->rds_client, &cb4_args, &cb4_res, 886d216dff5SRobert Mastors timeout); 8877c478bd9Sstevel@tonic-gate 888f3b585ceSsamf rec_resp = (cb4_res.array_len == 0) ? NULL : 889f3b585ceSsamf &cb4_res.array[0].nfs_cb_resop4_u.opcbrecall; 890f3b585ceSsamf 891d216dff5SRobert Mastors DTRACE_NFSV4_3(cb__recall__done, rfs4_client_t *, dsp->rds_client, 892f3b585ceSsamf rfs4_deleg_state_t *, dsp, CB_RECALL4res *, rec_resp); 893f3b585ceSsamf 8947c478bd9Sstevel@tonic-gate if (call_stat != RPC_SUCCESS || cb4_res.status != NFS4_OK) { 895d216dff5SRobert Mastors rfs4_return_deleg(dsp, TRUE); 8967c478bd9Sstevel@tonic-gate } 8977c478bd9Sstevel@tonic-gate 8987c478bd9Sstevel@tonic-gate rfs4freeargres(&cb4_args, &cb4_res); 8997c478bd9Sstevel@tonic-gate } 9007c478bd9Sstevel@tonic-gate 9017c478bd9Sstevel@tonic-gate struct recall_arg { 9027c478bd9Sstevel@tonic-gate rfs4_deleg_state_t *dsp; 9037c478bd9Sstevel@tonic-gate void (*recall)(rfs4_deleg_state_t *, bool_t trunc); 9047c478bd9Sstevel@tonic-gate bool_t trunc; 9057c478bd9Sstevel@tonic-gate }; 9067c478bd9Sstevel@tonic-gate 9077c478bd9Sstevel@tonic-gate static void 9087c478bd9Sstevel@tonic-gate do_recall(struct recall_arg *arg) 9097c478bd9Sstevel@tonic-gate { 9107c478bd9Sstevel@tonic-gate rfs4_deleg_state_t *dsp = arg->dsp; 911d216dff5SRobert Mastors rfs4_file_t *fp = dsp->rds_finfo; 9127c478bd9Sstevel@tonic-gate callb_cpr_t cpr_info; 9137c478bd9Sstevel@tonic-gate kmutex_t cpr_lock; 9147c478bd9Sstevel@tonic-gate 9157c478bd9Sstevel@tonic-gate mutex_init(&cpr_lock, NULL, MUTEX_DEFAULT, NULL); 9167c478bd9Sstevel@tonic-gate CALLB_CPR_INIT(&cpr_info, &cpr_lock, callb_generic_cpr, "nfsv4Recall"); 9177c478bd9Sstevel@tonic-gate 9187c478bd9Sstevel@tonic-gate /* 9197c478bd9Sstevel@tonic-gate * It is possible that before this thread starts 9207c478bd9Sstevel@tonic-gate * the client has send us a return_delegation, and 9217c478bd9Sstevel@tonic-gate * if that is the case we do not need to send the 9227c478bd9Sstevel@tonic-gate * recall callback. 9237c478bd9Sstevel@tonic-gate */ 924d216dff5SRobert Mastors if (dsp->rds_dtype != OPEN_DELEGATE_NONE) { 925ed57cab9Srg DTRACE_PROBE3(nfss__i__recall, 926ed57cab9Srg struct recall_arg *, arg, 927ed57cab9Srg struct rfs4_deleg_state_t *, dsp, 928ed57cab9Srg struct rfs4_file_t *, fp); 9297c478bd9Sstevel@tonic-gate 9307c478bd9Sstevel@tonic-gate if (arg->recall) 9317c478bd9Sstevel@tonic-gate (void) (*arg->recall)(dsp, arg->trunc); 9327c478bd9Sstevel@tonic-gate } 9337c478bd9Sstevel@tonic-gate 934d216dff5SRobert Mastors mutex_enter(fp->rf_dinfo.rd_recall_lock); 9357c478bd9Sstevel@tonic-gate /* 9367c478bd9Sstevel@tonic-gate * Recall count may go negative if the parent thread that is 9377c478bd9Sstevel@tonic-gate * creating the individual callback threads does not modify 9387c478bd9Sstevel@tonic-gate * the recall_count field before the callback thread actually 9397c478bd9Sstevel@tonic-gate * gets a response from the CB_RECALL 9407c478bd9Sstevel@tonic-gate */ 941d216dff5SRobert Mastors fp->rf_dinfo.rd_recall_count--; 942d216dff5SRobert Mastors if (fp->rf_dinfo.rd_recall_count == 0) 943d216dff5SRobert Mastors cv_signal(fp->rf_dinfo.rd_recall_cv); 944d216dff5SRobert Mastors mutex_exit(fp->rf_dinfo.rd_recall_lock); 9457c478bd9Sstevel@tonic-gate 9467c478bd9Sstevel@tonic-gate mutex_enter(&cpr_lock); 9477c478bd9Sstevel@tonic-gate CALLB_CPR_EXIT(&cpr_info); 9487c478bd9Sstevel@tonic-gate mutex_destroy(&cpr_lock); 9497c478bd9Sstevel@tonic-gate 9507c478bd9Sstevel@tonic-gate rfs4_deleg_state_rele(dsp); /* release the hold for this thread */ 9517c478bd9Sstevel@tonic-gate 9527c478bd9Sstevel@tonic-gate kmem_free(arg, sizeof (struct recall_arg)); 9537c478bd9Sstevel@tonic-gate } 9547c478bd9Sstevel@tonic-gate 9557c478bd9Sstevel@tonic-gate struct master_recall_args { 9567c478bd9Sstevel@tonic-gate rfs4_file_t *fp; 9577c478bd9Sstevel@tonic-gate void (*recall)(rfs4_deleg_state_t *, bool_t); 9587c478bd9Sstevel@tonic-gate bool_t trunc; 9597c478bd9Sstevel@tonic-gate }; 9607c478bd9Sstevel@tonic-gate 9617c478bd9Sstevel@tonic-gate static void 9627c478bd9Sstevel@tonic-gate do_recall_file(struct master_recall_args *map) 9637c478bd9Sstevel@tonic-gate { 9647c478bd9Sstevel@tonic-gate rfs4_file_t *fp = map->fp; 9657c478bd9Sstevel@tonic-gate rfs4_deleg_state_t *dsp; 9667c478bd9Sstevel@tonic-gate struct recall_arg *arg; 9677c478bd9Sstevel@tonic-gate callb_cpr_t cpr_info; 9687c478bd9Sstevel@tonic-gate kmutex_t cpr_lock; 9697c478bd9Sstevel@tonic-gate int32_t recall_count; 9707c478bd9Sstevel@tonic-gate 971d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 972ed57cab9Srg 973ed57cab9Srg /* Recall already in progress ? */ 974d216dff5SRobert Mastors mutex_enter(fp->rf_dinfo.rd_recall_lock); 975d216dff5SRobert Mastors if (fp->rf_dinfo.rd_recall_count != 0) { 976d216dff5SRobert Mastors mutex_exit(fp->rf_dinfo.rd_recall_lock); 977d216dff5SRobert Mastors rfs4_dbe_rele_nolock(fp->rf_dbe); 978d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 9797c478bd9Sstevel@tonic-gate kmem_free(map, sizeof (struct master_recall_args)); 9807c478bd9Sstevel@tonic-gate return; 9817c478bd9Sstevel@tonic-gate } 9827c478bd9Sstevel@tonic-gate 983d216dff5SRobert Mastors mutex_exit(fp->rf_dinfo.rd_recall_lock); 984ed57cab9Srg 9857c478bd9Sstevel@tonic-gate mutex_init(&cpr_lock, NULL, MUTEX_DEFAULT, NULL); 986ed57cab9Srg CALLB_CPR_INIT(&cpr_info, &cpr_lock, callb_generic_cpr, "v4RecallFile"); 9877c478bd9Sstevel@tonic-gate 9887c478bd9Sstevel@tonic-gate recall_count = 0; 989d216dff5SRobert Mastors for (dsp = list_head(&fp->rf_delegstatelist); dsp != NULL; 990d216dff5SRobert Mastors dsp = list_next(&fp->rf_delegstatelist, dsp)) { 991ed57cab9Srg 992d216dff5SRobert Mastors rfs4_dbe_lock(dsp->rds_dbe); 993ed57cab9Srg /* 994ed57cab9Srg * if this delegation state 995ed57cab9Srg * is being reaped skip it 996ed57cab9Srg */ 997d216dff5SRobert Mastors if (rfs4_dbe_is_invalid(dsp->rds_dbe)) { 998d216dff5SRobert Mastors rfs4_dbe_unlock(dsp->rds_dbe); 999ed57cab9Srg continue; 1000ed57cab9Srg } 1001ed57cab9Srg 1002ed57cab9Srg /* hold for receiving thread */ 1003d216dff5SRobert Mastors rfs4_dbe_hold(dsp->rds_dbe); 1004d216dff5SRobert Mastors rfs4_dbe_unlock(dsp->rds_dbe); 1005ed57cab9Srg 10067c478bd9Sstevel@tonic-gate arg = kmem_alloc(sizeof (struct recall_arg), KM_SLEEP); 10077c478bd9Sstevel@tonic-gate arg->recall = map->recall; 10087c478bd9Sstevel@tonic-gate arg->trunc = map->trunc; 10097c478bd9Sstevel@tonic-gate arg->dsp = dsp; 10107c478bd9Sstevel@tonic-gate 10117c478bd9Sstevel@tonic-gate recall_count++; 10127c478bd9Sstevel@tonic-gate 10137c478bd9Sstevel@tonic-gate (void) thread_create(NULL, 0, do_recall, arg, 0, &p0, TS_RUN, 1014ed57cab9Srg minclsyspri); 10157c478bd9Sstevel@tonic-gate } 1016ed57cab9Srg 1017d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 10187c478bd9Sstevel@tonic-gate 1019d216dff5SRobert Mastors mutex_enter(fp->rf_dinfo.rd_recall_lock); 10207c478bd9Sstevel@tonic-gate /* 10217c478bd9Sstevel@tonic-gate * Recall count