Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/sys/nlm/nlm_advlock.c
39475 views
1
/*-
2
* SPDX-License-Identifier: BSD-2-Clause
3
*
4
* Copyright (c) 2008 Isilon Inc http://www.isilon.com/
5
* Authors: Doug Rabson <[email protected]>
6
* Developed with Red Inc: Alfred Perlstein <[email protected]>
7
*
8
* Redistribution and use in source and binary forms, with or without
9
* modification, are permitted provided that the following conditions
10
* are met:
11
* 1. Redistributions of source code must retain the above copyright
12
* notice, this list of conditions and the following disclaimer.
13
* 2. Redistributions in binary form must reproduce the above copyright
14
* notice, this list of conditions and the following disclaimer in the
15
* documentation and/or other materials provided with the distribution.
16
*
17
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27
* SUCH DAMAGE.
28
*/
29
30
#include <sys/param.h>
31
#include <sys/fcntl.h>
32
#include <sys/jail.h>
33
#include <sys/kernel.h>
34
#include <sys/limits.h>
35
#include <sys/lock.h>
36
#include <sys/lockf.h>
37
#include <sys/malloc.h>
38
#include <sys/mbuf.h>
39
#include <sys/mount.h>
40
#include <sys/mutex.h>
41
#include <sys/proc.h>
42
#include <sys/socket.h>
43
#include <sys/syslog.h>
44
#include <sys/systm.h>
45
#include <sys/unistd.h>
46
#include <sys/vnode.h>
47
48
#include <nfs/nfsproto.h>
49
#include <nfsclient/nfs.h>
50
#include <nfsclient/nfsmount.h>
51
52
#include <nlm/nlm_prot.h>
53
#include <nlm/nlm.h>
54
55
/*
56
* We need to keep track of the svid values used for F_FLOCK locks.
57
*/
58
struct nlm_file_svid {
59
int ns_refs; /* thread count + 1 if active */
60
int ns_svid; /* on-the-wire SVID for this file */
61
struct ucred *ns_ucred; /* creds to use for lock recovery */
62
void *ns_id; /* local struct file pointer */
63
bool_t ns_active; /* TRUE if we own a lock */
64
LIST_ENTRY(nlm_file_svid) ns_link;
65
};
66
LIST_HEAD(nlm_file_svid_list, nlm_file_svid);
67
68
#define NLM_SVID_HASH_SIZE 256
69
struct nlm_file_svid_list nlm_file_svids[NLM_SVID_HASH_SIZE];
70
71
struct mtx nlm_svid_lock;
72
static struct unrhdr *nlm_svid_allocator;
73
static volatile u_int nlm_xid = 1;
74
75
static int nlm_setlock(struct nlm_host *host, struct rpc_callextra *ext,
76
rpcvers_t vers, struct timeval *timo, int retries,
77
struct vnode *vp, int op, struct flock *fl, int flags,
78
int svid, size_t fhlen, void *fh, off_t size, bool_t reclaim);
79
static int nlm_clearlock(struct nlm_host *host, struct rpc_callextra *ext,
80
rpcvers_t vers, struct timeval *timo, int retries,
81
struct vnode *vp, int op, struct flock *fl, int flags,
82
int svid, size_t fhlen, void *fh, off_t size);
83
static int nlm_getlock(struct nlm_host *host, struct rpc_callextra *ext,
84
rpcvers_t vers, struct timeval *timo, int retries,
85
struct vnode *vp, int op, struct flock *fl, int flags,
86
int svid, size_t fhlen, void *fh, off_t size);
87
static int nlm_map_status(nlm4_stats stat);
88
static struct nlm_file_svid *nlm_find_svid(void *id);
89
static void nlm_free_svid(struct nlm_file_svid *nf);
90
static int nlm_init_lock(struct flock *fl, int flags, int svid,
91
rpcvers_t vers, size_t fhlen, void *fh, off_t size,
92
struct nlm4_lock *lock, char oh_space[32]);
93
94
static void
95
nlm_client_init(void *dummy)
96
{
97
int i;
98
99
mtx_init(&nlm_svid_lock, "NLM svid lock", NULL, MTX_DEF);
100
/* pid_max cannot be greater than PID_MAX */
101
nlm_svid_allocator = new_unrhdr(PID_MAX + 2, INT_MAX, &nlm_svid_lock);
102
for (i = 0; i < NLM_SVID_HASH_SIZE; i++)
103
LIST_INIT(&nlm_file_svids[i]);
104
}
105
SYSINIT(nlm_client_init, SI_SUB_LOCK, SI_ORDER_FIRST, nlm_client_init, NULL);
106
107
static int
108
nlm_msg(struct thread *td, const char *server, const char *msg, int error)
109
{
110
struct proc *p;
111
112
p = td ? td->td_proc : NULL;
113
if (error) {
114
tprintf(p, LOG_INFO, "nfs server %s: %s, error %d\n", server,
115
msg, error);
116
} else {
117
tprintf(p, LOG_INFO, "nfs server %s: %s\n", server, msg);
118
}
119
return (0);
120
}
121
122
struct nlm_feedback_arg {
123
bool_t nf_printed;
124
struct nfsmount *nf_nmp;
125
};
126
127
static void
128
