Home | History | Annotate | Line # | Download | only in nlm
      1 /*	$NetBSD: nlm_advlock.c,v 1.2 2016/12/13 21:58:17 pgoyette Exp $	*/
      2 /*-
      3  * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
      4  * Authors: Doug Rabson <dfr (at) rabson.org>
      5  * Developed with Red Inc: Alfred Perlstein <alfred (at) freebsd.org>
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  *
     16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
     17  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     18  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     19  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     20  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     21  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     22  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     23  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     24  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     26  * SUCH DAMAGE.
     27  */
     28 
     29 #include <sys/cdefs.h>
     30 /* __FBSDID("FreeBSD: head/sys/nlm/nlm_advlock.c 302216 2016-06-26 20:08:42Z kib "); */
     31 __RCSID("$NetBSD: nlm_advlock.c,v 1.2 2016/12/13 21:58:17 pgoyette Exp $");
     32 
     33 #include <sys/param.h>
     34 #include <sys/fcntl.h>
     35 #include <sys/jail.h>
     36 #include <sys/kernel.h>
     37 #include <sys/limits.h>
     38 #include <sys/lock.h>
     39 #include <sys/lockf.h>
     40 #include <sys/malloc.h>
     41 #include <sys/mbuf.h>
     42 #include <sys/mount.h>
     43 #include <sys/mutex.h>
     44 #include <sys/proc.h>
     45 #include <sys/socket.h>
     46 #include <sys/syslog.h>
     47 #include <sys/systm.h>
     48 #include <sys/unistd.h>
     49 #include <sys/vnode.h>
     50 
     51 #include <fs/nfs/common/nfsproto.h>
     52 #include <fs/nfs/client/nfs.h>
     53 #include <fs/nfs/client/nfsmount.h>
     54 
     55 #include <fs/nfs/nlm/nlm_prot.h>
     56 #include <fs/nfs/nlm/nlm.h>
     57 
     58 /*
     59  * We need to keep track of the svid values used for F_FLOCK locks.
     60  */
     61 struct nlm_file_svid {
     62 	int		ns_refs;	/* thread count + 1 if active */
     63 	int		ns_svid;	/* on-the-wire SVID for this file */
     64 	struct ucred	*ns_ucred;	/* creds to use for lock recovery */
     65 	void		*ns_id;		/* local struct file pointer */
     66 	bool_t		ns_active;	/* TRUE if we own a lock */
     67 	LIST_ENTRY(nlm_file_svid) ns_link;
     68 };
     69 LIST_HEAD(nlm_file_svid_list, nlm_file_svid);
     70 
     71 #define NLM_SVID_HASH_SIZE	256
     72 struct nlm_file_svid_list nlm_file_svids[NLM_SVID_HASH_SIZE];
     73 
     74 struct mtx nlm_svid_lock;
     75 static struct unrhdr *nlm_svid_allocator;
     76 static volatile u_int nlm_xid = 1;
     77 
     78 static int nlm_setlock(struct nlm_host *host, struct rpc_callextra *ext,
     79     rpcvers_t vers, struct timeval *timo, int retries,
     80     struct vnode *vp, int op, struct flock *fl, int flags,
     81     int svid, size_t fhlen, void *fh, off_t size, bool_t reclaim);
     82 static int nlm_clearlock(struct nlm_host *host,  struct rpc_callextra *ext,
     83     rpcvers_t vers, struct timeval *timo, int retries,
     84     struct vnode *vp, int op, struct flock *fl, int flags,
     85     int svid, size_t fhlen, void *fh, off_t size);
     86 static int nlm_getlock(struct nlm_host *host, struct rpc_callextra *ext,
     87     rpcvers_t vers, struct timeval *timo, int retries,
     88     struct vnode *vp, int op, struct flock *fl, int flags,
     89     int svid, size_t fhlen, void *fh, off_t size);
     90 static int nlm_map_status(nlm4_stats stat);
     91 static struct nlm_file_svid *nlm_find_svid(void *id);
     92 static void nlm_free_svid(struct nlm_file_svid *nf);
     93 static int nlm_init_lock(struct flock *fl, int flags, int svid,
     94     rpcvers_t vers, size_t fhlen, void *fh, off_t size,
     95     struct nlm4_lock *lock, char oh_space[32]);
     96 
     97 static void
     98 nlm_client_init(void *dummy)
     99 {
    100 	int i;
    101 
    102 	mtx_init(&nlm_svid_lock, "NLM svid lock", NULL, MTX_DEF);
    103 	/* pid_max cannot be greater than PID_MAX */
    104 	nlm_svid_allocator = new_unrhdr(PID_MAX + 2, INT_MAX, &nlm_svid_lock);
    105 	for (i = 0; i < NLM_SVID_HASH_SIZE; i++)
    106 		LIST_INIT(&nlm_file_svids[i]);
    107 }
    108 SYSINIT(nlm_client_init, SI_SUB_LOCK, SI_ORDER_FIRST, nlm_client_init, NULL);
    109 
    110 static int
    111 nlm_msg(struct thread *td, const char *server, const char *msg, int error)
    112 {
    113 	struct proc *p;
    114 
    115 	p = td ? td->td_proc : NULL;
    116 	if (error) {
    117 		tprintf(p, LOG_INFO, "nfs server %s: %s, error %d\n", server,
    118 		    msg, error);
    119 	} else {
    120 		tprintf(p, LOG_INFO, "nfs server %s: %s\n", server, msg);
    121 	}
    122 	return (0);
    123 }
    124 
    125 struct nlm_feedback_arg {
    126 	bool_t	nf_printed;
    127 	struct nfsmount *nf_nmp;
