]> Git Repo - linux.git/blame - fs/lockd/svclock.c
Merge tag 'for-6.10/dm-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/device...
[linux.git] / fs / lockd / svclock.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
1da177e4
LT
2/*
3 * linux/fs/lockd/svclock.c
4 *
5 * Handling of server-side locks, mostly of the blocked variety.
6 * This is the ugliest part of lockd because we tread on very thin ice.
7 * GRANT and CANCEL calls may get stuck, meet in mid-flight, etc.
8 * IMNSHO introducing the grant callback into the NLM protocol was one
9 * of the worst ideas Sun ever had. Except maybe for the idea of doing
10 * NFS file locking at all.
11 *
12 * I'm trying hard to avoid race conditions by protecting most accesses
13 * to a file's list of blocked locks through a semaphore. The global
14 * list of blocked locks is not protected in this fashion however.
15 * Therefore, some functions (such as the RPC callback for the async grant
16 * call) move blocked locks towards the head of the list *while some other
17 * process might be traversing it*. This should not be a problem in
18 * practice, because this will only cause functions traversing the list
19 * to visit some blocks twice.
20 *
21 * Copyright (C) 1996, Olaf Kirch <[email protected]>
22 */
23
1da177e4 24#include <linux/types.h>
5a0e3ad6 25#include <linux/slab.h>
1da177e4
LT
26#include <linux/errno.h>
27#include <linux/kernel.h>
28#include <linux/sched.h>
1da177e4 29#include <linux/sunrpc/clnt.h>
5ccb0066 30#include <linux/sunrpc/svc_xprt.h>
1da177e4
LT
31#include <linux/lockd/nlm.h>
32#include <linux/lockd/lockd.h>
b840be2f 33#include <linux/exportfs.h>
1da177e4
LT
34
35#define NLMDBG_FACILITY NLMDBG_SVCLOCK
36
37#ifdef CONFIG_LOCKD_V4
38#define nlm_deadlock nlm4_deadlock
39#else
40#define nlm_deadlock nlm_lck_denied
41#endif
42
6849c0ca 43static void nlmsvc_release_block(struct nlm_block *block);
1da177e4 44static void nlmsvc_insert_block(struct nlm_block *block, unsigned long);
68a2d76c 45static void nlmsvc_remove_block(struct nlm_block *block);
963d8fe5 46
5e1abf8c
TM
47static int nlmsvc_setgrantargs(struct nlm_rqst *call, struct nlm_lock *lock);
48static void nlmsvc_freegrantargs(struct nlm_rqst *call);
963d8fe5 49static const struct rpc_call_ops nlmsvc_grant_ops;
1da177e4
LT
50
51/*
52 * The list of blocked locks to retry
53 */
68a2d76c 54static LIST_HEAD(nlm_blocked);
f904be9c 55static DEFINE_SPINLOCK(nlm_blocked_lock);
1da177e4 56
10b89567 57#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
ffa94db6
TM
58static const char *nlmdbg_cookie2a(const struct nlm_cookie *cookie)
59{
60 /*
3c519914
JL
61 * We can get away with a static buffer because this is only called
62 * from lockd, which is single-threaded.
ffa94db6
TM
63 */
64 static char buf[2*NLM_MAXCOOKIELEN+1];
65 unsigned int i, len = sizeof(buf);
66 char *p = buf;
67
68 len--; /* allow for trailing \0 */
69 if (len < 3)
70 return "???";
71 for (i = 0 ; i < cookie->len ; i++) {
72 if (len < 2) {
73 strcpy(p-3, "...");
74 break;
75 }
76 sprintf(p, "%02x", cookie->data[i]);
77 p += 2;
78 len -= 2;
79 }
80 *p = '\0';
81
82 return buf;
83}
84#endif
85
1da177e4
LT
86/*
87 * Insert a blocked lock into the global list
88 */
89static void
f904be9c 90nlmsvc_insert_block_locked(struct nlm_block *block, unsigned long when)
1da177e4 91{
68a2d76c
OK
92 struct nlm_block *b;
93 struct list_head *pos;
1da177e4
LT
94
95 dprintk("lockd: nlmsvc_insert_block(%p, %ld)\n", block, when);
68a2d76c
OK
96 if (list_empty(&block->b_list)) {
97 kref_get(&block->b_count);
98 } else {
99 list_del_init(&block->b_list);
100 }
101
102 pos = &nlm_blocked;
1da177e4
LT
103 if (when != NLM_NEVER) {
104 if ((when += jiffies) == NLM_NEVER)
105 when ++;
68a2d76c
OK
106 list_for_each(pos, &nlm_blocked) {
107 b = list_entry(pos, struct nlm_block, b_list);
108 if (time_after(b->b_when,when) || b->b_when == NLM_NEVER)
109 break;
110 }
111 /* On normal exit from the loop, pos == &nlm_blocked,
112 * so we will be adding to the end of the list - good
113 */
114 }
1da177e4 115
68a2d76c 116 list_add_tail(&block->b_list, pos);
1da177e4 117 block->b_when = when;
1da177e4
LT
118}
119
f904be9c
BS
120static void nlmsvc_insert_block(struct nlm_block *block, unsigned long when)
121{
122 spin_lock(&nlm_blocked_lock);
123 nlmsvc_insert_block_locked(block, when);
124 spin_unlock(&nlm_blocked_lock);
125}
126
1da177e4
LT
127/*
128 * Remove a block from the global list
129 */
68a2d76c 130static inline void
1da177e4
LT
131nlmsvc_remove_block(struct nlm_block *block)
132{
be2be5f7 133 spin_lock(&nlm_blocked_lock);
68a2d76c
OK
134 if (!list_empty(&block->b_list)) {
135 list_del_init(&block->b_list);
f904be9c 136 spin_unlock(&nlm_blocked_lock);
68a2d76c 137 nlmsvc_release_block(block);
be2be5f7 138 return;
