7be67fe3d1
Change communication protocol to be much more resistant on network problems and to allow for much better performance. Better performance is achieved by creating two connections between ggatec and ggated one for sending the data and one for receiving it. Every connection is handled by separeted thread, so there is no more synchronous data flow (send and wait for response), now one threads sends all requests and another receives the data. Use two threads in ggatec(8): - sendtd, which takes I/O requests from the kernel and sends them to the ggated daemon on the other end; - recvtd, which waits for ggated responses and forwards them to the kernel. Use three threads in ggated(8): - recvtd, which waits for I/O requests and puts them onto incoming queue; - disktd, which takes requests from the incoming queue, does disk operations and puts finished requests onto outgoing queue; - sendtd, which takes finished requests from the outgoing queue and sends responses back to ggatec. Because there were major changes in communication protocol, there is no backward compatibility, from now on, both client and server has to run on 5.x or 6.x (or at least ggated should be from the same FreeBSD version on which ggatec is running). For Gbit networks some buffers need to be increased. I use those settings: kern.ipc.maxsockbuf=16777216 net.inet.tcp.sendspace=8388608 net.inet.tcp.recvspace=8388608 and I use '-S 4194304 -R 4194304' options for both, ggatec and ggated. Approved by: re (scottl)
1045 lines
25 KiB
C
1045 lines
25 KiB
C
/*-
|
|
* Copyright (c) 2004 Pawel Jakub Dawidek <pjd@FreeBSD.org>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* $FreeBSD$
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <stdint.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <pthread.h>
|
|
#include <sys/param.h>
|
|
#include <sys/queue.h>
|
|
#include <sys/endian.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/time.h>
|
|
#include <sys/disk.h>
|
|
#include <sys/bio.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/tcp.h>
|
|
#include <arpa/inet.h>
|
|
#include <signal.h>
|
|
#include <assert.h>
|
|
#include <err.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <libgen.h>
|
|
#include <syslog.h>
|
|
#include <stdarg.h>
|
|
|
|
#include "ggate.h"
|
|
|
|
|
|
#define GGATED_EXPORT_FILE "/etc/gg.exports"
|
|
|
|
struct ggd_connection {
|
|
off_t c_mediasize;
|
|
off_t c_sectorsize;
|
|
unsigned c_flags; /* flags (RO/RW) */
|
|
int c_diskfd;
|
|
int c_sendfd;
|
|
int c_recvfd;
|
|
time_t c_birthtime;
|
|
char *c_path;
|
|
uint64_t c_token;
|
|
in_addr_t c_srcip;
|
|
LIST_ENTRY(ggd_connection) c_next;
|
|
};
|
|
|
|
struct ggd_request {
|
|
struct g_gate_hdr r_hdr;
|
|
char *r_data;
|
|
TAILQ_ENTRY(ggd_request) r_next;
|
|
};
|
|
#define r_cmd r_hdr.gh_cmd
|
|
#define r_offset r_hdr.gh_offset
|
|
#define r_length r_hdr.gh_length
|
|
#define r_error r_hdr.gh_error
|
|
|
|
struct ggd_export {
|
|
char *e_path; /* path to device/file */
|
|
in_addr_t e_ip; /* remote IP address */
|
|
in_addr_t e_mask; /* IP mask */
|
|
unsigned e_flags; /* flags (RO/RW) */
|
|
SLIST_ENTRY(ggd_export) e_next;
|
|
};
|
|
|
|
static const char *exports_file = GGATED_EXPORT_FILE;
|
|
static int got_sighup = 0;
|
|
in_addr_t bindaddr;
|
|
|
|
static TAILQ_HEAD(, ggd_request) inqueue = TAILQ_HEAD_INITIALIZER(inqueue);
|
|
static TAILQ_HEAD(, ggd_request) outqueue = TAILQ_HEAD_INITIALIZER(outqueue);
|
|
pthread_mutex_t inqueue_mtx, outqueue_mtx;
|
|
pthread_cond_t inqueue_cond, outqueue_cond;
|
|
|
|
static SLIST_HEAD(, ggd_export) exports = SLIST_HEAD_INITIALIZER(&exports);
|
|
