2012-05-17 20:14:22 +01:00
|
|
|
#include "params.h"
|
|
|
|
#include "nbdtypes.h"
|
|
|
|
#include "ioutil.h"
|
|
|
|
#include "util.h"
|
2012-05-18 13:24:35 +01:00
|
|
|
#include "bitset.h"
|
2012-05-23 00:42:14 +01:00
|
|
|
#include "control.h"
|
2012-05-17 20:14:22 +01:00
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/mman.h>
|
2012-05-18 18:44:34 +01:00
|
|
|
#include <sys/un.h>
|
2012-05-17 20:14:22 +01:00
|
|
|
#include <fcntl.h>
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <errno.h>
|
|
|
|
|
2012-05-18 13:24:35 +01:00
|
|
|
static const int block_allocation_resolution = 4096;//128<<10;
|
|
|
|
|
2012-05-21 04:03:17 +01:00
|
|
|
static inline void dirty(struct mode_serve_params *serve, off64_t from, int len)
|
|
|
|
{
|
|
|
|
if (serve->mirror)
|
|
|
|
bitset_set_range(serve->mirror->dirty_map, from, len);
|
|
|
|
}
|
|
|
|
|
2012-05-18 13:24:35 +01:00
|
|
|
/**
|
|
|
|
* So waiting on client->socket is len bytes of data, and we must write it all
|
|
|
|
* to client->mapped. However while doing do we must consult the bitmap
|
|
|
|
* client->block_allocation_map, which is a bitmap where one bit represents
|
|
|
|
* block_allocation_resolution bytes. Where a bit isn't set, there are no
|
|
|
|
* disc blocks allocated for that portion of the file, and we'd like to keep
|
|
|
|
* it that way.
|
|
|
|
*
|
|
|
|
* If the bitmap shows that every block in our prospective write is already
|
|
|
|
* allocated, we can proceed as normal and make one call to writeloop.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
void write_not_zeroes(struct client_params* client, off64_t from, int len)
|
|
|
|
{
|
2012-05-24 01:39:35 +01:00
|
|
|
char *map = client->serve->block_allocation_map;
|
2012-05-18 13:24:35 +01:00
|
|
|
|
|
|
|
while (len > 0) {
|
|
|
|
/* so we have to calculate how much of our input to consider
|
|
|
|
* next based on the bitmap of allocated blocks. This will be
|
|
|
|
* at a coarser resolution than the actual write, which may
|
|
|
|
* not fall on a block boundary at either end. So we look up
|
|
|
|
* how many blocks our write covers, then cut off the start
|
|
|
|
* and end to get the exact number of bytes.
|
|
|
|
*/
|
|
|
|
int first_bit = from/block_allocation_resolution;
|
|
|
|
int last_bit = (from+len+block_allocation_resolution-1) /
|
|
|
|
block_allocation_resolution;
|
|
|
|
int run = bit_run_count(map, first_bit, last_bit-first_bit) *
|
|
|
|
block_allocation_resolution;
|
|
|
|
|
2012-05-21 04:03:17 +01:00
|
|
|
if (run > len)
|
|
|
|
run = len;
|
|
|
|
|
2012-05-18 13:24:35 +01:00
|
|
|
debug("write_not_zeroes: %ld+%d, first_bit=%d, last_bit=%d, run=%d",
|
|
|
|
from, len, first_bit, last_bit, run);
|
|
|
|
|
|
|
|
#define DO_READ(dst, len) CLIENT_ERROR_ON_FAILURE( \
|
|
|
|
readloop( \
|
|
|
|
client->socket, \
|
|
|
|
(dst), \
|
|
|
|
(len) \
|
|
|
|
), \
|
|
|
|
"read failed %ld+%d", from, (len) \
|
|
|
|
)
|
|
|
|
|
2012-05-21 04:03:17 +01:00
|
|
|
if (bit_is_set(map, from/block_allocation_resolution)) {
|
|
|
|
debug("writing the lot");
|
2012-05-18 13:24:35 +01:00
