fc7e71c52d
The tests will manipulate the system daemon today, which can cause undesired service interruption when the tests are run. This change allows the geom_gate tests to be run with an arbitrary ggated(8) daemon / geom_gate(4) device pairing. Other changes: - Sort #includes - Use a more common idiom for parsing options with getopt(3) Differential Revision: https://reviews.freebsd.org/D4836 MFC after: 2 weeks Reviewed by: bjk (manpages), pjd (maintainer timeout) Sponsored by: EMC / Isilon Storage Division
1066 lines
25 KiB
C
1066 lines
25 KiB
C
/*-
|
|
* Copyright (c) 2004 Pawel Jakub Dawidek <pjd@FreeBSD.org>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* $FreeBSD$
|
|
*/
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/bio.h>
|
|
#include <sys/disk.h>
|
|
#include <sys/endian.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/queue.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/time.h>
|
|
#include <arpa/inet.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/tcp.h>
|
|
#include <assert.h>
|
|
#include <err.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <libgen.h>
|
|
#include <libutil.h>
|
|
#include <paths.h>
|
|
#include <pthread.h>
|
|
#include <signal.h>
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <stdint.h>
|
|
#include <string.h>
|
|
#include <syslog.h>
|
|
#include <unistd.h>
|
|
|
|
#include "ggate.h"
|
|
|
|
|
|
#define GGATED_EXPORT_FILE "/etc/gg.exports"
|
|
|
|
struct ggd_connection {
|
|
off_t c_mediasize;
|
|
unsigned c_sectorsize;
|
|
unsigned c_flags; /* flags (RO/RW) */
|
|
int c_diskfd;
|
|
int c_sendfd;
|
|
int c_recvfd;
|
|
time_t c_birthtime;
|
|
char *c_path;
|
|
uint64_t c_token;
|
|
in_addr_t c_srcip;
|
|
LIST_ENTRY(ggd_connection) c_next;
|
|
};
|
|
|
|
struct ggd_request {
|
|
struct g_gate_hdr r_hdr;
|
|
char *r_data;
|
|
TAILQ_ENTRY(ggd_request) r_next;
|
|
};
|
|
#define r_cmd r_hdr.gh_cmd
|
|
#define r_offset r_hdr.gh_offset
|
|
#define r_length r_hdr.gh_length
|
|
#define r_error r_hdr.gh_error
|
|
|
|
struct ggd_export {
|
|
char *e_path; /* path to device/file */
|
|
in_addr_t e_ip; /* remote IP address */
|
|
in_addr_t e_mask; /* IP mask */
|
|
unsigned e_flags; /* flags (RO/RW) */
|
|
SLIST_ENTRY(ggd_export) e_next;
|
|
};
|
|
|
|
static const char *exports_file = GGATED_EXPORT_FILE;
|
|
static int got_sighup = 0;
|
|
static in_addr_t bindaddr;
|
|
|
|
static TAILQ_HEAD(, ggd_request) inqueue = TAILQ_HEAD_INITIALIZER(inqueue);
|
|
static TAILQ_HEAD(, ggd_request) outqueue = TAILQ_HEAD_INITIALIZER(outqueue);
|
|
static pthread_mutex_t inqueue_mtx, outqueue_mtx;
|
|
static pthread_cond_t inqueue_cond, outqueue_cond;
|
|
|
|
static SLIST_HEAD(, ggd_export) exports = SLIST_HEAD_INITIALIZER(exports);
|
|
static LIST_HEAD(, ggd_connection) connections = LIST_HEAD_INITIALIZER(connections);
|
|
|
|
static void *recv_thread(void *arg);
|
|
static void *disk_thread(void *arg);
|
|
static void *send_thread(void *arg);
|
|
|
|
static void
|
|
usage(void)
|
|
{
|
|
|
|
fprintf(stderr, "usage: %s [-nv] [-a address] [-F pidfile] [-p port] "
|
|
"[-R rcvbuf] [-S sndbuf] [exports file]\n", getprogname());
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
static char *
|
|
ip2str(in_addr_t ip)
|
|
{
|
|
static char sip[16];
|
|
|
|
snprintf(sip, sizeof(sip), "%u.%u.%u.%u",
|
|
((ip >> 24) & 0xff),
|