may go negative if the parent thread that is 10227c478bd9Sstevel@tonic-gate * creating the individual callback threads does not modify 10237c478bd9Sstevel@tonic-gate * the recall_count field before the callback thread actually 10247c478bd9Sstevel@tonic-gate * gets a response from the CB_RECALL 10257c478bd9Sstevel@tonic-gate */ 1026d216dff5SRobert Mastors fp->rf_dinfo.rd_recall_count += recall_count; 1027d216dff5SRobert Mastors while (fp->rf_dinfo.rd_recall_count) 1028d216dff5SRobert Mastors cv_wait(fp->rf_dinfo.rd_recall_cv, fp->rf_dinfo.rd_recall_lock); 10297c478bd9Sstevel@tonic-gate 1030d216dff5SRobert Mastors mutex_exit(fp->rf_dinfo.rd_recall_lock); 10317c478bd9Sstevel@tonic-gate 1032ed57cab9Srg DTRACE_PROBE1(nfss__i__recall_done, rfs4_file_t *, fp); 10337c478bd9Sstevel@tonic-gate rfs4_file_rele(fp); 10347c478bd9Sstevel@tonic-gate kmem_free(map, sizeof (struct master_recall_args)); 10357c478bd9Sstevel@tonic-gate mutex_enter(&cpr_lock); 10367c478bd9Sstevel@tonic-gate CALLB_CPR_EXIT(&cpr_info); 10377c478bd9Sstevel@tonic-gate mutex_destroy(&cpr_lock); 10387c478bd9Sstevel@tonic-gate } 10397c478bd9Sstevel@tonic-gate 10407c478bd9Sstevel@tonic-gate static void 10417c478bd9Sstevel@tonic-gate rfs4_recall_file(rfs4_file_t *fp, 1042d216dff5SRobert Mastors void (*recall)(rfs4_deleg_state_t *, bool_t trunc), 1043d216dff5SRobert Mastors bool_t trunc, rfs4_client_t *cp) 10447c478bd9Sstevel@tonic-gate { 10457c478bd9Sstevel@tonic-gate struct master_recall_args *args; 10467c478bd9Sstevel@tonic-gate 1047d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 1048d216dff5SRobert Mastors if (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_NONE) { 1049d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 10507c478bd9Sstevel@tonic-gate return; 10517c478bd9Sstevel@tonic-gate } 1052d216dff5SRobert Mastors rfs4_dbe_hold(fp->rf_dbe); /* hold for new thread */ 10537c478bd9Sstevel@tonic-gate 10547c478bd9Sstevel@tonic-gate /* 10557c478bd9Sstevel@tonic-gate * Mark the time we started the recall processing. 10567c478bd9Sstevel@tonic-gate * If it has been previously recalled, do not reset the 10577c478bd9Sstevel@tonic-gate * timer since this is used for the revocation decision. 10587c478bd9Sstevel@tonic-gate */ 1059d216dff5SRobert Mastors if (fp->rf_dinfo.rd_time_recalled == 0) 1060d216dff5SRobert Mastors fp->rf_dinfo.rd_time_recalled = gethrestime_sec(); 1061d216dff5SRobert Mastors fp->rf_dinfo.rd_ever_recalled = TRUE; /* used for policy decision */ 10627c478bd9Sstevel@tonic-gate /* Client causing recall not always available */ 10637c478bd9Sstevel@tonic-gate if (cp) 1064d216dff5SRobert Mastors fp->rf_dinfo.rd_conflicted_client = cp->rc_clientid; 10657c478bd9Sstevel@tonic-gate 1066d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 10677c478bd9Sstevel@tonic-gate 10687c478bd9Sstevel@tonic-gate args = kmem_alloc(sizeof (struct master_recall_args), KM_SLEEP); 10697c478bd9Sstevel@tonic-gate args->fp = fp; 10707c478bd9Sstevel@tonic-gate args->recall = recall; 10717c478bd9Sstevel@tonic-gate args->trunc = trunc; 10727c478bd9Sstevel@tonic-gate 10737c478bd9Sstevel@tonic-gate (void) thread_create(NULL, 0, do_recall_file, args, 0, &p0, TS_RUN, 1074ed57cab9Srg minclsyspri); 10757c478bd9Sstevel@tonic-gate } 10767c478bd9Sstevel@tonic-gate 10777c478bd9Sstevel@tonic-gate void 10787c478bd9Sstevel@tonic-gate rfs4_recall_deleg(rfs4_file_t *fp, bool_t trunc, rfs4_client_t *cp) 10797c478bd9Sstevel@tonic-gate { 10807c478bd9Sstevel@tonic-gate time_t elapsed1, elapsed2; 10817c478bd9Sstevel@tonic-gate 1082d216dff5SRobert Mastors if (fp->rf_dinfo.rd_time_recalled != 0) { 1083d216dff5SRobert Mastors elapsed1 = gethrestime_sec() - fp->rf_dinfo.rd_time_recalled; 1084d216dff5SRobert Mastors elapsed2 = gethrestime_sec() - fp->rf_dinfo.rd_time_lastwrite; 10857c478bd9Sstevel@tonic-gate /* First check to see if a revocation should occur */ 10867c478bd9Sstevel@tonic-gate if (elapsed1 > rfs4_lease_time && 1087ed57cab9Srg elapsed2 > rfs4_lease_time) { 10887c478bd9Sstevel@tonic-gate rfs4_revoke_file(fp); 10897c478bd9Sstevel@tonic-gate return; 10907c478bd9Sstevel@tonic-gate } 10917c478bd9Sstevel@tonic-gate /* 10927c478bd9Sstevel@tonic-gate * Next check to see if a recall should be done again 10937c478bd9Sstevel@tonic-gate * so quickly. 10947c478bd9Sstevel@tonic-gate */ 10957c478bd9Sstevel@tonic-gate if (elapsed1 <= ((rfs4_lease_time * 20) / 100)) 10967c478bd9Sstevel@tonic-gate return; 10977c478bd9Sstevel@tonic-gate } 10987c478bd9Sstevel@tonic-gate rfs4_recall_file(fp, rfs4_do_cb_recall, trunc, cp); 10997c478bd9Sstevel@tonic-gate } 11007c478bd9Sstevel@tonic-gate 11017c478bd9Sstevel@tonic-gate /* 11027c478bd9Sstevel@tonic-gate * rfs4_check_recall is called from rfs4_do_open to determine if the current 11037c478bd9Sstevel@tonic-gate * open conflicts with the delegation. 11047c478bd9Sstevel@tonic-gate * Return true if we need recall otherwise false. 1105d216dff5SRobert Mastors * Assumes entry locks for sp and sp->rs_finfo are held. 11067c478bd9Sstevel@tonic-gate */ 11077c478bd9Sstevel@tonic-gate bool_t 11087c478bd9Sstevel@tonic-gate rfs4_check_recall(rfs4_state_t *sp, uint32_t access) 11097c478bd9Sstevel@tonic-gate { 1110d216dff5SRobert Mastors open_delegation_type4 dtype = sp->rs_finfo->rf_dinfo.rd_dtype; 11117c478bd9Sstevel@tonic-gate 11127c478bd9Sstevel@tonic-gate switch (dtype) { 11137c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_NONE: 11147c478bd9Sstevel@tonic-gate /* Not currently delegated so there is nothing to do */ 11157c478bd9Sstevel@tonic-gate return (FALSE); 11167c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_READ: 11177c478bd9Sstevel@tonic-gate /* 11187c478bd9Sstevel@tonic-gate * If the access is only asking for READ then there is 11197c478bd9Sstevel@tonic-gate * no conflict and nothing to do. If it is asking 11207c478bd9Sstevel@tonic-gate * for write, then there will be conflict and the read 11217c478bd9Sstevel@tonic-gate * delegation should be recalled. 11227c478bd9Sstevel@tonic-gate */ 11237c478bd9Sstevel@tonic-gate if (access == OPEN4_SHARE_ACCESS_READ) 11247c478bd9Sstevel@tonic-gate return (FALSE); 11257c478bd9Sstevel@tonic-gate else 11267c478bd9Sstevel@tonic-gate return (TRUE); 11277c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_WRITE: 11287c478bd9Sstevel@tonic-gate /* Check to see if this client has the delegation */ 11297c478bd9Sstevel@tonic-gate return (rfs4_is_deleg(sp)); 11307c478bd9Sstevel@tonic-gate } 11317c478bd9Sstevel@tonic-gate 11327c478bd9Sstevel@tonic-gate return (FALSE); 11337c478bd9Sstevel@tonic-gate } 11347c478bd9Sstevel@tonic-gate 11357c478bd9Sstevel@tonic-gate /* 11367c478bd9Sstevel@tonic-gate * Return the "best" allowable delegation available given the current 11377c478bd9Sstevel@tonic-gate * delegation type and the desired access and deny modes on the file. 11387c478bd9Sstevel@tonic-gate * At the point that this routine is called we know that the access and 11397c478bd9Sstevel@tonic-gate * deny modes are consistent with the file modes. 