    128 };
    129 
    130 static void
    131 nlm_down(struct nlm_feedback_arg *nf, struct thread *td,
    132     const char *msg, int error)
    133 {
    134 	struct nfsmount *nmp = nf->nf_nmp;
    135 
    136 	if (nmp == NULL)
    137 		return;
    138 	mtx_lock(&nmp->nm_mtx);
    139 	if (!(nmp->nm_state & NFSSTA_LOCKTIMEO)) {
    140 		nmp->nm_state |= NFSSTA_LOCKTIMEO;
    141 		mtx_unlock(&nmp->nm_mtx);
    142 		vfs_event_signal(&nmp->nm_mountp->mnt_stat.f_fsid,
    143 		    VQ_NOTRESPLOCK, 0);
    144 	} else {
    145 		mtx_unlock(&nmp->nm_mtx);
    146 	}
    147 
    148 	nf->nf_printed = TRUE;
    149 	nlm_msg(td, nmp->nm_mountp->mnt_stat.f_mntfromname, msg, error);
    150 }
    151 
    152 static void
    153 nlm_up(struct nlm_feedback_arg *nf, struct thread *td,
    154     const char *msg)
    155 {
    156 	struct nfsmount *nmp = nf->nf_nmp;
    157 
    158 	if (!nf->nf_printed)
    159 		return;
    160 
    161 	nlm_msg(td, nmp->nm_mountp->mnt_stat.f_mntfromname, msg, 0);
    162 
    163 	mtx_lock(&nmp->nm_mtx);
    164 	if (nmp->nm_state & NFSSTA_LOCKTIMEO) {
    165 		nmp->nm_state &= ~NFSSTA_LOCKTIMEO;
    166 		mtx_unlock(&nmp->nm_mtx);
    167 		vfs_event_signal(&nmp->nm_mountp->mnt_stat.f_fsid,
    168 		    VQ_NOTRESPLOCK, 1);
    169 	} else {
    170 		mtx_unlock(&nmp->nm_mtx);
    171 	}
    172 }
    173 
    174 static void
    175 nlm_feedback(int type, int proc, void *arg)
    176 {
    177 	struct thread *td = curthread;
    178 	struct nlm_feedback_arg *nf = (struct nlm_feedback_arg *) arg;
    179 
    180 	switch (type) {
    181 	case FEEDBACK_REXMIT2:
    182 	case FEEDBACK_RECONNECT:
    183 		nlm_down(nf, td, "lockd not responding", 0);
    184 		break;
    185 
    186 	case FEEDBACK_OK:
    187 		nlm_up(nf, td, "lockd is alive again");
    188 		break;
    189 	}
    190 }
    191 
    192 /*
    193  * nlm_advlock --
    194  *      NFS advisory byte-level locks.
    195  */
    196 static int
    197 nlm_advlock_internal(struct vnode *vp, void *id, int op, struct flock *fl,
    198     int flags, bool_t reclaim, bool_t unlock_vp)
    199 {
    200 	struct thread *td = curthread;
    201 	struct nfsmount *nmp;
    202 	off_t size;
    203 	size_t fhlen;
    204 	union nfsfh fh;
    205 	struct sockaddr *sa;
    206 	struct sockaddr_storage ss;
    207 	char servername[MNAMELEN];
    208 	struct timeval timo;
    209 	int retries;
    210 	rpcvers_t vers;
    211 	struct nlm_host *host;
    212 	struct rpc_callextra ext;
    213 	struct nlm_feedback_arg nf;
    214 	AUTH *auth;
    215 	struct ucred *cred, *cred1;
    216 	struct nlm_file_svid *ns;
    217 	int svid;
    218 	int error;
    219 	int is_v3;
    220 
    221 	ASSERT_VOP_LOCKED(vp, "nlm_advlock_1");
    222 
    223 	nmp = VFSTONFS(vp->v_mount);
    224 	/*
    225 	 * Push any pending writes to the server and flush our cache
    226 	 * so that if we are contending with another machine for a
    227 	 * file, we get whatever they wrote and vice-versa.
    228 	 */
    229 	if (op == F_SETLK || op == F_UNLCK)
    230 		nmp->nm_vinvalbuf(vp, V_SAVE, td, 1);
    231 
    232 	strcpy(servername, nmp->nm_hostname);
    233 	nmp->nm_getinfo(vp, fh.fh_bytes, &fhlen, &ss, &is_v3, &size, &timo);
    234 	sa = (struct sockaddr *) &ss;
    235 	if (is_v3 != 0)
    236 		vers = NLM_VERS4;
    237 	else
    238 		vers = NLM_VERS;
    239 
    240 	if (nmp->nm_flag & NFSMNT_SOFT)
    241 		retries = nmp->nm_retry;
    242 	else
    243 		retries = INT_MAX;
    244 
    245 	/*
    246 	 * We need to switch to mount-point creds so that we can send
    247 	 * packets from a privileged port.  Reference mnt_cred and
    248 	 * switch to them before unlocking the vnode, since mount
    249 	 * point could be unmounted right after unlock.
    250 	 */
    251 	cred = td->td_ucred;
    252 	td->td_ucred = vp->v_mount->mnt_cred;
    253 	crhold(td->td_ucred);
    254 	if (unlock_vp)
    255 		VOP_UNLOCK(vp, 0);
    256 
    257 	host = nlm_find_host_by_name(servername, sa, vers);
    258 	auth = authunix_create(cred);
    259 	memset(&ext, 0, sizeof(ext));
    260 
    261 	nf.nf_printed = FALSE;
    262 	nf.nf_nmp = nmp;
    263 	ext.rc_auth = auth;
    264 
    265 	ext.rc_feedback = nlm_feedback;
    266 	ext.rc_feedback_arg = &nf;
    267 	ext.rc_timers = NULL;
    268 
    269 	ns = NULL;
    270 	if (flags & F_FLOCK) {
    271 		ns = nlm_find_svid(id);
    272 		KASSERT(fl->l_start == 0 && fl->l_len == 0,
    273 		    ("F_FLOCK lock requests must be whole-file locks"));
    274 		if (!ns->ns_ucred) {
    275 			/*
    276 			 * Remember the creds used for locking in case
    277 			 * we need to recover the lock later.
    278 			 */
    279 			ns->ns_ucred = crdup(cred);
    280 		}
    281 		svid = ns->ns_svid;
    282 	} else if (flags & F_REMOTE) {
    283 		/*
    284 		 * If we are recovering after a server restart or
    285 		 * trashing locks on a force unmount, use the same
    286 		 * svid as last time.