static LIST_HEAD(, ggd_connection) connections = LIST_HEAD_INITIALIZER(&connection);
|
|
|
|
static void *recv_thread(void *arg);
|
|
static void *disk_thread(void *arg);
|
|
static void *send_thread(void *arg);
|
|
|
|
static void
|
|
usage(void)
|
|
{
|
|
|
|
fprintf(stderr, "usage: %s [-nv] [-a address] [-p port] [-R rcvbuf] "
|
|
"[-S sndbuf] [exports file]\n", getprogname());
|
|
exit(EXIT_FAILURE);
|
|
}
|
|
|
|
static char *
|
|
ip2str(in_addr_t ip)
|
|
{
|
|
static char sip[16];
|
|
|
|
snprintf(sip, sizeof(sip), "%u.%u.%u.%u",
|
|
((ip >> 24) & 0xff),
|
|
((ip >> 16) & 0xff),
|
|
((ip >> 8) & 0xff),
|
|
(ip & 0xff));
|
|
return (sip);
|
|
}
|
|
|
|
static in_addr_t
|
|
countmask(unsigned m)
|
|
{
|
|
in_addr_t mask;
|
|
|
|
if (m == 0) {
|
|
mask = 0x0;
|
|
} else {
|
|
mask = 1 << (32 - m);
|
|
mask--;
|
|
mask = ~mask;
|
|
}
|
|
return (mask);
|
|
}
|
|
|
|
static void
|
|
line_parse(char *line, unsigned lineno)
|
|
{
|
|
struct ggd_export *ex;
|
|
char *word, *path, *sflags;
|
|
unsigned flags, i, vmask;
|
|
in_addr_t ip, mask;
|
|
|
|
ip = mask = flags = vmask = 0;
|
|
path = NULL;
|
|
sflags = NULL;
|
|
|
|
for (i = 0, word = strtok(line, " \t"); word != NULL;
|
|
i++, word = strtok(NULL, " \t")) {
|
|
switch (i) {
|
|
case 0: /* IP address or host name */
|
|
ip = g_gate_str2ip(strsep(&word, "/"));
|
|
if (ip == INADDR_NONE) {
|
|
g_gate_xlog("Invalid IP/host name at line %u.",
|
|
lineno);
|
|
}
|
|
ip = ntohl(ip);
|
|
if (word == NULL)
|
|
vmask = 32;
|
|
else {
|
|
errno = 0;
|
|
vmask = strtoul(word, NULL, 10);
|
|
if (vmask == 0 && errno != 0) {
|
|
g_gate_xlog("Invalid IP mask value at "
|
|
"line %u.", lineno);
|
|
}
|
|
if ((unsigned)vmask > 32) {
|
|
g_gate_xlog("Invalid IP mask value at line %u.",
|
|
lineno);
|
|
}
|
|
}
|
|
mask = countmask(vmask);
|
|
break;
|
|
case 1: /* flags */
|
|
if (strcasecmp("rd", word) == 0 ||
|
|
strcasecmp("ro", word) == 0) {
|
|
flags = O_RDONLY;
|
|
} else if (strcasecmp("wo", word) == 0) {
|
|
flags = O_WRONLY;
|
|
} else if (strcasecmp("rw", word) == 0) {
|
|
flags = O_RDWR;
|
|
} else {
|
|
g_gate_xlog("Invalid value in flags field at "
|
|
"line %u.", lineno);
|
|
}
|
|
sflags = word;
|
|
break;
|
|
case 2: /* path */
|
|
if (strlen(word) >= MAXPATHLEN) {
|
|
g_gate_xlog("Path too long at line %u. ",
|
|
lineno);
|
|
}
|
|
path = word;
|
|
break;
|
|
default:
|
|
g_gate_xlog("Too many arguments at line %u. ", lineno);
|
|
}
|
|
}
|
|
if (i != 3)
|
|
g_gate_xlog("Too few arguments at line %u.", lineno);
|
|
|
|
ex = malloc(sizeof(*ex));
|
|
if (ex == NULL)
|
|
g_gate_xlog("No enough memory.");
|
|
ex->e_path = strdup(path);
|
|
if (ex->e_path == NULL)
|
|
g_gate_xlog("No enough memory.");
|
|
|
|
/* Made 'and' here. */
|
|
ex->e_ip = (ip & mask);
|
|
ex->e_mask = mask;
|
|
ex->e_flags = flags;
|
|
|
|
SLIST_INSERT_HEAD(&exports, ex, e_next);
|
|
|
|
g_gate_log(LOG_DEBUG, "Added %s/%u %s %s to exports list.",
|
|
ip2str(ex->e_ip), vmask, path, sflags);
|
|
}
|
|
|
|
static void
|
|
exports_clear(void)
|
|
{
|
|
struct ggd_export *ex;
|
|
|
|
while (!SLIST_EMPTY(&exports)) {
|
|
ex = SLIST_FIRST(&exports);
|
|
SLIST_REMOVE_HEAD(&exports, e_next);
|
|
free(ex);
|
|
}
|
|
}
|
|
|
|
#define EXPORTS_LINE_SIZE 2048
|
|
static void
|
|
exports_get(void)
|
|
{
|
|
char buf[EXPORTS_LINE_SIZE], *line;
|
|
unsigned lineno = 0, objs = 0, len;
|
|
FILE *fd;
|
|
|
|
exports_clear();
|
|
|
|
fd = fopen(exports_file, "r");
|
|
if (fd == NULL) {
|
|
g_gate_xlog("Cannot open exports file (%s): %s.", exports_file,
|
|
strerror(errno));
|
|
}
|
|
|
|
g_gate_log(LOG_INFO, "Reading exports file (%s).", exports_file);