11407c478bd9Sstevel@tonic-gate */ 11417c478bd9Sstevel@tonic-gate static open_delegation_type4 11427c478bd9Sstevel@tonic-gate rfs4_check_delegation(rfs4_state_t *sp, rfs4_file_t *fp) 11437c478bd9Sstevel@tonic-gate { 1144d216dff5SRobert Mastors open_delegation_type4 dtype = fp->rf_dinfo.rd_dtype; 1145d216dff5SRobert Mastors uint32_t access = sp->rs_share_access; 1146d216dff5SRobert Mastors uint32_t deny = sp->rs_share_deny; 11477c478bd9Sstevel@tonic-gate int readcnt = 0; 11487c478bd9Sstevel@tonic-gate int writecnt = 0; 11497c478bd9Sstevel@tonic-gate 11507c478bd9Sstevel@tonic-gate switch (dtype) { 11517c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_NONE: 11527c478bd9Sstevel@tonic-gate /* 11537c478bd9Sstevel@tonic-gate * Determine if more than just this OPEN have the file 11547c478bd9Sstevel@tonic-gate * open and if so, no delegation may be provided to 11557c478bd9Sstevel@tonic-gate * the client. 11567c478bd9Sstevel@tonic-gate */ 11577c478bd9Sstevel@tonic-gate if (access & OPEN4_SHARE_ACCESS_WRITE) 11587c478bd9Sstevel@tonic-gate writecnt++; 11597c478bd9Sstevel@tonic-gate if (access & OPEN4_SHARE_ACCESS_READ) 11607c478bd9Sstevel@tonic-gate readcnt++; 11617c478bd9Sstevel@tonic-gate 1162d216dff5SRobert Mastors if (fp->rf_access_read > readcnt || 1163d216dff5SRobert Mastors fp->rf_access_write > writecnt) 11647c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_NONE); 11657c478bd9Sstevel@tonic-gate 11667c478bd9Sstevel@tonic-gate /* 11677c478bd9Sstevel@tonic-gate * If the client is going to write, or if the client 11687c478bd9Sstevel@tonic-gate * has exclusive access, return a write delegation. 11697c478bd9Sstevel@tonic-gate */ 11707c478bd9Sstevel@tonic-gate if ((access & OPEN4_SHARE_ACCESS_WRITE) || 11717c478bd9Sstevel@tonic-gate (deny & (OPEN4_SHARE_DENY_READ | OPEN4_SHARE_DENY_WRITE))) 11727c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_WRITE); 11737c478bd9Sstevel@tonic-gate /* 11747c478bd9Sstevel@tonic-gate * If we don't want to write or we've haven't denied read 11757c478bd9Sstevel@tonic-gate * access to others, return a read delegation. 11767c478bd9Sstevel@tonic-gate */ 11777c478bd9Sstevel@tonic-gate if ((access & ~OPEN4_SHARE_ACCESS_WRITE) || 1178ed57cab9Srg (deny & ~OPEN4_SHARE_DENY_READ)) 11797c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_READ); 11807c478bd9Sstevel@tonic-gate 11817c478bd9Sstevel@tonic-gate /* Shouldn't get here */ 11827c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_NONE); 11837c478bd9Sstevel@tonic-gate 11847c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_READ: 11857c478bd9Sstevel@tonic-gate /* 11867c478bd9Sstevel@tonic-gate * If the file is delegated for read but we wan't to 11877c478bd9Sstevel@tonic-gate * write or deny others to read then we can't delegate 11887c478bd9Sstevel@tonic-gate * the file. We shouldn't get here since the delegation should 11897c478bd9Sstevel@tonic-gate * have been recalled already. 11907c478bd9Sstevel@tonic-gate */ 11917c478bd9Sstevel@tonic-gate if ((access & OPEN4_SHARE_ACCESS_WRITE) || 11927c478bd9Sstevel@tonic-gate (deny & OPEN4_SHARE_DENY_READ)) 1193ed57cab9Srg return (OPEN_DELEGATE_NONE); 11947c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_READ); 11957c478bd9Sstevel@tonic-gate 11967c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_WRITE: 11977c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_WRITE); 11987c478bd9Sstevel@tonic-gate } 11997c478bd9Sstevel@tonic-gate 12007c478bd9Sstevel@tonic-gate /* Shouldn't get here */ 12017c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_NONE); 12027c478bd9Sstevel@tonic-gate } 12037c478bd9Sstevel@tonic-gate 12047c478bd9Sstevel@tonic-gate /* 12057c478bd9Sstevel@tonic-gate * Given the desired delegation type and the "history" of the file 12067c478bd9Sstevel@tonic-gate * determine the actual delegation type to return. 12077c478bd9Sstevel@tonic-gate */ 12087c478bd9Sstevel@tonic-gate static open_delegation_type4 12097c478bd9Sstevel@tonic-gate rfs4_delegation_policy(open_delegation_type4 dtype, 1210d216dff5SRobert Mastors rfs4_dinfo_t *dinfo, clientid4 cid) 12117c478bd9Sstevel@tonic-gate { 12127c478bd9Sstevel@tonic-gate time_t elapsed; 12137c478bd9Sstevel@tonic-gate 12147c478bd9Sstevel@tonic-gate if (rfs4_deleg_policy != SRV_NORMAL_DELEGATE) 12157c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_NONE); 12167c478bd9Sstevel@tonic-gate 12177c478bd9Sstevel@tonic-gate /* 12187c478bd9Sstevel@tonic-gate * Has this file/delegation ever been recalled? If not then 1219d216dff5SRobert Mastors * no further checks for a delegation race need to be done. 12207c478bd9Sstevel@tonic-gate * However if a recall has occurred, then check to see if a 12217c478bd9Sstevel@tonic-gate * client has caused its own delegation recall to occur. If 12227c478bd9Sstevel@tonic-gate * not, then has a delegation for this file been returned 12237c478bd9Sstevel@tonic-gate * recently? If so, then do not assign a new delegation to 12247c478bd9Sstevel@tonic-gate * avoid a "delegation race" between the original client and 12257c478bd9Sstevel@tonic-gate * the new/conflicting client. 12267c478bd9Sstevel@tonic-gate */ 1227d216dff5SRobert Mastors if (dinfo->rd_ever_recalled == TRUE) { 1228d216dff5SRobert Mastors if (dinfo->rd_conflicted_client != cid) { 1229d216dff5SRobert Mastors elapsed = gethrestime_sec() - dinfo->rd_time_returned; 12307c478bd9Sstevel@tonic-gate if (elapsed < rfs4_lease_time) 12317c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_NONE); 12327c478bd9Sstevel@tonic-gate } 12337c478bd9Sstevel@tonic-gate } 12347c478bd9Sstevel@tonic-gate 12357c478bd9Sstevel@tonic-gate /* Limit the number of read grants */ 12367c478bd9Sstevel@tonic-gate if (dtype == OPEN_DELEGATE_READ && 1237d216dff5SRobert Mastors dinfo->rd_rdgrants > MAX_READ_DELEGATIONS) 12387c478bd9Sstevel@tonic-gate return (OPEN_DELEGATE_NONE); 12397c478bd9Sstevel@tonic-gate 12407c478bd9Sstevel@tonic-gate /* 12417c478bd9Sstevel@tonic-gate * Should consider limiting total number of read/write 12427c478bd9Sstevel@tonic-gate * delegations the server will permit. 