nlm_down(struct nlm_feedback_arg *nf, struct thread *td,
129
const char *msg, int error)
130
{
131
struct nfsmount *nmp = nf->nf_nmp;
132
133
if (nmp == NULL)
134
return;
135
mtx_lock(&nmp->nm_mtx);
136
if (!(nmp->nm_state & NFSSTA_LOCKTIMEO)) {
137
nmp->nm_state |= NFSSTA_LOCKTIMEO;
138
mtx_unlock(&nmp->nm_mtx);
139
vfs_event_signal(&nmp->nm_mountp->mnt_stat.f_fsid,
140
VQ_NOTRESPLOCK, 0);
141
} else {
142
mtx_unlock(&nmp->nm_mtx);
143
}
144
145
nf->nf_printed = TRUE;
146
nlm_msg(td, nmp->nm_mountp->mnt_stat.f_mntfromname, msg, error);
147
}
148
149
static void
150
nlm_up(struct nlm_feedback_arg *nf, struct thread *td,
151
const char *msg)
152
{
153
struct nfsmount *nmp = nf->nf_nmp;
154
155
if (!nf->nf_printed)
156
return;
157
158
nlm_msg(td, nmp->nm_mountp->mnt_stat.f_mntfromname, msg, 0);
159
160
mtx_lock(&nmp->nm_mtx);
161
if (nmp->nm_state & NFSSTA_LOCKTIMEO) {
162
nmp->nm_state &= ~NFSSTA_LOCKTIMEO;
163
mtx_unlock(&nmp->nm_mtx);
164
vfs_event_signal(&nmp->nm_mountp->mnt_stat.f_fsid,
165
VQ_NOTRESPLOCK, 1);
166
} else {
167
mtx_unlock(&nmp->nm_mtx);
168
}
169
}
170
171
static void
172
nlm_feedback(int type, int proc, void *arg)
173
{
174
struct thread *td = curthread;
175
struct nlm_feedback_arg *nf = (struct nlm_feedback_arg *) arg;
176
177
switch (type) {
178
case FEEDBACK_REXMIT2:
179
case FEEDBACK_RECONNECT:
180
nlm_down(nf, td, "lockd not responding", 0);
181
break;
182
183
case FEEDBACK_OK:
184
nlm_up(nf, td, "lockd is alive again");
185
break;
186
}
187
}
188
189
/*
190
* nlm_advlock --
191
* NFS advisory byte-level locks.
192
*/
193
static int
194
nlm_advlock_internal(struct vnode *vp, void *id, int op, struct flock *fl,
195
int flags, bool_t reclaim, bool_t unlock_vp)
196
{
197
struct thread *td = curthread;
198
struct nfsmount *nmp;
199
off_t size;
200
size_t fhlen;
201
union nfsfh fh;
202
struct sockaddr *sa;
203
struct sockaddr_storage ss;
204
char *servername;
205
struct timeval timo;
206
int retries;
207
rpcvers_t vers;
208
struct nlm_host *host;
209
struct rpc_callextra ext;
210
struct nlm_feedback_arg nf;
211
AUTH *auth;
212
struct ucred *cred, *cred1;
213
struct nlm_file_svid *ns;
214
int svid;
215
int error;
216
int is_v3;
217
218
ASSERT_VOP_LOCKED(vp, "nlm_advlock_1");
219
220
servername = malloc(MNAMELEN, M_TEMP, M_WAITOK); /* XXXKIB vp locked */
221
nmp = VFSTONFS(vp->v_mount);
222
/*
223
* Push any pending writes to the server and flush our cache
224
* so that if we are contending with another machine for a
225
* file, we get whatever they wrote and vice-versa.
226
*/
227
if (op == F_SETLK || op == F_UNLCK)
228
nmp->nm_vinvalbuf(vp, V_SAVE, td, 1);
229
230
strcpy(servername, nmp->nm_hostname);
231
nmp->nm_getinfo(vp, fh.fh_bytes, &fhlen, &ss, &is_v3, &size, &timo);
232
sa = (struct sockaddr *) &ss;
233
if (is_v3 != 0)
234
vers = NLM_VERS4;
235
else
236
vers = NLM_VERS;
237
238
if (nmp->nm_flag & NFSMNT_SOFT)
239
retries = nmp->nm_retry;
240
else
241
retries = INT_MAX;
242
243
/*
244
* We need to switch to mount-point creds so that we can send
245
* packets from a privileged port. Reference mnt_cred and
246
* switch to them before unlocking the vnode, since mount
247
* point could be unmounted right after unlock.
248
*/
249
cred = td->td_ucred;
250
td->td_ucred = vp->v_mount->mnt_cred;
251
crhold(td->td_ucred);
252
if (unlock_vp)
253
VOP_UNLOCK(vp);
254
255
host = nlm_find_host_by_name(servername, sa, vers);
256
auth = authunix_create(cred);
257
memset(&ext, 0, sizeof(ext));
258
259
nf.nf_printed = FALSE;
260
nf.nf_nmp = nmp;
261
ext.rc_auth = auth;
262
263
ext.rc_feedback = nlm_feedback;
264
ext.rc_feedback_arg = &nf;
265
ext.rc_timers = NULL;
266
267
ns = NULL;
268
if (flags & F_FLOCK) {
269
ns = nlm_find_svid(id);
270
KASSERT(fl->l_start == 0 && fl->l_len == 0,
271
("F_FLOCK lock requests must be whole-file locks"));
272
if (!ns->ns_ucred) {
273
/*
274
* Remember the creds used for locking in case
275
* we need to recover the lock later.
276
*/
277
ns->ns_ucred = crdup(cred);
278
}
279
svid = ns->ns_svid;
280
} else if (flags & F_REMOTE) {
281
/*
282
* If we are recovering after a server restart or
283
* trashing locks on a force unmount, use the same
284
* svid as last time.