|
|
|
/* already allocated, just write it all */
|
|
|
|
DO_READ(client->mapped + from, run);
|
2012-05-21 04:03:17 +01:00
|
|
|
dirty(client->serve, from, run);
|
2012-05-18 13:24:35 +01:00
|
|
|
len -= run;
|
|
|
|
from += run;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
char zerobuffer[block_allocation_resolution];
|
|
|
|
/* not allocated, read in block_allocation_resoution */
|
|
|
|
while (run > 0) {
|
|
|
|
char *dst = client->mapped+from;
|
|
|
|
int bit = from/block_allocation_resolution;
|
|
|
|
int blockrun = block_allocation_resolution -
|
|
|
|
(from % block_allocation_resolution);
|
|
|
|
if (blockrun > run)
|
|
|
|
blockrun = run;
|
|
|
|
|
2012-05-21 04:03:17 +01:00
|
|
|
debug("writing partial: bit=%d, blockrun=%d (run=%d)",
|
|
|
|
bit, blockrun, run);
|
2012-05-18 13:24:35 +01:00
|
|
|
|
|
|
|
DO_READ(zerobuffer, blockrun);
|
|
|
|
|
|
|
|
/* This reads the buffer twice in the worst case
|
|
|
|
* but we're leaning on memcmp failing early
|
|
|
|
* and memcpy being fast, rather than try to
|
|
|
|
* hand-optimized something specific.
|
|
|
|
*/
|
|
|
|
if (zerobuffer[0] != 0 ||
|
|
|
|
memcmp(zerobuffer, zerobuffer + 1, blockrun)) {
|
|
|
|
memcpy(dst, zerobuffer, blockrun);
|
|
|
|
bit_set(map, bit);
|
2012-05-21 04:03:17 +01:00
|
|
|
dirty(client->serve, from, blockrun);
|
|
|
|
debug("non-zero, copied and set bit %d", bit);
|
2012-05-18 13:24:35 +01:00
|
|
|
/* at this point we could choose to
|
|
|
|
* short-cut the rest of the write for
|
|
|
|
* faster I/O but by continuing to do it
|
|
|
|
* the slow way we preserve as much
|
|
|
|
* sparseness as possible.
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
else {
|
2012-05-21 04:03:17 +01:00
|
|
|
debug("all zero, skip write");
|
2012-05-18 13:24:35 +01:00
|
|
|
}
|
|
|
|
len -= blockrun;
|
|
|
|
run -= blockrun;
|
|
|
|
from += blockrun;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
int client_serve_request(struct client_params* client)
|
|
|
|
{
|
|
|
|
off64_t offset;
|
|
|
|
struct nbd_request request;
|
|
|
|
struct nbd_reply reply;
|
|
|
|
|
|
|
|
if (readloop(client->socket, &request, sizeof(request)) == -1) {
|
|
|
|
if (errno == 0) {
|
|
|
|
debug("EOF reading request");
|
|
|
|
return 1; /* neat point to close the socket */
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
CLIENT_ERROR_ON_FAILURE(-1, "Error reading request");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
reply.magic = htobe32(REPLY_MAGIC);
|
|
|
|
reply.error = htobe32(0);
|
|
|
|
memcpy(reply.handle, request.handle, 8);
|
|
|
|
|
|
|
|
debug("request type %d", be32toh(request.type));
|
|
|
|
|
|
|
|
if (be32toh(request.magic) != REQUEST_MAGIC)
|
|
|
|
CLIENT_ERROR("Bad magic %08x", be32toh(request.magic));
|
|
|
|
|
|
|
|
switch (be32toh(request.type))
|
|
|
|
{
|
|
|
|
case REQUEST_READ:
|
|
|
|
case REQUEST_WRITE:
|
|
|
|
/* check it's not out of range */
|
|
|
|
if (be64toh(request.from) < 0 ||
|
2012-05-24 01:39:35 +01:00
|
|
|
be64toh(request.from)+be32toh(request.len) > client->serve->size) {
|
2012-05-17 20:14:22 +01:00