12437c478bd9Sstevel@tonic-gate */ 12447c478bd9Sstevel@tonic-gate 12457c478bd9Sstevel@tonic-gate return (dtype); 12467c478bd9Sstevel@tonic-gate } 12477c478bd9Sstevel@tonic-gate 12487c478bd9Sstevel@tonic-gate /* 12497c478bd9Sstevel@tonic-gate * Try and grant a delegation for an open give the state. The routine 12507c478bd9Sstevel@tonic-gate * returns the delegation type granted. This could be OPEN_DELEGATE_NONE. 12517c478bd9Sstevel@tonic-gate * 12527c478bd9Sstevel@tonic-gate * The state and associate file entry must be locked 12537c478bd9Sstevel@tonic-gate */ 12547c478bd9Sstevel@tonic-gate rfs4_deleg_state_t * 12557c478bd9Sstevel@tonic-gate rfs4_grant_delegation(delegreq_t dreq, rfs4_state_t *sp, int *recall) 12567c478bd9Sstevel@tonic-gate { 1257d216dff5SRobert Mastors rfs4_file_t *fp = sp->rs_finfo; 12587c478bd9Sstevel@tonic-gate open_delegation_type4 dtype; 12597c478bd9Sstevel@tonic-gate int no_delegation; 12607c478bd9Sstevel@tonic-gate 1261d216dff5SRobert Mastors ASSERT(rfs4_dbe_islocked(sp->rs_dbe)); 1262d216dff5SRobert Mastors ASSERT(rfs4_dbe_islocked(fp->rf_dbe)); 12637c478bd9Sstevel@tonic-gate 12647c478bd9Sstevel@tonic-gate /* Is the server even providing delegations? */ 12657c478bd9Sstevel@tonic-gate if (rfs4_deleg_policy == SRV_NEVER_DELEGATE || dreq == DELEG_NONE) 12667c478bd9Sstevel@tonic-gate return (NULL); 12677c478bd9Sstevel@tonic-gate 12687c478bd9Sstevel@tonic-gate /* Check to see if delegations have been temporarily disabled */ 12697c478bd9Sstevel@tonic-gate mutex_enter(&rfs4_deleg_lock); 12707c478bd9Sstevel@tonic-gate no_delegation = rfs4_deleg_disabled; 12717c478bd9Sstevel@tonic-gate mutex_exit(&rfs4_deleg_lock); 12727c478bd9Sstevel@tonic-gate 12737c478bd9Sstevel@tonic-gate if (no_delegation) 12747c478bd9Sstevel@tonic-gate return (NULL); 12757c478bd9Sstevel@tonic-gate 12767c478bd9Sstevel@tonic-gate /* Don't grant a delegation if a deletion is impending. */ 1277d216dff5SRobert Mastors if (fp->rf_dinfo.rd_hold_grant > 0) { 12787c478bd9Sstevel@tonic-gate return (NULL); 12797c478bd9Sstevel@tonic-gate } 12807c478bd9Sstevel@tonic-gate 12817c478bd9Sstevel@tonic-gate /* 12827c478bd9Sstevel@tonic-gate * Don't grant a delegation if there are any lock manager 12837c478bd9Sstevel@tonic-gate * (NFSv2/v3) locks for the file. This is a bit of a hack (e.g., 12847c478bd9Sstevel@tonic-gate * if there are only read locks we should be able to grant a 12857c478bd9Sstevel@tonic-gate * read-only delegation), but it's good enough for now. 12867c478bd9Sstevel@tonic-gate * 12877c478bd9Sstevel@tonic-gate * MT safety: the lock manager checks for conflicting delegations 12887c478bd9Sstevel@tonic-gate * before processing a lock request. That check will block until 12897c478bd9Sstevel@tonic-gate * we are done here. So if the lock manager acquires a lock after 12907c478bd9Sstevel@tonic-gate * we decide to grant the delegation, the delegation will get 12917c478bd9Sstevel@tonic-gate * immediately recalled (if there's a conflict), so we're safe. 12927c478bd9Sstevel@tonic-gate */ 1293d216dff5SRobert Mastors if (lm_vp_active(fp->rf_vp)) { 12947c478bd9Sstevel@tonic-gate return (NULL); 12957c478bd9Sstevel@tonic-gate } 12967c478bd9Sstevel@tonic-gate 12977c478bd9Sstevel@tonic-gate /* 12987c478bd9Sstevel@tonic-gate * Based on the type of delegation request passed in, take the 12997c478bd9Sstevel@tonic-gate * appropriate action (DELEG_NONE is handled above) 13007c478bd9Sstevel@tonic-gate */ 13017c478bd9Sstevel@tonic-gate switch (dreq) { 13027c478bd9Sstevel@tonic-gate 13037c478bd9Sstevel@tonic-gate case DELEG_READ: 13047c478bd9Sstevel@tonic-gate case DELEG_WRITE: 13057c478bd9Sstevel@tonic-gate /* 13067c478bd9Sstevel@tonic-gate * The server "must" grant the delegation in this case. 13077c478bd9Sstevel@tonic-gate * Client is using open previous 13087c478bd9Sstevel@tonic-gate */ 13097c478bd9Sstevel@tonic-gate dtype = (open_delegation_type4)dreq; 13107c478bd9Sstevel@tonic-gate *recall = 1; 13117c478bd9Sstevel@tonic-gate break; 13127c478bd9Sstevel@tonic-gate case DELEG_ANY: 13137c478bd9Sstevel@tonic-gate /* 13147c478bd9Sstevel@tonic-gate * If a valid callback path does not exist, no delegation may 13157c478bd9Sstevel@tonic-gate * be granted. 13167c478bd9Sstevel@tonic-gate */ 1317d216dff5SRobert Mastors if (sp->rs_owner->ro_client->rc_cbinfo.cb_state != CB_OK) 13187c478bd9Sstevel@tonic-gate return (NULL); 13197c478bd9Sstevel@tonic-gate 13207c478bd9Sstevel@tonic-gate /* 13217c478bd9Sstevel@tonic-gate * If the original operation which caused time_rm_delayed 13227c478bd9Sstevel@tonic-gate * to be set hasn't been retried and completed for one 13237c478bd9Sstevel@tonic-gate * full lease period, clear it and allow delegations to 13247c478bd9Sstevel@tonic-gate * get granted again. 13257c478bd9Sstevel@tonic-gate */ 1326d216dff5SRobert Mastors if (fp->rf_dinfo.rd_time_rm_delayed > 0 && 13277c478bd9Sstevel@tonic-gate gethrestime_sec() > 1328d216dff5SRobert Mastors fp->rf_dinfo.rd_time_rm_delayed + rfs4_lease_time) 1329d216dff5SRobert Mastors fp->rf_dinfo.rd_time_rm_delayed = 0; 13307c478bd9Sstevel@tonic-gate 13317c478bd9Sstevel@tonic-gate /* 13327c478bd9Sstevel@tonic-gate * If we are waiting for a delegation to be returned then 13337c478bd9Sstevel@tonic-gate * don't delegate this file. We do this for correctness as 13347c478bd9Sstevel@tonic-gate * well as if the file is being recalled we would likely 13357c478bd9Sstevel@tonic-gate * recall this file again. 13367c478bd9Sstevel@tonic-gate */ 13377c478bd9Sstevel@tonic-gate 1338d216dff5SRobert Mastors if (fp->rf_dinfo.rd_time_recalled != 0 || 1339d216dff5SRobert Mastors fp->rf_dinfo.rd_time_rm_delayed != 0) 13407c478bd9Sstevel@tonic-gate return (NULL); 13417c478bd9Sstevel@tonic-gate 13427c478bd9Sstevel@tonic-gate /* Get the "best" delegation candidate */ 13437c478bd9Sstevel@tonic-gate dtype = rfs4_check_delegation(sp, fp); 13447c478bd9Sstevel@tonic-gate 13457c478bd9Sstevel@tonic-gate if (dtype == OPEN_DELEGATE_NONE) 13467c478bd9Sstevel@tonic-gate return (NULL); 13477c478bd9Sstevel@tonic-gate 13487c478bd9Sstevel@tonic-gate /* 13497c478bd9Sstevel@tonic-gate * Based on policy and the history of the file get the 13507c478bd9Sstevel@tonic-gate * actual delegation. 13517c478bd9Sstevel@tonic-gate */ 1352d216dff5SRobert Mastors dtype = rfs4_delegation_policy(dtype, &fp->rf_dinfo, 1353d216dff5SRobert Mastors sp->rs_owner->ro_client->rc_clientid); 13547c478bd9Sstevel@tonic-gate 13557c478bd9Sstevel@tonic-gate if (dtype == OPEN_DELEGATE_NONE) 13567c478bd9Sstevel@tonic-gate return (NULL); 13577c478bd9Sstevel@tonic-gate break; 13587c478bd9Sstevel@tonic-gate default: 13597c478bd9Sstevel@tonic-gate return (NULL); 13607c478bd9Sstevel@tonic-gate } 13617c478bd9Sstevel@tonic-gate 13627c478bd9Sstevel@tonic-gate /* set the delegation for the state */ 13637c478bd9Sstevel@tonic-gate return (rfs4_deleg_state(sp, dtype, recall)); 13647c478bd9Sstevel@tonic-gate } 13657c478bd9Sstevel@tonic-gate 13667c478bd9Sstevel@tonic-gate void 13677c478bd9Sstevel@tonic-gate rfs4_set_deleg_response(rfs4_deleg_state_t *dsp, open_delegation4 *dp, 1368d216dff5SRobert Mastors nfsace4 *ace, int recall) 13697c478bd9Sstevel@tonic-gate { 13707c478bd9Sstevel@tonic-gate open_write_delegation4 *wp; 13717c478bd9Sstevel@tonic-gate open_read_delegation4 *rp; 13727c478bd9Sstevel@tonic-gate nfs_space_limit4 *spl; 13737c478bd9Sstevel@tonic-gate nfsace4 nace; 13747c478bd9Sstevel@tonic-gate 13757c478bd9Sstevel@tonic-gate /* 13767c478bd9Sstevel@tonic-gate * We need to allocate a new copy of the who string. 