285
*/
286
svid = fl->l_pid;
287
} else {
288
svid = ((struct proc *) id)->p_pid;
289
}
290
291
switch(op) {
292
case F_SETLK:
293
if ((flags & (F_FLOCK|F_WAIT)) == (F_FLOCK|F_WAIT)
294
&& fl->l_type == F_WRLCK) {
295
/*
296
* The semantics for flock(2) require that any
297
* shared lock on the file must be released
298
* before an exclusive lock is granted. The
299
* local locking code interprets this by
300
* unlocking the file before sleeping on a
301
* blocked exclusive lock request. We
302
* approximate this by first attempting
303
* non-blocking and if that fails, we unlock
304
* the file and block.
305
*/
306
error = nlm_setlock(host, &ext, vers, &timo, retries,
307
vp, F_SETLK, fl, flags & ~F_WAIT,
308
svid, fhlen, &fh.fh_bytes, size, reclaim);
309
if (error == EAGAIN) {
310
fl->l_type = F_UNLCK;
311
error = nlm_clearlock(host, &ext, vers, &timo,
312
retries, vp, F_UNLCK, fl, flags,
313
svid, fhlen, &fh.fh_bytes, size);
314
fl->l_type = F_WRLCK;
315
if (!error) {
316
mtx_lock(&nlm_svid_lock);
317
if (ns->ns_active) {
318
ns->ns_refs--;
319
ns->ns_active = FALSE;
320
}
321
mtx_unlock(&nlm_svid_lock);
322
flags |= F_WAIT;
323
error = nlm_setlock(host, &ext, vers,
324
&timo, retries, vp, F_SETLK, fl,
325
flags, svid, fhlen, &fh.fh_bytes,
326
size, reclaim);
327
}
328
}
329
} else {
330
error = nlm_setlock(host, &ext, vers, &timo, retries,
331
vp, op, fl, flags, svid, fhlen, &fh.fh_bytes,
332
size, reclaim);
333
}
334
if (!error && ns) {
335
mtx_lock(&nlm_svid_lock);
336
if (!ns->ns_active) {
337
/*
338
* Add one to the reference count to
339
* hold onto the SVID for the lifetime
340
* of the lock. Note that since
341
* F_FLOCK only supports whole-file
342
* locks, there can only be one active
343
* lock for this SVID.
344
*/
345
ns->ns_refs++;
346
ns->ns_active = TRUE;
347
}
348
mtx_unlock(&nlm_svid_lock);
349
}
350
break;
351
352
case F_UNLCK:
353
error = nlm_clearlock(host, &ext, vers, &timo, retries,
354
vp, op, fl, flags, svid, fhlen, &fh.fh_bytes, size);
355
if (!error && ns) {
356
mtx_lock(&nlm_svid_lock);
357
if (ns->ns_active) {
358
ns->ns_refs--;
359
ns->ns_active = FALSE;
360
}
361
mtx_unlock(&nlm_svid_lock);
362
}
363
break;
364
365
case F_GETLK:
366
error = nlm_getlock(host, &ext, vers, &timo, retries,
367
vp, op, fl, flags, svid, fhlen, &fh.fh_bytes, size);
368
break;
369
370
default:
371
error = EINVAL;
372
break;
373
}
374
375
if (ns)
376
nlm_free_svid(ns);
377
378
cred1 = td->td_ucred;
379
td->td_ucred = cred;
380
crfree(cred1);
381
AUTH_DESTROY(auth);
382
383
nlm_host_release(host);
384
free(servername, M_TEMP);
385
return (error);
386
}
387
388
int
389
nlm_advlock(struct vop_advlock_args *ap)
390
{
391
392
return (nlm_advlock_internal(ap->a_vp, ap->a_id, ap->a_op, ap->a_fl,
393
ap->a_flags, FALSE, TRUE));
394
}
395
396
/*
397
* Set the creds of td to the creds of the given lock's owner. The new
398
* creds reference count will be incremented via crhold. The caller is
399
* responsible for calling crfree and restoring td's original creds.
400
*/
401
static void
402
nlm_set_creds_for_lock(struct thread *td, struct flock *fl)
403
{
404
int i;
405
struct nlm_file_svid *ns;
406
struct proc *p;
407
struct ucred *cred;
408
409
cred = NULL;
410
if (fl->l_pid > PID_MAX) {
411
/*
412
* If this was originally a F_FLOCK-style lock, we
413
* recorded the creds used when it was originally
414
* locked in the nlm_file_svid structure.
415
*/
416
mtx_lock(&nlm_svid_lock);
417
for (i = 0; i < NLM_SVID_HASH_SIZE; i++) {
418
for (ns = LIST_FIRST(&nlm_file_svids[i]); ns;
419
ns = LIST_NEXT(ns, ns_link)) {
420
if (ns->ns_svid == fl->l_pid) {
421
cred = crhold(ns->ns_ucred);
422
break;
423
}
424
}
425
}
426
mtx_unlock(&nlm_svid_lock);
427
} else {
428
/*
429
* This lock is owned by a process. Get a reference to
430
* the process creds.
431
*/
432
p = pfind(fl->l_pid);
433
if (p) {
434
cred = crhold(p->p_ucred);
435
PROC_UNLOCK(p);
436
}
437
}
438
439
/*
440
* If we can't find a cred, fall back on the recovery
441
* thread's cred.