    287 		 */
    288 		svid = fl->l_pid;
    289 	} else {
    290 		svid = ((struct proc *) id)->p_pid;
    291 	}
    292 
    293 	switch(op) {
    294 	case F_SETLK:
    295 		if ((flags & (F_FLOCK|F_WAIT)) == (F_FLOCK|F_WAIT)
    296 		    && fl->l_type == F_WRLCK) {
    297 			/*
    298 			 * The semantics for flock(2) require that any
    299 			 * shared lock on the file must be released
    300 			 * before an exclusive lock is granted. The
    301 			 * local locking code interprets this by
    302 			 * unlocking the file before sleeping on a
    303 			 * blocked exclusive lock request. We
    304 			 * approximate this by first attempting
    305 			 * non-blocking and if that fails, we unlock
    306 			 * the file and block.
    307 			 */
    308 			error = nlm_setlock(host, &ext, vers, &timo, retries,
    309 			    vp, F_SETLK, fl, flags & ~F_WAIT,
    310 			    svid, fhlen, &fh.fh_bytes, size, reclaim);
    311 			if (error == EAGAIN) {
    312 				fl->l_type = F_UNLCK;
    313 				error = nlm_clearlock(host, &ext, vers, &timo,
    314 				    retries, vp, F_UNLCK, fl, flags,
    315 				    svid, fhlen, &fh.fh_bytes, size);
    316 				fl->l_type = F_WRLCK;
    317 				if (!error) {
    318 					mtx_lock(&nlm_svid_lock);
    319 					if (ns->ns_active) {
    320 						ns->ns_refs--;
    321 						ns->ns_active = FALSE;
    322 					}
    323 					mtx_unlock(&nlm_svid_lock);
    324 					flags |= F_WAIT;
    325 					error = nlm_setlock(host, &ext, vers,
    326 					    &timo, retries, vp, F_SETLK, fl,
    327 					    flags, svid, fhlen, &fh.fh_bytes,
    328 					    size, reclaim);
    329 				}
    330 			}
    331 		} else {
    332 			error = nlm_setlock(host, &ext, vers, &timo, retries,
    333 			    vp, op, fl, flags, svid, fhlen, &fh.fh_bytes,
    334 			    size, reclaim);
    335 		}
    336 		if (!error && ns) {
    337 			mtx_lock(&nlm_svid_lock);
    338 			if (!ns->ns_active) {
    339 				/*
    340 				 * Add one to the reference count to
    341 				 * hold onto the SVID for the lifetime
    342 				 * of the lock. Note that since
    343 				 * F_FLOCK only supports whole-file
    344 				 * locks, there can only be one active
    345 				 * lock for this SVID.
    346 				 */
    347 				ns->ns_refs++;
    348 				ns->ns_active = TRUE;
    349 			}
    350 			mtx_unlock(&nlm_svid_lock);
    351 		}
    352 		break;
    353 
    354 	case F_UNLCK:
    355 		error = nlm_clearlock(host, &ext, vers, &timo, retries,
    356 		    vp, op, fl, flags, svid, fhlen, &fh.fh_bytes, size);
    357 		if (!error && ns) {
    358 			mtx_lock(&nlm_svid_lock);
    359 			if (ns->ns_active) {
    360 				ns->ns_refs--;
    361 				ns->ns_active = FALSE;
    362 			}
    363 			mtx_unlock(&nlm_svid_lock);
    364 		}
    365 		break;
    366 
    367 	case F_GETLK:
    368 		error = nlm_getlock(host, &ext, vers, &timo, retries,
    369 		    vp, op, fl, flags, svid, fhlen, &fh.fh_bytes, size);
    370 		break;
    371 
    372 	default:
    373 		error = EINVAL;
    374 		break;
    375 	}
    376 
    377 	if (ns)
    378 		nlm_free_svid(ns);
    379 
    380 	cred1 = td->td_ucred;
    381 	td->td_ucred = cred;
    382 	crfree(cred1);
    383 	AUTH_DESTROY(auth);
    384 
    385 	nlm_host_release(host);
    386 
    387 	return (error);
    388 }
    389 
    390 int
    391 nlm_advlock(struct vop_advlock_args *ap)
    392 {
    393 
    394 	return (nlm_advlock_internal(ap->a_vp, ap->a_id, ap->a_op, ap->a_fl,
    395 		ap->a_flags, FALSE, TRUE));
    396 }
    397 
    398 /*
    399  * Set the creds of td to the creds of the given lock's owner. The new
    400  * creds reference count will be incremented via crhold. The caller is
    401  * responsible for calling crfree and restoring td's original creds.
    402  */
    403 static void
    404 nlm_set_creds_for_lock(struct thread *td, struct flock *fl)
    405 {
    406 	int i;
    407 	struct nlm_file_svid *ns;
    408 	struct proc *p;
    409 	struct ucred *cred;
    410 
    411 	cred = NULL;
    412 	if (fl->l_pid > PID_MAX) {
    413 		/*
    414 		 * If this was originally a F_FLOCK-style lock, we
    415 		 * recorded the creds used when it was originally
    416 		 * locked in the nlm_file_svid structure.
    417 		 */
    418 		mtx_lock(&nlm_svid_lock);
    419 		for (i = 0; i < NLM_SVID_HASH_SIZE; i++) {
    420 			for (ns = LIST_FIRST(&nlm_file_svids[i]); ns;
    421 			     ns = LIST_NEXT(ns, ns_link)) {
    422 				if (ns->ns_svid == fl->l_pid) {
    423 					cred = crhold(ns->ns_ucred);
    424 					break;
    425 				}
    426 			}
    427 		}
    428 		mtx_unlock(&nlm_svid_lock);
    429 	} else {
    430 		/*
    431 		 * This lock is owned by a process. Get a reference to
    432 		 * the process creds.
    433 		 */
    434 		p = pfind(fl->l_pid);
    435 		if (p) {
    436 			cred = crhold(p->p_ucred);
    437 			PROC_UNLOCK(p);
    438 		}
    439 	}
    440 
    441 	/*
    442 	 * If we can't find a cred, fall back on the recovery
    443 	 * thread's cred.