13777c478bd9Sstevel@tonic-gate * this string will be freed by the rfs4_op_open dis_resfree 13787c478bd9Sstevel@tonic-gate * routine. We need to do this allocation since replays will 13797c478bd9Sstevel@tonic-gate * be allocated and rfs4_compound can't tell the difference from 13807c478bd9Sstevel@tonic-gate * a replay and an inital open. N.B. if an ace is passed in, it 13817c478bd9Sstevel@tonic-gate * the caller's responsibility to free it. 13827c478bd9Sstevel@tonic-gate */ 13837c478bd9Sstevel@tonic-gate 13847c478bd9Sstevel@tonic-gate if (ace == NULL) { 13857c478bd9Sstevel@tonic-gate /* 13867c478bd9Sstevel@tonic-gate * Default is to deny all access, the client will have 13877c478bd9Sstevel@tonic-gate * to contact the server. XXX Do we want to actually 13887c478bd9Sstevel@tonic-gate * set a deny for every one, or do we simply want to 13897c478bd9Sstevel@tonic-gate * construct an entity that will match no one? 13907c478bd9Sstevel@tonic-gate */ 13917c478bd9Sstevel@tonic-gate nace.type = ACE4_ACCESS_DENIED_ACE_TYPE; 13927c478bd9Sstevel@tonic-gate nace.flag = 0; 13937c478bd9Sstevel@tonic-gate nace.access_mask = ACE4_VALID_MASK_BITS; 13947c478bd9Sstevel@tonic-gate (void) str_to_utf8(ACE4_WHO_EVERYONE, &nace.who); 13957c478bd9Sstevel@tonic-gate } else { 13967c478bd9Sstevel@tonic-gate nace.type = ace->type; 13977c478bd9Sstevel@tonic-gate nace.flag = ace->flag; 13987c478bd9Sstevel@tonic-gate nace.access_mask = ace->access_mask; 13997c478bd9Sstevel@tonic-gate (void) utf8_copy(&ace->who, &nace.who); 14007c478bd9Sstevel@tonic-gate } 14017c478bd9Sstevel@tonic-gate 1402d216dff5SRobert Mastors dp->delegation_type = dsp->rds_dtype; 14037c478bd9Sstevel@tonic-gate 1404d216dff5SRobert Mastors switch (dsp->rds_dtype) { 14057c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_NONE: 14067c478bd9Sstevel@tonic-gate break; 14077c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_READ: 14087c478bd9Sstevel@tonic-gate rp = &dp->open_delegation4_u.read; 1409d216dff5SRobert Mastors rp->stateid = dsp->rds_delegid.stateid; 14107c478bd9Sstevel@tonic-gate rp->recall = (bool_t)recall; 14117c478bd9Sstevel@tonic-gate rp->permissions = nace; 14127c478bd9Sstevel@tonic-gate break; 14137c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_WRITE: 14147c478bd9Sstevel@tonic-gate wp = &dp->open_delegation4_u.write; 1415d216dff5SRobert Mastors wp->stateid = dsp->rds_delegid.stateid; 14167c478bd9Sstevel@tonic-gate wp->recall = (bool_t)recall; 14177c478bd9Sstevel@tonic-gate spl = &wp->space_limit; 14187c478bd9Sstevel@tonic-gate spl->limitby = NFS_LIMIT_SIZE; 14197c478bd9Sstevel@tonic-gate spl->nfs_space_limit4_u.filesize = 0; 14207c478bd9Sstevel@tonic-gate wp->permissions = nace; 14217c478bd9Sstevel@tonic-gate break; 14227c478bd9Sstevel@tonic-gate } 14237c478bd9Sstevel@tonic-gate } 14247c478bd9Sstevel@tonic-gate 14257c478bd9Sstevel@tonic-gate /* 14267c478bd9Sstevel@tonic-gate * Check if the file is delegated via the provided file struct. 14277c478bd9Sstevel@tonic-gate * Return TRUE if it is delegated. This is intended for use by 14287c478bd9Sstevel@tonic-gate * the v4 server. The v2/v3 server code should use rfs4_check_delegated(). 14297c478bd9Sstevel@tonic-gate * 14307c478bd9Sstevel@tonic-gate * Note that if the file is found to have a delegation, it is 14317c478bd9Sstevel@tonic-gate * recalled, unless the clientid of the caller matches the clientid of the 14327c478bd9Sstevel@tonic-gate * delegation. If the caller has specified, there is a slight delay 14337c478bd9Sstevel@tonic-gate * inserted in the hopes that the delegation will be returned quickly. 14347c478bd9Sstevel@tonic-gate */ 14357c478bd9Sstevel@tonic-gate bool_t 14367c478bd9Sstevel@tonic-gate rfs4_check_delegated_byfp(int mode, rfs4_file_t *fp, 1437d216dff5SRobert Mastors bool_t trunc, bool_t do_delay, bool_t is_rm, clientid4 *cp) 14387c478bd9Sstevel@tonic-gate { 14397c478bd9Sstevel@tonic-gate rfs4_deleg_state_t *dsp; 14407c478bd9Sstevel@tonic-gate 14417c478bd9Sstevel@tonic-gate /* Is delegation enabled? */ 14427c478bd9Sstevel@tonic-gate if (rfs4_deleg_policy == SRV_NEVER_DELEGATE) 14437c478bd9Sstevel@tonic-gate return (FALSE); 14447c478bd9Sstevel@tonic-gate 14457c478bd9Sstevel@tonic-gate /* do we have a delegation on this file? */ 1446d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 1447d216dff5SRobert Mastors if (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_NONE) { 14487c478bd9Sstevel@tonic-gate if (is_rm) 1449d216dff5SRobert Mastors fp->rf_dinfo.rd_hold_grant++; 1450d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 14517c478bd9Sstevel@tonic-gate return (FALSE); 14527c478bd9Sstevel@tonic-gate } 14537c478bd9Sstevel@tonic-gate /* 14547c478bd9Sstevel@tonic-gate * do we have a write delegation on this file or are we 14557c478bd9Sstevel@tonic-gate * requesting write access to a file with any type of existing 14567c478bd9Sstevel@tonic-gate * delegation? 14577c478bd9Sstevel@tonic-gate */ 1458d216dff5SRobert Mastors if (mode == FWRITE || fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_WRITE) { 14597c478bd9Sstevel@tonic-gate if (cp != NULL) { 1460d216dff5SRobert Mastors dsp = list_head(&fp->rf_delegstatelist); 14617c478bd9Sstevel@tonic-gate if (dsp == NULL) { 1462d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 14637c478bd9Sstevel@tonic-gate return (FALSE); 14647c478bd9Sstevel@tonic-gate } 14657c478bd9Sstevel@tonic-gate /* 14667c478bd9Sstevel@tonic-gate * Does the requestor already own the delegation? 14677c478bd9Sstevel@tonic-gate */ 1468d216dff5SRobert Mastors if (dsp->rds_client->rc_clientid == *(cp)) { 1469d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 14707c478bd9Sstevel@tonic-gate return (FALSE); 14717c478bd9Sstevel@tonic-gate } 14727c478bd9Sstevel@tonic-gate } 14737c478bd9Sstevel@tonic-gate 1474d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 14757c478bd9Sstevel@tonic-gate rfs4_recall_deleg(fp, trunc, NULL); 14767c478bd9Sstevel@tonic-gate 14777c478bd9Sstevel@tonic-gate if (!do_delay) { 1478d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 1479d216dff5SRobert Mastors fp->rf_dinfo.rd_time_rm_delayed = gethrestime_sec(); 1480d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 14817c478bd9Sstevel@tonic-gate return (TRUE); 14827c478bd9Sstevel@tonic-gate } 14837c478bd9Sstevel@tonic-gate 14847c478bd9Sstevel@tonic-gate delay(NFS4_DELEGATION_CONFLICT_DELAY); 14857c478bd9Sstevel@tonic-gate 1486d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 1487d216dff5SRobert Mastors if (fp->rf_dinfo.rd_dtype != OPEN_DELEGATE_NONE) { 1488d216dff5SRobert Mastors fp->rf_dinfo.rd_time_rm_delayed = gethrestime_sec(); 1489d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 14907c478bd9Sstevel@tonic-gate return (TRUE); 14917c478bd9Sstevel@tonic-gate } 14927c478bd9Sstevel@tonic-gate } 14937c478bd9Sstevel@tonic-gate if (is_rm) 1494d216dff5SRobert Mastors fp->rf_dinfo.rd_hold_grant++; 1495d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 14967c478bd9Sstevel@tonic-gate return (FALSE); 14977c478bd9Sstevel@tonic-gate } 14987c478bd9Sstevel@tonic-gate 14997c478bd9Sstevel@tonic-gate /* 15007c478bd9Sstevel@tonic-gate * Check if the file is delegated in the case of a v2 or v3 access. 