442
*/
443
if (!cred) {
444
cred = crhold(td->td_ucred);
445
}
446
447
td->td_ucred = cred;
448
}
449
450
static int
451
nlm_reclaim_free_lock(struct vnode *vp, struct flock *fl, void *arg)
452
{
453
struct flock newfl;
454
struct thread *td = curthread;
455
struct ucred *oldcred;
456
int error;
457
458
newfl = *fl;
459
newfl.l_type = F_UNLCK;
460
461
oldcred = td->td_ucred;
462
nlm_set_creds_for_lock(td, &newfl);
463
464
error = nlm_advlock_internal(vp, NULL, F_UNLCK, &newfl, F_REMOTE,
465
FALSE, FALSE);
466
467
crfree(td->td_ucred);
468
td->td_ucred = oldcred;
469
470
return (error);
471
}
472
473
int
474
nlm_reclaim(struct vop_reclaim_args *ap)
475
{
476
477
nlm_cancel_wait(ap->a_vp);
478
lf_iteratelocks_vnode(ap->a_vp, nlm_reclaim_free_lock, NULL);
479
return (0);
480
}
481
482
struct nlm_recovery_context {
483
struct nlm_host *nr_host; /* host we are recovering */
484
int nr_state; /* remote NSM state for recovery */
485
};
486
487
static int
488
nlm_client_recover_lock(struct vnode *vp, struct flock *fl, void *arg)
489
{
490
struct nlm_recovery_context *nr = (struct nlm_recovery_context *) arg;
491
struct thread *td = curthread;
492
struct ucred *oldcred;
493
int state, error;
494
495
/*
496
* If the remote NSM state changes during recovery, the host
497
* must have rebooted a second time. In that case, we must
498
* restart the recovery.
499
*/
500
state = nlm_host_get_state(nr->nr_host);
501
if (nr->nr_state != state)
502
return (ERESTART);
503
504
error = vn_lock(vp, LK_SHARED);
505
if (error)
506
return (error);
507
508
oldcred = td->td_ucred;
509
nlm_set_creds_for_lock(td, fl);
510
511
error = nlm_advlock_internal(vp, NULL, F_SETLK, fl, F_REMOTE,
512
TRUE, TRUE);
513
514
crfree(td->td_ucred);
515
td->td_ucred = oldcred;
516
517
return (error);
518
}
519
520
void
521
nlm_client_recovery(struct nlm_host *host)
522
{
523
struct nlm_recovery_context nr;
524
int sysid, error;
525
526
sysid = NLM_SYSID_CLIENT | nlm_host_get_sysid(host);
527
do {
528
nr.nr_host = host;
529
nr.nr_state = nlm_host_get_state(host);
530
error = lf_iteratelocks_sysid(sysid,
531
nlm_client_recover_lock, &nr);
532
} while (error == ERESTART);
533
}
534
535
static void
536
nlm_convert_to_nlm_lock(struct nlm_lock *dst, struct nlm4_lock *src)
537
{
538
539
dst->caller_name = src->caller_name;
540
dst->fh = src->fh;
541
dst->oh = src->oh;
542
dst->svid = src->svid;
543
dst->l_offset = src->l_offset;
544
dst->l_len = src->l_len;
545
}
546
547
static void
548
nlm_convert_to_nlm4_holder(struct nlm4_holder *dst, struct nlm_holder *src)
549
{
550
551
dst->exclusive = src->exclusive;
552
dst->svid = src->svid;
553
dst->oh = src->oh;
554
dst->l_offset = src->l_offset;
555
dst->l_len = src->l_len;
556
}
557
558
static void
559
nlm_convert_to_nlm4_res(struct nlm4_res *dst, struct nlm_res *src)
560
{
561
dst->cookie = src->cookie;
562
dst->stat.stat = (enum nlm4_stats) src->stat.stat;
563
}
564
565
static enum clnt_stat
566
nlm_test_rpc(rpcvers_t vers, nlm4_testargs *args, nlm4_testres *res, CLIENT *client,
567
struct rpc_callextra *ext, struct timeval timo)
568
{
569
if (vers == NLM_VERS4) {
570
return nlm4_test_4(args, res, client, ext, timo);
571
} else {
572
nlm_testargs args1;
573
nlm_testres res1;
574
enum clnt_stat stat;
575
576
args1.cookie = args->cookie;
577
args1.exclusive = args->exclusive;
578
nlm_convert_to_nlm_lock(&args1.alock, &args->alock);
579
memset(&res1, 0, sizeof(res1));
580
581
stat = nlm_test_1(&args1, &res1, client, ext, timo);
582
583
if (stat == RPC_SUCCESS) {
584
res->cookie = res1.cookie;
585
res->stat.stat = (enum nlm4_stats) res1.stat.stat;
586
if (res1.stat.stat == nlm_denied)
587
nlm_convert_to_nlm4_holder(
588
&res->stat.nlm4_testrply_u.holder,
589
&res1.stat.nlm_testrply_u.holder);
590
}
591
592
return (stat);
593
}
594
}
595
596
static enum clnt_stat
597
nlm_lock_rpc(rpcvers_t vers, nlm4_lockargs *args, nlm4_res *res, CLIENT *client,
598
struct rpc_callextra *ext, struct timeval timo)
599
{
600
if (vers == NLM_VERS4) {
601
return nlm4_lock_4(args, res, client, ext, timo);
602
} else {
603
nlm_lockargs args1;
604
nlm_res res1;
605
enum clnt_stat stat;
606
607
args1.cookie = args->cookie;
608
args1.block = args->block;
609
args1.exclusive = args->exclusive;