|
((ip >> 16) & 0xff),
|
|
((ip >> 8) & 0xff),
|
|
(ip & 0xff));
|
|
return (sip);
|
|
}
|
|
|
|
static in_addr_t
|
|
countmask(unsigned m)
|
|
{
|
|
in_addr_t mask;
|
|
|
|
if (m == 0) {
|
|
mask = 0x0;
|
|
} else {
|
|
mask = 1 << (32 - m);
|
|
mask--;
|
|
mask = ~mask;
|
|
}
|
|
return (mask);
|
|
}
|
|
|
|
static void
|
|
line_parse(char *line, unsigned lineno)
|
|
{
|
|
struct ggd_export *ex;
|
|
char *word, *path, *sflags;
|
|
unsigned flags, i, vmask;
|
|
in_addr_t ip, mask;
|
|
|
|
ip = mask = flags = vmask = 0;
|
|
path = NULL;
|
|
sflags = NULL;
|
|
|
|
for (i = 0, word = strtok(line, " \t"); word != NULL;
|
|
i++, word = strtok(NULL, " \t")) {
|
|
switch (i) {
|
|
case 0: /* IP address or host name */
|
|
ip = g_gate_str2ip(strsep(&word, "/"));
|
|
if (ip == INADDR_NONE) {
|
|
g_gate_xlog("Invalid IP/host name at line %u.",
|
|
lineno);
|
|
}
|
|
ip = ntohl(ip);
|
|
if (word == NULL)
|
|
vmask = 32;
|
|
else {
|
|
errno = 0;
|
|
vmask = strtoul(word, NULL, 10);
|
|
if (vmask == 0 && errno != 0) {
|
|
g_gate_xlog("Invalid IP mask value at "
|
|
"line %u.", lineno);
|
|
}
|
|
if ((unsigned)vmask > 32) {
|
|
g_gate_xlog("Invalid IP mask value at line %u.",
|
|
lineno);
|
|
}
|
|
}
|
|
mask = countmask(vmask);
|
|
break;
|
|
case 1: /* flags */
|
|
if (strcasecmp("rd", word) == 0 ||
|
|
strcasecmp("ro", word) == 0) {
|
|
flags = O_RDONLY;
|
|
} else if (strcasecmp("wo", word) == 0) {
|
|
flags = O_WRONLY;
|
|
} else if (strcasecmp("rw", word) == 0) {
|
|
flags = O_RDWR;
|
|
} else {
|
|
g_gate_xlog("Invalid value in flags field at "
|
|
"line %u.", lineno);
|
|
}
|
|
sflags = word;
|
|
break;
|
|
case 2: /* path */
|
|
if (strlen(word) >= MAXPATHLEN) {
|
|
g_gate_xlog("Path too long at line %u. ",
|
|
lineno);
|
|
}
|
|
path = word;
|
|
break;
|
|
default:
|
|
g_gate_xlog("Too many arguments at line %u. ", lineno);
|
|
}
|
|
}
|
|
if (i != 3)
|
|
g_gate_xlog("Too few arguments at line %u.", lineno);
|
|
|
|
ex = malloc(sizeof(*ex));
|
|
if (ex == NULL)
|
|
g_gate_xlog("Not enough memory.");
|
|
ex->e_path = strdup(path);
|
|
if (ex->e_path == NULL)
|
|
g_gate_xlog("Not enough memory.");
|
|
|
|
/* Made 'and' here. */
|
|
ex->e_ip = (ip & mask);
|
|
ex->e_mask = mask;
|
|
ex->e_flags = flags;
|
|
|
|
SLIST_INSERT_HEAD(&exports, ex, e_next);
|
|
|
|
g_gate_log(LOG_DEBUG, "Added %s/%u %s %s to exports list.",
|
|
ip2str(ex->e_ip), vmask, path, sflags);
|
|
}
|
|
|
|
static void
|
|
exports_clear(void)
|
|
{
|
|
struct ggd_export *ex;
|
|
|
|
while (!SLIST_EMPTY(&exports)) {
|
|
ex = SLIST_FIRST(&exports);
|
|
SLIST_REMOVE_HEAD(&exports, e_next);
|
|
free(ex);
|
|
}
|
|
}
|
|
|
|
#define EXPORTS_LINE_SIZE 2048
|
|
static void
|
|
exports_get(void)
|
|
{
|
|
char buf[EXPORTS_LINE_SIZE], *line;
|
|
unsigned lineno = 0, objs = 0, len;
|
|
FILE *fd;
|
|
|
|
exports_clear();
|
|
|
|
fd = fopen(exports_file, "r");
|
|
if (fd == NULL) {
|
|
g_gate_xlog("Cannot open exports file (%s): %s.", exports_file,
|
|
strerror(errno));
|
|
}
|
|
|
|
g_gate_log(LOG_INFO, "Reading exports file (%s).", exports_file);
|
|
|
|
for (;;) {
|
|
if (fgets(buf, sizeof(buf), fd) == NULL) {
|
|
if (feof(fd))
|
|
break;
|
|
|
|
g_gate_xlog("Error while reading exports file: %s.",
|
|
strerror(errno));
|
|
}
|
|
|
|
/* Increase line count. */
|
|
lineno++;
|
|
|
|
/* Skip spaces and tabs. */
|
|