|
|
|
|
for (;;) {
|
|
if (fgets(buf, sizeof(buf), fd) == NULL) {
|
|
if (feof(fd))
|
|
break;
|
|
|
|
g_gate_xlog("Error while reading exports file: %s.",
|
|
strerror(errno));
|
|
}
|
|
|
|
/* Increase line count. */
|
|
lineno++;
|
|
|
|
/* Skip spaces and tabs. */
|
|
for (line = buf; *line == ' ' || *line == '\t'; ++line)
|
|
;
|
|
|
|
/* Empty line, comment or empty line at the end of file. */
|
|
if (*line == '\n' || *line == '#' || *line == '\0')
|
|
continue;
|
|
|
|
len = strlen(line);
|
|
if (line[len - 1] == '\n') {
|
|
/* Remove new line char. */
|
|
line[len - 1] = '\0';
|
|
} else {
|
|
if (!feof(fd))
|
|
g_gate_xlog("Line %u too long.", lineno);
|
|
}
|
|
|
|
line_parse(line, lineno);
|
|
objs++;
|
|
}
|
|
|
|
fclose(fd);
|
|
|
|
if (objs == 0)
|
|
g_gate_xlog("There are no objects to export.");
|
|
|
|
g_gate_log(LOG_INFO, "Exporting %u object(s).", objs);
|
|
}
|
|
|
|
static int
|
|
exports_check(struct ggd_export *ex, struct g_gate_cinit *cinit,
|
|
struct ggd_connection *conn)
|
|
{
|
|
char ipmask[32]; /* 32 == strlen("xxx.xxx.xxx.xxx/xxx.xxx.xxx.xxx")+1 */
|
|
int error = 0, flags;
|
|
|
|
strlcpy(ipmask, ip2str(ex->e_ip), sizeof(ipmask));
|
|
strlcat(ipmask, "/", sizeof(ipmask));
|
|
strlcat(ipmask, ip2str(ex->e_mask), sizeof(ipmask));
|
|
if ((cinit->gc_flags & GGATE_FLAG_RDONLY) != 0) {
|
|
if (ex->e_flags == O_WRONLY) {
|
|
g_gate_log(LOG_WARNING, "Read-only access requested, "
|
|
"but %s (%s) is exported write-only.", ex->e_path,
|
|
ipmask);
|
|
return (EPERM);
|
|
} else {
|
|
conn->c_flags |= GGATE_FLAG_RDONLY;
|
|
}
|
|
} else if ((cinit->gc_flags & GGATE_FLAG_WRONLY) != 0) {
|
|
if (ex->e_flags == O_RDONLY) {
|
|
g_gate_log(LOG_WARNING, "Write-only access requested, "
|
|
"but %s (%s) is exported read-only.", ex->e_path,
|
|
ipmask);
|
|
return (EPERM);
|
|
} else {
|
|
conn->c_flags |= GGATE_FLAG_WRONLY;
|
|
}
|
|
} else {
|
|
if (ex->e_flags == O_RDONLY) {
|
|
g_gate_log(LOG_WARNING, "Read-write access requested, "
|
|
"but %s (%s) is exported read-only.", ex->e_path,
|
|
ipmask);
|
|
return (EPERM);
|
|
} else if (ex->e_flags == O_WRONLY) {
|
|
g_gate_log(LOG_WARNING, "Read-write access requested, "
|
|
"but %s (%s) is exported write-only.", ex->e_path,
|
|
ipmask);
|
|
return (EPERM);
|
|
}
|
|
}
|
|
if ((conn->c_flags & GGATE_FLAG_RDONLY) != 0)
|
|
flags = O_RDONLY;
|
|
else if ((conn->c_flags & GGATE_FLAG_WRONLY) != 0)
|
|
flags = O_WRONLY;
|
|
else
|
|
flags = O_RDWR;
|
|
conn->c_diskfd = open(ex->e_path, flags);
|
|
if (conn->c_diskfd == -1) {
|
|
error = errno;
|
|
g_gate_log(LOG_ERR, "Cannot open %s: %s.", ex->e_path,
|
|
strerror(error));
|
|
return (error);
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
static struct ggd_export *
|
|
exports_find(struct sockaddr *s, struct g_gate_cinit *cinit,
|
|
struct ggd_connection *conn)
|
|
{
|
|
struct ggd_export *ex;
|
|
in_addr_t ip;
|
|
int error;
|
|
|
|
ip = htonl(((struct sockaddr_in *)(void *)s)->sin_addr.s_addr);
|
|
SLIST_FOREACH(ex, &exports, e_next) {
|
|
if ((ip & ex->e_mask) != ex->e_ip) {
|
|
g_gate_log(LOG_DEBUG, "exports[%s]: IP mismatch.",
|
|
ex->e_path);
|
|
continue;
|
|
}
|
|
if (strcmp(cinit->gc_path, ex->e_path) != 0) {
|
|
g_gate_log(LOG_DEBUG, "exports[%s]: Path mismatch.",
|
|
ex->e_path);
|
|
continue;
|
|
}
|
|
error = exports_check(ex, cinit, conn);
|
|
if (error == 0)
|
|
return (ex);
|
|
else {
|
|
errno = error;
|
|
return (NULL);
|
|
}
|
|
}
|
|
g_gate_log(LOG_WARNING, "Unauthorized connection from: %s.",
|
|
ip2str(ip));
|
|
errno = EPERM;
|
|
return (NULL);
|
|
}
|
|
|
|
/*
|
|
* Remove timed out connections.