    444 	 */
    445 	if (!cred) {
    446 		cred = crhold(td->td_ucred);
    447 	}
    448 
    449 	td->td_ucred = cred;
    450 }
    451 
    452 static int
    453 nlm_reclaim_free_lock(struct vnode *vp, struct flock *fl, void *arg)
    454 {
    455 	struct flock newfl;
    456 	struct thread *td = curthread;
    457 	struct ucred *oldcred;
    458 	int error;
    459 
    460 	newfl = *fl;
    461 	newfl.l_type = F_UNLCK;
    462 
    463 	oldcred = td->td_ucred;
    464 	nlm_set_creds_for_lock(td, &newfl);
    465 
    466 	error = nlm_advlock_internal(vp, NULL, F_UNLCK, &newfl, F_REMOTE,
    467 	    FALSE, FALSE);
    468 
    469 	crfree(td->td_ucred);
    470 	td->td_ucred = oldcred;
    471 
    472 	return (error);
    473 }
    474 
    475 int
    476 nlm_reclaim(struct vop_reclaim_args *ap)
    477 {
    478 
    479 	nlm_cancel_wait(ap->a_vp);
    480 	lf_iteratelocks_vnode(ap->a_vp, nlm_reclaim_free_lock, NULL);
    481 	return (0);
    482 }
    483 
    484 struct nlm_recovery_context {
    485 	struct nlm_host	*nr_host;	/* host we are recovering */
    486 	int		nr_state;	/* remote NSM state for recovery */
    487 };
    488 
    489 static int
    490 nlm_client_recover_lock(struct vnode *vp, struct flock *fl, void *arg)
    491 {
    492 	struct nlm_recovery_context *nr = (struct nlm_recovery_context *) arg;
    493 	struct thread *td = curthread;
    494 	struct ucred *oldcred;
    495 	int state, error;
    496 
    497 	/*
    498 	 * If the remote NSM state changes during recovery, the host
    499 	 * must have rebooted a second time. In that case, we must
    500 	 * restart the recovery.
    501 	 */
    502 	state = nlm_host_get_state(nr->nr_host);
    503 	if (nr->nr_state != state)
    504 		return (ERESTART);
    505 
    506 	error = vn_lock(vp, LK_SHARED);
    507 	if (error)
    508 		return (error);
    509 
    510 	oldcred = td->td_ucred;
    511 	nlm_set_creds_for_lock(td, fl);
    512 
    513 	error = nlm_advlock_internal(vp, NULL, F_SETLK, fl, F_REMOTE,
    514 	    TRUE, TRUE);
    515 
    516 	crfree(td->td_ucred);
    517 	td->td_ucred = oldcred;
    518 
    519 	return (error);
    520 }
    521 
    522 void
    523 nlm_client_recovery(struct nlm_host *host)
    524 {
    525 	struct nlm_recovery_context nr;
    526 	int sysid, error;
    527 
    528 	sysid = NLM_SYSID_CLIENT | nlm_host_get_sysid(host);
    529 	do {
    530 		nr.nr_host = host;
    531 		nr.nr_state = nlm_host_get_state(host);
    532 		error = lf_iteratelocks_sysid(sysid,
    533 		    nlm_client_recover_lock, &nr);
    534 	} while (error == ERESTART);
    535 }
    536 
    537 static void
    538 nlm_convert_to_nlm_lock(struct nlm_lock *dst, struct nlm4_lock *src)
    539 {
    540 
    541 	dst->caller_name = src->caller_name;
    542 	dst->fh = src->fh;
    543 	dst->oh = src->oh;
    544 	dst->svid = src->svid;
    545 	dst->l_offset = src->l_offset;
    546 	dst->l_len = src->l_len;
    547 }
    548 
    549 static void
    550 nlm_convert_to_nlm4_holder(struct nlm4_holder *dst, struct nlm_holder *src)
    551 {
    552 
    553 	dst->exclusive = src->exclusive;
    554 	dst->svid = src->svid;
    555 	dst->oh = src->oh;
    556 	dst->l_offset = src->l_offset;
    557 	dst->l_len = src->l_len;
    558 }
    559 
    560 static void
    561 nlm_convert_to_nlm4_res(struct nlm4_res *dst, struct nlm_res *src)
    562 {
    563 	dst->cookie = src->cookie;
    564 	dst->stat.stat = (enum nlm4_stats) src->stat.stat;
    565 }
    566 
    567 static enum clnt_stat
    568 nlm_test_rpc(rpcvers_t vers, nlm4_testargs *args, nlm4_testres *res, CLIENT *client,
    569     struct rpc_callextra *ext, struct timeval timo)
    570 {
    571 	if (vers == NLM_VERS4) {
    572 		return nlm4_test_4(args, res, client, ext, timo);
    573 	} else {
    574 		nlm_testargs args1;
    575 		nlm_testres res1;
    576 		enum clnt_stat stat;
    577 
    578 		args1.cookie = args->cookie;
    579 		args1.exclusive = args->exclusive;
    580 		nlm_convert_to_nlm_lock(&args1.alock, &args->alock);
    581 		memset(&res1, 0, sizeof(res1));
    582 
    583 		stat = nlm_test_1(&args1, &res1, client, ext, timo);
    584 
    585 		if (stat == RPC_SUCCESS) {
    586 			res->cookie = res1.cookie;
    587 			res->stat.stat = (enum nlm4_stats) res1.stat.stat;
    588 			if (res1.stat.stat == nlm_denied)
    589 				nlm_convert_to_nlm4_holder(
    590 					&res->stat.nlm4_testrply_u.holder,
    591 					&res1.stat.nlm_testrply_u.holder);
    592 		}
    593 
    594 		return (stat);
    595 	}
    596 }
    597 
    598 static enum clnt_stat
    599 nlm_lock_rpc(rpcvers_t vers, nlm4_lockargs *args, nlm4_res *res, CLIENT *client,
    600     struct rpc_callextra *ext, struct timeval timo)
    601 {
    602 	if (vers == NLM_VERS4) {
    603 		return nlm4_lock_4(args, res, client, ext, timo);
    604 	} else {
    605 		nlm_lockargs args1;
    606 		nlm_res res1;
    607 		enum clnt_stat stat;
    608 
    609 		args1.cookie = args->cookie;
    610 		args1.block = args->block;