1da177e4 139 }
be2be5f7 140 spin_unlock(&nlm_blocked_lock);
1da177e4
LT
141}
142
143/*
d9f6eb75 144 * Find a block for a given lock
1da177e4
LT
145 */
146static struct nlm_block *
d9f6eb75 147nlmsvc_lookup_block(struct nlm_file *file, struct nlm_lock *lock)
1da177e4 148{
68a2d76c 149 struct nlm_block *block;
1da177e4
LT
150 struct file_lock *fl;
151
152 dprintk("lockd: nlmsvc_lookup_block f=%p pd=%d %Ld-%Ld ty=%d\n",
eb8ed7c6 153 file, lock->fl.c.flc_pid,
1da177e4 154 (long long)lock->fl.fl_start,
eb8ed7c6
JL
155 (long long)lock->fl.fl_end,
156 lock->fl.c.flc_type);
be2be5f7 157 spin_lock(&nlm_blocked_lock);
68a2d76c 158 list_for_each_entry(block, &nlm_blocked, b_list) {
92737230 159 fl = &block->b_call->a_args.lock.fl;
1da177e4 160 dprintk("lockd: check f=%p pd=%d %Ld-%Ld ty=%d cookie=%s\n",
eb8ed7c6 161 block->b_file, fl->c.flc_pid,
1da177e4 162 (long long)fl->fl_start,
eb8ed7c6 163 (long long)fl->fl_end, fl->c.flc_type,
92737230 164 nlmdbg_cookie2a(&block->b_call->a_args.cookie));
1da177e4 165 if (block->b_file == file && nlm_compare_locks(fl, &lock->fl)) {
6849c0ca 166 kref_get(&block->b_count);
be2be5f7 167 spin_unlock(&nlm_blocked_lock);
1da177e4
LT
168 return block;
169 }
170 }
be2be5f7 171 spin_unlock(&nlm_blocked_lock);
1da177e4
LT
172
173 return NULL;
174}
175
176static inline int nlm_cookie_match(struct nlm_cookie *a, struct nlm_cookie *b)
177{
6d7bbbba 178 if (a->len != b->len)
1da177e4 179 return 0;
6d7bbbba 180 if (memcmp(a->data, b->data, a->len))
1da177e4
LT
181 return 0;
182 return 1;
183}
184
185/*
186 * Find a block with a given NLM cookie.
187 */
188static inline struct nlm_block *
39be4502 189nlmsvc_find_block(struct nlm_cookie *cookie)
1da177e4
LT
190{
191 struct nlm_block *block;
192
be2be5f7 193 spin_lock(&nlm_blocked_lock);
68a2d76c 194 list_for_each_entry(block, &nlm_blocked, b_list) {
39be4502 195 if (nlm_cookie_match(&block->b_call->a_args.cookie,cookie))
68a2d76c 196 goto found;
1da177e4 197 }
be2be5f7 198 spin_unlock(&nlm_blocked_lock);
1da177e4 199
68a2d76c
OK
200 return NULL;
201
202found:
39be4502 203 dprintk("nlmsvc_find_block(%s): block=%p\n", nlmdbg_cookie2a(cookie), block);
68a2d76c 204 kref_get(&block->b_count);
be2be5f7 205 spin_unlock(&nlm_blocked_lock);
1da177e4
LT
206 return block;
207}
208
209/*
210 * Create a block and initialize it.
211 *
212 * Note: we explicitly set the cookie of the grant reply to that of
213 * the blocked lock request. The spec explicitly mentions that the client
214 * should _not_ rely on the callback containing the same cookie as the
215 * request, but (as I found out later) that's because some implementations
216 * do just this. Never mind the standards comittees, they support our
217 * logging industries.
39be4502
OK
218 *
219 * 10 years later: I hope we can safely ignore these old and broken
220 * clients by now. Let's fix this so we can uniquely identify an incoming
221 * GRANTED_RES message by cookie, without having to rely on the client's IP
222 * address. --okir
1da177e4 223 */
255129d1
TM
224static struct nlm_block *
225nlmsvc_create_block(struct svc_rqst *rqstp, struct nlm_host *host,
226 struct nlm_file *file, struct nlm_lock *lock,
227 struct nlm_cookie *cookie)
1da177e4
LT
228{
229 struct nlm_block *block;
92737230 230 struct nlm_rqst *call = NULL;
1da177e4 231
92737230
TM
232 call = nlm_alloc_call(host);
233 if (call == NULL)
234 return NULL;
235
1da177e4 236 /* Allocate memory for block, and initialize arguments */
92737230
TM
237 block = kzalloc(sizeof(*block), GFP_KERNEL);
238 if (block == NULL)
1da177e4 239 goto failed;
6849c0ca 240 kref_init(&block->b_count);
68a2d76c
OK
241 INIT_LIST_HEAD(&block->b_list);
242 INIT_LIST_HEAD(&block->b_flist);
1da177e4 243
92737230 244 if (!nlmsvc_setgrantargs(call, lock))
1da177e4
LT
245 goto failed_free;
246
247 /* Set notifier function for VFS, and init args */
eb8ed7c6 248 call->a_args.lock.fl.c.flc_flags |= FL_SLEEP;
92737230 249 call->a_args.lock.fl.fl_lmops = &nlmsvc_lock_operations;
39be4502 250 nlmclnt_next_cookie(&call->a_args.cookie);
1da177e4
LT
251
252 dprintk("lockd: created block %p...\n", block);
253
254 /* Create and initialize the block */
255 block->b_daemon = rqstp->rq_server;
256 block->b_host = host;
257 block->b_file = file;
d9f6eb75 258 file->f_count++;
1da177e4
LT
259
260 /* Add to file's list of blocks */
68a2d76c 261 list_add(&block->b_flist, &file->f_blocks);
1da177e4
LT
262
263 /* Set up RPC arguments for callback */
92737230 264 block->b_call = call;
1da177e4 265 call->a_flags = RPC_TASK_ASYNC;
92737230 266 call->a_block = block;
1da177e4
LT
267
268 return block;
269
270failed_free:
271 kfree(block);
272failed:
7db836d4 273 nlmsvc_release_call(call);
1da177e4
LT
274 return NULL;
275}
276
277/*
3c61eecb 278 * Delete a block.