15017c478bd9Sstevel@tonic-gate * Return TRUE if it is delegated which in turn means that v2 should 15027c478bd9Sstevel@tonic-gate * drop the request and in the case of v3 JUKEBOX should be returned. 15037c478bd9Sstevel@tonic-gate */ 15047c478bd9Sstevel@tonic-gate bool_t 15057c478bd9Sstevel@tonic-gate rfs4_check_delegated(int mode, vnode_t *vp, bool_t trunc) 15067c478bd9Sstevel@tonic-gate { 15077c478bd9Sstevel@tonic-gate rfs4_file_t *fp; 15087c478bd9Sstevel@tonic-gate bool_t create = FALSE; 15097c478bd9Sstevel@tonic-gate bool_t rc = FALSE; 15107c478bd9Sstevel@tonic-gate 15117c478bd9Sstevel@tonic-gate rfs4_hold_deleg_policy(); 15127c478bd9Sstevel@tonic-gate 15137c478bd9Sstevel@tonic-gate /* Is delegation enabled? */ 15147c478bd9Sstevel@tonic-gate if (rfs4_deleg_policy != SRV_NEVER_DELEGATE) { 15157c478bd9Sstevel@tonic-gate fp = rfs4_findfile(vp, NULL, &create); 15167c478bd9Sstevel@tonic-gate if (fp != NULL) { 15177c478bd9Sstevel@tonic-gate if (rfs4_check_delegated_byfp(mode, fp, trunc, 1518ed57cab9Srg TRUE, FALSE, NULL)) { 15197c478bd9Sstevel@tonic-gate rc = TRUE; 15207c478bd9Sstevel@tonic-gate } 15217c478bd9Sstevel@tonic-gate rfs4_file_rele(fp); 15227c478bd9Sstevel@tonic-gate } 15237c478bd9Sstevel@tonic-gate } 15247c478bd9Sstevel@tonic-gate rfs4_rele_deleg_policy(); 15257c478bd9Sstevel@tonic-gate return (rc); 15267c478bd9Sstevel@tonic-gate } 15277c478bd9Sstevel@tonic-gate 15287c478bd9Sstevel@tonic-gate /* 15297c478bd9Sstevel@tonic-gate * Release a hold on the hold_grant counter which 15307c478bd9Sstevel@tonic-gate * prevents delegation from being granted while a remove 15317c478bd9Sstevel@tonic-gate * or a rename is in progress. 15327c478bd9Sstevel@tonic-gate */ 15337c478bd9Sstevel@tonic-gate void 15347c478bd9Sstevel@tonic-gate rfs4_clear_dont_grant(rfs4_file_t *fp) 15357c478bd9Sstevel@tonic-gate { 15367c478bd9Sstevel@tonic-gate if (rfs4_deleg_policy == SRV_NEVER_DELEGATE) 15377c478bd9Sstevel@tonic-gate return; 1538d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 1539d216dff5SRobert Mastors ASSERT(fp->rf_dinfo.rd_hold_grant > 0); 1540d216dff5SRobert Mastors fp->rf_dinfo.rd_hold_grant--; 1541d216dff5SRobert Mastors fp->rf_dinfo.rd_time_rm_delayed = 0; 1542d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 15437c478bd9Sstevel@tonic-gate } 15447c478bd9Sstevel@tonic-gate 15457c478bd9Sstevel@tonic-gate /* 15467c478bd9Sstevel@tonic-gate * State support for delegation. 15477c478bd9Sstevel@tonic-gate * Set the state delegation type for this state; 15487c478bd9Sstevel@tonic-gate * This routine is called from open via rfs4_grant_delegation and the entry 1549d216dff5SRobert Mastors * locks on sp and sp->rs_finfo are assumed. 15507c478bd9Sstevel@tonic-gate */ 15517c478bd9Sstevel@tonic-gate static rfs4_deleg_state_t * 15527c478bd9Sstevel@tonic-gate rfs4_deleg_state(rfs4_state_t *sp, open_delegation_type4 dtype, int *recall) 15537c478bd9Sstevel@tonic-gate { 1554d216dff5SRobert Mastors rfs4_file_t *fp = sp->rs_finfo; 15557c478bd9Sstevel@tonic-gate bool_t create = TRUE; 15567c478bd9Sstevel@tonic-gate rfs4_deleg_state_t *dsp; 15577c478bd9Sstevel@tonic-gate vnode_t *vp; 15587c478bd9Sstevel@tonic-gate int open_prev = *recall; 1559da6c28aaSamw int ret; 1560da6c28aaSamw int fflags = 0; 15617c478bd9Sstevel@tonic-gate 1562d216dff5SRobert Mastors ASSERT(rfs4_dbe_islocked(sp->rs_dbe)); 1563d216dff5SRobert Mastors ASSERT(rfs4_dbe_islocked(fp->rf_dbe)); 15647c478bd9Sstevel@tonic-gate 15657c478bd9Sstevel@tonic-gate /* Shouldn't happen */ 1566d216dff5SRobert Mastors if (fp->rf_dinfo.rd_recall_count != 0 || 1567d216dff5SRobert Mastors (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_READ && 1568ed57cab9Srg dtype != OPEN_DELEGATE_READ)) { 15697c478bd9Sstevel@tonic-gate return (NULL); 15707c478bd9Sstevel@tonic-gate } 15717c478bd9Sstevel@tonic-gate 15727c478bd9Sstevel@tonic-gate /* Unlock to avoid deadlock */ 1573d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 1574d216dff5SRobert Mastors rfs4_dbe_unlock(sp->rs_dbe); 15757c478bd9Sstevel@tonic-gate 15767c478bd9Sstevel@tonic-gate dsp = rfs4_finddeleg(sp, &create); 15777c478bd9Sstevel@tonic-gate 1578d216dff5SRobert Mastors rfs4_dbe_lock(sp->rs_dbe); 1579d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 15807c478bd9Sstevel@tonic-gate 15817c478bd9Sstevel@tonic-gate if (dsp == NULL) 15827c478bd9Sstevel@tonic-gate return (NULL); 15837c478bd9Sstevel@tonic-gate 1584da1b9cd5Sjwahlig /* 1585da1b9cd5Sjwahlig * It is possible that since we dropped the lock 1586da1b9cd5Sjwahlig * in order to call finddeleg, the rfs4_file_t 1587da1b9cd5Sjwahlig * was marked such that we should not grant a 1588da1b9cd5Sjwahlig * delegation, if so bail out. 1589da1b9cd5Sjwahlig */ 1590d216dff5SRobert Mastors if (fp->rf_dinfo.rd_hold_grant > 0) { 1591da1b9cd5Sjwahlig rfs4_deleg_state_rele(dsp); 1592da1b9cd5Sjwahlig return (NULL); 1593da1b9cd5Sjwahlig } 1594da1b9cd5Sjwahlig 15957c478bd9Sstevel@tonic-gate if (create == FALSE) { 1596d216dff5SRobert Mastors if (sp->rs_owner->ro_client == dsp->rds_client && 1597d216dff5SRobert Mastors dsp->rds_dtype == dtype) { 15987c478bd9Sstevel@tonic-gate return (dsp); 15997c478bd9Sstevel@tonic-gate } else { 16007c478bd9Sstevel@tonic-gate rfs4_deleg_state_rele(dsp); 16017c478bd9Sstevel@tonic-gate return (NULL); 16027c478bd9Sstevel@tonic-gate } 16037c478bd9Sstevel@tonic-gate } 16047c478bd9Sstevel@tonic-gate 16057c478bd9Sstevel@tonic-gate /* 16067c478bd9Sstevel@tonic-gate * Check that this file has not been delegated to another 16077c478bd9Sstevel@tonic-gate * client 16087c478bd9Sstevel@tonic-gate */ 1609d216dff5SRobert Mastors if (fp->rf_dinfo.rd_recall_count != 0 || 1610d216dff5SRobert Mastors fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_WRITE || 1611d216dff5SRobert Mastors (fp->rf_dinfo.rd_dtype == OPEN_DELEGATE_READ && 1612ed57cab9Srg dtype != OPEN_DELEGATE_READ)) { 16137c478bd9Sstevel@tonic-gate rfs4_deleg_state_rele(dsp); 16147c478bd9Sstevel@tonic-gate return (NULL); 16157c478bd9Sstevel@tonic-gate } 16167c478bd9Sstevel@tonic-gate 1617d216dff5SRobert Mastors vp = fp->rf_vp; 16187c478bd9Sstevel@tonic-gate /* vnevent_support returns 0 if file system supports vnevents */ 1619da6c28aaSamw if (vnevent_support(vp, NULL)) { 16207c478bd9Sstevel@tonic-gate rfs4_deleg_state_rele(dsp); 16217c478bd9Sstevel@tonic-gate return (NULL); 16227c478bd9Sstevel@tonic-gate } 16237c478bd9Sstevel@tonic-gate 1624da6c28aaSamw /* Calculate the fflags for this OPEN. */ 1625d216dff5SRobert Mastors if (sp->rs_share_access & OPEN4_SHARE_ACCESS_READ) 1626da6c28aaSamw fflags |= FREAD; 1627d216dff5SRobert Mastors if (sp->rs_share_access & OPEN4_SHARE_ACCESS_WRITE) 1628da6c28aaSamw fflags |= FWRITE; 1629da6c28aaSamw 16307c478bd9Sstevel@tonic-gate *recall = 0; 1631da6c28aaSamw /* 1632da6c28aaSamw * Before granting a delegation we need to know if anyone else has 1633da6c28aaSamw * opened the file in a conflicting mode. However, first we need to 1634da6c28aaSamw * know how we opened the file to check the counts properly. 