    611 		args1.exclusive = args->exclusive;
    612 		nlm_convert_to_nlm_lock(&args1.alock, &args->alock);
    613 		args1.reclaim = args->reclaim;
    614 		args1.state = args->state;
    615 		memset(&res1, 0, sizeof(res1));
    616 
    617 		stat = nlm_lock_1(&args1, &res1, client, ext, timo);
    618 
    619 		if (stat == RPC_SUCCESS) {
    620 			nlm_convert_to_nlm4_res(res, &res1);
    621 		}
    622 
    623 		return (stat);
    624 	}
    625 }
    626 
    627 static enum clnt_stat
    628 nlm_cancel_rpc(rpcvers_t vers, nlm4_cancargs *args, nlm4_res *res, CLIENT *client,
    629     struct rpc_callextra *ext, struct timeval timo)
    630 {
    631 	if (vers == NLM_VERS4) {
    632 		return nlm4_cancel_4(args, res, client, ext, timo);
    633 	} else {
    634 		nlm_cancargs args1;
    635 		nlm_res res1;
    636 		enum clnt_stat stat;
    637 
    638 		args1.cookie = args->cookie;
    639 		args1.block = args->block;
    640 		args1.exclusive = args->exclusive;
    641 		nlm_convert_to_nlm_lock(&args1.alock, &args->alock);
    642 		memset(&res1, 0, sizeof(res1));
    643 
    644 		stat = nlm_cancel_1(&args1, &res1, client, ext, timo);
    645 
    646 		if (stat == RPC_SUCCESS) {
    647 			nlm_convert_to_nlm4_res(res, &res1);
    648 		}
    649 
    650 		return (stat);
    651 	}
    652 }
    653 
    654 static enum clnt_stat
    655 nlm_unlock_rpc(rpcvers_t vers, nlm4_unlockargs *args, nlm4_res *res, CLIENT *client,
    656     struct rpc_callextra *ext, struct timeval timo)
    657 {
    658 	if (vers == NLM_VERS4) {
    659 		return nlm4_unlock_4(args, res, client, ext, timo);
    660 	} else {
    661 		nlm_unlockargs args1;
    662 		nlm_res res1;
    663 		enum clnt_stat stat;
    664 
    665 		args1.cookie = args->cookie;
    666 		nlm_convert_to_nlm_lock(&args1.alock, &args->alock);
    667 		memset(&res1, 0, sizeof(res1));
    668 
    669 		stat = nlm_unlock_1(&args1, &res1, client, ext, timo);
    670 
    671 		if (stat == RPC_SUCCESS) {
    672 			nlm_convert_to_nlm4_res(res, &res1);
    673 		}
    674 
    675 		return (stat);
    676 	}
    677 }
    678 
    679 /*
    680  * Called after a lock request (set or clear) succeeded. We record the
    681  * details in the local lock manager. Note that since the remote
    682  * server has granted the lock, we can be sure that it doesn't
    683  * conflict with any other locks we have in the local lock manager.
    684  *
    685  * Since it is possible that host may also make NLM client requests to
    686  * our NLM server, we use a different sysid value to record our own
    687  * client locks.
    688  *
    689  * Note that since it is possible for us to receive replies from the
    690  * server in a different order than the locks were granted (e.g. if
    691  * many local threads are contending for the same lock), we must use a
    692  * blocking operation when registering with the local lock manager.
    693  * We expect that any actual wait will be rare and short hence we
    694  * ignore signals for this.
    695  */
    696 static void
    697 nlm_record_lock(struct vnode *vp, int op, struct flock *fl,
    698     int svid, int sysid, off_t size)
    699 {
    700 	struct vop_advlockasync_args a;
    701 	struct flock newfl;
    702 	struct proc *p;
    703 	int error, stops_deferred;
    704 
    705 	a.a_vp = vp;
    706 	a.a_id = NULL;
    707 	a.a_op = op;
    708 	a.a_fl = &newfl;
    709 	a.a_flags = F_REMOTE|F_WAIT|F_NOINTR;
    710 	a.a_task = NULL;
    711 	a.a_cookiep = NULL;
    712 	newfl.l_start = fl->l_start;
    713 	newfl.l_len = fl->l_len;
    714 	newfl.l_type = fl->l_type;
    715 	newfl.l_whence = fl->l_whence;
    716 	newfl.l_pid = svid;
    717 	newfl.l_sysid = NLM_SYSID_CLIENT | sysid;
    718 
    719 	for (;;) {
    720 		error = lf_advlockasync(&a, &vp->v_lockf, size);
    721 		if (error == EDEADLK) {
    722 			/*
    723 			 * Locks are associated with the processes and
    724 			 * not with threads.  Suppose we have two
    725 			 * threads A1 A2 in one process, A1 locked
    726 			 * file f1, A2 is locking file f2, and A1 is
    727 			 * unlocking f1. Then remote server may
    728 			 * already unlocked f1, while local still not
    729 			 * yet scheduled A1 to make the call to local
    730 			 * advlock manager. The process B owns lock on
    731 			 * f2 and issued the lock on f1.  Remote would
    732 			 * grant B the request on f1, but local would
    733 			 * return EDEADLK.
    734 			*/
    735 			pause("nlmdlk", 1);
    736 			p = curproc;
    737 			stops_deferred = sigdeferstop(SIGDEFERSTOP_OFF);
    738 			PROC_LOCK(p);
    739 			thread_suspend_check(0);
    740 			PROC_UNLOCK(p);
    741 			sigallowstop(stops_deferred);
    742 		} else if (error == EINTR) {
    743 			/*
    744 			 * lf_purgelocks() might wake up the lock
    745 			 * waiter and removed our lock graph edges.
    746 			 * There is no sense in re-trying recording
    747 			 * the lock to the local manager after
    748 			 * reclaim.