1da177e4
LT
279 * It is the caller's responsibility to check whether the file
280 * can be closed hereafter.
281 */
6849c0ca 282static int nlmsvc_unlink_block(struct nlm_block *block)
1da177e4 283{
09c7938c 284 int status;
6849c0ca 285 dprintk("lockd: unlinking block %p...\n", block);
1da177e4
LT
286
287 /* Remove block from list */
cb03f94f 288 status = locks_delete_block(&block->b_call->a_args.lock.fl);
1da177e4 289 nlmsvc_remove_block(block);
6849c0ca
TM
290 return status;
291}
1da177e4 292
6849c0ca
TM
293static void nlmsvc_free_block(struct kref *kref)
294{
295 struct nlm_block *block = container_of(kref, struct nlm_block, b_count);
296 struct nlm_file *file = block->b_file;
6849c0ca
TM
297
298 dprintk("lockd: freeing block %p...\n", block);
1da177e4
LT
299
300 /* Remove block from file's list of blocks */
68a2d76c 301 list_del_init(&block->b_flist);
89e63ef6 302 mutex_unlock(&file->f_mutex);
1da177e4 303
92737230 304 nlmsvc_freegrantargs(block->b_call);
7db836d4 305 nlmsvc_release_call(block->b_call);
d9f6eb75 306 nlm_release_file(block->b_file);
1da177e4 307 kfree(block);
6849c0ca
TM
308}
309
310static void nlmsvc_release_block(struct nlm_block *block)
311{
312 if (block != NULL)
c5aa1e55 313 kref_put_mutex(&block->b_count, nlmsvc_free_block, &block->b_file->f_mutex);
1da177e4
LT
314}
315
f2af793d
OK
316/*
317 * Loop over all blocks and delete blocks held by
318 * a matching host.
319 */
320void nlmsvc_traverse_blocks(struct nlm_host *host,
321 struct nlm_file *file,
322 nlm_host_match_fn_t match)
d9f6eb75 323{
68a2d76c 324 struct nlm_block *block, *next;
d9f6eb75
TM
325
326restart:
89e63ef6 327 mutex_lock(&file->f_mutex);
be2be5f7 328 spin_lock(&nlm_blocked_lock);
68a2d76c 329 list_for_each_entry_safe(block, next, &file->f_blocks, b_flist) {
f2af793d 330 if (!match(block->b_host, host))
d9f6eb75 331 continue;
68a2d76c
OK
332 /* Do not destroy blocks that are not on
333 * the global retry list - why? */
334 if (list_empty(&block->b_list))
d9f6eb75
TM
335 continue;
336 kref_get(&block->b_count);
be2be5f7 337 spin_unlock(&nlm_blocked_lock);
89e63ef6 338 mutex_unlock(&file->f_mutex);
d9f6eb75
TM
339 nlmsvc_unlink_block(block);
340 nlmsvc_release_block(block);
341 goto restart;
342 }
be2be5f7 343 spin_unlock(&nlm_blocked_lock);
89e63ef6 344 mutex_unlock(&file->f_mutex);
d9f6eb75
TM
345}
346
89e0edfb
BC
347static struct nlm_lockowner *
348nlmsvc_get_lockowner(struct nlm_lockowner *lockowner)
349{
350 refcount_inc(&lockowner->count);
351 return lockowner;
352}
353
184cefbe 354void nlmsvc_put_lockowner(struct nlm_lockowner *lockowner)
89e0edfb
BC
355{
356 if (!refcount_dec_and_lock(&lockowner->count, &lockowner->host->h_lock))
357 return;
358 list_del(&lockowner->list);
359 spin_unlock(&lockowner->host->h_lock);
360 nlmsvc_release_host(lockowner->host);
361 kfree(lockowner);
362}
363
364static struct nlm_lockowner *__nlmsvc_find_lockowner(struct nlm_host *host, pid_t pid)
365{
366 struct nlm_lockowner *lockowner;
367 list_for_each_entry(lockowner, &host->h_lockowners, list) {
368 if (lockowner->pid != pid)
369 continue;
370 return nlmsvc_get_lockowner(lockowner);
371 }
372 return NULL;
373}
374
375static struct nlm_lockowner *nlmsvc_find_lockowner(struct nlm_host *host, pid_t pid)
376{
377 struct nlm_lockowner *res, *new = NULL;
378
379 spin_lock(&host->h_lock);
380 res = __nlmsvc_find_lockowner(host, pid);
381
382 if (res == NULL) {
383 spin_unlock(&host->h_lock);
384 new = kmalloc(sizeof(*res), GFP_KERNEL);
385 spin_lock(&host->h_lock);
386 res = __nlmsvc_find_lockowner(host, pid);
387 if (res == NULL && new != NULL) {
388 res = new;
389 /* fs/locks.c will manage the refcount through lock_ops */
390 refcount_set(&new->count, 1);
391 new->pid = pid;
392 new->host = nlm_get_host(host);
393 list_add(&new->list, &host->h_lockowners);
394 new = NULL;
395 }
396 }
397
398 spin_unlock(&host->h_lock);
399 kfree(new);
400 return res;
401}
402
403void
404nlmsvc_release_lockowner(struct nlm_lock *lock)
405{
eb8ed7c6
JL
406 if (lock->fl.c.flc_owner)
407 nlmsvc_put_lockowner(lock->fl.c.flc_owner);
89e0edfb
BC
408}
409
89e0edfb
BC
410void nlmsvc_locks_init_private(struct file_lock *fl, struct nlm_host *host,
411 pid_t pid)
412{
eb8ed7c6 413 fl->c.flc_owner = nlmsvc_find_lockowner(host, pid);
89e0edfb
BC
414}
415
5e1abf8c
TM
416/*
417 * Initialize arguments for GRANTED call. The nlm_rqst structure
418 * has been cleared already.
