Merge branch 'fix-formatting' into 'develop'
Formatted all code using `indent` See merge request open-source/flexnbd-c!47
This commit is contained in:
24
CONTRIBUTING.md
Normal file
24
CONTRIBUTING.md
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
# Contribution guide
|
||||||
|
|
||||||
|
The code is formatted using the K&R style of "indent".
|
||||||
|
|
||||||
|
```
|
||||||
|
indent -kr <files go here>
|
||||||
|
```
|
||||||
|
|
||||||
|
The C unit tests have also been indented in the same way, but manually adjsted
|
||||||
|
such that the functions follow the normal libcheck layout.
|
||||||
|
|
||||||
|
```c
|
||||||
|
START_TEST( ... ) {
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
END TEST
|
||||||
|
```
|
||||||
|
|
||||||
|
Indent tends to mangle the `END_TEST` macro, so that will need adjusting if
|
||||||
|
`indent` is run over the test files again.
|
||||||
|
|
||||||
|
|
||||||
|
|
@@ -45,8 +45,7 @@ int build_allocation_map(struct bitset * allocation_map, int fd)
|
|||||||
if (ioctl(fd, FS_IOC_FIEMAP, fiemap) < 0) {
|
if (ioctl(fd, FS_IOC_FIEMAP, fiemap) < 0) {
|
||||||
debug("Couldn't get fiemap, returning no allocation_map");
|
debug("Couldn't get fiemap, returning no allocation_map");
|
||||||
return 0; /* it's up to the caller to free the map */
|
return 0; /* it's up to the caller to free the map */
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
for (unsigned int i = 0; i < fiemap->fm_mapped_extents; i++) {
|
for (unsigned int i = 0; i < fiemap->fm_mapped_extents; i++) {
|
||||||
bitset_set_range(allocation_map,
|
bitset_set_range(allocation_map,
|
||||||
fiemap->fm_extents[i].fe_logical,
|
fiemap->fm_extents[i].fe_logical,
|
||||||
@@ -58,12 +57,10 @@ int build_allocation_map(struct bitset * allocation_map, int fd)
|
|||||||
* if we've actually hit max_offsets.
|
* if we've actually hit max_offsets.
|
||||||
*/
|
*/
|
||||||
if (fiemap->fm_mapped_extents > 0) {
|
if (fiemap->fm_mapped_extents > 0) {
|
||||||
struct fiemap_extent *last = &fiemap->fm_extents[
|
struct fiemap_extent *last =
|
||||||
fiemap->fm_mapped_extents-1
|
&fiemap->fm_extents[fiemap->fm_mapped_extents - 1];
|
||||||
];
|
|
||||||
offset = last->fe_logical + last->fe_length;
|
offset = last->fe_logical + last->fe_length;
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
offset += fiemap->fm_length;
|
offset += fiemap->fm_length;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -74,7 +71,8 @@ int build_allocation_map(struct bitset * allocation_map, int fd)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int open_and_mmap(const char* filename, int* out_fd, uint64_t *out_size, void **out_map)
|
int open_and_mmap(const char *filename, int *out_fd, uint64_t * out_size,
|
||||||
|
void **out_map)
|
||||||
{
|
{
|
||||||
/*
|
/*
|
||||||
* size and out_size are intentionally of different types.
|
* size and out_size are intentionally of different types.