for (line = buf; *line == ' ' || *line == '\t'; ++line)
|
|
;
|
|
|
|
/* Empty line, comment or empty line at the end of file. */
|
|
if (*line == '\n' || *line == '#' || *line == '\0')
|
|
continue;
|
|
|
|
len = strlen(line);
|
|
if (line[len - 1] == '\n') {
|
|
/* Remove new line char. */
|
|
line[len - 1] = '\0';
|
|
} else {
|
|
if (!feof(fd))
|
|
g_gate_xlog("Line %u too long.", lineno);
|
|
}
|
|
|
|
line_parse(line, lineno);
|
|
objs++;
|
|
}
|
|
|
|
fclose(fd);
|
|
|
|
if (objs == 0)
|
|
g_gate_xlog("There are no objects to export.");
|
|
|
|
g_gate_log(LOG_INFO, "Exporting %u object(s).", objs);
|
|
}
|
|
|
|
static int
|
|
exports_check(struct ggd_export *ex, struct g_gate_cinit *cinit,
|
|
struct ggd_connection *conn)
|
|
{
|
|
char ipmask[32]; /* 32 == strlen("xxx.xxx.xxx.xxx/xxx.xxx.xxx.xxx")+1 */
|
|
int error = 0, flags;
|
|
|
|
strlcpy(ipmask, ip2str(ex->e_ip), sizeof(ipmask));
|
|
strlcat(ipmask, "/", sizeof(ipmask));
|
|
strlcat(ipmask, ip2str(ex->e_mask), sizeof(ipmask));
|
|
if ((cinit->gc_flags & GGATE_FLAG_RDONLY) != 0) {
|
|
if (ex->e_flags == O_WRONLY) {
|
|
g_gate_log(LOG_WARNING, "Read-only access requested, "
|
|
"but %s (%s) is exported write-only.", ex->e_path,
|
|
ipmask);
|
|
return (EPERM);
|
|
} else {
|
|
conn->c_flags |= GGATE_FLAG_RDONLY;
|
|
}
|
|
} else if ((cinit->gc_flags & GGATE_FLAG_WRONLY) != 0) {
|
|
if (ex->e_flags == O_RDONLY) {
|
|
g_gate_log(LOG_WARNING, "Write-only access requested, "
|
|
"but %s (%s) is exported read-only.", ex->e_path,
|
|
ipmask);
|
|
return (EPERM);
|
|
} else {
|
|
conn->c_flags |= GGATE_FLAG_WRONLY;
|
|
}
|
|
} else {
|
|
if (ex->e_flags == O_RDONLY) {
|
|
g_gate_log(LOG_WARNING, "Read-write access requested, "
|
|
"but %s (%s) is exported read-only.", ex->e_path,
|
|
ipmask);
|
|
return (EPERM);
|
|
} else if (ex->e_flags == O_WRONLY) {
|
|
g_gate_log(LOG_WARNING, "Read-write access requested, "
|
|
"but %s (%s) is exported write-only.", ex->e_path,
|
|
ipmask);
|
|
return (EPERM);
|
|
}
|
|
}
|
|
if ((conn->c_flags & GGATE_FLAG_RDONLY) != 0)
|
|
flags = O_RDONLY;
|
|
else if ((conn->c_flags & GGATE_FLAG_WRONLY) != 0)
|
|
flags = O_WRONLY;
|
|
else
|
|
flags = O_RDWR;
|
|
conn->c_diskfd = open(ex->e_path, flags);
|
|
if (conn->c_diskfd == -1) {
|
|
error = errno;
|
|
g_gate_log(LOG_ERR, "Cannot open %s: %s.", ex->e_path,
|
|
strerror(error));
|
|
return (error);
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
static struct ggd_export *
|
|
exports_find(struct sockaddr *s, struct g_gate_cinit *cinit,
|
|
struct ggd_connection *conn)
|
|
{
|
|
struct ggd_export *ex;
|
|
in_addr_t ip;
|
|
int error;
|
|
|
|
ip = htonl(((struct sockaddr_in *)(void *)s)->sin_addr.s_addr);
|
|
SLIST_FOREACH(ex, &exports, e_next) {
|
|
if ((ip & ex->e_mask) != ex->e_ip) {
|
|
g_gate_log(LOG_DEBUG, "exports[%s]: IP mismatch.",
|
|
ex->e_path);
|
|
continue;
|
|
}
|
|
if (strcmp(cinit->gc_path, ex->e_path) != 0) {
|
|
g_gate_log(LOG_DEBUG, "exports[%s]: Path mismatch.",
|
|
ex->e_path);
|
|
continue;
|
|
}
|
|
error = exports_check(ex, cinit, conn);
|
|
if (error == 0)
|
|
return (ex);
|
|
else {
|
|
errno = error;
|
|
return (NULL);
|
|
}
|
|
}
|
|
g_gate_log(LOG_WARNING, "Unauthorized connection from: %s.",
|
|
ip2str(ip));
|
|
errno = EPERM;
|
|
return (NULL);
|
|
}
|
|
|
|
/*
|
|
* Remove timed out connections.
