2012-06-06 10:45:07 +01:00
|
|
|
#include "serve.h"
|
2012-06-06 11:27:52 +01:00
|
|
|
#include "client.h"
|
2012-05-17 20:14:22 +01:00
|
|
|
#include "nbdtypes.h"
|
|
|
|
#include "ioutil.h"
|
|
|
|
#include "util.h"
|
2012-05-18 13:24:35 +01:00
|
|
|
#include "bitset.h"
|
2012-05-23 00:42:14 +01:00
|
|
|
#include "control.h"
|
2012-06-06 12:41:03 +01:00
|
|
|
#include "self_pipe.h"
|
2012-05-17 20:14:22 +01:00
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/mman.h>
|
2012-05-18 18:44:34 +01:00
|
|
|
#include <sys/un.h>
|
2012-05-17 20:14:22 +01:00
|
|
|
#include <fcntl.h>
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <errno.h>
|
|
|
|
|
2012-05-31 11:33:31 +01:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/tcp.h>
|
|
|
|
|
2012-06-06 10:45:07 +01:00
|
|
|
static inline void* sockaddr_address_data(struct sockaddr* sockaddr)
|
|
|
|
{
|
|
|
|
struct sockaddr_in* in = (struct sockaddr_in*) sockaddr;
|
|
|
|
struct sockaddr_in6* in6 = (struct sockaddr_in6*) sockaddr;
|
|
|
|
|
|
|
|
if (sockaddr->sa_family == AF_INET)
|
|
|
|
return &in->sin_addr;
|
|
|
|
if (sockaddr->sa_family == AF_INET6)
|
|
|
|
return &in6->sin6_addr;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2012-06-06 11:27:52 +01:00
|
|
|
void server_dirty(struct server *serve, off64_t from, int len)
|
2012-05-21 04:03:17 +01:00
|
|
|
{
|
|
|
|
if (serve->mirror)
|
|
|
|
bitset_set_range(serve->mirror->dirty_map, from, len);
|
|
|
|
}
|
|
|
|
|
2012-06-06 13:29:13 +01:00
|
|
|
int server_lock_io( struct server * serve)
|
|
|
|
{
|
|
|
|
SERVER_ERROR_ON_FAILURE(
|
|
|
|
pthread_mutex_lock(&serve->l_io),
|
|
|
|
"Problem with I/O lock"
|
|
|
|
);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void server_unlock_io( struct server* serve )
|
|
|
|
{
|
|
|
|
SERVER_ERROR_ON_FAILURE(
|
|
|
|
pthread_mutex_unlock(&serve->l_io),
|
|
|
|
"Problem with I/O unlock"
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
static int testmasks[9] = { 0,128,192,224,240,248,252,254,255 };
|
|
|
|
|
2012-05-29 04:03:28 +01:00
|
|
|
/** Test whether AF_INET or AF_INET6 sockaddr is included in the given access
|
|
|
|
* control list, returning 1 if it is, and 0 if not.
|
|
|
|
*/
|
2012-05-30 20:13:56 +01:00
|
|
|
int is_included_in_acl(int list_length, struct ip_and_mask (*list)[], union mysockaddr* test)
|
2012-05-17 20:14:22 +01:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i=0; i < list_length; i++) {
|
2012-05-21 04:03:17 +01:00
|
|
|
struct ip_and_mask *entry = &(*list)[i];
|
2012-05-17 20:14:22 +01:00
|
|
|
int testbits;
|
2012-05-30 20:13:56 +01:00
|
|
|
unsigned char *raw_address1, *raw_address2;
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-05-30 20:13:56 +01:00
|
|
|
debug("checking acl entry %d (%d/%d)", i, test->generic.sa_family, entry->ip.family);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-05-30 20:13:56 +01:00
|
|
|
if (test->generic.sa_family != entry->ip.family)
|
2012-05-17 20:14:22 +01:00
|
|
|
continue;
|
|
|
|
|
2012-05-30 20:13:56 +01:00
|
|
|
if (test->generic.sa_family == AF_INET) {
|
2012-05-19 12:48:03 +01:00
|
|
|
debug("it's an AF_INET");
|
2012-05-30 20:13:56 +01:00
|
|
|
raw_address1 = (unsigned char*) &test->v4.sin_addr;
|
|
|
|