|
|
*/
|
|
static void
|
|
connection_cleanups(void)
|
|
{
|
|
struct ggd_connection *conn, *tconn;
|
|
time_t now;
|
|
|
|
time(&now);
|
|
LIST_FOREACH_SAFE(conn, &connections, c_next, tconn) {
|
|
if (now - conn->c_birthtime > 10) {
|
|
LIST_REMOVE(conn, c_next);
|
|
g_gate_log(LOG_NOTICE,
|
|
"Connection from %s [%s] removed.",
|
|
ip2str(conn->c_srcip), conn->c_path);
|
|
close(conn->c_diskfd);
|
|
close(conn->c_sendfd);
|
|
close(conn->c_recvfd);
|
|
free(conn->c_path);
|
|
free(conn);
|
|
}
|
|
}
|
|
}
|
|
|
|
static struct ggd_connection *
|
|
connection_find(struct g_gate_cinit *cinit)
|
|
{
|
|
struct ggd_connection *conn;
|
|
|
|
LIST_FOREACH(conn, &connections, c_next) {
|
|
if (conn->c_token == cinit->gc_token)
|
|
break;
|
|
}
|
|
return (conn);
|
|
}
|
|
|
|
static struct ggd_connection *
|
|
connection_new(struct g_gate_cinit *cinit, struct sockaddr *s, int sfd)
|
|
{
|
|
struct ggd_connection *conn;
|
|
in_addr_t ip;
|
|
|
|
/*
|
|
* First, look for old connections.
|
|
* We probably should do it every X seconds, but what for?
|
|
* It is only dangerous if an attacker wants to overload connections
|
|
* queue, so here is a good place to do the cleanups.
|
|
*/
|
|
connection_cleanups();
|
|
|
|
conn = malloc(sizeof(*conn));
|
|
if (conn == NULL)
|
|
return (NULL);
|
|
conn->c_path = strdup(cinit->gc_path);
|
|
if (conn->c_path == NULL) {
|
|
free(conn);
|
|
return (NULL);
|
|
}
|
|
conn->c_token = cinit->gc_token;
|
|
ip = htonl(((struct sockaddr_in *)(void *)s)->sin_addr.s_addr);
|
|
conn->c_srcip = ip;
|
|
conn->c_sendfd = conn->c_recvfd = -1;
|
|
if ((cinit->gc_flags & GGATE_FLAG_SEND) != 0)
|
|
conn->c_sendfd = sfd;
|
|
else
|
|
conn->c_recvfd = sfd;
|
|
conn->c_mediasize = 0;
|
|
conn->c_sectorsize = 0;
|
|
time(&conn->c_birthtime);
|
|
conn->c_flags = cinit->gc_flags;
|
|
LIST_INSERT_HEAD(&connections, conn, c_next);
|
|
g_gate_log(LOG_DEBUG, "Connection created [%s, %s].", ip2str(ip),
|
|
conn->c_path);
|
|
return (conn);
|
|
}
|
|
|
|
static int
|
|
connection_add(struct ggd_connection *conn, struct g_gate_cinit *cinit,
|
|
struct sockaddr *s, int sfd)
|
|
{
|
|
in_addr_t ip;
|
|
|
|
ip = htonl(((struct sockaddr_in *)(void *)s)->sin_addr.s_addr);
|
|
if ((cinit->gc_flags & GGATE_FLAG_SEND) != 0) {
|
|
if (conn->c_sendfd != -1) {
|
|
g_gate_log(LOG_WARNING,
|
|
"Send socket already exists [%s, %s].", ip2str(ip),
|
|
conn->c_path);
|
|
return (EEXIST);
|
|
}
|
|
conn->c_sendfd = sfd;
|
|
} else {
|
|
if (conn->c_recvfd != -1) {
|
|
g_gate_log(LOG_WARNING,
|
|
"Receive socket already exists [%s, %s].",
|
|
ip2str(ip), conn->c_path);
|
|
return (EEXIST);
|
|
}
|
|
conn->c_recvfd = sfd;
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Connection added [%s, %s].", ip2str(ip),
|
|
conn->c_path);
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Remove one socket from the given connection or the whole
|
|
* connection if sfd == -1.