    749 			 */
    750 			error = 0;
    751 			break;
    752 		} else
    753 			break;
    754 	}
    755 	KASSERT(error == 0 || error == ENOENT,
    756 	    ("Failed to register NFS lock locally - error=%d", error));
    757 }
    758 
    759 static int
    760 nlm_setlock(struct nlm_host *host, struct rpc_callextra *ext,
    761     rpcvers_t vers, struct timeval *timo, int retries,
    762     struct vnode *vp, int op, struct flock *fl, int flags,
    763     int svid, size_t fhlen, void *fh, off_t size, bool_t reclaim)
    764 {
    765 	struct nlm4_lockargs args;
    766 	char oh_space[32];
    767 	struct nlm4_res res;
    768 	u_int xid;
    769 	CLIENT *client;
    770 	enum clnt_stat stat;
    771 	int retry, block, exclusive;
    772 	void *wait_handle = NULL;
    773 	int error;
    774 
    775 	memset(&args, 0, sizeof(args));
    776 	memset(&res, 0, sizeof(res));
    777 
    778 	block = (flags & F_WAIT) ? TRUE : FALSE;
    779 	exclusive = (fl->l_type == F_WRLCK);
    780 
    781 	error = nlm_init_lock(fl, flags, svid, vers, fhlen, fh, size,
    782 	    &args.alock, oh_space);
    783 	if (error)
    784 		return (error);
    785 	args.block = block;
    786 	args.exclusive = exclusive;
    787 	args.reclaim = reclaim;
    788 	args.state = nlm_nsm_state;
    789 
    790 	retry = 5*hz;
    791 	for (;;) {
    792 		client = nlm_host_get_rpc(host, FALSE);
    793 		if (!client)
    794 			return (ENOLCK); /* XXX retry? */
    795 
    796 		if (block)
    797 			wait_handle = nlm_register_wait_lock(&args.alock, vp);
    798 
    799 		xid = atomic_fetchadd_int(&nlm_xid, 1);
    800 		args.cookie.n_len = sizeof(xid);
    801 		args.cookie.n_bytes = (char*) &xid;
    802 
    803 		stat = nlm_lock_rpc(vers, &args, &res, client, ext, *timo);
    804 
    805 		CLNT_RELEASE(client);
    806 
    807 		if (stat != RPC_SUCCESS) {
    808 			if (block)
    809 				nlm_deregister_wait_lock(wait_handle);
    810 			if (retries) {
    811 				retries--;
    812 				continue;
    813 			}
    814 			return (EINVAL);
    815 		}
    816 
    817 		/*
    818 		 * Free res.cookie.
    819 		 */
    820 		xdr_free((xdrproc_t) xdr_nlm4_res, &res);
    821 
    822 		if (block && res.stat.stat != nlm4_blocked)
    823 			nlm_deregister_wait_lock(wait_handle);
    824 
    825 		if (res.stat.stat == nlm4_denied_grace_period) {
    826 			/*
    827 			 * The server has recently rebooted and is
    828 			 * giving old clients a change to reclaim
    829 			 * their locks. Wait for a few seconds and try
    830 			 * again.
    831 			 */
    832 			error = tsleep(&args, PCATCH, "nlmgrace", retry);
    833 			if (error && error != EWOULDBLOCK)
    834 				return (error);
    835 			retry = 2*retry;
    836 			if (retry > 30*hz)
    837 				retry = 30*hz;
    838 			continue;
    839 		}
    840 
    841 		if (block && res.stat.stat == nlm4_blocked) {
    842 			/*
    843 			 * The server should call us back with a
    844 			 * granted message when the lock succeeds. In
    845 			 * order to deal with broken servers, lost
    846 			 * granted messages and server reboots, we
    847 			 * will also re-try every few seconds.
    848 			 */
    849 			error = nlm_wait_lock(wait_handle, retry);
    850 			if (error == EWOULDBLOCK) {
    851 				retry = 2*retry;
    852 				if (retry > 30*hz)
    853 					retry = 30*hz;
    854 				continue;
    855 			}
    856 			if (error) {
    857 				/*
    858 				 * We need to call the server to
    859 				 * cancel our lock request.
    860 				 */
    861 				nlm4_cancargs cancel;
    862 
    863 				memset(&cancel, 0, sizeof(cancel));
    864 
    865 				xid = atomic_fetchadd_int(&nlm_xid, 1);
    866 				cancel.cookie.n_len = sizeof(xid);
    867 				cancel.cookie.n_bytes = (char*) &xid;
    868 				cancel.block = block;
    869 				cancel.exclusive = exclusive;
    870 				cancel.alock = args.alock;
    871 
    872 				do {
    873 					client = nlm_host_get_rpc(host, FALSE);
    874 					if (!client)
    875 						/* XXX retry? */
    876 						return (ENOLCK);
    877 
    878 					stat = nlm_cancel_rpc(vers, &cancel,
    879 					    &res, client, ext, *timo);
    880 
    881 					CLNT_RELEASE(client);
    882 
    883 					if (stat != RPC_SUCCESS) {
    884 						/*
    885 						 * We need to cope
    886 						 * with temporary
    887 						 * network partitions
    888 						 * as well as server
    889 						 * reboots. This means
    890 						 * we have to keep
    891 						 * trying to cancel
    892 						 * until the server
    893 						 * wakes up again.
    894 						 */
    895 						pause("nlmcancel", 10*hz);
    896 					}
    897 				} while (stat != RPC_SUCCESS);
    898 
    899 				/*
    900 				 * Free res.cookie.
    901 				 */
    902 				xdr_free((xdrproc_t) xdr_nlm4_res, &res);
    903 
    904 				switch (res.stat.stat) {
    905 				case nlm_denied:
    906 					/*
    907 					 * There was nothing
    908 					 * to cancel. We are
    909 					 * going to go ahead
    910 					 * and assume we got
    911 					 * the lock.
    912 					 */
    913 					error = 0;
    914 					break;
    915 
    916 				case nlm4_denied_grace_period:
    917 					/*
    918 					 * The server has
    919 					 * recently rebooted -
    920 					 * treat this as a
    921 					 * successful
    922 					 * cancellation.
    923 					 */
    924 					break;
    925 
    926 				case nlm4_granted:
    927 					/*
    928 					 * We managed to
    929 					 * cancel.
    930 					 */
    931 					break;
    932 
    933 				default:
    934 					/*
    935 					 * Broken server
    936 					 * implementation -
    937 					 * can't really do
    938 					 * anything here.