1635da6c28aaSamw */ 16367c478bd9Sstevel@tonic-gate if (dtype == OPEN_DELEGATE_READ) { 1637da6c28aaSamw if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) || 1638da6c28aaSamw (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) || 1639da6c28aaSamw vn_is_mapped(vp, V_WRITE)) { 16407c478bd9Sstevel@tonic-gate if (open_prev) { 16417c478bd9Sstevel@tonic-gate *recall = 1; 16427c478bd9Sstevel@tonic-gate } else { 16437c478bd9Sstevel@tonic-gate rfs4_deleg_state_rele(dsp); 16447c478bd9Sstevel@tonic-gate return (NULL); 16457c478bd9Sstevel@tonic-gate } 16467c478bd9Sstevel@tonic-gate } 1647da6c28aaSamw ret = fem_install(vp, deleg_rdops, (void *)fp, OPUNIQ, 1648ed57cab9Srg rfs4_mon_hold, rfs4_mon_rele); 1649da6c28aaSamw if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) || 1650da6c28aaSamw (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) || 1651da6c28aaSamw vn_is_mapped(vp, V_WRITE)) { 16527c478bd9Sstevel@tonic-gate if (open_prev) { 16537c478bd9Sstevel@tonic-gate *recall = 1; 16547c478bd9Sstevel@tonic-gate } else { 16557c478bd9Sstevel@tonic-gate (void) fem_uninstall(vp, deleg_rdops, 1656ed57cab9Srg (void *)fp); 16577c478bd9Sstevel@tonic-gate rfs4_deleg_state_rele(dsp); 16587c478bd9Sstevel@tonic-gate return (NULL); 16597c478bd9Sstevel@tonic-gate } 16607c478bd9Sstevel@tonic-gate } 1661da6c28aaSamw /* 1662da6c28aaSamw * Because a client can hold onto a delegation after the 1663da6c28aaSamw * file has been closed, we need to keep track of the 1664da6c28aaSamw * access to this file. Otherwise the CIFS server would 1665da6c28aaSamw * not know about the client accessing the file and could 1666da6c28aaSamw * inappropriately grant an OPLOCK. 1667da6c28aaSamw * fem_install() returns EBUSY when asked to install a 1668da6c28aaSamw * OPUNIQ monitor more than once. Therefore, check the 1669da6c28aaSamw * return code because we only want this done once. 1670da6c28aaSamw */ 1671da6c28aaSamw if (ret == 0) 1672da6c28aaSamw vn_open_upgrade(vp, FREAD); 16737c478bd9Sstevel@tonic-gate } else { /* WRITE */ 1674da6c28aaSamw if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) || 1675da6c28aaSamw (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) || 1676da6c28aaSamw ((fflags & FREAD) && vn_has_other_opens(vp, V_READ)) || 1677da6c28aaSamw (((fflags & FREAD) == 0) && vn_is_opened(vp, V_READ)) || 1678da6c28aaSamw vn_is_mapped(vp, V_RDORWR)) { 16797c478bd9Sstevel@tonic-gate if (open_prev) { 16807c478bd9Sstevel@tonic-gate *recall = 1; 16817c478bd9Sstevel@tonic-gate } else { 16827c478bd9Sstevel@tonic-gate rfs4_deleg_state_rele(dsp); 16837c478bd9Sstevel@tonic-gate return (NULL); 16847c478bd9Sstevel@tonic-gate } 16857c478bd9Sstevel@tonic-gate } 1686da6c28aaSamw ret = fem_install(vp, deleg_wrops, (void *)fp, OPUNIQ, 1687ed57cab9Srg rfs4_mon_hold, rfs4_mon_rele); 1688da6c28aaSamw if (((fflags & FWRITE) && vn_has_other_opens(vp, V_WRITE)) || 1689da6c28aaSamw (((fflags & FWRITE) == 0) && vn_is_opened(vp, V_WRITE)) || 1690da6c28aaSamw ((fflags & FREAD) && vn_has_other_opens(vp, V_READ)) || 1691da6c28aaSamw (((fflags & FREAD) == 0) && vn_is_opened(vp, V_READ)) || 1692da6c28aaSamw vn_is_mapped(vp, V_RDORWR)) { 16937c478bd9Sstevel@tonic-gate if (open_prev) { 16947c478bd9Sstevel@tonic-gate *recall = 1; 16957c478bd9Sstevel@tonic-gate } else { 16967c478bd9Sstevel@tonic-gate (void) fem_uninstall(vp, deleg_wrops, 1697ed57cab9Srg (void *)fp); 16987c478bd9Sstevel@tonic-gate rfs4_deleg_state_rele(dsp); 16997c478bd9Sstevel@tonic-gate return (NULL); 17007c478bd9Sstevel@tonic-gate } 17017c478bd9Sstevel@tonic-gate } 1702da6c28aaSamw /* 1703da6c28aaSamw * Because a client can hold onto a delegation after the 1704da6c28aaSamw * file has been closed, we need to keep track of the 1705da6c28aaSamw * access to this file. Otherwise the CIFS server would 1706da6c28aaSamw * not know about the client accessing the file and could 1707da6c28aaSamw * inappropriately grant an OPLOCK. 1708da6c28aaSamw * fem_install() returns EBUSY when asked to install a 1709da6c28aaSamw * OPUNIQ monitor more than once. Therefore, check the 1710da6c28aaSamw * return code because we only want this done once. 1711da6c28aaSamw */ 1712da6c28aaSamw if (ret == 0) 1713da6c28aaSamw vn_open_upgrade(vp, FREAD|FWRITE); 17147c478bd9Sstevel@tonic-gate } 17157c478bd9Sstevel@tonic-gate /* Place on delegation list for file */ 1716d216dff5SRobert Mastors ASSERT(!list_link_active(&dsp->rds_node)); 1717d216dff5SRobert Mastors list_insert_tail(&fp->rf_delegstatelist, dsp); 17187c478bd9Sstevel@tonic-gate 1719d216dff5SRobert Mastors dsp->rds_dtype = fp->rf_dinfo.rd_dtype = dtype; 17207c478bd9Sstevel@tonic-gate 17217c478bd9Sstevel@tonic-gate /* Update delegation stats for this file */ 1722d216dff5SRobert Mastors fp->rf_dinfo.rd_time_lastgrant = gethrestime_sec(); 17237c478bd9Sstevel@tonic-gate 17247c478bd9Sstevel@tonic-gate /* reset since this is a new delegation */ 1725d216dff5SRobert Mastors fp->rf_dinfo.rd_conflicted_client = 0; 1726d216dff5SRobert Mastors fp->rf_dinfo.rd_ever_recalled = FALSE; 17277c478bd9Sstevel@tonic-gate 17287c478bd9Sstevel@tonic-gate if (dtype == OPEN_DELEGATE_READ) 1729d216dff5SRobert Mastors fp->rf_dinfo.rd_rdgrants++; 17307c478bd9Sstevel@tonic-gate else 1731d216dff5SRobert Mastors fp->rf_dinfo.rd_wrgrants++; 17327c478bd9Sstevel@tonic-gate 17337c478bd9Sstevel@tonic-gate return (dsp); 17347c478bd9Sstevel@tonic-gate } 17357c478bd9Sstevel@tonic-gate 17367c478bd9Sstevel@tonic-gate /* 17377c478bd9Sstevel@tonic-gate * State routine for the server when a delegation is returned. 17387c478bd9Sstevel@tonic-gate */ 17397c478bd9Sstevel@tonic-gate void 17407c478bd9Sstevel@tonic-gate rfs4_return_deleg(rfs4_deleg_state_t *dsp, bool_t revoked) 17417c478bd9Sstevel@tonic-gate { 1742d216dff5SRobert Mastors rfs4_file_t *fp = dsp->rds_finfo; 17437c478bd9Sstevel@tonic-gate open_delegation_type4 dtypewas; 17447c478bd9Sstevel@tonic-gate 1745d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 17467c478bd9Sstevel@tonic-gate 1747d216dff5SRobert Mastors /* nothing to do if no longer on list */ 1748d216dff5SRobert Mastors if (!list_link_active(&dsp->rds_node)) { 1749d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 1750d216dff5SRobert Mastors return; 1751d216dff5SRobert Mastors } 1752d216dff5SRobert Mastors 1753d216dff5SRobert Mastors /* Remove state from recall list */ 1754d216dff5SRobert Mastors list_remove(&fp->rf_delegstatelist, dsp); 17557c478bd9Sstevel@tonic-gate 1756d216dff5SRobert Mastors if (list_is_empty(&fp->rf_delegstatelist)) { 1757d216dff5SRobert Mastors dtypewas = fp->rf_dinfo.rd_dtype; 1758d216dff5SRobert Mastors fp->rf_dinfo.rd_dtype = OPEN_DELEGATE_NONE; 1759d216dff5SRobert Mastors rfs4_dbe_cv_broadcast(fp->rf_dbe); 17607c478bd9Sstevel@tonic-gate 17617c478bd9Sstevel@tonic-gate /* if file system was unshared, the vp will be NULL */ 1762d216dff5SRobert Mastors if (fp->rf_vp != NULL) { 1763da6c28aaSamw /* 1764da6c28aaSamw * Once a delegation is no longer held by any client, 1765da6c28aaSamw * the monitor is uninstalled. At this point, the 1766da6c28aaSamw * client must send OPEN otw, so we don't need the 1767da6c28aaSamw * reference on the vnode anymore. The open 1768da6c28aaSamw * downgrade removes the reference put on earlier. 