|
|
*/
|
|
static void
|
|
connection_remove(struct ggd_connection *conn)
|
|
{
|
|
|
|
LIST_REMOVE(conn, c_next);
|
|
g_gate_log(LOG_DEBUG, "Connection removed [%s %s].",
|
|
ip2str(conn->c_srcip), conn->c_path);
|
|
if (conn->c_sendfd != -1)
|
|
close(conn->c_sendfd);
|
|
if (conn->c_recvfd != -1)
|
|
close(conn->c_recvfd);
|
|
free(conn->c_path);
|
|
free(conn);
|
|
}
|
|
|
|
static int
|
|
connection_ready(struct ggd_connection *conn)
|
|
{
|
|
|
|
return (conn->c_sendfd != -1 && conn->c_recvfd != -1);
|
|
}
|
|
|
|
static void
|
|
connection_launch(struct ggd_connection *conn)
|
|
{
|
|
pthread_t td;
|
|
int error, pid;
|
|
|
|
pid = fork();
|
|
if (pid > 0)
|
|
return;
|
|
else if (pid == -1) {
|
|
g_gate_log(LOG_ERR, "Cannot fork: %s.", strerror(errno));
|
|
return;
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Process created [%s].", conn->c_path);
|
|
|
|
/*
|
|
* Create condition variables and mutexes for in-queue and out-queue
|
|
* synchronization.
|
|
*/
|
|
error = pthread_mutex_init(&inqueue_mtx, NULL);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_mutex_init(inqueue_mtx): %s.",
|
|
strerror(error));
|
|
}
|
|
error = pthread_cond_init(&inqueue_cond, NULL);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_cond_init(inqueue_cond): %s.",
|
|
strerror(error));
|
|
}
|
|
error = pthread_mutex_init(&outqueue_mtx, NULL);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_mutex_init(outqueue_mtx): %s.",
|
|
strerror(error));
|
|
}
|
|
error = pthread_cond_init(&outqueue_cond, NULL);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_cond_init(outqueue_cond): %s.",
|
|
strerror(error));
|
|
}
|
|
|
|
/*
|
|
* Create threads:
|
|
* recvtd - thread for receiving I/O request
|
|
* diskio - thread for doing I/O request
|
|
* sendtd - thread for sending I/O requests back
|
|
*/
|
|
error = pthread_create(&td, NULL, send_thread, conn);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_create(send_thread): %s.",
|
|
strerror(error));
|
|
}
|
|
error = pthread_create(&td, NULL, recv_thread, conn);
|
|
if (error != 0) {
|
|
g_gate_xlog("pthread_create(recv_thread): %s.",
|
|
strerror(error));
|
|
}
|
|
disk_thread(conn);
|
|
}
|
|
|
|
static void
|
|
sendfail(int sfd, int error, const char *fmt, ...)
|
|
{
|
|
struct g_gate_sinit sinit;
|
|
va_list ap;
|
|
ssize_t data;
|
|
|
|
sinit.gs_error = error;
|
|
g_gate_swap2n_sinit(&sinit);
|
|
data = g_gate_send(sfd, &sinit, sizeof(sinit), 0);
|
|
g_gate_swap2h_sinit(&sinit);
|
|
if (data != sizeof(sinit)) {
|
|
g_gate_log(LOG_WARNING, "Cannot send initial packet: %s.",
|
|
strerror(errno));
|
|
return;
|
|
}
|
|
if (fmt != NULL) {
|
|
va_start(ap, fmt);
|
|
g_gate_vlog(LOG_WARNING, fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
}
|
|
|
|
static void *
|
|
malloc_waitok(size_t size)
|
|
{
|
|
void *p;
|
|
|
|
while ((p = malloc(size)) == NULL) {
|
|
g_gate_log(LOG_DEBUG, "Cannot allocate %zu bytes.", size);
|
|
sleep(1);
|
|
}
|
|
return (p);
|
|
}
|
|
|
|
static void *
|
|
recv_thread(void *arg)
|
|
{
|
|
struct ggd_connection *conn;
|
|
struct ggd_request *req;
|
|
ssize_t data;
|
|
int error, fd;
|
|
|
|
conn = arg;
|
|
g_gate_log(LOG_NOTICE, "%s: started [%s]!", __func__, conn->c_path);
|
|
fd = conn->c_recvfd;
|
|
for (;;) {
|
|
/*
|
|
* Get header packet.
|
|
*/
|
|
req = malloc_waitok(sizeof(*req));
|
|
data = g_gate_recv(fd, &req->r_hdr, sizeof(req->r_hdr),
|
|
MSG_WAITALL);
|
|
if (data == 0) {
|
|
g_gate_log(LOG_DEBUG, "Process %u exiting.", getpid());
|
|
exit(EXIT_SUCCESS);
|
|
} else if (data == -1) {
|
|
g_gate_xlog("Error while receiving hdr packet: %s.",
|
|
strerror(errno));
|
|
} else if (data != sizeof(req->r_hdr)) {
|
|
g_gate_xlog("Malformed hdr packet received.");
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Received hdr packet.");
|
|
g_gate_swap2h_hdr(&req->r_hdr);
|
|
|
|
g_gate_log(LOG_DEBUG, "%s: offset=%jd length=%u", __func__,
|
|
(intmax_t)req->r_offset, (unsigned)req->r_length);
|
|
|
|
/*
|
|
* Allocate memory for data.
|
|
*/
|
|
req->r_data = malloc_waitok(req->r_length);
|
|
|
|
/*
|
|
* Receive data to write for WRITE request.