|
|
|
debug("request read %ld+%d out of range",
|
|
|
|
be64toh(request.from),
|
|
|
|
be32toh(request.len)
|
|
|
|
);
|
|
|
|
reply.error = htobe32(1);
|
|
|
|
write(client->socket, &reply, sizeof(reply));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case REQUEST_DISCONNECT:
|
|
|
|
debug("request disconnect");
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
default:
|
|
|
|
CLIENT_ERROR("Unknown request %08x", be32toh(request.type));
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (be32toh(request.type))
|
|
|
|
{
|
|
|
|
case REQUEST_READ:
|
|
|
|
debug("request read %ld+%d", be64toh(request.from), be32toh(request.len));
|
|
|
|
write(client->socket, &reply, sizeof(reply));
|
|
|
|
|
|
|
|
offset = be64toh(request.from);
|
|
|
|
CLIENT_ERROR_ON_FAILURE(
|
|
|
|
sendfileloop(
|
|
|
|
client->socket,
|
|
|
|
client->fileno,
|
|
|
|
&offset,
|
|
|
|
be32toh(request.len)
|
|
|
|
),
|
|
|
|
"sendfile failed from=%ld, len=%d",
|
|
|
|
offset,
|
|
|
|
be32toh(request.len)
|
|
|
|
);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case REQUEST_WRITE:
|
|
|
|
debug("request write %ld+%d", be64toh(request.from), be32toh(request.len));
|
2012-05-24 01:39:35 +01:00
|
|
|
if (client->serve->block_allocation_map) {
|
2012-05-18 13:24:35 +01:00
|
|
|
write_not_zeroes(
|
|
|
|
client,
|
|
|
|
be64toh(request.from),
|
|
|
|
be32toh(request.len)
|
2012-05-17 20:14:22 +01:00
|
|
|
);
|
2012-05-18 13:24:35 +01:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
CLIENT_ERROR_ON_FAILURE(
|
|
|
|
readloop(
|
|
|
|
client->socket,
|
|
|
|
client->mapped + be64toh(request.from),
|
|
|
|
be32toh(request.len)
|
|
|
|
),
|
|
|
|
"read failed from=%ld, len=%d",
|
|
|
|
be64toh(request.from),
|
2012-05-17 20:14:22 +01:00
|
|
|
be32toh(request.len)
|
2012-05-18 13:24:35 +01:00
|
|
|
);
|
2012-05-21 04:03:17 +01:00
|
|
|
dirty(client->serve, be64toh(request.from), be32toh(request.len));
|
2012-05-18 13:24:35 +01:00
|
|
|
}
|
2012-05-17 20:14:22 +01:00
|
|
|
write(client->socket, &reply, sizeof(reply));
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void client_send_hello(struct client_params* client)
|
|
|
|
{
|
|
|
|
struct nbd_init init;
|
|
|
|
|
|
|
|
memcpy(init.passwd, INIT_PASSWD, sizeof(INIT_PASSWD));
|
|
|
|
init.magic = htobe64(INIT_MAGIC);
|
2012-05-24 01:39:35 +01:00
|
|
|
init.size = htobe64(client->serve->size);
|
2012-05-17 20:14:22 +01:00
|
|
|
memset(init.reserved, 0, 128);
|
|
|
|
CLIENT_ERROR_ON_FAILURE(
|
|
|
|
writeloop(client->socket, &init, sizeof(init)),
|
|
|
|
"Couldn't send hello"
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
void* client_serve(void* client_uncast)
|
|
|
|
{
|
|
|
|
struct client_params* client = (struct client_params*) client_uncast;
|
|
|
|
|
2012-05-21 04:03:17 +01:00
|
|
|
//client_open_file(client);
|
|
|
|
CLIENT_ERROR_ON_FAILURE(
|
|
|
|
open_and_mmap(
|
2012-05-24 01:39:35 +01:00
|
|
|
client->serve->filename,
|
2012-05-21 04:03:17 +01:00
|
|
|
&client->fileno,
|
2012-05-24 01:39:35 +01:00
|
|
|
NULL,
|
2012-05-21 04:03:17 +01:00
|
|
|