1769da6c28aaSamw */ 1770da6c28aaSamw if (dtypewas == OPEN_DELEGATE_READ) { 1771d216dff5SRobert Mastors (void) fem_uninstall(fp->rf_vp, deleg_rdops, 1772ed57cab9Srg (void *)fp); 1773d216dff5SRobert Mastors vn_open_downgrade(fp->rf_vp, FREAD); 1774da6c28aaSamw } else if (dtypewas == OPEN_DELEGATE_WRITE) { 1775d216dff5SRobert Mastors (void) fem_uninstall(fp->rf_vp, deleg_wrops, 1776ed57cab9Srg (void *)fp); 1777d216dff5SRobert Mastors vn_open_downgrade(fp->rf_vp, FREAD|FWRITE); 1778da6c28aaSamw } 17797c478bd9Sstevel@tonic-gate } 17807c478bd9Sstevel@tonic-gate } 17817c478bd9Sstevel@tonic-gate 1782d216dff5SRobert Mastors switch (dsp->rds_dtype) { 17837c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_READ: 1784d216dff5SRobert Mastors fp->rf_dinfo.rd_rdgrants--; 17857c478bd9Sstevel@tonic-gate break; 17867c478bd9Sstevel@tonic-gate case OPEN_DELEGATE_WRITE: 1787d216dff5SRobert Mastors fp->rf_dinfo.rd_wrgrants--; 17887c478bd9Sstevel@tonic-gate break; 17897c478bd9Sstevel@tonic-gate default: 17907c478bd9Sstevel@tonic-gate break; 17917c478bd9Sstevel@tonic-gate } 17927c478bd9Sstevel@tonic-gate 17937c478bd9Sstevel@tonic-gate /* used in the policy decision */ 1794d216dff5SRobert Mastors fp->rf_dinfo.rd_time_returned = gethrestime_sec(); 17957c478bd9Sstevel@tonic-gate 17967c478bd9Sstevel@tonic-gate /* 17977c478bd9Sstevel@tonic-gate * reset the time_recalled field so future delegations are not 17987c478bd9Sstevel@tonic-gate * accidentally revoked 17997c478bd9Sstevel@tonic-gate */ 1800d216dff5SRobert Mastors if ((fp->rf_dinfo.rd_rdgrants + fp->rf_dinfo.rd_wrgrants) == 0) 1801d216dff5SRobert Mastors fp->rf_dinfo.rd_time_recalled = 0; 18027c478bd9Sstevel@tonic-gate 1803d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 18047c478bd9Sstevel@tonic-gate 1805d216dff5SRobert Mastors rfs4_dbe_lock(dsp->rds_dbe); 18067c478bd9Sstevel@tonic-gate 1807d216dff5SRobert Mastors dsp->rds_dtype = OPEN_DELEGATE_NONE; 18087c478bd9Sstevel@tonic-gate 18097c478bd9Sstevel@tonic-gate if (revoked == TRUE) 1810d216dff5SRobert Mastors dsp->rds_time_revoked = gethrestime_sec(); 18117c478bd9Sstevel@tonic-gate 1812d216dff5SRobert Mastors rfs4_dbe_invalidate(dsp->rds_dbe); 18137c478bd9Sstevel@tonic-gate 1814d216dff5SRobert Mastors rfs4_dbe_unlock(dsp->rds_dbe); 18157c478bd9Sstevel@tonic-gate 18167c478bd9Sstevel@tonic-gate if (revoked == TRUE) { 1817d216dff5SRobert Mastors rfs4_dbe_lock(dsp->rds_client->rc_dbe); 1818d216dff5SRobert Mastors dsp->rds_client->rc_deleg_revoked++; /* observability */ 1819d216dff5SRobert Mastors rfs4_dbe_unlock(dsp->rds_client->rc_dbe); 18207c478bd9Sstevel@tonic-gate } 18217c478bd9Sstevel@tonic-gate } 18227c478bd9Sstevel@tonic-gate 18237c478bd9Sstevel@tonic-gate static void 18247c478bd9Sstevel@tonic-gate rfs4_revoke_file(rfs4_file_t *fp) 18257c478bd9Sstevel@tonic-gate { 18267c478bd9Sstevel@tonic-gate rfs4_deleg_state_t *dsp; 18277c478bd9Sstevel@tonic-gate 18287c478bd9Sstevel@tonic-gate /* 18297c478bd9Sstevel@tonic-gate * The lock for rfs4_file_t must be held when traversing the 18307c478bd9Sstevel@tonic-gate * delegation list but that lock needs to be released to call 1831d216dff5SRobert Mastors * rfs4_return_deleg() 18327c478bd9Sstevel@tonic-gate */ 1833d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 1834d216dff5SRobert Mastors while (dsp = list_head(&fp->rf_delegstatelist)) { 1835d216dff5SRobert Mastors rfs4_dbe_hold(dsp->rds_dbe); 1836d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 1837d216dff5SRobert Mastors rfs4_return_deleg(dsp, TRUE); 18387c478bd9Sstevel@tonic-gate rfs4_deleg_state_rele(dsp); 1839d216dff5SRobert Mastors rfs4_dbe_lock(fp->rf_dbe); 18407c478bd9Sstevel@tonic-gate } 1841d216dff5SRobert Mastors rfs4_dbe_unlock(fp->rf_dbe); 18427c478bd9Sstevel@tonic-gate } 18437c478bd9Sstevel@tonic-gate 18447c478bd9Sstevel@tonic-gate /* 18457c478bd9Sstevel@tonic-gate * A delegation is assumed to be present on the file associated with 1846d216dff5SRobert Mastors * "sp". Check to see if the delegation matches is associated with 1847d216dff5SRobert Mastors * the same client as referenced by "sp". If it is not, TRUE is 18487c478bd9Sstevel@tonic-gate * returned. If the delegation DOES match the client (or no 18497c478bd9Sstevel@tonic-gate * delegation is present), return FALSE. 18507c478bd9Sstevel@tonic-gate * Assume the state entry and file entry are locked. 18517c478bd9Sstevel@tonic-gate */ 18527c478bd9Sstevel@tonic-gate bool_t 1853d216dff5SRobert Mastors rfs4_is_deleg(rfs4_state_t *sp) 18547c478bd9Sstevel@tonic-gate { 18557c478bd9Sstevel@tonic-gate rfs4_deleg_state_t *dsp; 1856d216dff5SRobert Mastors rfs4_file_t *fp = sp->rs_finfo; 1857d216dff5SRobert Mastors rfs4_client_t *cp = sp->rs_owner->ro_client; 18587c478bd9Sstevel@tonic-gate 1859d216dff5SRobert Mastors ASSERT(rfs4_dbe_islocked(fp->rf_dbe)); 1860d216dff5SRobert Mastors for (dsp = list_head(&fp->rf_delegstatelist); dsp != NULL; 1861d216dff5SRobert Mastors dsp = list_next(&fp->rf_delegstatelist, dsp)) { 1862d216dff5SRobert Mastors if (cp != dsp->rds_client) { 18637c478bd9Sstevel@tonic-gate return (TRUE); 18647c478bd9Sstevel@tonic-gate } 18657c478bd9Sstevel@tonic-gate } 18667c478bd9Sstevel@tonic-gate return (FALSE); 18677c478bd9Sstevel@tonic-gate } 18687c478bd9Sstevel@tonic-gate 18697c478bd9Sstevel@tonic-gate void 18707c478bd9Sstevel@tonic-gate rfs4_disable_delegation(void) 18717c478bd9Sstevel@tonic-gate { 18727c478bd9Sstevel@tonic-gate mutex_enter(&rfs4_deleg_lock); 18737c478bd9Sstevel@tonic-gate rfs4_deleg_disabled++; 18747c478bd9Sstevel@tonic-gate mutex_exit(&rfs4_deleg_lock); 18757c478bd9Sstevel@tonic-gate } 18767c478bd9Sstevel@tonic-gate 18777c478bd9Sstevel@tonic-gate void 18787c478bd9Sstevel@tonic-gate rfs4_enable_delegation(void) 18797c478bd9Sstevel@tonic-gate { 18807c478bd9Sstevel@tonic-gate mutex_enter(&rfs4_deleg_lock); 18817c478bd9Sstevel@tonic-gate ASSERT(rfs4_deleg_disabled > 0); 18827c478bd9Sstevel@tonic-gate rfs4_deleg_disabled--; 18837c478bd9Sstevel@tonic-gate mutex_exit(&rfs4_deleg_lock); 18847c478bd9Sstevel@tonic-gate } 18857c478bd9Sstevel@tonic-gate 18867c478bd9Sstevel@tonic-gate void 18877c478bd9Sstevel@tonic-gate rfs4_mon_hold(void *arg) 18887c478bd9Sstevel@tonic-gate { 18897c478bd9Sstevel@tonic-gate rfs4_file_t *fp = arg; 18907c478bd9Sstevel@tonic-gate 1891d216dff5SRobert Mastors rfs4_dbe_hold(fp->rf_dbe); 18927c478bd9Sstevel@tonic-gate } 18937c478bd9Sstevel@tonic-gate 18947c478bd9Sstevel@tonic-gate void 18957c478bd9Sstevel@tonic-gate rfs4_mon_rele(void *arg) 18967c478bd9Sstevel@tonic-gate { 18977c478bd9Sstevel@tonic-gate rfs4_file_t *fp = arg; 18987c478bd9Sstevel@tonic-gate 1899d216dff5SRobert Mastors rfs4_dbe_rele_nolock(fp->rf_dbe); 19007c478bd9Sstevel@tonic-gate } 1901