|
|
*/
|
|
if (req->r_cmd == GGATE_CMD_WRITE) {
|
|
g_gate_log(LOG_DEBUG, "Waiting for %u bytes of data...",
|
|
req->r_length);
|
|
data = g_gate_recv(fd, req->r_data, req->r_length,
|
|
MSG_WAITALL);
|
|
if (data == -1) {
|
|
g_gate_xlog("Error while receiving data: %s.",
|
|
strerror(errno));
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Put the request onto the incoming queue.
|
|
*/
|
|
error = pthread_mutex_lock(&inqueue_mtx);
|
|
assert(error == 0);
|
|
TAILQ_INSERT_TAIL(&inqueue, req, r_next);
|
|
error = pthread_cond_signal(&inqueue_cond);
|
|
assert(error == 0);
|
|
error = pthread_mutex_unlock(&inqueue_mtx);
|
|
assert(error == 0);
|
|
}
|
|
}
|
|
|
|
static void *
|
|
disk_thread(void *arg)
|
|
{
|
|
struct ggd_connection *conn;
|
|
struct ggd_request *req;
|
|
ssize_t data;
|
|
int error, fd;
|
|
|
|
conn = arg;
|
|
g_gate_log(LOG_NOTICE, "%s: started [%s]!", __func__, conn->c_path);
|
|
fd = conn->c_diskfd;
|
|
for (;;) {
|
|
/*
|
|
* Get a request from the incoming queue.
|
|
*/
|
|
error = pthread_mutex_lock(&inqueue_mtx);
|
|
assert(error == 0);
|
|
while ((req = TAILQ_FIRST(&inqueue)) == NULL) {
|
|
error = pthread_cond_wait(&inqueue_cond, &inqueue_mtx);
|
|
assert(error == 0);
|
|
}
|
|
TAILQ_REMOVE(&inqueue, req, r_next);
|
|
error = pthread_mutex_unlock(&inqueue_mtx);
|
|
assert(error == 0);
|
|
|
|
/*
|
|
* Check the request.
|
|
*/
|
|
assert(req->r_cmd == GGATE_CMD_READ || req->r_cmd == GGATE_CMD_WRITE);
|
|
assert(req->r_offset + req->r_length <= (uintmax_t)conn->c_mediasize);
|
|
assert((req->r_offset % conn->c_sectorsize) == 0);
|
|
assert((req->r_length % conn->c_sectorsize) == 0);
|
|
|
|
g_gate_log(LOG_DEBUG, "%s: offset=%jd length=%u", __func__,
|
|
(intmax_t)req->r_offset, (unsigned)req->r_length);
|
|
|
|
/*
|
|
* Do the request.
|
|
*/
|
|
data = 0;
|
|
switch (req->r_cmd) {
|
|
case GGATE_CMD_READ:
|
|
data = pread(fd, req->r_data, req->r_length,
|
|
req->r_offset);
|
|
break;
|
|
case GGATE_CMD_WRITE:
|
|
data = pwrite(fd, req->r_data, req->r_length,
|
|
req->r_offset);
|
|
/* Free data memory here - better sooner. */
|
|
free(req->r_data);
|
|
req->r_data = NULL;
|
|
break;
|
|
}
|
|
if (data != (ssize_t)req->r_length) {
|
|
/* Report short reads/writes as I/O errors. */
|
|
if (errno == 0)
|
|
errno = EIO;
|
|
g_gate_log(LOG_ERR, "Disk error: %s", strerror(errno));
|
|
req->r_error = errno;
|
|
if (req->r_data != NULL) {
|
|
free(req->r_data);
|
|
req->r_data = NULL;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Put the request onto the outgoing queue.
|
|
*/
|
|
error = pthread_mutex_lock(&outqueue_mtx);
|
|
assert(error == 0);
|
|
TAILQ_INSERT_TAIL(&outqueue, req, r_next);
|
|
error = pthread_cond_signal(&outqueue_cond);
|
|
assert(error == 0);
|
|
error = pthread_mutex_unlock(&outqueue_mtx);
|
|
assert(error == 0);
|
|
}
|
|
}
|
|
|
|
static void *
|
|
send_thread(void *arg)
|
|
{
|
|
struct ggd_connection *conn;
|
|
struct ggd_request *req;
|
|
ssize_t data;
|
|
int error, fd;
|
|
|
|
conn = arg;
|
|
g_gate_log(LOG_NOTICE, "%s: started [%s]!", __func__, conn->c_path);
|
|
fd = conn->c_sendfd;
|
|
for (;;) {
|
|
/*
|
|
* Get a request from the outgoing queue.
|
|
*/
|
|
error = pthread_mutex_lock(&outqueue_mtx);
|
|
assert(error == 0);
|
|
while ((req = TAILQ_FIRST(&outqueue)) == NULL) {
|
|
error = pthread_cond_wait(&outqueue_cond,
|
|
&outqueue_mtx);
|
|
assert(error == 0);
|
|
}
|
|
TAILQ_REMOVE(&outqueue, req, r_next);
|
|
error = pthread_mutex_unlock(&outqueue_mtx);
|
|
assert(error == 0);
|
|
|
|
g_gate_log(LOG_DEBUG, "%s: offset=%jd length=%u", __func__,
|
|
(intmax_t)req->r_offset, (unsigned)req->r_length);
|
|
|
|
/*
|
|
* Send the request.