|
||||||
@@ -117,9 +115,9 @@ int open_and_mmap(const char* filename, int* out_fd, uint64_t *out_size, void **
|
|||||||
warn("mmap64() failed");
|
warn("mmap64() failed");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
debug("opened %s size %ld on fd %d @ %p", filename, size, *out_fd, *out_map);
|
debug("opened %s size %ld on fd %d @ %p", filename, size, *out_fd,
|
||||||
}
|
*out_map);
|
||||||
else {
|
} else {
|
||||||
debug("opened %s size %ld on fd %d", filename, size, *out_fd);
|
debug("opened %s size %ld on fd %d", filename, size, *out_fd);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -150,7 +148,8 @@ int readloop(int filedes, void *buffer, size_t size)
|
|||||||
ssize_t result = read(filedes, buffer + readden, size - readden);
|
ssize_t result = read(filedes, buffer + readden, size - readden);
|
||||||
|
|
||||||
if (result == 0 /* EOF */ ) {
|
if (result == 0 /* EOF */ ) {
|
||||||
warn( "end-of-file detected while reading after %i bytes", readden );
|
warn("end-of-file detected while reading after %i bytes",
|
||||||
|
readden);
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -170,7 +169,9 @@ int sendfileloop(int out_fd, int in_fd, off64_t *offset, size_t count)
|
|||||||
size_t sent = 0;
|
size_t sent = 0;
|
||||||
while (sent < count) {
|
while (sent < count) {
|
||||||
ssize_t result = sendfile64(out_fd, in_fd, offset, count - sent);
|
ssize_t result = sendfile64(out_fd, in_fd, offset, count - sent);
|
||||||
debug("sendfile64(out_fd=%d, in_fd=%d, offset=%p, count-sent=%ld) = %ld", out_fd, in_fd, offset, count-sent, result);
|
debug
|
||||||
|
("sendfile64(out_fd=%d, in_fd=%d, offset=%p, count-sent=%ld) = %ld",
|
||||||
|
out_fd, in_fd, offset, count - sent, result);
|
||||||
|
|
||||||
if (result == -1) {
|
if (result == -1) {
|
||||||
debug("%s (%i) calling sendfile64()", strerror(errno), errno);
|
debug("%s (%i) calling sendfile64()", strerror(errno), errno);
|
||||||
@@ -184,7 +185,8 @@ int sendfileloop(int out_fd, int in_fd, off64_t *offset, size_t count)
|
|||||||
}
|
}
|
||||||
|
|
||||||
#include <errno.h>
|
#include <errno.h>
|
||||||
ssize_t spliceloop(int fd_in, loff_t *off_in, int fd_out, loff_t *off_out, size_t len, unsigned int flags2)
|
ssize_t spliceloop(int fd_in, loff_t * off_in, int fd_out,
|
||||||
|
loff_t * off_out, size_t len, unsigned int flags2)
|
||||||
{
|
{
|
||||||
const unsigned int flags = SPLICE_F_MORE | SPLICE_F_MOVE | flags2;
|
const unsigned int flags = SPLICE_F_MORE | SPLICE_F_MOVE | flags2;
|
||||||
size_t spliced = 0;
|
size_t spliced = 0;
|
||||||
@@ -192,13 +194,13 @@ ssize_t spliceloop(int fd_in, loff_t *off_in, int fd_out, loff_t *off_out, size_
|
|||||||
//debug("spliceloop(%d, %ld, %d, %ld, %ld)", fd_in, off_in ? *off_in : 0, fd_out, off_out ? *off_out : 0, len);
|
//debug("spliceloop(%d, %ld, %d, %ld, %ld)", fd_in, off_in ? *off_in : 0, fd_out, off_out ? *off_out : 0, len);
|
||||||
|
|
||||||
while (spliced < len) {
|
while (spliced < len) {
|
||||||
ssize_t result = splice(fd_in, off_in, fd_out, off_out, len, flags);
|
ssize_t result =
|
||||||
|
splice(fd_in, off_in, fd_out, off_out, len, flags);
|
||||||
if (result < 0) {
|
if (result < 0) {
|
||||||
//debug("result=%ld (%s), spliced=%ld, len=%ld", result, strerror(errno), spliced, len);
|
//debug("result=%ld (%s), spliced=%ld, len=%ld", result, strerror(errno), spliced, len);
|
||||||
if (errno == EAGAIN && (flags & SPLICE_F_NONBLOCK)) {
|
if (errno == EAGAIN && (flags & SPLICE_F_NONBLOCK)) {
|
||||||
return spliced;
|
return spliced;
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
@@ -222,13 +224,19 @@ int splice_via_pipe_loop(int fd_in, int fd_out, size_t len)
|
|||||||
|
|
||||||
while (spliced < len) {
|
while (spliced < len) {
|
||||||
ssize_t run = len - spliced;
|
ssize_t run = len - spliced;
|
||||||
ssize_t s2, s1 = spliceloop(fd_in, NULL, pipefd[1], NULL, run, SPLICE_F_NONBLOCK);
|
ssize_t s2, s1 =
|
||||||
|
spliceloop(fd_in, NULL, pipefd[1], NULL, run,
|
||||||
|
SPLICE_F_NONBLOCK);
|
||||||
/*if (run > 65535)