610
nlm_convert_to_nlm_lock(&args1.alock, &args->alock);
611
args1.reclaim = args->reclaim;
612
args1.state = args->state;
613
memset(&res1, 0, sizeof(res1));
614
615
stat = nlm_lock_1(&args1, &res1, client, ext, timo);
616
617
if (stat == RPC_SUCCESS) {
618
nlm_convert_to_nlm4_res(res, &res1);
619
}
620
621
return (stat);
622
}
623
}
624
625
static enum clnt_stat
626
nlm_cancel_rpc(rpcvers_t vers, nlm4_cancargs *args, nlm4_res *res, CLIENT *client,
627
struct rpc_callextra *ext, struct timeval timo)
628
{
629
if (vers == NLM_VERS4) {
630
return nlm4_cancel_4(args, res, client, ext, timo);
631
} else {
632
nlm_cancargs args1;
633
nlm_res res1;
634
enum clnt_stat stat;
635
636
args1.cookie = args->cookie;
637
args1.block = args->block;
638
args1.exclusive = args->exclusive;
639
nlm_convert_to_nlm_lock(&args1.alock, &args->alock);
640
memset(&res1, 0, sizeof(res1));
641
642
stat = nlm_cancel_1(&args1, &res1, client, ext, timo);
643
644
if (stat == RPC_SUCCESS) {
645
nlm_convert_to_nlm4_res(res, &res1);
646
}
647
648
return (stat);
649
}
650
}
651
652
static enum clnt_stat
653
nlm_unlock_rpc(rpcvers_t vers, nlm4_unlockargs *args, nlm4_res *res, CLIENT *client,
654
struct rpc_callextra *ext, struct timeval timo)
655
{
656
if (vers == NLM_VERS4) {
657
return nlm4_unlock_4(args, res, client, ext, timo);
658
} else {
659
nlm_unlockargs args1;
660
nlm_res res1;
661
enum clnt_stat stat;
662
663
args1.cookie = args->cookie;
664
nlm_convert_to_nlm_lock(&args1.alock, &args->alock);
665
memset(&res1, 0, sizeof(res1));
666
667
stat = nlm_unlock_1(&args1, &res1, client, ext, timo);
668
669
if (stat == RPC_SUCCESS) {
670
nlm_convert_to_nlm4_res(res, &res1);
671
}
672
673
return (stat);
674
}
675
}
676
677
/*
678
* Called after a lock request (set or clear) succeeded. We record the
679
* details in the local lock manager. Note that since the remote
680
* server has granted the lock, we can be sure that it doesn't
681
* conflict with any other locks we have in the local lock manager.
682
*
683
* Since it is possible that host may also make NLM client requests to
684
* our NLM server, we use a different sysid value to record our own
685
* client locks.
686
*
687
* Note that since it is possible for us to receive replies from the
688
* server in a different order than the locks were granted (e.g. if
689
* many local threads are contending for the same lock), we must use a
690
* blocking operation when registering with the local lock manager.
691
* We expect that any actual wait will be rare and short hence we
692
* ignore signals for this.
693
*/
694
static void
695
nlm_record_lock(struct vnode *vp, int op, struct flock *fl,
696
int svid, int sysid, off_t size)
697
{
698
struct vop_advlockasync_args a;
699
struct flock newfl;
700
struct proc *p;
701
int error, stops_deferred;
702
703
a.a_vp = vp;
704
a.a_id = NULL;
705
a.a_op = op;
706
a.a_fl = &newfl;
707
a.a_flags = F_REMOTE|F_WAIT|F_NOINTR;
708
a.a_task = NULL;
709
a.a_cookiep = NULL;
710
newfl.l_start = fl->l_start;
711
newfl.l_len = fl->l_len;
712
newfl.l_type = fl->l_type;
713
newfl.l_whence = fl->l_whence;
714
newfl.l_pid = svid;
715
newfl.l_sysid = NLM_SYSID_CLIENT | sysid;
716
717
for (;;) {
718
error = lf_advlockasync(&a, &vp->v_lockf, size);
719
if (error == EDEADLK) {
720
/*
721
* Locks are associated with the processes and
722
* not with threads. Suppose we have two
723
* threads A1 A2 in one process, A1 locked
724
* file f1, A2 is locking file f2, and A1 is
725
* unlocking f1. Then remote server may
726
* already unlocked f1, while local still not
727
* yet scheduled A1 to make the call to local
728
* advlock manager. The process B owns lock on
729
* f2 and issued the lock on f1. Remote would
730
* grant B the request on f1, but local would
731
* return EDEADLK.
732
*/
733
pause("nlmdlk", 1);
734
p = curproc;
735
stops_deferred = sigdeferstop(SIGDEFERSTOP_OFF);
736
PROC_LOCK(p);
737
thread_suspend_check(0);
738
PROC_UNLOCK(p);
739
sigallowstop(stops_deferred);
740
} else if (error == EINTR) {
741
/*
742
* lf_purgelocks() might wake up the lock
743
* waiter and removed our lock graph edges.
744
* There is no sense in re-trying recording
745
* the lock to the local manager after
746
* reclaim.