|
|
*/
|
|
static void
|
|
connection_cleanups(void)
|
|
{
|
|
struct ggd_connection *conn, *tconn;
|
|
time_t now;
|
|
|
|
time(&now);
|
|
LIST_FOREACH_SAFE(conn, &connections, c_next, tconn) {
|
|
if (now - conn->c_birthtime > 10) {
|
|
LIST_REMOVE(conn, c_next);
|
|
g_gate_log(LOG_NOTICE,
|
|
"Connection from %s [%s] removed.",
|
|
ip2str(conn->c_srcip), conn->c_path);
|
|
close(conn->c_diskfd);
|
|
close(conn->c_sendfd);
|
|
close(conn->c_recvfd);
|
|
free(conn->c_path);
|
|
free(conn);
|
|
}
|
|
}
|
|
}
|
|
|
|
static struct ggd_connection *
|
|
connection_find(struct g_gate_cinit *cinit)
|
|
{
|
|
struct ggd_connection *conn;
|
|
|
|
LIST_FOREACH(conn, &connections, c_next) {
|
|
if (conn->c_token == cinit->gc_token)
|
|
break;
|
|
}
|
|
return (conn);
|
|
}
|
|
|
|
static struct ggd_connection *
|
|
connection_new(struct g_gate_cinit *cinit, struct sockaddr *s, int sfd)
|
|
{
|
|
struct ggd_connection *conn;
|
|
in_addr_t ip;
|
|
|
|
/*
|
|
* First, look for old connections.
|
|
* We probably should do it every X seconds, but what for?
|
|
* It is only dangerous if an attacker wants to overload connections
|
|
* queue, so here is a good place to do the cleanups.
|
|
*/
|
|
connection_cleanups();
|
|
|
|
conn = malloc(sizeof(*conn));
|
|
if (conn == NULL)
|
|
return (NULL);
|
|
conn->c_path = strdup(cinit->gc_path);
|
|
if (conn->c_path == NULL) {
|
|
free(conn);
|
|
return (NULL);
|
|
}
|
|
conn->c_token = cinit->gc_token;
|
|
ip = htonl(((struct sockaddr_in *)(void *)s)->sin_addr.s_addr);
|
|
conn->c_srcip = ip;
|
|
conn->c_sendfd = conn->c_recvfd = -1;
|
|
if ((cinit->gc_flags & GGATE_FLAG_SEND) != 0)
|
|
conn->c_sendfd = sfd;
|
|
else
|
|
conn->c_recvfd = sfd;
|
|
conn->c_mediasize = 0;
|
|
conn->c_sectorsize = 0;
|
|
time(&conn->c_birthtime);
|
|
conn->c_flags = cinit->gc_flags;
|
|
LIST_INSERT_HEAD(&connections, conn, c_next);
|
|
g_gate_log(LOG_DEBUG, "Connection created [%s, %s].", ip2str(ip),
|
|
conn->c_path);
|
|
return (conn);
|
|
}
|
|
|
|
static int
|
|
connection_add(struct ggd_connection *conn, struct g_gate_cinit *cinit,
|
|
struct sockaddr *s, int sfd)
|
|
{
|
|
in_addr_t ip;
|
|
|
|
ip = htonl(((struct sockaddr_in *)(void *)s)->sin_addr.s_addr);
|
|
if ((cinit->gc_flags & GGATE_FLAG_SEND) != 0) {
|
|
if (conn->c_sendfd != -1) {
|
|
g_gate_log(LOG_WARNING,
|
|
"Send socket already exists [%s, %s].", ip2str(ip),
|
|
conn->c_path);
|
|
return (EEXIST);
|
|
}
|
|
conn->c_sendfd = sfd;
|
|
} else {
|
|
if (conn->c_recvfd != -1) {
|
|
g_gate_log(LOG_WARNING,
|
|
"Receive socket already exists [%s, %s].",
|
|
ip2str(ip), conn->c_path);
|
|
return (EEXIST);
|
|
}
|
|
conn->c_recvfd = sfd;
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Connection added [%s, %s].", ip2str(ip),
|
|
conn->c_path);
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Remove one socket from the given connection or the whole
|
|
* connection if sfd == -1.
|
|
*/
|
|
static void
|
|
connection_remove(struct ggd_connection *conn)
|
|
{
|
|
|
|
LIST_REMOVE(conn, c_next);
|
|
g_gate_log(LOG_DEBUG, "Connection removed [%s %s].",
|
|
ip2str(conn->c_srcip), conn->c_path);
|
|
if (conn->c_sendfd != -1)
|
|
close(conn->c_sendfd);
|
|
if (conn->c_recvfd != -1)
|
|
close(conn->c_recvfd);
|
|
free(conn->c_path);
|
|
free(conn);
|
|
}
|
|
|
|
static int
|
|
connection_ready(struct ggd_connection *conn)
|
|
{
|
|
|
|
return (conn->c_sendfd != -1 && conn->c_recvfd != -1);
|
|
}
|
|
|
|
static void
|
|
connection_launch(struct ggd_connection *conn)
|
|
{
|
|
pthread_t td;
|
|
int error, pid;
|
|
|
|
pid = fork();
|
|
if (pid > 0)
|
|
return;
|
|
else if (pid == -1) {
|
|
g_gate_log(LOG_ERR, "Cannot fork: %s.", strerror(errno));
|
|
return;
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Process created [%s].", conn->c_path);
|
|
|
|
/*
|
|
* Create condition variables and mutexes for in-queue and out-queue
|
|
* synchronization.