raw_address2 = (unsigned char*) &entry->ip.v4.sin_addr;
|
2012-05-17 20:14:22 +01:00
|
|
|
}
|
2012-05-30 20:13:56 +01:00
|
|
|
else if (test->generic.sa_family == AF_INET6) {
|
2012-05-19 12:48:03 +01:00
|
|
|
debug("it's an AF_INET6");
|
2012-05-30 20:13:56 +01:00
|
|
|
raw_address1 = (unsigned char*) &test->v6.sin6_addr;
|
|
|
|
raw_address2 = (unsigned char*) &entry->ip.v6.sin6_addr;
|
2012-05-17 20:14:22 +01:00
|
|
|
}
|
|
|
|
|
2012-05-19 12:48:03 +01:00
|
|
|
debug("testbits=%d", entry->mask);
|
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
for (testbits = entry->mask; testbits > 0; testbits -= 8) {
|
2012-05-30 20:13:56 +01:00
|
|
|
debug("testbits=%d, c1=%02x, c2=%02x", testbits, raw_address1[0], raw_address2[0]);
|
2012-05-17 20:14:22 +01:00
|
|
|
if (testbits >= 8) {
|
|
|
|
if (raw_address1[0] != raw_address2[0])
|
|
|
|
goto no_match;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if ((raw_address1[0] & testmasks[testbits%8]) !=
|
|
|
|
(raw_address2[0] & testmasks[testbits%8]) )
|
|
|
|
goto no_match;
|
|
|
|
}
|
|
|
|
|
|
|
|
raw_address1++;
|
|
|
|
raw_address2++;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
no_match: ;
|
|
|
|
debug("no match");
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-05-29 04:03:28 +01:00
|
|
|
/** Prepares a listening socket for the NBD server, binding etc. */
|
2012-06-06 10:35:50 +01:00
|
|
|
void serve_open_server_socket(struct server* params)
|
2012-05-17 20:14:22 +01:00
|
|
|
{
|
2012-05-29 00:59:12 +01:00
|
|
|
int optval=1;
|
|
|
|
|
2012-06-06 10:19:45 +01:00
|
|
|
params->server_fd= socket(params->bind_to.generic.sa_family == AF_INET ?
|
2012-05-27 14:40:16 +01:00
|
|
|
PF_INET : PF_INET6, SOCK_STREAM, 0);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-06-06 10:19:45 +01:00
|
|
|
SERVER_ERROR_ON_FAILURE(params->server_fd,
|
2012-05-17 20:14:22 +01:00
|
|
|
"Couldn't create server socket");
|
2012-05-27 14:40:16 +01:00
|
|
|
|
2012-05-29 00:59:12 +01:00
|
|
|
SERVER_ERROR_ON_FAILURE(
|
2012-06-06 10:19:45 +01:00
|
|
|
setsockopt(params->server_fd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval)),
|
2012-05-29 00:59:12 +01:00
|
|
|
"Couldn't set SO_REUSEADDR"
|
|
|
|
);
|
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
SERVER_ERROR_ON_FAILURE(
|
2012-06-06 10:19:45 +01:00
|
|
|
setsockopt(params->server_fd, IPPROTO_TCP, TCP_NODELAY, &optval, sizeof(optval)),
|
2012-05-31 11:33:31 +01:00
|
|
|
"Couldn't set TCP_NODELAY"
|
|
|
|
);
|
|
|
|
|
|
|
|
SERVER_ERROR_ON_FAILURE(
|
2012-06-06 10:19:45 +01:00
|
|
|
bind(params->server_fd, ¶ms->bind_to.generic,
|
2012-05-27 14:40:16 +01:00
|
|
|
sizeof(params->bind_to)),
|
2012-05-17 20:14:22 +01:00
|
|
|
"Couldn't bind server to IP address"
|
|
|
|
);
|
|
|
|
|
|
|
|
SERVER_ERROR_ON_FAILURE(
|
2012-06-06 10:19:45 +01:00
|
|
|
listen(params->server_fd, params->tcp_backlog),
|
2012-05-17 20:14:22 +01:00
|
|
|
"Couldn't listen on server socket"
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2012-05-29 04:03:28 +01:00
|
|
|
/** We can only accommodate MAX_NBD_CLIENTS connections at once. This function
|
|
|
|
* goes through the current list, waits for any threads that have finished
|
|
|
|
* and returns the next slot free (or -1 if there are none).