747
*/
748
error = 0;
749
break;
750
} else
751
break;
752
}
753
KASSERT(error == 0 || error == ENOENT,
754
("Failed to register NFS lock locally - error=%d", error));
755
}
756
757
static int
758
nlm_setlock(struct nlm_host *host, struct rpc_callextra *ext,
759
rpcvers_t vers, struct timeval *timo, int retries,
760
struct vnode *vp, int op, struct flock *fl, int flags,
761
int svid, size_t fhlen, void *fh, off_t size, bool_t reclaim)
762
{
763
struct nlm4_lockargs args;
764
char oh_space[32];
765
struct nlm4_res res;
766
u_int xid;
767
CLIENT *client;
768
enum clnt_stat stat;
769
int retry, block, exclusive;
770
void *wait_handle = NULL;
771
int error;
772
773
memset(&args, 0, sizeof(args));
774
memset(&res, 0, sizeof(res));
775
776
block = (flags & F_WAIT) ? TRUE : FALSE;
777
exclusive = (fl->l_type == F_WRLCK);
778
779
error = nlm_init_lock(fl, flags, svid, vers, fhlen, fh, size,
780
&args.alock, oh_space);
781
if (error)
782
return (error);
783
args.block = block;
784
args.exclusive = exclusive;
785
args.reclaim = reclaim;
786
args.state = nlm_nsm_state;
787
788
retry = 5*hz;
789
for (;;) {
790
client = nlm_host_get_rpc(host, FALSE);
791
if (!client)
792
return (ENOLCK); /* XXX retry? */
793
794
if (block)
795
wait_handle = nlm_register_wait_lock(&args.alock, vp);
796
797
xid = atomic_fetchadd_int(&nlm_xid, 1);
798
args.cookie.n_len = sizeof(xid);
799
args.cookie.n_bytes = (char*) &xid;
800
801
stat = nlm_lock_rpc(vers, &args, &res, client, ext, *timo);
802
803
CLNT_RELEASE(client);
804
805
if (stat != RPC_SUCCESS) {
806
if (block)
807
nlm_deregister_wait_lock(wait_handle);
808
if (retries) {
809
retries--;
810
continue;
811
}
812
return (EINVAL);
813
}
814
815
/*
816
* Free res.cookie.
817
*/
818
xdr_free((xdrproc_t) xdr_nlm4_res, &res);
819
820
if (block && res.stat.stat != nlm4_blocked)
821
nlm_deregister_wait_lock(wait_handle);
822
823
if (res.stat.stat == nlm4_denied_grace_period) {
824
/*
825
* The server has recently rebooted and is
826
* giving old clients a change to reclaim
827
* their locks. Wait for a few seconds and try
828
* again.
829
*/
830
error = tsleep(&args, PCATCH, "nlmgrace", retry);
831
if (error && error != EWOULDBLOCK)
832
return (error);
833
retry = 2*retry;
834
if (retry > 30*hz)
835
retry = 30*hz;
836
continue;
837
}
838
839
if (block && res.stat.stat == nlm4_blocked) {
840
/*
841
* The server should call us back with a
842
* granted message when the lock succeeds. In
843
* order to deal with broken servers, lost
844
* granted messages and server reboots, we
845
* will also re-try every few seconds.
846
*/
847
error = nlm_wait_lock(wait_handle, retry);
848
if (error == EWOULDBLOCK) {
849
retry = 2*retry;
850
if (retry > 30*hz)
851
retry = 30*hz;
852
continue;
853
}
854
if (error) {
855
/*
856
* We need to call the server to
857
* cancel our lock request.
858
*/
859
nlm4_cancargs cancel;
860
861
memset(&cancel, 0, sizeof(cancel));
862
863
xid = atomic_fetchadd_int(&nlm_xid, 1);
864
cancel.cookie.n_len = sizeof(xid);
865
cancel.cookie.n_bytes = (char*) &xid;
866
cancel.block = block;
867
cancel.exclusive = exclusive;
868
cancel.alock = args.alock;
869
870
do {
871
client = nlm_host_get_rpc(host, FALSE);
872
if (!client)
873
/* XXX retry? */
874
return (ENOLCK);
875
876
stat = nlm_cancel_rpc(vers, &cancel,
877
&res, client, ext, *timo);
878
879
CLNT_RELEASE(client);
880
881
if (stat != RPC_SUCCESS) {
882
/*
883
* We need to cope
884
* with temporary
885
* network partitions
886
* as well as server
887
* reboots. This means
888
* we have to keep
889
* trying to cancel
890
* until the server
891
* wakes up again.
892
*/
893
pause("nlmcancel", 10*hz);
894
}
895
} while (stat != RPC_SUCCESS);
896
897
/*
898
* Free res.cookie.
899
*/
900
xdr_free((xdrproc_t) xdr_nlm4_res, &res);
901
902
switch (res.stat.stat) {
903
case nlm_denied:
904
/*
905
* There was nothing
906
* to cancel. We are
907
* going to go ahead
908
* and assume we got
909
* the lock.
910
*/
911
error = 0;
912
break;
913
914
case nlm4_denied_grace_period:
915
/*
916
* The server has
917
* recently rebooted -
918
* treat this as a
919
* successful
920
* cancellation.
921
*/
922
break;
923
924
case nlm4_granted:
925
/*
926
* We managed to
927
* cancel.
928
*/
929
break;
930
931
default:
932
/*
933
* Broken server
934
* implementation -
935
* can't really do
936
* anything here.