(void**) &client->mapped
|
|
|
|
),
|
2012-05-24 01:39:35 +01:00
|
|
|
"Couldn't open/mmap file %s", client->serve->filename
|
2012-05-21 04:03:17 +01:00
|
|
|
);
|
2012-05-17 20:14:22 +01:00
|
|
|
client_send_hello(client);
|
|
|
|
|
|
|
|
while (client_serve_request(client) == 0)
|
|
|
|
;
|
|
|
|
|
|
|
|
CLIENT_ERROR_ON_FAILURE(
|
|
|
|
close(client->socket),
|
|
|
|
"Couldn't close socket %d",
|
|
|
|
client->socket
|
|
|
|
);
|
|
|
|
|
2012-05-21 04:03:17 +01:00
|
|
|
|
|
|
|
close(client->socket);
|
|
|
|
close(client->fileno);
|
2012-05-24 01:39:35 +01:00
|
|
|
munmap(client->mapped, client->serve->size);
|
2012-05-21 04:03:17 +01:00
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
free(client);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int testmasks[9] = { 0,128,192,224,240,248,252,254,255 };
|
|
|
|
|
2012-05-21 04:03:17 +01:00
|
|
|
int is_included_in_acl(int list_length, struct ip_and_mask (*list)[], struct sockaddr* test)
|
2012-05-17 20:14:22 +01:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i=0; i < list_length; i++) {
|
2012-05-21 04:03:17 +01:00
|
|
|
struct ip_and_mask *entry = &(*list)[i];
|
2012-05-17 20:14:22 +01:00
|
|
|
int testbits;
|
|
|
|
char *raw_address1, *raw_address2;
|
|
|
|
|
2012-05-19 12:48:03 +01:00
|
|
|
debug("checking acl entry %d (%d/%d)", i, test->sa_family, entry->ip.family);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
|
|
|
if (test->sa_family != entry->ip.family)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (test->sa_family == AF_INET) {
|
2012-05-19 12:48:03 +01:00
|
|
|
debug("it's an AF_INET");
|
2012-05-17 20:14:22 +01:00
|
|
|
raw_address1 = (char*)
|
|
|
|
&((struct sockaddr_in*) test)->sin_addr;
|
|
|
|
raw_address2 = (char*) &entry->ip.v4.sin_addr;
|
|
|
|
}
|
|
|
|
else if (test->sa_family == AF_INET6) {
|
2012-05-19 12:48:03 +01:00
|
|
|
debug("it's an AF_INET6");
|
2012-05-17 20:14:22 +01:00
|
|
|
raw_address1 = (char*)
|
|
|
|
&((struct sockaddr_in6*) test)->sin6_addr;
|
|
|
|
raw_address2 = (char*) &entry->ip.v6.sin6_addr;
|
|
|
|
}
|
|
|
|
|
2012-05-19 12:48:03 +01:00
|
|
|
debug("testbits=%d", entry->mask);
|
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
for (testbits = entry->mask; testbits > 0; testbits -= 8) {
|
|
|
|
debug("testbits=%d, c1=%d, c2=%d", testbits, raw_address1[0], raw_address2[0]);
|
|
|
|
if (testbits >= 8) {
|
|
|
|
if (raw_address1[0] != raw_address2[0])
|
|
|
|
goto no_match;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if ((raw_address1[0] & testmasks[testbits%8]) !=
|
|
|
|
(raw_address2[0] & testmasks[testbits%8]) )
|
|
|
|
goto no_match;
|
|
|
|
}
|
|
|
|
|
|
|
|
raw_address1++;
|
|
|
|
raw_address2++;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
no_match: ;
|
|
|
|
debug("no match");
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-05-18 18:44:34 +01:00
|
|
|
void serve_open_server_socket(struct mode_serve_params* params)
|
2012-05-17 20:14:22 +01:00
|
|
|
{
|
2012-05-27 14:40:16 +01:00
|
|
|
params->server = socket(params->bind_to.generic.sa_family == AF_INET ?