|
/*if (run > 65535)
|
||||||
run = 65535; */
|
run = 65535; */
|
||||||
if (s1 < 0) { break; }
|
if (s1 < 0) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
s2 = spliceloop(pipefd[0], NULL, fd_out, NULL, s1, 0);
|
s2 = spliceloop(pipefd[0], NULL, fd_out, NULL, s1, 0);
|
||||||
if (s2 < 0) { break; }
|
if (s2 < 0) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
spliced += s2;
|
spliced += s2;
|
||||||
}
|
}
|
||||||
close(pipefd[0]);
|
close(pipefd[0]);
|
||||||
@@ -250,7 +258,9 @@ int read_until_newline(int fd, char* buf, int bufsize)
|
|||||||
|
|
||||||
for (cur = 0; cur < bufsize; cur++) {
|
for (cur = 0; cur < bufsize; cur++) {
|
||||||
int result = read(fd, buf + cur, 1);
|
int result = read(fd, buf + cur, 1);
|
||||||
if (result <= 0) { return -1; }
|
if (result <= 0) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
if (buf[cur] == 10) {
|
if (buf[cur] == 10) {
|
||||||
buf[cur] = '\0';
|
buf[cur] = '\0';
|
||||||
break;
|
break;
|
||||||
@@ -275,7 +285,9 @@ int read_lines_until_blankline(int fd, int max_line_length, char ***lines)
|
|||||||
* -1 for an eof
|
* -1 for an eof
|
||||||
* -1 for a read error
|
* -1 for a read error
|
||||||
*/
|
*/
|
||||||
if (readden <= 1) { return lines_count; }
|
if (readden <= 1) {
|
||||||
|
return lines_count;
|
||||||
|
}
|
||||||
*lines = xrealloc(*lines, (lines_count + 1) * sizeof(char *));
|
*lines = xrealloc(*lines, (lines_count + 1) * sizeof(char *));
|
||||||
(*lines)[lines_count] = strdup(line);
|
(*lines)[lines_count] = strdup(line);
|
||||||
if ((*lines)[lines_count][0] == 0) {
|
if ((*lines)[lines_count][0] == 0) {
|
||||||
@@ -313,7 +325,8 @@ ssize_t iobuf_read(int fd, struct iobuf *iobuf, size_t default_size )
|
|||||||
}
|
}
|
||||||
|
|
||||||
left = iobuf->size - iobuf->needle;
|
left = iobuf->size - iobuf->needle;
|
||||||
debug( "Reading %"PRIu32" of %"PRIu32" bytes from fd %i", left, iobuf->size, fd );
|
debug("Reading %" PRIu32 " of %" PRIu32 " bytes from fd %i", left,
|
||||||
|
iobuf->size, fd);
|
||||||
|
|
||||||
count = read(fd, iobuf->buf + iobuf->needle, left);
|
count = read(fd, iobuf->buf + iobuf->needle, left);
|
||||||
|
|
||||||
@@ -341,7 +354,8 @@ ssize_t iobuf_write( int fd, struct iobuf *iobuf )
|
|||||||
size_t left = iobuf->size - iobuf->needle;
|
size_t left = iobuf->size - iobuf->needle;
|
||||||
ssize_t count;
|
ssize_t count;
|
||||||
|
|
||||||
debug( "Writing %"PRIu32" of %"PRIu32" bytes to fd %i", left, iobuf->size, fd );
|
debug("Writing %" PRIu32 " of %" PRIu32 " bytes to fd %i", left,
|
||||||
|
iobuf->size, fd);
|
||||||
count = write(fd, iobuf->buf + iobuf->needle, left);
|
count = write(fd, iobuf->buf + iobuf->needle, left);
|
||||||
|
|
||||||
if (count >= 0) {
|
if (count >= 0) {
|
||||||
|
@@ -38,7 +38,8 @@ int readloop(int filedes, void *buffer, size_t size);
|
|||||||
int sendfileloop(int out_fd, int in_fd, off64_t * offset, size_t count);
|
int sendfileloop(int out_fd, int in_fd, off64_t * offset, size_t count);
|
||||||
|
|
||||||
/** Repeat a splice() operation until we have 'len' bytes. */
|
/** Repeat a splice() operation until we have 'len' bytes. */
|
||||||
ssize_t spliceloop(int fd_in, loff_t *off_in, int fd_out, loff_t *off_out, size_t len, unsigned int flags2);
|
ssize_t spliceloop(int fd_in, loff_t * off_in, int fd_out,
|
||||||
|
loff_t * off_out, size_t len, unsigned int flags2);
|
||||||
|
|
||||||
/** Copy ''len'' bytes from ''fd_in'' to ''fd_out'' by creating a temporary
|
/** Copy ''len'' bytes from ''fd_in'' to ''fd_out'' by creating a temporary
|
||||||
* pipe and using the Linux splice call repeatedly until it has transferred
|
* pipe and using the Linux splice call repeatedly until it has transferred
|
||||||
@@ -65,7 +66,8 @@ int read_lines_until_blankline(int fd, int max_line_length, char ***lines);
|
|||||||
* ''out_size'' and the address of the mmap in ''out_map''. If anything goes
|
* ''out_size'' and the address of the mmap in ''out_map''. If anything goes
|
||||||
* wrong, returns -1 setting errno, otherwise 0.