|
|
|
|
*/
|
2012-06-06 10:35:50 +01:00
|
|
|
int cleanup_and_find_client_slot(struct server* params)
|
2012-05-27 14:40:16 +01:00
|
|
|
{
|
|
|
|
int slot=-1, i;
|
|
|
|
|
|
|
|
for (i=0; i < MAX_NBD_CLIENTS; i++) {
|
|
|
|
void* status;
|
|
|
|
|
|
|
|
if (params->nbd_client[i].thread != 0) {
|
|
|
|
char s_client_address[64];
|
|
|
|
|
|
|
|
memset(s_client_address, 0, 64);
|
|
|
|
strcpy(s_client_address, "???");
|
|
|
|
inet_ntop(
|
2012-05-30 20:13:56 +01:00
|
|
|
params->nbd_client[i].address.generic.sa_family,
|
2012-05-31 14:09:35 +01:00
|
|
|
sockaddr_address_data(¶ms->nbd_client[i].address.generic),
|
|
|
|
s_client_address,
|
2012-05-27 14:40:16 +01:00
|
|
|
64
|
|
|
|
);
|
|
|
|
|
|
|
|
if (pthread_tryjoin_np(params->nbd_client[i].thread, &status) < 0) {
|
|
|
|
if (errno != EBUSY)
|
|
|
|
SERVER_ERROR_ON_FAILURE(-1, "Problem with joining thread");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
params->nbd_client[i].thread = 0;
|
2012-05-31 14:09:35 +01:00
|
|
|
debug("nbd thread %d exited (%s) with status %ld", (int) params->nbd_client[i].thread, s_client_address, (uint64_t)status);
|
2012-05-27 14:40:16 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (params->nbd_client[i].thread == 0 && slot == -1)
|
|
|
|
slot = i;
|
|
|
|
}
|
|
|
|
|
|
|
|
return slot;
|
|
|
|
}
|
|
|
|
|
2012-05-29 04:03:28 +01:00
|
|
|
/** Dispatch function for accepting an NBD connection and starting a thread
|
|
|
|
* to handle it. Rejects the connection if there is an ACL, and the far end's
|
|
|
|
* address doesn't match, or if there are too many clients already connected.
|
|
|
|
*/
|
2012-06-01 16:24:50 +01:00
|
|
|
void accept_nbd_client(
|
2012-06-06 10:35:50 +01:00
|
|
|
struct server* params,
|
2012-06-01 16:24:50 +01:00
|
|
|
int client_fd,
|
|
|
|
union mysockaddr* client_address)
|
2012-05-18 23:39:16 +01:00
|
|
|
{
|
2012-06-06 11:33:17 +01:00
|
|
|
struct client* client_params;
|
2012-05-27 14:40:16 +01:00
|
|
|
int slot = cleanup_and_find_client_slot(params);
|
|
|
|
char s_client_address[64];
|
2012-06-01 14:48:34 +01:00
|
|
|
int acl_passed = 0;
|
|
|
|
|
2012-05-27 14:40:16 +01:00
|
|
|
|
2012-06-01 16:24:50 +01:00
|
|
|
if (inet_ntop(client_address->generic.sa_family,
|
|
|
|
sockaddr_address_data(&client_address->generic),
|
|
|
|
s_client_address, 64) == NULL) {
|
2012-05-27 14:40:16 +01:00
|
|
|
write(client_fd, "Bad client_address", 18);
|
|
|
|
close(client_fd);
|
|
|
|
return;
|
|
|
|
}
|
2012-05-18 23:39:16 +01:00
|
|
|
|
2012-06-01 14:48:34 +01:00
|
|
|
|
|
|
|
if (params->acl) {
|
|
|
|
if (is_included_in_acl(params->acl_entries, params->acl, client_address))
|
|
|
|
acl_passed = 1;
|
|
|
|
} else {
|
|
|
|
if (!params->default_deny)
|
|
|
|
acl_passed = 1;
|
2012-05-18 23:39:16 +01:00
|
|
|
}
|
2012-06-01 14:48:34 +01:00
|
|
|
|
|
|
|
if (!acl_passed) {
|
|
|
|
write(client_fd, "Access control error", 20);
|
|
|
|
close(client_fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-05-18 23:39:16 +01:00
|
|
|
|
2012-05-27 14:40:16 +01:00
|
|
|
if (slot < 0) {
|
|
|
|
write(client_fd, "Too many clients", 16);
|
|
|
|
close(client_fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-06-06 11:33:17 +01:00
|
|
|