419 */
420static int nlmsvc_setgrantargs(struct nlm_rqst *call, struct nlm_lock *lock)
421{
422 locks_copy_lock(&call->a_args.lock.fl, &lock->fl);
423 memcpy(&call->a_args.lock.fh, &lock->fh, sizeof(call->a_args.lock.fh));
e9ff3990 424 call->a_args.lock.caller = utsname()->nodename;
5e1abf8c
TM
425 call->a_args.lock.oh.len = lock->oh.len;
426
427 /* set default data area */
428 call->a_args.lock.oh.data = call->a_owner;
eb8ed7c6 429 call->a_args.lock.svid = ((struct nlm_lockowner *) lock->fl.c.flc_owner)->pid;
5e1abf8c
TM
430
431 if (lock->oh.len > NLMCLNT_OHSIZE) {
432 void *data = kmalloc(lock->oh.len, GFP_KERNEL);
92737230 433 if (!data)
5e1abf8c 434 return 0;
5e1abf8c
TM
435 call->a_args.lock.oh.data = (u8 *) data;
436 }
437
438 memcpy(call->a_args.lock.oh.data, lock->oh.data, lock->oh.len);
439 return 1;
440}
441
442static void nlmsvc_freegrantargs(struct nlm_rqst *call)
443{
92737230 444 if (call->a_args.lock.oh.data != call->a_owner)
5e1abf8c 445 kfree(call->a_args.lock.oh.data);
a9e61e25
FB
446
447 locks_release_private(&call->a_args.lock.fl);
5e1abf8c
TM
448}
449
2b36f412
ME
450/*
451 * Deferred lock request handling for non-blocking lock
452 */
ca5c8cde 453static __be32
2b36f412
ME
454nlmsvc_defer_lock_rqst(struct svc_rqst *rqstp, struct nlm_block *block)
455{
ca5c8cde 456 __be32 status = nlm_lck_denied_nolocks;
2b36f412
ME
457
458 block->b_flags |= B_QUEUED;
459
460 nlmsvc_insert_block(block, NLM_TIMEOUT);
461
462 block->b_cache_req = &rqstp->rq_chandle;
463 if (rqstp->rq_chandle.defer) {
464 block->b_deferred_req =
465 rqstp->rq_chandle.defer(block->b_cache_req);
466 if (block->b_deferred_req != NULL)
467 status = nlm_drop_reply;
468 }
469 dprintk("lockd: nlmsvc_defer_lock_rqst block %p flags %d status %d\n",
ca5c8cde 470 block, block->b_flags, ntohl(status));
2b36f412
ME
471
472 return status;
473}
474
1da177e4
LT
475/*
476 * Attempt to establish a lock, and if it can't be granted, block it
477 * if required.
478 */
52921e02 479__be32
1da177e4 480nlmsvc_lock(struct svc_rqst *rqstp, struct nlm_file *file,
6cde4de8 481 struct nlm_host *host, struct nlm_lock *lock, int wait,
b2b50289 482 struct nlm_cookie *cookie, int reclaim)
1da177e4 483{
b840be2f 484 struct inode *inode = nlmsvc_file_inode(file);
40595cdc 485 struct nlm_block *block = NULL;
1da177e4 486 int error;
7f024fcd 487 int mode;
b840be2f 488 int async_block = 0;
52921e02 489 __be32 ret;
1da177e4
LT
490
491 dprintk("lockd: nlmsvc_lock(%s/%ld, ty=%d, pi=%d, %Ld-%Ld, bl=%d)\n",
b840be2f 492 inode->i_sb->s_id, inode->i_ino,
eb8ed7c6
JL
493 lock->fl.c.flc_type,
494 lock->fl.c.flc_pid,
1da177e4
LT
495 (long long)lock->fl.fl_start,
496 (long long)lock->fl.fl_end,
497 wait);
498
2dd10de8 499 if (!exportfs_lock_op_is_async(inode->i_sb->s_export_op)) {
b840be2f
BF
500 async_block = wait;
501 wait = 0;
502 }
503
1da177e4 504 /* Lock file against concurrent access */
89e63ef6 505 mutex_lock(&file->f_mutex);
f8120480
ME
506 /* Get existing block (in case client is busy-waiting)
507 * or create new block
508 */
d9f6eb75 509 block = nlmsvc_lookup_block(file, lock);
09c7938c 510 if (block == NULL) {
560de0e6 511 block = nlmsvc_create_block(rqstp, host, file, lock, cookie);
f8120480
ME
512 ret = nlm_lck_denied_nolocks;
513 if (block == NULL)
514 goto out;
92737230 515 lock = &block->b_call->a_args.lock;
f8120480 516 } else
eb8ed7c6 517 lock->fl.c.flc_flags &= ~FL_SLEEP;
1da177e4 518
1a8322b2
ME
519 if (block->b_flags & B_QUEUED) {
520 dprintk("lockd: nlmsvc_lock deferred block %p flags %d\n",
521 block, block->b_flags);
522 if (block->b_granted) {
523 nlmsvc_unlink_block(block);
524 ret = nlm_granted;
525 goto out;
526 }
527 if (block->b_flags & B_TIMED_OUT) {
528 nlmsvc_unlink_block(block);
529 ret = nlm_lck_denied;
530 goto out;
531 }
532 ret = nlm_drop_reply;
533 goto out;
534 }
1da177e4 535
5ccb0066 536 if (locks_in_grace(SVC_NET(rqstp)) && !reclaim) {
b2b50289
BF
537 ret = nlm_lck_denied_grace_period;
538 goto out;
539 }
5ccb0066 540 if (reclaim && !locks_in_grace(SVC_NET(rqstp))) {
d22b1cff
BF
541 ret = nlm_lck_denied_grace_period;
542 goto out;
543 }
b2b50289 544
b743612c
AA
545 spin_lock(&nlm_blocked_lock);
546 /*
547 * If this is a lock request for an already pending
548 * lock request we return nlm_lck_blocked without calling
549 * vfs_lock_file() again. Otherwise we have two pending
550 * requests on the underlaying ->lock() implementation but
551 * only one nlm_block to being granted by lm_grant().