937
*/
938
break;
939
}
940
}
941
} else {
942
error = nlm_map_status(res.stat.stat);
943
}
944
945
if (!error && !reclaim) {
946
nlm_record_lock(vp, op, fl, args.alock.svid,
947
nlm_host_get_sysid(host), size);
948
nlm_host_monitor(host, 0);
949
}
950
951
return (error);
952
}
953
}
954
955
static int
956
nlm_clearlock(struct nlm_host *host, struct rpc_callextra *ext,
957
rpcvers_t vers, struct timeval *timo, int retries,
958
struct vnode *vp, int op, struct flock *fl, int flags,
959
int svid, size_t fhlen, void *fh, off_t size)
960
{
961
struct nlm4_unlockargs args;
962
char oh_space[32];
963
struct nlm4_res res;
964
u_int xid;
965
CLIENT *client;
966
enum clnt_stat stat;
967
int error;
968
969
memset(&args, 0, sizeof(args));
970
memset(&res, 0, sizeof(res));
971
972
error = nlm_init_lock(fl, flags, svid, vers, fhlen, fh, size,
973
&args.alock, oh_space);
974
if (error)
975
return (error);
976
977
for (;;) {
978
client = nlm_host_get_rpc(host, FALSE);
979
if (!client)
980
return (ENOLCK); /* XXX retry? */
981
982
xid = atomic_fetchadd_int(&nlm_xid, 1);
983
args.cookie.n_len = sizeof(xid);
984
args.cookie.n_bytes = (char*) &xid;
985
986
stat = nlm_unlock_rpc(vers, &args, &res, client, ext, *timo);
987
988
CLNT_RELEASE(client);
989
990
if (stat != RPC_SUCCESS) {
991
if (retries) {
992
retries--;
993
continue;
994
}
995
return (EINVAL);
996
}
997
998
/*
999
* Free res.cookie.
1000
*/
1001
xdr_free((xdrproc_t) xdr_nlm4_res, &res);
1002
1003
if (res.stat.stat == nlm4_denied_grace_period) {
1004
/*
1005
* The server has recently rebooted and is
1006
* giving old clients a change to reclaim
1007
* their locks. Wait for a few seconds and try
1008
* again.
1009
*/
1010
error = tsleep(&args, PCATCH, "nlmgrace", 5*hz);
1011
if (error && error != EWOULDBLOCK)
1012
return (error);
1013
continue;
1014
}
1015
1016
/*
1017
* If we are being called via nlm_reclaim (which will
1018
* use the F_REMOTE flag), don't record the lock
1019
* operation in the local lock manager since the vnode
1020
* is going away.
1021
*/
1022
if (!(flags & F_REMOTE))
1023
nlm_record_lock(vp, op, fl, args.alock.svid,
1024
nlm_host_get_sysid(host), size);
1025
1026
return (0);
1027
}
1028
}
1029
1030
static int
1031
nlm_getlock(struct nlm_host *host, struct rpc_callextra *ext,
1032
rpcvers_t vers, struct timeval *timo, int retries,
1033
struct vnode *vp, int op, struct flock *fl, int flags,
1034
int svid, size_t fhlen, void *fh, off_t size)
1035
{
1036
struct nlm4_testargs args;
1037
char oh_space[32];
1038
struct nlm4_testres res;
1039
u_int xid;
1040
CLIENT *client;
1041
enum clnt_stat stat;
1042
int exclusive;
1043
int error;
1044
1045
KASSERT(!(flags & F_FLOCK), ("unexpected F_FLOCK for F_GETLK"));
1046
1047
memset(&args, 0, sizeof(args));
1048
memset(&res, 0, sizeof(res));
1049
1050
exclusive = (fl->l_type == F_WRLCK);
1051
1052
error = nlm_init_lock(fl, flags, svid, vers, fhlen, fh, size,
1053
&args.alock, oh_space);
1054
if (error)
1055
return (error);
1056
args.exclusive = exclusive;
1057
1058
for (;;) {
1059
client = nlm_host_get_rpc(host, FALSE);
1060
if (!client)
1061
return (ENOLCK); /* XXX retry? */
1062
1063
xid = atomic_fetchadd_int(&nlm_xid, 1);
1064
args.cookie.n_len = sizeof(xid);
1065
args.cookie.n_bytes = (char*) &xid;
1066
1067
stat = nlm_test_rpc(vers, &args, &res, client, ext, *timo);
1068
1069
CLNT_RELEASE(client);
1070
1071
if (stat != RPC_SUCCESS) {
1072
if (retries) {
1073
retries--;
1074
continue;
1075
}
1076
return (EINVAL);
1077
}
1078
1079
if (res.stat.stat == nlm4_denied_grace_period) {
1080
/*
1081
* The server has recently rebooted and is
1082
* giving old clients a change to reclaim
1083
* their locks. Wait for a few seconds and try
1084
* again.