|
|
*/
|
|
error = pthread_mutex_init(&inqueue_mtx, NULL);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_mutex_init(inqueue_mtx): %s.",
|
|
strerror(error));
|
|
}
|
|
error = pthread_cond_init(&inqueue_cond, NULL);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_cond_init(inqueue_cond): %s.",
|
|
strerror(error));
|
|
}
|
|
error = pthread_mutex_init(&outqueue_mtx, NULL);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_mutex_init(outqueue_mtx): %s.",
|
|
strerror(error));
|
|
}
|
|
error = pthread_cond_init(&outqueue_cond, NULL);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_cond_init(outqueue_cond): %s.",
|
|
strerror(error));
|
|
}
|
|
|
|
/*
|
|
* Create threads:
|
|
* recvtd - thread for receiving I/O request
|
|
* diskio - thread for doing I/O request
|
|
* sendtd - thread for sending I/O requests back
|
|
*/
|
|
error = pthread_create(&td, NULL, send_thread, conn);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_create(send_thread): %s.",
|
|
strerror(error));
|
|
}
|
|
error = pthread_create(&td, NULL, recv_thread, conn);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_create(recv_thread): %s.",
|
|
strerror(error));
|
|
}
|
|
disk_thread(conn);
|
|
}
|
|
|
|
static void
|
|
sendfail(int sfd, int error, const char *fmt, ...)
|
|
{
|
|
struct g_gate_sinit sinit;
|
|
va_list ap;
|
|
ssize_t data;
|
|
|
|
sinit.gs_error = error;
|
|
g_gate_swap2n_sinit(&sinit);
|
|
data = g_gate_send(sfd, &sinit, sizeof(sinit), 0);
|
|
g_gate_swap2h_sinit(&sinit);
|
|
if (data != sizeof(sinit)) {
|
|
g_gate_log(LOG_WARNING, "Cannot send initial packet: %s.",
|
|
strerror(errno));
|
|
return;
|
|
}
|
|
if (fmt != NULL) {
|
|
va_start(ap, fmt);
|
|
g_gate_vlog(LOG_WARNING, fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
}
|
|
|
|
static void *
|
|
malloc_waitok(size_t size)
|
|
{
|
|
void *p;
|
|
|
|
while ((p = malloc(size)) == NULL) {
|
|
g_gate_log(LOG_DEBUG, "Cannot allocate %zu bytes.", size);
|
|
sleep(1);
|
|
}
|
|
return (p);
|
|
}
|
|
|
|
static void *
|
|
recv_thread(void *arg)
|
|
{
|
|
struct ggd_connection *conn;
|
|
struct ggd_request *req;
|
|
ssize_t data;
|
|
int error, fd;
|
|
|
|
conn = arg;
|
|
g_gate_log(LOG_NOTICE, "%s: started [%s]!", __func__, conn->c_path);
|
|
fd = conn->c_recvfd;
|
|
for (;;) {
|
|
/*
|
|
* Get header packet.
|
|
*/
|
|
req = malloc_waitok(sizeof(*req));
|
|
data = g_gate_recv(fd, &req->r_hdr, sizeof(req->r_hdr),
|
|
MSG_WAITALL);
|
|
if (data == 0) {
|
|
g_gate_log(LOG_DEBUG, "Process %u exiting.", getpid());
|
|
exit(EXIT_SUCCESS);
|
|
} else if (data == -1) {
|
|
g_gate_xlog("Error while receiving hdr packet: %s.",
|
|
strerror(errno));
|
|
} else if (data != sizeof(req->r_hdr)) {
|
|
g_gate_xlog("Malformed hdr packet received.");
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Received hdr packet.");
|
|
g_gate_swap2h_hdr(&req->r_hdr);
|
|
|
|
g_gate_log(LOG_DEBUG, "%s: offset=%jd length=%u", __func__,
|
|
(intmax_t)req->r_offset, (unsigned)req->r_length);
|
|
|
|
/*
|
|
* Allocate memory for data.
|
|
*/
|
|
req->r_data = malloc_waitok(req->r_length);
|
|
|
|
/*
|
|
* Receive data to write for WRITE request.
|
|
*/
|
|
if (req->r_cmd == GGATE_CMD_WRITE) {
|
|
g_gate_log(LOG_DEBUG, "Waiting for %u bytes of data...",
|
|
req->r_length);
|
|
data = g_gate_recv(fd, req->r_data, req->r_length,
|
|
MSG_WAITALL);
|
|
if (data == -1) {
|
|
g_gate_xlog("Error while receiving data: %s.",
|
|
strerror(errno));
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Put the request onto the incoming queue.