552 */
553 if (exportfs_lock_op_is_async(inode->i_sb->s_export_op) &&
554 !list_empty(&block->b_list)) {
555 spin_unlock(&nlm_blocked_lock);
556 ret = nlm_lck_blocked;
557 goto out;
558 }
afb13302
AA
559
560 /* Append to list of blocked */
561 nlmsvc_insert_block_locked(block, NLM_NEVER);
b743612c
AA
562 spin_unlock(&nlm_blocked_lock);
563
1a8322b2 564 if (!wait)
eb8ed7c6 565 lock->fl.c.flc_flags &= ~FL_SLEEP;
7f024fcd
BF
566 mode = lock_to_openmode(&lock->fl);
567 error = vfs_lock_file(file->f_file[mode], F_SETLK, &lock->fl, NULL);
eb8ed7c6 568 lock->fl.c.flc_flags &= ~FL_SLEEP;
a85f193e 569
1a8322b2 570 dprintk("lockd: vfs_lock_file returned %d\n", error);
6d7bbbba 571 switch (error) {
1da177e4 572 case 0:
afb13302 573 nlmsvc_remove_block(block);
15dadef9
AA
574 ret = nlm_granted;
575 goto out;
09c7938c 576 case -EAGAIN:
afb13302
AA
577 if (!wait)
578 nlmsvc_remove_block(block);
b840be2f 579 ret = async_block ? nlm_lck_blocked : nlm_lck_denied;
e33d1ea6 580 goto out;
bde74e4b 581 case FILE_LOCK_DEFERRED:
1a8322b2
ME
582 if (wait)
583 break;
584 /* Filesystem lock operation is in progress
585 Add it to the queue waiting for callback */
586 ret = nlmsvc_defer_lock_rqst(rqstp, block);
587 goto out;
09c7938c 588 case -EDEADLK:
afb13302 589 nlmsvc_remove_block(block);
15dadef9
AA
590 ret = nlm_deadlock;
591 goto out;
1da177e4 592 default: /* includes ENOLCK */
afb13302 593 nlmsvc_remove_block(block);
15dadef9
AA
594 ret = nlm_lck_denied_nolocks;
595 goto out;
1da177e4
LT
596 }
597
09c7938c 598 ret = nlm_lck_blocked;
15dadef9 599out:
89e63ef6 600 mutex_unlock(&file->f_mutex);
6849c0ca 601 nlmsvc_release_block(block);
15dadef9
AA
602 dprintk("lockd: nlmsvc_lock returned %u\n", ret);
603 return ret;
1da177e4
LT
604}
605
606/*
607 * Test for presence of a conflicting lock.
608 */
52921e02 609__be32
85f3f1b3 610nlmsvc_testlock(struct svc_rqst *rqstp, struct nlm_file *file,
8f920d5e
JL
611 struct nlm_host *host, struct nlm_lock *lock,
612 struct nlm_lock *conflock, struct nlm_cookie *cookie)
1da177e4 613{
5ea0d750 614 int error;
7f024fcd 615 int mode;
5ea0d750
ME
616 __be32 ret;
617
1da177e4 618 dprintk("lockd: nlmsvc_testlock(%s/%ld, ty=%d, %Ld-%Ld)\n",
a81041b7
BF
619 nlmsvc_file_inode(file)->i_sb->s_id,
620 nlmsvc_file_inode(file)->i_ino,
eb8ed7c6 621 lock->fl.c.flc_type,
1da177e4
LT
622 (long long)lock->fl.fl_start,
623 (long long)lock->fl.fl_end);
624
5ccb0066 625 if (locks_in_grace(SVC_NET(rqstp))) {
b2b50289
BF
626 ret = nlm_lck_denied_grace_period;
627 goto out;
628 }
09802fd2 629
7f024fcd
BF
630 mode = lock_to_openmode(&lock->fl);
631 error = vfs_test_lock(file->f_file[mode], &lock->fl);
5ea0d750 632 if (error) {
09802fd2
JL
633 /* We can't currently deal with deferred test requests */
634 if (error == FILE_LOCK_DEFERRED)
635 WARN_ON_ONCE(1);
636
5ea0d750
ME
637 ret = nlm_lck_denied_nolocks;
638 goto out;
639 }
09802fd2 640
eb8ed7c6 641 if (lock->fl.c.flc_type == F_UNLCK) {
5ea0d750
ME
642 ret = nlm_granted;
643 goto out;
644 }
645
5ea0d750 646 dprintk("lockd: conflicting lock(ty=%d, %Ld-%Ld)\n",
eb8ed7c6 647 lock->fl.c.flc_type, (long long)lock->fl.fl_start,
5ea0d750
ME
648 (long long)lock->fl.fl_end);
649 conflock->caller = "somehost"; /* FIXME */
650 conflock->len = strlen(conflock->caller);
651 conflock->oh.len = 0; /* don't return OH info */
eb8ed7c6
JL
652 conflock->svid = lock->fl.c.flc_pid;
653 conflock->fl.c.flc_type = lock->fl.c.flc_type;
5ea0d750
ME
654 conflock->fl.fl_start = lock->fl.fl_start;
655 conflock->fl.fl_end = lock->fl.fl_end;
f328296e 656 locks_release_private(&lock->fl);
89e0edfb 657
5ea0d750
ME
658 ret = nlm_lck_denied;
659out:
5ea0d750 660 return ret;
1da177e4
LT
661}
662
663/*
664 * Remove a lock.
665 * This implies a CANCEL call: We send a GRANT_MSG, the client replies
666 * with a GRANT_RES call which gets lost, and calls UNLOCK immediately
667 * afterwards. In this case the block will still be there, and hence
668 * must be removed.