|
|
*/
|
|
g_gate_swap2n_hdr(&req->r_hdr);
|
|
if (g_gate_send(fd, &req->r_hdr, sizeof(req->r_hdr), 0) == -1) {
|
|
g_gate_xlog("Error while sending hdr packet: %s.",
|
|
strerror(errno));
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Sent hdr packet.");
|
|
g_gate_swap2h_hdr(&req->r_hdr);
|
|
if (req->r_data != NULL) {
|
|
data = g_gate_send(fd, req->r_data, req->r_length, 0);
|
|
if (data != (ssize_t)req->r_length) {
|
|
g_gate_xlog("Error while sending data: %s.",
|
|
strerror(errno));
|
|
}
|
|
g_gate_log(LOG_DEBUG,
|
|
"Sent %zd bytes (offset=%ju, size=%zu).", data,
|
|
(uintmax_t)req->r_offset, (size_t)req->r_length);
|
|
free(req->r_data);
|
|
}
|
|
free(req);
|
|
}
|
|
}
|
|
|
|
static void
|
|
log_connection(struct sockaddr *from)
|
|
{
|
|
in_addr_t ip;
|
|
|
|
ip = htonl(((struct sockaddr_in *)(void *)from)->sin_addr.s_addr);
|
|
g_gate_log(LOG_INFO, "Connection from: %s.", ip2str(ip));
|
|
}
|
|
|
|
static int
|
|
handshake(struct sockaddr *from, int sfd)
|
|
{
|
|
struct g_gate_version ver;
|
|
struct g_gate_cinit cinit;
|
|
struct g_gate_sinit sinit;
|
|
struct ggd_connection *conn;
|
|
struct ggd_export *ex;
|
|
ssize_t data;
|
|
|
|
log_connection(from);
|
|
/*
|
|
* Phase 1: Version verification.
|
|
*/
|
|
g_gate_log(LOG_DEBUG, "Receiving version packet.");
|
|
data = g_gate_recv(sfd, &ver, sizeof(ver), MSG_WAITALL);
|
|
g_gate_swap2h_version(&ver);
|
|
if (data != sizeof(ver)) {
|
|
g_gate_log(LOG_WARNING, "Malformed version packet.");
|
|
return (0);
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Version packet received.");
|
|
if (memcmp(ver.gv_magic, GGATE_MAGIC, strlen(GGATE_MAGIC)) != 0) {
|
|
g_gate_log(LOG_WARNING, "Invalid magic field.");
|
|
return (0);
|
|
}
|
|
if (ver.gv_version != GGATE_VERSION) {
|
|
g_gate_log(LOG_WARNING, "Version %u is not supported.",
|
|
ver.gv_version);
|
|
return (0);
|
|
}
|
|
ver.gv_error = 0;
|
|
g_gate_swap2n_version(&ver);
|
|
data = g_gate_send(sfd, &ver, sizeof(ver), 0);
|
|
g_gate_swap2h_version(&ver);
|
|
if (data == -1) {
|
|
sendfail(sfd, errno, "Error while sending version packet: %s.",
|
|
strerror(errno));
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Phase 2: Request verification.
|
|
*/
|
|
g_gate_log(LOG_DEBUG, "Receiving initial packet.");
|
|
data = g_gate_recv(sfd, &cinit, sizeof(cinit), MSG_WAITALL);
|
|
g_gate_swap2h_cinit(&cinit);
|
|
if (data != sizeof(cinit)) {
|
|
g_gate_log(LOG_WARNING, "Malformed initial packet.");
|
|
return (0);
|
|
}
|
|
g_gate_log(LOG_DEBUG, "Initial packet received.");
|
|
conn = connection_find(&cinit);
|
|
if (conn != NULL) {
|
|
/*
|
|
* Connection should already exists.
|
|
*/
|
|
g_gate_log(LOG_DEBUG, "Found existing connection (token=%lu).",
|
|
(unsigned long)conn->c_token);
|
|
if (connection_add(conn, &cinit, from, sfd) == -1) {
|
|
connection_remove(conn);
|
|
return (0);
|
|
}
|
|
} else {
|
|
/*
|
|
* New connection, allocate space.