|
|
*/
|
|
error = pthread_mutex_lock(&inqueue_mtx);
|
|
assert(error == 0);
|
|
TAILQ_INSERT_TAIL(&inqueue, req, r_next);
|
|
error = pthread_cond_signal(&inqueue_cond);
|
|
assert(error == 0);
|
|
error = pthread_mutex_unlock(&inqueue_mtx);
|
|
assert(error == 0);
|
|
}
|
|
}
|
|
|
|
static void *
|
|
disk_thread(void *arg)
|
|
{
|
|
struct ggd_connection *conn;
|
|
struct ggd_request *req;
|
|
ssize_t data;
|
|
int error, fd;
|
|
|
|
conn = arg;
|
|
g_gate_log(LOG_NOTICE, "%s: started [%s]!", __func__, conn->c_path);
|
|
fd = conn->c_diskfd;
|
|
for (;;) {
|
|
/*
|
|
* Get a request from the incoming queue.
|
|
*/
|
|
error = pthread_mutex_lock(&inqueue_mtx);
|
|
assert(error == 0);
|
|
while ((req = TAILQ_FIRST(&inqueue)) == NULL) {
|
|
error = pthread_cond_wait(&inqueue_cond, &inqueue_mtx);
|
|
assert(error == 0);
|
|
}
|
|
TAILQ_REMOVE(&inqueue, req, r_next);
|
|
error = pthread_mutex_unlock(&inqueue_mtx);
|
|
assert(error == 0);
|
|
|
|
/*
|
|
* Check the request.
|
|
*/
|
|
assert(req->r_cmd == GGATE_CMD_READ || req->r_cmd == GGATE_CMD_WRITE);
|
|
assert(req->r_offset + req->r_length <= (uintmax_t)conn->c_mediasize);
|
|
assert((req->r_offset % conn->c_sectorsize) == 0);
|
|
assert((req->r_length % conn->c_sectorsize) == 0);
|
|
|
|
g_gate_log(LOG_DEBUG, "%s: offset=%jd length=%u", __func__,
|
|
(intmax_t)req->r_offset, (unsigned)req->r_length);
|
|
|
|
/*
|
|
* Do the request.
|
|
*/
|
|
data = 0;
|
|
switch (req->r_cmd) {
|
|
case GGATE_CMD_READ:
|
|
data = pread(fd, req->r_data, req->r_length,
|
|
req->r_offset);
|
|
break;
|
|
case GGATE_CMD_WRITE:
|
|
data = pwrite(fd, req->r_data, req->r_length,
|
|
req->r_offset);
|
|
/* Free data memory here - better sooner. */
|
|
free(req->r_data);
|
|
req->r_data = NULL;
|
|
break;
|
|
}
|
|
if (data != (ssize_t)req->r_length) {
|
|
/* Report short reads/writes as I/O errors. */
|
|
if (errno == 0)
|
|
errno = EIO;
|
|
g_gate_log(LOG_ERR, "Disk error: %s", strerror(errno));
|
|
req->r_error = errno;
|
|
if (req->r_data != NULL) {
|
|
free(req->r_data);
|
|
req->r_data = NULL;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Put the request onto the outgoing queue.
|
|
*/
|
|
error = pthread_mutex_lock(&outqueue_mtx);
|
|
assert(error == 0);
|
|
TAILQ_INSERT_TAIL(&outqueue, req, r_next);
|
|
error = pthread_cond_signal(&outqueue_cond);
|
|
assert(error == 0);
|
|
error = pthread_mutex_unlock(&outqueue_mtx);
|
|
assert(error == 0);
|
|
}
|
|
|
|
/* NOTREACHED */
|
|
return (NULL);
|
|
}
|
|
|
|
static void *
|
|
send_thread(void *arg)
|
|
{
|
|
struct ggd_connection *conn;
|
|
struct ggd_request *req;
|
|
ssize_t data;
|
|
int error, fd;
|
|
|
|
conn = arg;
|
|
g_gate_log(LOG_NOTICE, "%s: started [%s]!", __func__, conn->c_path);
|
|
fd = conn->c_sendfd;
|
|
for (;;) {
|
|
/*
|
|
* Get a request from the outgoing queue.
|
|
*/
|
|
error = pthread_mutex_lock(&outqueue_mtx);
|
|
assert(error == 0);
|
|
while ((req = TAILQ_FIRST(&outqueue)) == NULL) {
|
|
error = pthread_cond_wait(&outqueue_cond,
|
|
&outqueue_mtx);
|
|
assert(error == 0);
|
|
}
|
|
TAILQ_REMOVE(&outqueue, req, r_next);
|
|
error = pthread_mutex_unlock(&outqueue_mtx);
|
|
assert(error == 0);
|
|
|
|
g_gate_log(LOG_DEBUG, "%s: offset=%jd length=%u", __func__,
|
|
(intmax_t)req->r_offset, (unsigned)req->r_length);
|
|
|
|
/*
|
|
* Send the request.