669 */
52921e02 670__be32
5ccb0066 671nlmsvc_unlock(struct net *net, struct nlm_file *file, struct nlm_lock *lock)
1da177e4 672{
7f024fcd 673 int error = 0;
1da177e4
LT
674
675 dprintk("lockd: nlmsvc_unlock(%s/%ld, pi=%d, %Ld-%Ld)\n",
a81041b7
BF
676 nlmsvc_file_inode(file)->i_sb->s_id,
677 nlmsvc_file_inode(file)->i_ino,
eb8ed7c6 678 lock->fl.c.flc_pid,
1da177e4
LT
679 (long long)lock->fl.fl_start,
680 (long long)lock->fl.fl_end);
681
682 /* First, cancel any lock that might be there */
5ccb0066 683 nlmsvc_cancel_blocked(net, file, lock);
1da177e4 684
eb8ed7c6
JL
685 lock->fl.c.flc_type = F_UNLCK;
686 lock->fl.c.flc_file = file->f_file[O_RDONLY];
687 if (lock->fl.c.flc_file)
688 error = vfs_lock_file(lock->fl.c.flc_file, F_SETLK,
7f024fcd 689 &lock->fl, NULL);
eb8ed7c6
JL
690 lock->fl.c.flc_file = file->f_file[O_WRONLY];
691 if (lock->fl.c.flc_file)
692 error |= vfs_lock_file(lock->fl.c.flc_file, F_SETLK,
7f024fcd 693 &lock->fl, NULL);
1da177e4
LT
694
695 return (error < 0)? nlm_lck_denied_nolocks : nlm_granted;
696}
697
698/*
699 * Cancel a previously blocked request.
700 *
701 * A cancel request always overrides any grant that may currently
702 * be in progress.
703 * The calling procedure must check whether the file can be closed.
704 */
52921e02 705__be32
5ccb0066 706nlmsvc_cancel_blocked(struct net *net, struct nlm_file *file, struct nlm_lock *lock)
1da177e4
LT
707{
708 struct nlm_block *block;
64a318ee 709 int status = 0;
7f024fcd 710 int mode;
1da177e4
LT
711
712 dprintk("lockd: nlmsvc_cancel(%s/%ld, pi=%d, %Ld-%Ld)\n",
a81041b7
BF
713 nlmsvc_file_inode(file)->i_sb->s_id,
714 nlmsvc_file_inode(file)->i_ino,
eb8ed7c6 715 lock->fl.c.flc_pid,
1da177e4
LT
716 (long long)lock->fl.fl_start,
717 (long long)lock->fl.fl_end);
718
5ccb0066 719 if (locks_in_grace(net))
b2b50289
BF
720 return nlm_lck_denied_grace_period;
721
89e63ef6 722 mutex_lock(&file->f_mutex);
d9f6eb75 723 block = nlmsvc_lookup_block(file, lock);
89e63ef6 724 mutex_unlock(&file->f_mutex);
d9f6eb75 725 if (block != NULL) {
9f27783b
JL
726 struct file_lock *fl = &block->b_call->a_args.lock.fl;
727
728 mode = lock_to_openmode(fl);
729 vfs_cancel_lock(block->b_file->f_file[mode], fl);
6849c0ca
TM
730 status = nlmsvc_unlink_block(block);
731 nlmsvc_release_block(block);
732 }
64a318ee 733 return status ? nlm_lck_denied : nlm_granted;
1da177e4
LT
734}
735
0e4ac9d9
ME
736/*
737 * This is a callback from the filesystem for VFS file lock requests.
8fb47a4f 738 * It will be used if lm_grant is defined and the filesystem can not
0e4ac9d9 739 * respond to the request immediately.
0e4ac9d9
ME
740 * For SETLK or SETLKW request it will get the local posix lock.
741 * In all cases it will move the block to the head of nlm_blocked q where
742 * nlmsvc_retry_blocked() can send back a reply for SETLKW or revisit the
743 * deferred rpc for GETLK and SETLK.
744 */
745static void
d0449b90 746nlmsvc_update_deferred_block(struct nlm_block *block, int result)
0e4ac9d9
ME
747{
748 block->b_flags |= B_GOT_CALLBACK;
749 if (result == 0)
750 block->b_granted = 1;
751 else
752 block->b_flags |= B_TIMED_OUT;
0e4ac9d9
ME
753}
754
d0449b90 755static int nlmsvc_grant_deferred(struct file_lock *fl, int result)
0e4ac9d9
ME
756{
757 struct nlm_block *block;
758 int rc = -ENOENT;
759
f904be9c 760 spin_lock(&nlm_blocked_lock);
0e4ac9d9
ME
761 list_for_each_entry(block, &nlm_blocked, b_list) {
762 if (nlm_compare_locks(&block->b_call->a_args.lock.fl, fl)) {
763 dprintk("lockd: nlmsvc_notify_blocked block %p flags %d\n",
764 block, block->b_flags);
765 if (block->b_flags & B_QUEUED) {
766 if (block->b_flags & B_TIMED_OUT) {
767 rc = -ENOLCK;
768 break;
769 }
d0449b90 770 nlmsvc_update_deferred_block(block, result);
0e4ac9d9
ME
771 } else if (result == 0)
772 block->b_granted = 1;
773
f904be9c 774 nlmsvc_insert_block_locked(block, 0);
0e4ac9d9
ME
775 svc_wake_up(block->b_daemon);
776 rc = 0;
777 break;
778 }
779 }
f904be9c 780 spin_unlock(&nlm_blocked_lock);
0e4ac9d9
ME
781 if (rc == -ENOENT)
782 printk(KERN_WARNING "lockd: grant for unknown block\n");
783 return rc;
784}
785
1da177e4
LT
786/*
787 * Unblock a blocked lock request. This is a callback invoked from the
788 * VFS layer when a lock on which we blocked is removed.
789 *
790 * This function doesn't grant the blocked lock instantly, but rather moves
791 * the block to the head of nlm_blocked where it can be picked up by lockd.