client_params = xmalloc(sizeof(struct client));
|
2012-05-18 23:39:16 +01:00
|
|
|
client_params->socket = client_fd;
|
2012-05-21 04:03:17 +01:00
|
|
|
client_params->serve = params;
|
2012-05-18 23:39:16 +01:00
|
|
|
|
2012-05-27 14:40:16 +01:00
|
|
|
if (pthread_create(¶ms->nbd_client[slot].thread, NULL, client_serve, client_params) < 0) {
|
|
|
|
write(client_fd, "Thread creation problem", 23);
|
|
|
|
free(client_params);
|
|
|
|
close(client_fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(¶ms->nbd_client[slot].address, client_address,
|
2012-05-30 20:13:56 +01:00
|
|
|
sizeof(union mysockaddr));
|
2012-05-27 14:40:16 +01:00
|
|
|
|
|
|
|
debug("nbd thread %d started (%s)", (int) params->nbd_client[slot].thread, s_client_address);
|
2012-05-18 23:39:16 +01:00
|
|
|
}
|
|
|
|
|
2012-06-06 11:27:52 +01:00
|
|
|
|
2012-06-06 14:25:35 +01:00
|
|
|
int server_is_closed(struct server* serve)
|
2012-06-06 11:27:52 +01:00
|
|
|
{
|
|
|
|
int errno_old = errno;
|
|
|
|
int result = fcntl(serve->server_fd, F_GETFD, 0) < 0;
|
|
|
|
errno = errno_old;
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-05-29 04:03:28 +01:00
|
|
|
/** Accept either an NBD or control socket connection, dispatch appropriately */
|
2012-06-06 10:35:50 +01:00
|
|
|
void serve_accept_loop(struct server* params)
|
2012-05-17 20:14:22 +01:00
|
|
|
{
|
|
|
|
while (1) {
|
2012-05-30 20:13:56 +01:00
|
|
|
int activity_fd, client_fd;
|
|
|
|
union mysockaddr client_address;
|
|
|
|
fd_set fds;
|
|
|
|
socklen_t socklen=sizeof(client_address);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-05-18 23:39:16 +01:00
|
|
|
FD_ZERO(&fds);
|
2012-06-06 10:19:45 +01:00
|
|
|
FD_SET(params->server_fd, &fds);
|
2012-06-06 12:41:03 +01:00
|
|
|
self_pipe_fd_set( params->close_signal, &fds );
|
2012-05-21 04:03:17 +01:00
|
|
|
if (params->control_socket_name)
|
2012-06-06 10:35:50 +01:00
|
|
|
FD_SET(params->control_fd, &fds);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-05-29 04:03:28 +01:00
|
|
|
SERVER_ERROR_ON_FAILURE(select(FD_SETSIZE, &fds,
|
|
|
|
NULL, NULL, NULL), "select() failed");
|
|
|
|
|
2012-06-06 12:41:03 +01:00
|
|
|
if ( self_pipe_fd_isset( params->close_signal, &fds) )
|
2012-05-29 04:03:28 +01:00
|
|
|
return;
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-06-06 10:19:45 +01:00
|
|
|
activity_fd = FD_ISSET(params->server_fd, &fds) ? params->server_fd:
|
2012-06-06 10:35:50 +01:00
|
|
|
params->control_fd;
|
2012-05-30 20:13:56 +01:00
|
|
|
client_fd = accept(activity_fd, &client_address.generic, &socklen);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-05-29 00:59:12 +01:00
|
|
|
|
2012-06-06 10:19:45 +01:00
|
|
|
if (activity_fd == params->server_fd)
|
2012-05-18 23:39:16 +01:00
|
|
|
accept_nbd_client(params, client_fd, &client_address);
|
2012-06-06 10:35:50 +01:00
|
|
|
if (activity_fd == params->control_fd)
|
2012-05-18 23:39:16 +01:00
|
|
|
accept_control_connection(params, client_fd, &client_address);
|
2012-05-29 00:59:12 +01:00
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-29 04:03:28 +01:00
|
|
|
/** Initialisation function that sets up the initial allocation map, i.e. so
|
|
|
|
* we know which blocks of the file are allocated.