|
|
*/
|
|
conn = connection_new(&cinit, from, sfd);
|
|
if (conn == NULL) {
|
|
sendfail(sfd, ENOMEM,
|
|
"Cannot allocate new connection.");
|
|
return (0);
|
|
}
|
|
g_gate_log(LOG_DEBUG, "New connection created (token=%lu).",
|
|
(unsigned long)conn->c_token);
|
|
}
|
|
|
|
ex = exports_find(from, &cinit, conn);
|
|
if (ex == NULL) {
|
|
connection_remove(conn);
|
|
sendfail(sfd, errno, NULL);
|
|
return (0);
|
|
}
|
|
if (conn->c_mediasize == 0) {
|
|
conn->c_mediasize = g_gate_mediasize(conn->c_diskfd);
|
|
conn->c_sectorsize = g_gate_sectorsize(conn->c_diskfd);
|
|
}
|
|
sinit.gs_mediasize = conn->c_mediasize;
|
|
sinit.gs_sectorsize = conn->c_sectorsize;
|
|
sinit.gs_error = 0;
|
|
|
|
g_gate_log(LOG_DEBUG, "Sending initial packet.");
|
|
|
|
g_gate_swap2n_sinit(&sinit);
|
|
data = g_gate_send(sfd, &sinit, sizeof(sinit), 0);
|
|
g_gate_swap2h_sinit(&sinit);
|
|
if (data == -1) {
|
|
sendfail(sfd, errno, "Error while sending initial packet: %s.",
|
|
strerror(errno));
|
|
return (0);
|
|
}
|
|
|
|
if (connection_ready(conn)) {
|
|
connection_launch(conn);
|
|
connection_remove(conn);
|
|
}
|
|
return (1);
|
|
}
|
|
|
|
static void
|
|
huphandler(int sig __unused)
|
|
{
|
|
|
|
got_sighup = 1;
|
|
}
|
|
|
|
int
|
|
main(int argc, char *argv[])
|
|
{
|
|
struct sockaddr_in serv;
|
|
struct sockaddr from;
|
|
socklen_t fromlen;
|
|
int sfd, tmpsfd;
|
|
unsigned port;
|
|
|
|
bindaddr = htonl(INADDR_ANY);
|
|
port = G_GATE_PORT;
|
|
for (;;) {
|
|
int ch;
|
|
|
|
ch = getopt(argc, argv, "a:hnp:R:S:v");
|
|
if (ch == -1)
|
|
break;
|
|
switch (ch) {
|
|
case 'a':
|
|
bindaddr = g_gate_str2ip(optarg);
|
|
if (bindaddr == INADDR_NONE) {
|
|
errx(EXIT_FAILURE,
|
|
"Invalid IP/host name to bind to.");
|
|
}
|
|
break;
|
|
case 'n':
|
|
nagle = 0;
|
|
break;
|
|
case 'p':
|
|
errno = 0;
|
|
port = strtoul(optarg, NULL, 10);
|
|
if (port == 0 && errno != 0)
|
|
errx(EXIT_FAILURE, "Invalid port.");
|
|
break;
|
|
case 'R':
|
|
errno = 0;
|
|
rcvbuf = strtoul(optarg, NULL, 10);
|
|
if (rcvbuf == 0 && errno != 0)
|
|
errx(EXIT_FAILURE, "Invalid rcvbuf.");
|
|
break;
|
|
case 'S':
|
|
errno = 0;
|
|
sndbuf = strtoul(optarg, NULL, 10);
|
|
if (sndbuf == 0 && errno != 0)
|
|
errx(EXIT_FAILURE, "Invalid sndbuf.");
|
|
break;
|
|
case 'v':
|
|
g_gate_verbose++;
|
|
break;
|
|
case 'h':
|
|
default:
|
|
usage();
|
|
}
|
|
}
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
if (argv[0] != NULL)
|
|
exports_file = argv[0];
|
|
exports_get();
|
|
|
|
if (!g_gate_verbose) {
|
|
/* Run in daemon mode. */
|
|
if (daemon(0, 0) == -1)
|
|
g_gate_xlog("Cannot daemonize: %s", strerror(errno));
|
|
}
|
|
|
|
signal(SIGCHLD, SIG_IGN);
|
|
|
|
sfd = socket(AF_INET, SOCK_STREAM, 0);
|
|
if (sfd == -1)
|
|
g_gate_xlog("Cannot open stream socket: %s.", strerror(errno));
|
|
bzero(&serv, sizeof(serv));
|
|
serv.sin_family = AF_INET;
|
|
serv.sin_addr.s_addr = bindaddr;
|
|
serv.sin_port = htons(port);
|
|
|
|
g_gate_socket_settings(sfd);
|
|
|
|
if (bind(sfd, (struct sockaddr *)&serv, sizeof(serv)) == -1)
|
|
g_gate_xlog("bind(): %s.", strerror(errno));
|
|
if (listen(sfd, 5) == -1)
|
|
g_gate_xlog("listen(): %s.", strerror(errno));
|
|
|
|
g_gate_log(LOG_INFO, "Listen on port: %d.", port);
|
|
|
|
signal(SIGHUP, huphandler);
|
|
|
|
for (;;) {
|
|
fromlen = sizeof(from);
|
|
tmpsfd = accept(sfd, &from, &fromlen);
|
|
if (tmpsfd == -1)
|
|
g_gate_xlog("accept(): %s.", strerror(errno));
|
|
|
|
if (got_sighup) {
|
|
got_sighup = 0;
|
|
exports_get();
|
|
}
|
|
|
|
if (!handshake(&from, tmpsfd))
|
|
close(tmpsfd);
|
|
}
|
|
close(sfd);
|
|
exit(EXIT_SUCCESS);
|
|
}
|