792 */
793static void
794nlmsvc_notify_blocked(struct file_lock *fl)
795{
68a2d76c 796 struct nlm_block *block;
1da177e4
LT
797
798 dprintk("lockd: VFS unblock notification for block %p\n", fl);
a282a1fa 799 spin_lock(&nlm_blocked_lock);
68a2d76c 800 list_for_each_entry(block, &nlm_blocked, b_list) {
92737230 801 if (nlm_compare_locks(&block->b_call->a_args.lock.fl, fl)) {
a282a1fa
BF
802 nlmsvc_insert_block_locked(block, 0);
803 spin_unlock(&nlm_blocked_lock);
1da177e4
LT
804 svc_wake_up(block->b_daemon);
805 return;
806 }
807 }
a282a1fa 808 spin_unlock(&nlm_blocked_lock);
1da177e4
LT
809 printk(KERN_WARNING "lockd: notification for unknown block!\n");
810}
811
7de875b2
BF
812static fl_owner_t nlmsvc_get_owner(fl_owner_t owner)
813{
814 return nlmsvc_get_lockowner(owner);
815}
816
817static void nlmsvc_put_owner(fl_owner_t owner)
818{
819 nlmsvc_put_lockowner(owner);
820}
821
7b021967 822const struct lock_manager_operations nlmsvc_lock_operations = {
8fb47a4f
BF
823 .lm_notify = nlmsvc_notify_blocked,
824 .lm_grant = nlmsvc_grant_deferred,
7de875b2
BF
825 .lm_get_owner = nlmsvc_get_owner,
826 .lm_put_owner = nlmsvc_put_owner,
1da177e4
LT
827};
828
829/*
830 * Try to claim a lock that was previously blocked.
831 *
832 * Note that we use both the RPC_GRANTED_MSG call _and_ an async
833 * RPC thread when notifying the client. This seems like overkill...
834 * Here's why:
835 * - we don't want to use a synchronous RPC thread, otherwise
836 * we might find ourselves hanging on a dead portmapper.
837 * - Some lockd implementations (e.g. HP) don't react to
838 * RPC_GRANTED calls; they seem to insist on RPC_GRANTED_MSG calls.
839 */
840static void
841nlmsvc_grant_blocked(struct nlm_block *block)
842{
843 struct nlm_file *file = block->b_file;
92737230 844 struct nlm_lock *lock = &block->b_call->a_args.lock;
7f024fcd 845 int mode;
1da177e4 846 int error;
2ec197db 847 loff_t fl_start, fl_end;
1da177e4
LT
848
849 dprintk("lockd: grant blocked lock %p\n", block);
850
0e4ac9d9
ME
851 kref_get(&block->b_count);
852
1da177e4 853 /* Unlink block request from list */
6849c0ca 854 nlmsvc_unlink_block(block);
1da177e4
LT
855
856 /* If b_granted is true this means we've been here before.
857 * Just retry the grant callback, possibly refreshing the RPC
858 * binding */
859 if (block->b_granted) {
860 nlm_rebind_host(block->b_host);
861 goto callback;
862 }
863
864 /* Try the lock operation again */
2ec197db
N
865 /* vfs_lock_file() can mangle fl_start and fl_end, but we need
866 * them unchanged for the GRANT_MSG
867 */
eb8ed7c6 868 lock->fl.c.flc_flags |= FL_SLEEP;
2ec197db
N
869 fl_start = lock->fl.fl_start;
870 fl_end = lock->fl.fl_end;
7f024fcd
BF
871 mode = lock_to_openmode(&lock->fl);
872 error = vfs_lock_file(file->f_file[mode], F_SETLK, &lock->fl, NULL);
eb8ed7c6 873 lock->fl.c.flc_flags &= ~FL_SLEEP;
2ec197db
N
874 lock->fl.fl_start = fl_start;
875 lock->fl.fl_end = fl_end;
09c7938c 876
5de0e502
AA
877 switch (error) {
878 case 0:
879 break;
bde74e4b 880 case FILE_LOCK_DEFERRED:
1a8322b2 881 dprintk("lockd: lock still blocked error %d\n", error);
1da177e4 882 nlmsvc_insert_block(block, NLM_NEVER);
0e4ac9d9 883 nlmsvc_release_block(block);
d9f6eb75 884 return;
5de0e502 885 default:
1da177e4 886 printk(KERN_WARNING "lockd: unexpected error %d in %s!\n",
8e24eea7 887 -error, __func__);
1da177e4 888 nlmsvc_insert_block(block, 10 * HZ);
0e4ac9d9 889 nlmsvc_release_block(block);
d9f6eb75 890 return;
1da177e4
LT
891 }
892
893callback:
894 /* Lock was granted by VFS. */
895 dprintk("lockd: GRANTing blocked lock.\n");
896 block->b_granted = 1;
1da177e4 897
9706501e
JL
898 /* keep block on the list, but don't reattempt until the RPC
899 * completes or the submission fails
900 */
901 nlmsvc_insert_block(block, NLM_NEVER);
1da177e4 902
9706501e
JL
903 /* Call the client -- use a soft RPC task since nlmsvc_retry_blocked
904 * will queue up a new one if this one times out
905 */
906 error = nlm_async_call(block->b_call, NLMPROC_GRANTED_MSG,
907 &nlmsvc_grant_ops);
908
909 /* RPC submission failed, wait a bit and retry */
910 if (error < 0)
911 nlmsvc_insert_block(block, 10 * HZ);
1da177e4
LT
912}
913
914/*
915 * This is the callback from the RPC layer when the NLM_GRANTED_MSG
916 * RPC call has succeeded or timed out.
917 * Like all RPC callbacks, it is invoked by the rpciod process, so it
918 * better not sleep. Therefore, we put the blocked lock on the nlm_blocked
919 * chain once more in order to have it removed by lockd itself (which can
920 * then sleep on the file semaphore without disrupting e.g. the nfs client).
921 */
963d8fe5 922static void nlmsvc_grant_callback(struct rpc_task *task, void *data)
1da177e4 923{
963d8fe5 924 struct nlm_rqst *call = data;
92737230 925 struct nlm_block *block = call->a_block;
1da177e4 926 unsigned long timeout;
1da177e4
LT
927
928 dprintk("lockd: GRANT_MSG RPC callback\n");
1da177e4 929
f904be9c 930 spin_lock(&nlm_blocked_lock);
c64e80d5
JL
931 /* if the block is not on a list at this point then it has
932 * been invalidated. Don't try to requeue it.
933 *
934 * FIXME: it's possible that the block is removed from the list
935 * after this check but before the nlmsvc_insert_block. In that
936 * case it will be added back. Perhaps we need better locking
937 * for nlm_blocked?