    939 					 */
    940 					break;
    941 				}
    942 
    943 			}
    944 		} else {
    945 			error = nlm_map_status(res.stat.stat);
    946 		}
    947 
    948 		if (!error && !reclaim) {
    949 			nlm_record_lock(vp, op, fl, args.alock.svid,
    950 			    nlm_host_get_sysid(host), size);
    951 			nlm_host_monitor(host, 0);
    952 		}
    953 
    954 		return (error);
    955 	}
    956 }
    957 
    958 static int
    959 nlm_clearlock(struct nlm_host *host, struct rpc_callextra *ext,
    960     rpcvers_t vers, struct timeval *timo, int retries,
    961     struct vnode *vp, int op, struct flock *fl, int flags,
    962     int svid, size_t fhlen, void *fh, off_t size)
    963 {
    964 	struct nlm4_unlockargs args;
    965 	char oh_space[32];
    966 	struct nlm4_res res;
    967 	u_int xid;
    968 	CLIENT *client;
    969 	enum clnt_stat stat;
    970 	int error;
    971 
    972 	memset(&args, 0, sizeof(args));
    973 	memset(&res, 0, sizeof(res));
    974 
    975 	error = nlm_init_lock(fl, flags, svid, vers, fhlen, fh, size,
    976 	    &args.alock, oh_space);
    977 	if (error)
    978 		return (error);
    979 
    980 	for (;;) {
    981 		client = nlm_host_get_rpc(host, FALSE);
    982 		if (!client)
    983 			return (ENOLCK); /* XXX retry? */
    984 
    985 		xid = atomic_fetchadd_int(&nlm_xid, 1);
    986 		args.cookie.n_len = sizeof(xid);
    987 		args.cookie.n_bytes = (char*) &xid;
    988 
    989 		stat = nlm_unlock_rpc(vers, &args, &res, client, ext, *timo);
    990 
    991 		CLNT_RELEASE(client);
    992 
    993 		if (stat != RPC_SUCCESS) {
    994 			if (retries) {
    995 				retries--;
    996 				continue;
    997 			}
    998 			return (EINVAL);
    999 		}
   1000 
   1001 		/*
   1002 		 * Free res.cookie.
   1003 		 */
   1004 		xdr_free((xdrproc_t) xdr_nlm4_res, &res);
   1005 
   1006 		if (res.stat.stat == nlm4_denied_grace_period) {
   1007 			/*
   1008 			 * The server has recently rebooted and is
   1009 			 * giving old clients a change to reclaim
   1010 			 * their locks. Wait for a few seconds and try
   1011 			 * again.
   1012 			 */
   1013 			error = tsleep(&args, PCATCH, "nlmgrace", 5*hz);
   1014 			if (error && error != EWOULDBLOCK)
   1015 				return (error);
   1016 			continue;
   1017 		}
   1018 
   1019 		/*
   1020 		 * If we are being called via nlm_reclaim (which will
   1021 		 * use the F_REMOTE flag), don't record the lock
   1022 		 * operation in the local lock manager since the vnode
   1023 		 * is going away.
   1024 		 */
   1025 		if (!(flags & F_REMOTE))
   1026 			nlm_record_lock(vp, op, fl, args.alock.svid,
   1027 			    nlm_host_get_sysid(host), size);
   1028 
   1029 		return (0);
   1030 	}
   1031 }
   1032 
   1033 static int
   1034 nlm_getlock(struct nlm_host *host, struct rpc_callextra *ext,
   1035     rpcvers_t vers, struct timeval *timo, int retries,
   1036     struct vnode *vp, int op, struct flock *fl, int flags,
   1037     int svid, size_t fhlen, void *fh, off_t size)
   1038 {
   1039 	struct nlm4_testargs args;
   1040 	char oh_space[32];
   1041 	struct nlm4_testres res;
   1042 	u_int xid;
   1043 	CLIENT *client;
   1044 	enum clnt_stat stat;
   1045 	int exclusive;
   1046 	int error;
   1047 
   1048 	KASSERT(!(flags & F_FLOCK), ("unexpected F_FLOCK for F_GETLK"));
   1049 
   1050 	memset(&args, 0, sizeof(args));
   1051 	memset(&res, 0, sizeof(res));
   1052 
   1053 	exclusive = (fl->l_type == F_WRLCK);
   1054 
   1055 	error = nlm_init_lock(fl, flags, svid, vers, fhlen, fh, size,
   1056 	    &args.alock, oh_space);
   1057 	if (error)
   1058 		return (error);
   1059 	args.exclusive = exclusive;
   1060 
   1061 	for (;;) {
   1062 		client = nlm_host_get_rpc(host, FALSE);
   1063 		if (!client)
   1064 			return (ENOLCK); /* XXX retry? */
   1065 
   1066 		xid = atomic_fetchadd_int(&nlm_xid, 1);
   1067 		args.cookie.n_len = sizeof(xid);
   1068 		args.cookie.n_bytes = (char*) &xid;
   1069 
   1070 		stat = nlm_test_rpc(vers, &args, &res, client, ext, *timo);
   1071 
   1072 		CLNT_RELEASE(client);
   1073 
   1074 		if (stat != RPC_SUCCESS) {
   1075 			if (retries) {
   1076 				retries--;
   1077 				continue;
   1078 			}
   1079 			return (EINVAL);
   1080 		}
   1081 
   1082 		if (res.stat.stat == nlm4_denied_grace_period) {
   1083 			/*
   1084 			 * The server has recently rebooted and is
   1085 			 * giving old clients a change to reclaim
   1086 			 * their locks. Wait for a few seconds and try
   1087 			 * again.