|
* wrong, returns -1 setting errno, otherwise 0.
|
||||||
*/
|
*/
|
||||||
int open_and_mmap( const char* filename, int* out_fd, uint64_t* out_size, void **out_map);
|
int open_and_mmap(const char *filename, int *out_fd, uint64_t * out_size,
|
||||||
|
void **out_map);
|
||||||
|
|
||||||
|
|
||||||
/** Check to see whether the given file descriptor is closed.
|
/** Check to see whether the given file descriptor is closed.
|
||||||
@@ -73,4 +75,3 @@ int open_and_mmap( const char* filename, int* out_fd, uint64_t* out_size, void *
|
|||||||
int fd_is_closed(int fd_in);
|
int fd_is_closed(int fd_in);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -94,4 +94,3 @@ void mode(char* mode, int argc, char **argv);
|
|||||||
char *help_help_text;
|
char *help_help_text;
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -59,4 +59,3 @@ void nbd_h2r_reply( struct nbd_reply * from, struct nbd_reply_raw * to )
|
|||||||
to->error = htobe32(from->error);
|
to->error = htobe32(from->error);
|
||||||
to->handle.w = from->handle.w;
|
to->handle.w = from->handle.w;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -112,4 +112,3 @@ void nbd_h2r_request( struct nbd_request * from, struct nbd_request_raw * to );
|
|||||||
void nbd_h2r_reply(struct nbd_reply *from, struct nbd_reply_raw *to);
|
void nbd_h2r_reply(struct nbd_reply *from, struct nbd_reply_raw *to);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -22,7 +22,9 @@ int parse_ip_to_sockaddr(struct sockaddr* out, char* src)
|
|||||||
/* allow user to start with [ and end with any other invalid char */
|
/* allow user to start with [ and end with any other invalid char */
|
||||||
{
|
{
|
||||||
int i = 0, j = 0;
|
int i = 0, j = 0;
|
||||||
if (src[i] == '[') { i++; }
|
if (src[i] == '[') {
|
||||||
|
i++;
|
||||||
|
}
|
||||||
for (; i < 64 && IS_IP_VALID_CHAR(src[i]); i++) {
|
for (; i < 64 && IS_IP_VALID_CHAR(src[i]); i++) {
|
||||||
temp[j++] = src[i];
|
temp[j++] = src[i];
|
||||||
}
|
}
|
||||||
@@ -72,8 +74,7 @@ int parse_acl(struct ip_and_mask (**out)[], int max, char **entries)
|
|||||||
if (max == 0) {
|
if (max == 0) {
|
||||||
*out = NULL;
|
*out = NULL;
|
||||||
return 0;
|
return 0;
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
list = xmalloc(max * sizeof(struct ip_and_mask));
|
list = xmalloc(max * sizeof(struct ip_and_mask));
|
||||||
*out = (struct ip_and_mask(*)[]) list;
|
*out = (struct ip_and_mask(*)[]) list;
|
||||||
debug("acl alloc: %p", *out);
|
debug("acl alloc: %p", *out);
|
||||||
@@ -88,16 +89,14 @@ int parse_acl(struct ip_and_mask (**out)[], int max, char **entries)
|
|||||||
return i;
|
return i;
|
||||||
}
|
}
|
||||||
|
|
||||||
for (j=0; entries[i][j] && entries[i][j] != '/'; j++)
|
for (j = 0; entries[i][j] && entries[i][j] != '/'; j++); // increment j!
|
||||||
; // increment j!