|
|
*/
|
|
g_gate_swap2n_hdr(&req->r_hdr);
|
|
if (g_gate_send(fd, &req->r_hdr, sizeof(req->r_hdr), 0) == -1) {
|
|
g_gate_xlog("Error while sending hdr packet: %s.",
|
|
strerror(errno));
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Sent hdr packet.");
|
|
g_gate_swap2h_hdr(&req->r_hdr);
|
|
if (req->r_data != NULL) {
|
|
data = g_gate_send(fd, req->r_data, req->r_length, 0);
|
|
if (data != (ssize_t)req->r_length) {
|
|
g_gate_xlog("Error while sending data: %s.",
|
|
strerror(errno));
|
|
}
|
|
g_gate_log(LOG_DEBUG,
|
|
"Sent %zd bytes (offset=%ju, size=%zu).", data,
|
|
(uintmax_t)req->r_offset, (size_t)req->r_length);
|
|
free(req->r_data);
|
|
}
|
|
free(req);
|
|
}
|
|
|
|
/* NOTREACHED */
|
|
return (NULL);
|
|
}
|
|
|
|
static void
|
|
log_connection(struct sockaddr *from)
|
|
{
|
|
in_addr_t ip;
|
|
|
|
ip = htonl(((struct sockaddr_in *)(void *)from)->sin_addr.s_addr);
|
|
g_gate_log(LOG_INFO, "Connection from: %s.", ip2str(ip));
|
|
}
|
|
|
|
static int
|
|
handshake(struct sockaddr *from, int sfd)
|
|
{
|
|
struct g_gate_version ver;
|
|
struct g_gate_cinit cinit;
|
|
struct g_gate_sinit sinit;
|
|
struct ggd_connection *conn;
|
|
struct ggd_export *ex;
|
|
ssize_t data;
|
|
|
|
log_connection(from);
|
|
/*
|
|
* Phase 1: Version verification.
|
|
*/
|
|
g_gate_log(LOG_DEBUG, "Receiving version packet.");
|
|
data = g_gate_recv(sfd, &ver, sizeof(ver), MSG_WAITALL);
|
|
g_gate_swap2h_version(&ver);
|
|
if (data != sizeof(ver)) {
|
|
g_gate_log(LOG_WARNING, "Malformed version packet.");
|
|
return (0);
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Version packet received.");
|
|
if (memcmp(ver.gv_magic, GGATE_MAGIC, strlen(GGATE_MAGIC)) != 0) {
|
|
g_gate_log(LOG_WARNING, "Invalid magic field.");
|
|
return (0);
|
|
}
|
|
if (ver.gv_version != GGATE_VERSION) {
|
|
g_gate_log(LOG_WARNING, "Version %u is not supported.",
|
|
ver.gv_version);
|
|
return (0);
|
|
}
|
|
ver.gv_error = 0;
|
|
g_gate_swap2n_version(&ver);
|
|
data = g_gate_send(sfd, &ver, sizeof(ver), 0);
|
|
g_gate_swap2h_version(&ver);
|
|
if (data == -1) {
|
|
sendfail(sfd, errno, "Error while sending version packet: %s.",
|
|
strerror(errno));
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Phase 2: Request verification.
|
|
*/
|
|
g_gate_log(LOG_DEBUG, "Receiving initial packet.");
|
|
data = g_gate_recv(sfd, &cinit, sizeof(cinit), MSG_WAITALL);
|
|
g_gate_swap2h_cinit(&cinit);
|
|
if (data != sizeof(cinit)) {
|
|
g_gate_log(LOG_WARNING, "Malformed initial packet.");
|
|
return (0);
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Initial packet received.");
|
|
conn = connection_find(&cinit);
|
|
if (conn != NULL) {
|
|
/*
|
|
* Connection should already exists.
|
|
*/
|
|
g_gate_log(LOG_DEBUG, "Found existing connection (token=%lu).",
|
|
(unsigned long)conn->c_token);
|
|
if (connection_add(conn, &cinit, from, sfd) == -1) {
|
|
connection_remove(conn);
|
|
return (0);
|
|
}
|
|
} else {
|
|
/*
|
|
* New connection, allocate space.