938 */
939 if (list_empty(&block->b_list))
a86dc496 940 goto out;
c64e80d5 941
1da177e4
LT
942 /* Technically, we should down the file semaphore here. Since we
943 * move the block towards the head of the queue only, no harm
944 * can be done, though. */
945 if (task->tk_status < 0) {
946 /* RPC error: Re-insert for retransmission */
947 timeout = 10 * HZ;
1da177e4
LT
948 } else {
949 /* Call was successful, now wait for client callback */
950 timeout = 60 * HZ;
951 }
f904be9c 952 nlmsvc_insert_block_locked(block, timeout);
1da177e4 953 svc_wake_up(block->b_daemon);
a86dc496 954out:
f904be9c 955 spin_unlock(&nlm_blocked_lock);
5e1abf8c
TM
956}
957
f904be9c
BS
958/*
959 * FIXME: nlmsvc_release_block() grabs a mutex. This is not allowed for an
960 * .rpc_release rpc_call_op
961 */
ec535ce1 962static void nlmsvc_grant_release(void *data)
5e1abf8c 963{
6041b791 964 struct nlm_rqst *call = data;
6041b791 965 nlmsvc_release_block(call->a_block);
1da177e4
LT
966}
967
963d8fe5
TM
968static const struct rpc_call_ops nlmsvc_grant_ops = {
969 .rpc_call_done = nlmsvc_grant_callback,
5e1abf8c 970 .rpc_release = nlmsvc_grant_release,
963d8fe5
TM
971};
972
1da177e4
LT
973/*
974 * We received a GRANT_RES callback. Try to find the corresponding
975 * block.
976 */
977void
e8c5c045 978nlmsvc_grant_reply(struct nlm_cookie *cookie, __be32 status)
1da177e4
LT
979{
980 struct nlm_block *block;
244cc191
JL
981 struct file_lock *fl;
982 int error;
1da177e4 983
39be4502
OK
984 dprintk("grant_reply: looking for cookie %x, s=%d \n",
985 *(unsigned int *)(cookie->data), status);
986 if (!(block = nlmsvc_find_block(cookie)))
1da177e4 987 return;
1da177e4 988
244cc191
JL
989 switch (status) {
990 case nlm_lck_denied_grace_period:
e56efe93
CIK
991 /* Try again in a couple of seconds */
992 nlmsvc_insert_block(block, 10 * HZ);
244cc191
JL
993 break;
994 case nlm_lck_denied:
995 /* Client doesn't want it, just unlock it */
996 nlmsvc_unlink_block(block);
997 fl = &block->b_call->a_args.lock.fl;
eb8ed7c6
JL
998 fl->c.flc_type = F_UNLCK;
999 error = vfs_lock_file(fl->c.flc_file, F_SETLK, fl, NULL);
244cc191
JL
1000 if (error)
1001 pr_warn("lockd: unable to unlock lock rejected by client!\n");
1002 break;
1003 default:
e56efe93 1004 /*
244cc191
JL
1005 * Either it was accepted or the status makes no sense
1006 * just unlink it either way.
e56efe93
CIK
1007 */
1008 nlmsvc_unlink_block(block);
1da177e4 1009 }
6849c0ca 1010 nlmsvc_release_block(block);
1da177e4
LT
1011}
1012
0e4ac9d9
ME
1013/* Helper function to handle retry of a deferred block.
1014 * If it is a blocking lock, call grant_blocked.
1015 * For a non-blocking lock or test lock, revisit the request.
1016 */
1017static void
1018retry_deferred_block(struct nlm_block *block)
1019{
1020 if (!(block->b_flags & B_GOT_CALLBACK))
1021 block->b_flags |= B_TIMED_OUT;
1022 nlmsvc_insert_block(block, NLM_TIMEOUT);
1023 dprintk("revisit block %p flags %d\n", block, block->b_flags);
1024 if (block->b_deferred_req) {
1025 block->b_deferred_req->revisit(block->b_deferred_req, 0);
1026 block->b_deferred_req = NULL;
1027 }
1028}
1029
1da177e4
LT
1030/*
1031 * Retry all blocked locks that have been notified. This is where lockd
1032 * picks up locks that can be granted, or grant notifications that must
1033 * be retransmitted.
1034 */
c743b425 1035void
fa341560 1036nlmsvc_retry_blocked(struct svc_rqst *rqstp)
1da177e4 1037{
68a2d76c
OK
1038 unsigned long timeout = MAX_SCHEDULE_TIMEOUT;
1039 struct nlm_block *block;
1040
1c327d96 1041 spin_lock(&nlm_blocked_lock);
fa341560 1042 while (!list_empty(&nlm_blocked) && !svc_thread_should_stop(rqstp)) {
68a2d76c 1043 block = list_entry(nlm_blocked.next, struct nlm_block, b_list);
1da177e4 1044
1da177e4
LT
1045 if (block->b_when == NLM_NEVER)
1046 break;
6d7bbbba 1047 if (time_after(block->b_when, jiffies)) {
68a2d76c 1048 timeout = block->b_when - jiffies;
1da177e4 1049 break;
68a2d76c 1050 }
1c327d96 1051 spin_unlock(&nlm_blocked_lock);
68a2d76c 1052
f3d43c76
BF
1053 dprintk("nlmsvc_retry_blocked(%p, when=%ld)\n",
1054 block, block->b_when);
0e4ac9d9
ME
1055 if (block->b_flags & B_QUEUED) {
1056 dprintk("nlmsvc_retry_blocked delete block (%p, granted=%d, flags=%d)\n",
1057 block, block->b_granted, block->b_flags);
1058 retry_deferred_block(block);
1059 } else
1060 nlmsvc_grant_blocked(block);
1c327d96 1061 spin_lock(&nlm_blocked_lock);
1da177e4 1062 }
1c327d96 1063 spin_unlock(&nlm_blocked_lock);
1da177e4 1064
c743b425
N
1065 if (timeout < MAX_SCHEDULE_TIMEOUT)
1066 mod_timer(&nlmsvc_retry, jiffies + timeout);
1da177e4 1067}
This page took 1.728981 seconds and 4 git commands to generate.