|
|
|
|
PF_INET : PF_INET6, SOCK_STREAM, 0);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
|
|
|
SERVER_ERROR_ON_FAILURE(params->server,
|
|
|
|
"Couldn't create server socket");
|
2012-05-27 14:40:16 +01:00
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
SERVER_ERROR_ON_FAILURE(
|
|
|
|
bind(params->server, ¶ms->bind_to.generic,
|
2012-05-27 14:40:16 +01:00
|
|
|
sizeof(params->bind_to)),
|
2012-05-17 20:14:22 +01:00
|
|
|
"Couldn't bind server to IP address"
|
|
|
|
);
|
|
|
|
|
|
|
|
SERVER_ERROR_ON_FAILURE(
|
|
|
|
listen(params->server, params->tcp_backlog),
|
|
|
|
"Couldn't listen on server socket"
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2012-05-27 14:40:16 +01:00
|
|
|
int cleanup_and_find_client_slot(struct mode_serve_params* params)
|
|
|
|
{
|
|
|
|
int slot=-1, i;
|
|
|
|
|
|
|
|
for (i=0; i < MAX_NBD_CLIENTS; i++) {
|
|
|
|
void* status;
|
|
|
|
|
|
|
|
if (params->nbd_client[i].thread != 0) {
|
|
|
|
char s_client_address[64];
|
|
|
|
|
|
|
|
memset(s_client_address, 0, 64);
|
|
|
|
strcpy(s_client_address, "???");
|
|
|
|
inet_ntop(
|
|
|
|
params->nbd_client[i].address.sa_family,
|
|
|
|
sockaddr_address_data(¶ms->nbd_client[i].address),
|
|
|
|
s_client_address,
|
|
|
|
64
|
|
|
|
);
|
|
|
|
|
|
|
|
if (pthread_tryjoin_np(params->nbd_client[i].thread, &status) < 0) {
|
|
|
|
if (errno != EBUSY)
|
|
|
|
SERVER_ERROR_ON_FAILURE(-1, "Problem with joining thread");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
uint64_t status1 = (uint64_t) status;
|
|
|
|
params->nbd_client[i].thread = 0;
|
|
|
|
debug("nbd thread %d exited (%s)", (int) params->nbd_client[i].thread, s_client_address);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (params->nbd_client[i].thread == 0 && slot == -1)
|
|
|
|
slot = i;
|
|
|
|
}
|
|
|
|
|
|
|
|
return slot;
|
|
|
|
}
|
|
|
|
|
2012-05-18 23:39:16 +01:00
|
|
|
void accept_nbd_client(struct mode_serve_params* params, int client_fd, struct sockaddr* client_address)
|
|
|
|
{
|
|
|
|
struct client_params* client_params;
|
2012-05-27 14:40:16 +01:00
|
|
|
int slot = cleanup_and_find_client_slot(params);
|
|
|
|
char s_client_address[64];
|
|
|
|
|
|
|
|
if (inet_ntop(client_address->sa_family, sockaddr_address_data(client_address), s_client_address, 64) < 0) {
|
|
|
|
write(client_fd, "Bad client_address", 18);
|
|
|
|
close(client_fd);
|
|
|
|
return;
|
|
|
|
}
|
2012-05-18 23:39:16 +01:00
|
|
|
|
|
|
|
if (params->acl &&
|
|
|
|
!is_included_in_acl(params->acl_entries, params->acl, client_address)) {
|
|
|
|
write(client_fd, "Access control error", 20);
|
|
|
|
close(client_fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-05-27 14:40:16 +01:00
|
|
|
if (slot < 0) {
|
|
|
|
write(client_fd, "Too many clients", 16);
|
|
|
|
close(client_fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-05-18 23:39:16 +01:00
|
|
|
client_params = xmalloc(sizeof(struct client_params));
|
|
|
|
client_params->socket = client_fd;
|
2012-05-21 04:03:17 +01:00
|
|
|
client_params->serve = params;
|