|
|
|
|
*/
|
2012-06-06 10:35:50 +01:00
|
|
|
void serve_init_allocation_map(struct server* params)
|
2012-05-18 13:24:35 +01:00
|
|
|
{
|
|
|
|
int fd = open(params->filename, O_RDONLY);
|
|
|
|
off64_t size;
|
|
|
|
SERVER_ERROR_ON_FAILURE(fd, "Couldn't open %s", params->filename);
|
|
|
|
size = lseek64(fd, 0, SEEK_END);
|
2012-05-21 04:03:17 +01:00
|
|
|
params->size = size;
|
2012-05-18 13:24:35 +01:00
|
|
|
SERVER_ERROR_ON_FAILURE(size, "Couldn't find size of %s",
|
|
|
|
params->filename);
|
|
|
|
params->block_allocation_map =
|
|
|
|
build_allocation_map(fd, size, block_allocation_resolution);
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
2012-06-06 12:41:03 +01:00
|
|
|
|
|
|
|
/* Tell the server to close all the things. */
|
|
|
|
void serve_signal_close( struct server * serve )
|
|
|
|
{
|
|
|
|
self_pipe_signal( serve->close_signal );
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-05-29 04:03:28 +01:00
|
|
|
/** Closes sockets, frees memory and waits for all client threads to finish */
|
2012-06-06 10:35:50 +01:00
|
|
|
void serve_cleanup(struct server* params)
|
2012-05-29 04:03:28 +01:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2012-06-06 10:19:45 +01:00
|
|
|
close(params->server_fd);
|
2012-06-06 10:35:50 +01:00
|
|
|
close(params->control_fd);
|
2012-05-29 04:03:28 +01:00
|
|
|
if (params->acl)
|
|
|
|
free(params->acl);
|
|
|
|
//free(params->filename);
|
|
|
|
if (params->control_socket_name)
|
|
|
|
//free(params->control_socket_name);
|
|
|
|
pthread_mutex_destroy(¶ms->l_io);
|
|
|
|
if (params->proxy_fd);
|
|
|
|
close(params->proxy_fd);
|
2012-06-06 12:41:03 +01:00
|
|
|
|
|
|
|
self_pipe_destroy( params->close_signal );
|
|
|
|
|
2012-05-29 04:03:28 +01:00
|
|
|
free(params->block_allocation_map);
|
|
|
|
|
|
|
|
if (params->mirror)
|
|
|
|
debug("mirror thread running! this should not happen!");
|
|
|
|
|
|
|
|
for (i=0; i < MAX_NBD_CLIENTS; i++) {
|
|
|
|
void* status;
|
|
|
|
|
|
|
|
if (params->nbd_client[i].thread != 0) {
|
|
|
|
debug("joining thread %d", i);
|
|
|
|
pthread_join(params->nbd_client[i].thread, &status);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Full lifecycle of the server */
|
2012-06-06 10:35:50 +01:00
|
|
|
void do_serve(struct server* params)
|
2012-05-17 20:14:22 +01:00
|
|
|
{
|
2012-05-29 00:59:12 +01:00
|
|
|
pthread_mutex_init(¶ms->l_io, NULL);
|
2012-06-06 12:41:03 +01:00
|
|
|
|
|
|
|
params->close_signal = self_pipe_create();
|
2012-06-06 13:19:24 +01:00
|
|
|
if ( NULL == params->close_signal) {
|
|
|
|
SERVER_ERROR( "close signal creation failed" );
|
|
|
|
}
|
2012-05-29 00:59:12 +01:00
|
|
|
|
2012-05-18 18:44:34 +01:00
|
|
|
serve_open_server_socket(params);
|
|
|
|
serve_open_control_socket(params);
|
2012-05-18 13:24:35 +01:00
|
|
|
serve_init_allocation_map(params);
|
2012-05-17 20:14:22 +01:00
|
|
|
serve_accept_loop(params);
|
2012-05-29 04:03:28 +01:00
|
|
|
serve_cleanup(params);
|
2012-05-17 20:14:22 +01:00
|
|
|
}
|
|
|
|
|