   1088 			 */
   1089 			xdr_free((xdrproc_t) xdr_nlm4_testres, &res);
   1090 			error = tsleep(&args, PCATCH, "nlmgrace", 5*hz);
   1091 			if (error && error != EWOULDBLOCK)
   1092 				return (error);
   1093 			continue;
   1094 		}
   1095 
   1096 		if (res.stat.stat == nlm4_denied) {
   1097 			struct nlm4_holder *h =
   1098 				&res.stat.nlm4_testrply_u.holder;
   1099 			fl->l_start = h->l_offset;
   1100 			fl->l_len = h->l_len;
   1101 			fl->l_pid = h->svid;
   1102 			if (h->exclusive)
   1103 				fl->l_type = F_WRLCK;
   1104 			else
   1105 				fl->l_type = F_RDLCK;
   1106 			fl->l_whence = SEEK_SET;
   1107 			fl->l_sysid = 0;
   1108 		} else {
   1109 			fl->l_type = F_UNLCK;
   1110 		}
   1111 
   1112 		xdr_free((xdrproc_t) xdr_nlm4_testres, &res);
   1113 
   1114 		return (0);
   1115 	}
   1116 }
   1117 
   1118 static int
   1119 nlm_map_status(nlm4_stats stat)
   1120 {
   1121 	switch (stat) {
   1122 	case nlm4_granted:
   1123 		return (0);
   1124 
   1125 	case nlm4_denied:
   1126 		return (EAGAIN);
   1127 
   1128 	case nlm4_denied_nolocks:
   1129 		return (ENOLCK);
   1130 
   1131 	case nlm4_deadlck:
   1132 		return (EDEADLK);
   1133 
   1134 	case nlm4_rofs:
   1135 		return (EROFS);
   1136 
   1137 	case nlm4_stale_fh:
   1138 		return (ESTALE);
   1139 
   1140 	case nlm4_fbig:
   1141 		return (EFBIG);
   1142 
   1143 	case nlm4_failed:
   1144 		return (EACCES);
   1145 
   1146 	default:
   1147 		return (EINVAL);
   1148 	}
   1149 }
   1150 
   1151 static struct nlm_file_svid *
   1152 nlm_find_svid(void *id)
   1153 {
   1154 	struct nlm_file_svid *ns, *newns;
   1155 	int h;
   1156 
   1157 	h = (((uintptr_t) id) >> 7) % NLM_SVID_HASH_SIZE;
   1158 
   1159 	mtx_lock(&nlm_svid_lock);
   1160 	LIST_FOREACH(ns, &nlm_file_svids[h], ns_link) {
   1161 		if (ns->ns_id == id) {
   1162 			ns->ns_refs++;
   1163 			break;
   1164 		}
   1165 	}
   1166 	mtx_unlock(&nlm_svid_lock);
   1167 	if (!ns) {
   1168 		int svid = alloc_unr(nlm_svid_allocator);
   1169 		newns = malloc(sizeof(struct nlm_file_svid), M_NLM,
   1170 		    M_WAITOK);
   1171 		newns->ns_refs = 1;
   1172 		newns->ns_id = id;
   1173 		newns->ns_svid = svid;
   1174 		newns->ns_ucred = NULL;
   1175 		newns->ns_active = FALSE;
   1176 
   1177 		/*
   1178 		 * We need to check for a race with some other
   1179 		 * thread allocating a svid for this file.
   1180 		 */
   1181 		mtx_lock(&nlm_svid_lock);
   1182 		LIST_FOREACH(ns, &nlm_file_svids[h], ns_link) {
   1183 			if (ns->ns_id == id) {
   1184 				ns->ns_refs++;
   1185 				break;
   1186 			}
   1187 		}
   1188 		if (ns) {
   1189 			mtx_unlock(&nlm_svid_lock);
   1190 			free_unr(nlm_svid_allocator, newns->ns_svid);
   1191 			free(newns, M_NLM);
   1192 		} else {
   1193 			LIST_INSERT_HEAD(&nlm_file_svids[h], newns,
   1194 			    ns_link);
   1195 			ns = newns;
   1196 			mtx_unlock(&nlm_svid_lock);
   1197 		}
   1198 	}
   1199 
   1200 	return (ns);
   1201 }
   1202 
   1203 static void
   1204 nlm_free_svid(struct nlm_file_svid *ns)
   1205 {
   1206 
   1207 	mtx_lock(&nlm_svid_lock);
   1208 	ns->ns_refs--;
   1209 	if (!ns->ns_refs) {
   1210 		KASSERT(!ns->ns_active, ("Freeing active SVID"));
   1211 		LIST_REMOVE(ns, ns_link);
   1212 		mtx_unlock(&nlm_svid_lock);
   1213 		free_unr(nlm_svid_allocator, ns->ns_svid);
   1214 		if (ns->ns_ucred)
   1215 			crfree(ns->ns_ucred);
   1216 		free(ns, M_NLM);
   1217 	} else {
   1218 		mtx_unlock(&nlm_svid_lock);
   1219 	}
   1220 }
   1221 
   1222 static int
   1223 nlm_init_lock(struct flock *fl, int flags, int svid,
   1224     rpcvers_t vers, size_t fhlen, void *fh, off_t size,
   1225     struct nlm4_lock *lock, char oh_space[32])
   1226 {
   1227 	size_t oh_len;
   1228 	off_t start, len;
   1229 
   1230 	if (fl->l_whence == SEEK_END) {
   1231 		if (size > OFF_MAX
   1232 		    || (fl->l_start > 0 && size > OFF_MAX - fl->l_start))
   1233 			return (EOVERFLOW);
   1234 		start = size + fl->l_start;
   1235 	} else if (fl->l_whence == SEEK_SET || fl->l_whence == SEEK_CUR) {
   1236 		start = fl->l_start;
   1237 	} else {
   1238 		return (EINVAL);
   1239 	}
   1240 	if (start < 0)
   1241 		return (EINVAL);
   1242 	if (fl->l_len < 0) {
   1243 		len = -fl->l_len;
   1244 		start -= len;
   1245 		if (start < 0)
   1246 			return (EINVAL);
   1247 	} else {
   1248 		len = fl->l_len;
   1249 	}
   1250 
   1251 	if (vers == NLM_VERS) {
   1252 		/*
   1253 		 * Enforce range limits on V1 locks
   1254 		 */
   1255 		if (start > 0xffffffffLL || len > 0xffffffffLL)
   1256 			return (EOVERFLOW);
   1257 	}
   1258 
   1259 	snprintf(oh_space, 32, "%d@", svid);
   1260 	oh_len = strlen(oh_space);
   1261 	getcredhostname(NULL, oh_space + oh_len, 32 - oh_len);
   1262 	oh_len = strlen(oh_space);
   1263 
   1264 	memset(lock, 0, sizeof(*lock));
   1265 	lock->caller_name = prison0.pr_hostname;
   1266 	lock->fh.n_len = fhlen;
   1267 	lock->fh.n_bytes = fh;
   1268 	lock->oh.n_len = oh_len;
   1269 	lock->oh.n_bytes = oh_space;
   1270 	lock->svid = svid;
   1271 	lock->l_offset = start;
   1272 	lock->l_len = len;
   1273 
   1274 	return (0);
   1275 }
   1276