2012-05-18 23:39:16 +01:00
|
|
|
|
2012-05-27 14:40:16 +01:00
|
|
|
if (pthread_create(¶ms->nbd_client[slot].thread, NULL, client_serve, client_params) < 0) {
|
|
|
|
write(client_fd, "Thread creation problem", 23);
|
|
|
|
free(client_params);
|
|
|
|
close(client_fd);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(¶ms->nbd_client[slot].address, client_address,
|
|
|
|
sizeof(struct sockaddr));
|
|
|
|
|
|
|
|
debug("nbd thread %d started (%s)", (int) params->nbd_client[slot].thread, s_client_address);
|
2012-05-18 23:39:16 +01:00
|
|
|
}
|
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
void serve_accept_loop(struct mode_serve_params* params)
|
|
|
|
{
|
|
|
|
while (1) {
|
2012-05-18 23:39:16 +01:00
|
|
|
int activity_fd, client_fd;
|
2012-05-17 20:14:22 +01:00
|
|
|
struct sockaddr client_address;
|
2012-05-18 23:39:16 +01:00
|
|
|
fd_set fds;
|
2012-05-19 12:48:03 +01:00
|
|
|
socklen_t socklen=sizeof(client_address);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-05-18 23:39:16 +01:00
|
|
|
FD_ZERO(&fds);
|
|
|
|
FD_SET(params->server, &fds);
|
2012-05-21 04:03:17 +01:00
|
|
|
if (params->control_socket_name)
|
|
|
|
FD_SET(params->control, &fds);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-05-18 23:39:16 +01:00
|
|
|
SERVER_ERROR_ON_FAILURE(
|
|
|
|
select(FD_SETSIZE, &fds, NULL, NULL, NULL),
|
|
|
|
"select() failed"
|
|
|
|
);
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-05-18 23:39:16 +01:00
|
|
|
activity_fd = FD_ISSET(params->server, &fds) ? params->server :
|
|
|
|
params->control;
|
|
|
|
client_fd = accept(activity_fd, &client_address, &socklen);
|
|
|
|
SERVER_ERROR_ON_FAILURE(client_fd, "accept() failed");
|
2012-05-17 20:14:22 +01:00
|
|
|
|
2012-05-18 23:39:16 +01:00
|
|
|
if (activity_fd == params->server)
|
|
|
|
accept_nbd_client(params, client_fd, &client_address);
|
|
|
|
if (activity_fd == params->control)
|
|
|
|
accept_control_connection(params, client_fd, &client_address);
|
2012-05-17 20:14:22 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-18 13:24:35 +01:00
|
|
|
void serve_init_allocation_map(struct mode_serve_params* params)
|
|
|
|
{
|
|
|
|
int fd = open(params->filename, O_RDONLY);
|
|
|
|
off64_t size;
|
|
|
|
SERVER_ERROR_ON_FAILURE(fd, "Couldn't open %s", params->filename);
|
|
|
|
size = lseek64(fd, 0, SEEK_END);
|
2012-05-21 04:03:17 +01:00
|
|
|
params->size = size;
|
2012-05-18 13:24:35 +01:00
|
|
|
SERVER_ERROR_ON_FAILURE(size, "Couldn't find size of %s",
|
|
|
|
params->filename);
|
|
|
|
params->block_allocation_map =
|
|
|
|
build_allocation_map(fd, size, block_allocation_resolution);
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
2012-05-17 20:14:22 +01:00
|
|
|
void do_serve(struct mode_serve_params* params)
|
|
|
|
{
|
2012-05-18 18:44:34 +01:00
|
|
|
serve_open_server_socket(params);
|
|
|
|
serve_open_control_socket(params);
|
2012-05-18 13:24:35 +01:00
|
|
|
serve_init_allocation_map(params);
|
2012-05-17 20:14:22 +01:00
|
|
|
serve_accept_loop(params);
|
|
|
|
}
|
|
|
|
|