1085
*/
1086
xdr_free((xdrproc_t) xdr_nlm4_testres, &res);
1087
error = tsleep(&args, PCATCH, "nlmgrace", 5*hz);
1088
if (error && error != EWOULDBLOCK)
1089
return (error);
1090
continue;
1091
}
1092
1093
if (res.stat.stat == nlm4_denied) {
1094
struct nlm4_holder *h =
1095
&res.stat.nlm4_testrply_u.holder;
1096
fl->l_start = h->l_offset;
1097
fl->l_len = h->l_len;
1098
fl->l_pid = h->svid;
1099
if (h->exclusive)
1100
fl->l_type = F_WRLCK;
1101
else
1102
fl->l_type = F_RDLCK;
1103
fl->l_whence = SEEK_SET;
1104
fl->l_sysid = 0;
1105
} else {
1106
fl->l_type = F_UNLCK;
1107
}
1108
1109
xdr_free((xdrproc_t) xdr_nlm4_testres, &res);
1110
1111
return (0);
1112
}
1113
}
1114
1115
static int
1116
nlm_map_status(nlm4_stats stat)
1117
{
1118
switch (stat) {
1119
case nlm4_granted:
1120
return (0);
1121
1122
case nlm4_denied:
1123
return (EAGAIN);
1124
1125
case nlm4_denied_nolocks:
1126
return (ENOLCK);
1127
1128
case nlm4_deadlck:
1129
return (EDEADLK);
1130
1131
case nlm4_rofs:
1132
return (EROFS);
1133
1134
case nlm4_stale_fh:
1135
return (ESTALE);
1136
1137
case nlm4_fbig:
1138
return (EFBIG);
1139
1140
case nlm4_failed:
1141
return (EACCES);
1142
1143
default:
1144
return (EINVAL);
1145
}
1146
}
1147
1148
static struct nlm_file_svid *
1149
nlm_find_svid(void *id)
1150
{
1151
struct nlm_file_svid *ns, *newns;
1152
int h;
1153
1154
h = (((uintptr_t) id) >> 7) % NLM_SVID_HASH_SIZE;
1155
1156
mtx_lock(&nlm_svid_lock);
1157
LIST_FOREACH(ns, &nlm_file_svids[h], ns_link) {
1158
if (ns->ns_id == id) {
1159
ns->ns_refs++;
1160
break;
1161
}
1162
}
1163
mtx_unlock(&nlm_svid_lock);
1164
if (!ns) {
1165
int svid = alloc_unr(nlm_svid_allocator);
1166
newns = malloc(sizeof(struct nlm_file_svid), M_NLM,
1167
M_WAITOK);
1168
newns->ns_refs = 1;
1169
newns->ns_id = id;
1170
newns->ns_svid = svid;
1171
newns->ns_ucred = NULL;
1172
newns->ns_active = FALSE;
1173
1174
/*
1175
* We need to check for a race with some other
1176
* thread allocating a svid for this file.
1177
*/
1178
mtx_lock(&nlm_svid_lock);
1179
LIST_FOREACH(ns, &nlm_file_svids[h], ns_link) {
1180
if (ns->ns_id == id) {
1181
ns->ns_refs++;
1182
break;
1183
}
1184
}
1185
if (ns) {
1186
mtx_unlock(&nlm_svid_lock);
1187
free_unr(nlm_svid_allocator, newns->ns_svid);
1188
free(newns, M_NLM);
1189
} else {
1190
LIST_INSERT_HEAD(&nlm_file_svids[h], newns,
1191
ns_link);
1192
ns = newns;
1193
mtx_unlock(&nlm_svid_lock);
1194
}
1195
}
1196
1197
return (ns);
1198
}
1199
1200
static void
1201
nlm_free_svid(struct nlm_file_svid *ns)
1202
{
1203
1204
mtx_lock(&nlm_svid_lock);
1205
ns->ns_refs--;
1206
if (!ns->ns_refs) {
1207
KASSERT(!ns->ns_active, ("Freeing active SVID"));
1208
LIST_REMOVE(ns, ns_link);
1209
mtx_unlock(&nlm_svid_lock);
1210
free_unr(nlm_svid_allocator, ns->ns_svid);
1211
if (ns->ns_ucred)
1212
crfree(ns->ns_ucred);
1213
free(ns, M_NLM);
1214
} else {
1215
mtx_unlock(&nlm_svid_lock);
1216
}
1217
}
1218
1219
static int
1220
nlm_init_lock(struct flock *fl, int flags, int svid,
1221
rpcvers_t vers, size_t fhlen, void *fh, off_t size,
1222
struct nlm4_lock *lock, char oh_space[32])
1223
{
1224
size_t oh_len;
1225
off_t start, len;
1226
1227
if (fl->l_whence == SEEK_END) {
1228
if (size > OFF_MAX
1229
|| (fl->l_start > 0 && size > OFF_MAX - fl->l_start))
1230
return (EOVERFLOW);
1231
start = size + fl->l_start;
1232
} else if (fl->l_whence == SEEK_SET || fl->l_whence == SEEK_CUR) {
1233
start = fl->l_start;
1234
} else {
1235
return (EINVAL);
1236
}
1237
if (start < 0)
1238
return (EINVAL);
1239
if (fl->l_len < 0) {
1240
len = -fl->l_len;
1241
start -= len;
1242
if (start < 0)
1243
return (EINVAL);
1244
} else {
1245
len = fl->l_len;
1246
}
1247
1248
if (vers == NLM_VERS) {
1249
/*
1250
* Enforce range limits on V1 locks
1251
*/
1252
if (start > 0xffffffffLL || len > 0xffffffffLL)
1253
return (EOVERFLOW);
1254
}
1255
1256
snprintf(oh_space, 32, "%d@", svid);
1257
oh_len = strlen(oh_space);
1258
getcredhostname(NULL, oh_space + oh_len, 32 - oh_len);
1259
oh_len = strlen(oh_space);
1260
1261
memset(lock, 0, sizeof(*lock));
1262
lock->caller_name = prison0.pr_hostname;
1263
lock->fh.n_len = fhlen;
1264
lock->fh.n_bytes = fh;
1265
lock->oh.n_len = oh_len;
1266
lock->oh.n_bytes = oh_space;
1267
lock->svid = svid;
1268
lock->l_offset = start;
1269
lock->l_len = len;
1270
1271
return (0);
1272
}
1273
1274