|
|
*/
|
|
conn = connection_new(&cinit, from, sfd);
|
|
if (conn == NULL) {
|
|
sendfail(sfd, ENOMEM,
|
|
"Cannot allocate new connection.");
|
|
return (0);
|
|
}
|
|
g_gate_log(LOG_DEBUG, "New connection created (token=%lu).",
|
|
(unsigned long)conn->c_token);
|
|
}
|
|
|
|
ex = exports_find(from, &cinit, conn);
|
|
if (ex == NULL) {
|
|
sendfail(sfd, errno, NULL);
|
|
connection_remove(conn);
|
|
return (0);
|
|
}
|
|
if (conn->c_mediasize == 0) {
|
|
conn->c_mediasize = g_gate_mediasize(conn->c_diskfd);
|
|
conn->c_sectorsize = g_gate_sectorsize(conn->c_diskfd);
|
|
}
|
|
sinit.gs_mediasize = conn->c_mediasize;
|
|
sinit.gs_sectorsize = conn->c_sectorsize;
|
|
sinit.gs_error = 0;
|
|
|
|
g_gate_log(LOG_DEBUG, "Sending initial packet.");
|
|
|
|
g_gate_swap2n_sinit(&sinit);
|
|
data = g_gate_send(sfd, &sinit, sizeof(sinit), 0);
|
|
g_gate_swap2h_sinit(&sinit);
|
|
if (data == -1) {
|
|
sendfail(sfd, errno, "Error while sending initial packet: %s.",
|
|
strerror(errno));
|
|
return (0);
|
|
}
|
|
|
|
if (connection_ready(conn)) {
|
|
connection_launch(conn);
|
|
connection_remove(conn);
|
|
}
|
|
return (1);
|
|
}
|
|
|
|
static void
|
|
huphandler(int sig __unused)
|
|
{
|
|
|
|
got_sighup = 1;
|
|
}
|
|
|
|
int
|
|
main(int argc, char *argv[])
|
|
{
|
|
const char *ggated_pidfile = _PATH_VARRUN "/ggated.pid";
|
|
struct pidfh *pfh;
|
|
struct sockaddr_in serv;
|
|
struct sockaddr from;
|
|
socklen_t fromlen;
|
|
pid_t otherpid;
|
|
int ch, sfd, tmpsfd;
|
|
unsigned port;
|
|
|
|
bindaddr = htonl(INADDR_ANY);
|
|
port = G_GATE_PORT;
|
|
while ((ch = getopt(argc, argv, "a:hnp:F:R:S:v")) != -1) {
|
|
switch (ch) {
|
|
case 'a':
|
|
bindaddr = g_gate_str2ip(optarg);
|
|
if (bindaddr == INADDR_NONE) {
|
|
errx(EXIT_FAILURE,
|
|
"Invalid IP/host name to bind to.");
|
|
}
|
|
break;
|
|
case 'F':
|
|
ggated_pidfile = optarg;
|
|
break;
|
|
case 'n':
|
|
nagle = 0;
|
|
break;
|
|
case 'p':
|
|
errno = 0;
|
|
port = strtoul(optarg, NULL, 10);
|
|
if (port == 0 && errno != 0)
|
|
errx(EXIT_FAILURE, "Invalid port.");
|
|
break;
|
|
case 'R':
|
|
errno = 0;
|
|
rcvbuf = strtoul(optarg, NULL, 10);
|
|
if (rcvbuf == 0 && errno != 0)
|
|
errx(EXIT_FAILURE, "Invalid rcvbuf.");
|
|
break;
|
|
case 'S':
|
|
errno = 0;
|
|
sndbuf = strtoul(optarg, NULL, 10);
|
|
if (sndbuf == 0 && errno != 0)
|
|
errx(EXIT_FAILURE, "Invalid sndbuf.");
|
|
break;
|
|
case 'v':
|
|
g_gate_verbose++;
|
|
break;
|
|
case 'h':
|
|
default:
|
|
usage();
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
if (argv[0] != NULL)
|
|
exports_file = argv[0];
|
|
exports_get();
|
|
|
|
pfh = pidfile_open(ggated_pidfile, 0600, &otherpid);
|
|
if (pfh == NULL) {
|
|
if (errno == EEXIST) {
|
|
errx(EXIT_FAILURE, "Daemon already running, pid: %jd.",
|
|
(intmax_t)otherpid);
|
|
}
|
|
err(EXIT_FAILURE, "Cannot open/create pidfile");
|
|
}
|
|
|
|
if (!g_gate_verbose) {
|
|
/* Run in daemon mode. */
|
|
if (daemon(0, 0) == -1)
|
|
g_gate_xlog("Cannot daemonize: %s", strerror(errno));
|
|
}
|
|
|
|
pidfile_write(pfh);
|
|
|
|
signal(SIGCHLD, SIG_IGN);
|
|
|
|
sfd = socket(AF_INET, SOCK_STREAM, 0);
|
|
if (sfd == -1)
|
|
g_gate_xlog("Cannot open stream socket: %s.", strerror(errno));
|
|
bzero(&serv, sizeof(serv));
|
|
serv.sin_family = AF_INET;
|
|
serv.sin_addr.s_addr = bindaddr;
|
|
serv.sin_port = htons(port);
|
|
|
|
g_gate_socket_settings(sfd);
|
|
|
|
if (bind(sfd, (struct sockaddr *)&serv, sizeof(serv)) == -1)
|
|
g_gate_xlog("bind(): %s.", strerror(errno));
|
|
if (listen(sfd, 5) == -1)
|
|
g_gate_xlog("listen(): %s.", strerror(errno));
|
|
|
|
g_gate_log(LOG_INFO, "Listen on port: %d.", port);
|
|
|
|
signal(SIGHUP, huphandler);
|
|
|
|
for (;;) {
|
|
fromlen = sizeof(from);
|
|
tmpsfd = accept(sfd, &from, &fromlen);
|
|
if (tmpsfd == -1)
|
|
g_gate_xlog("accept(): %s.", strerror(errno));
|
|
|
|
if (got_sighup) {
|
|
got_sighup = 0;
|
|
exports_get();
|
|
}
|
|
|
|
if (!handshake(&from, tmpsfd))
|
|
close(tmpsfd);
|
|
}
|
|
close(sfd);
|
|
pidfile_remove(pfh);
|
|
exit(EXIT_SUCCESS);
|
|
}
|