|
|
||||||
|
|
||||||
if (entries[i][j] == '/') {
|
if (entries[i][j] == '/') {
|
||||||
outentry->mask = atoi(entries[i] + j + 1);
|
outentry->mask = atoi(entries[i] + j + 1);
|
||||||
if (outentry->mask < 1 || outentry->mask > MAX_MASK_BITS) {
|
if (outentry->mask < 1 || outentry->mask > MAX_MASK_BITS) {
|
||||||
return i;
|
return i;
|
||||||
}
|
}
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
outentry->mask = MAX_MASK_BITS;
|
outentry->mask = MAX_MASK_BITS;
|
||||||
}
|
}
|
||||||
# undef MAX_MASK_BITS
|
# undef MAX_MASK_BITS
|
||||||
@@ -124,4 +123,3 @@ void parse_port( char *s_port, struct sockaddr_in *out )
|
|||||||
}
|
}
|
||||||
out->sin_port = htobe16(raw_port);
|
out->sin_port = htobe16(raw_port);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -26,4 +26,3 @@ int parse_acl(struct ip_and_mask (**out)[], int max, char **entries);
|
|||||||
void parse_port(char *s_port, struct sockaddr_in *out);
|
void parse_port(char *s_port, struct sockaddr_in *out);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -10,7 +10,9 @@
|
|||||||
|
|
||||||
int socket_connect(struct sockaddr *to, struct sockaddr *from)
|
int socket_connect(struct sockaddr *to, struct sockaddr *from)
|
||||||
{
|
{
|
||||||
int fd = socket(to->sa_family == AF_INET ? PF_INET : PF_INET6, SOCK_STREAM, 0);
|
int fd =
|
||||||
|
socket(to->sa_family == AF_INET ? PF_INET : PF_INET6, SOCK_STREAM,
|
||||||
|
0);
|
||||||
if (fd < 0) {
|
if (fd < 0) {
|
||||||
warn("Couldn't create client socket");
|
warn("Couldn't create client socket");
|
||||||
return -1;
|
return -1;
|
||||||
@@ -41,7 +43,8 @@ int socket_connect(struct sockaddr* to, struct sockaddr* from)
|
|||||||
return fd;
|
return fd;
|
||||||
}
|
}
|
||||||
|
|
||||||
int nbd_check_hello( struct nbd_init_raw* init_raw, uint64_t* out_size, uint32_t* out_flags )
|
int nbd_check_hello(struct nbd_init_raw *init_raw, uint64_t * out_size,
|
||||||
|
uint32_t * out_flags)
|
||||||
{
|
{
|
||||||
if (strncmp(init_raw->passwd, INIT_PASSWD, 8) != 0) {
|
if (strncmp(init_raw->passwd, INIT_PASSWD, 8) != 0) {
|
||||||
warn("wrong passwd");
|
warn("wrong passwd");
|
||||||
@@ -66,7 +69,8 @@ fail:
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
int socket_nbd_read_hello( int fd, uint64_t* out_size, uint32_t* out_flags )
|
int socket_nbd_read_hello(int fd, uint64_t * out_size,
|
||||||
|
uint32_t * out_flags)
|
||||||
{
|
{
|
||||||
struct nbd_init_raw init_raw;
|
struct nbd_init_raw init_raw;
|
||||||
|
|
||||||
@@ -79,7 +83,8 @@ int socket_nbd_read_hello( int fd, uint64_t* out_size, uint32_t* out_flags )
|
|||||||
return nbd_check_hello(&init_raw, out_size, out_flags);
|
return nbd_check_hello(&init_raw, out_size, out_flags);
|
||||||
}
|
}
|
||||||
|
|
||||||
void nbd_hello_to_buf( struct nbd_init_raw *buf, off64_t out_size, uint32_t out_flags )
|
void nbd_hello_to_buf(struct nbd_init_raw *buf, off64_t out_size,
|
||||||
|
uint32_t out_flags)
|
||||||
{
|
{
|
||||||
struct nbd_init init;
|
struct nbd_init init;
|
||||||
|
|
||||||
@@ -106,21 +111,25 @@ int socket_nbd_write_hello( int fd, off64_t out_size, uint32_t out_flags )
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
void fill_request(struct nbd_request_raw *request_raw, uint16_t type, uint16_t flags, uint64_t from, uint32_t len)
|
void fill_request(struct nbd_request_raw *request_raw, uint16_t type,
|
||||||
|
uint16_t flags, uint64_t from, uint32_t len)
|
||||||
{
|
{
|
||||||
request_raw->magic = htobe32(REQUEST_MAGIC);
|
request_raw->magic = htobe32(REQUEST_MAGIC);
|
||||||
request_raw->type = htobe16(type);
|
request_raw->type = htobe16(type);
|
||||||
request_raw->flags = htobe16(flags);
|
request_raw->flags = htobe16(flags);
|
||||||
request_raw->handle.w = (((uint64_t)rand()) << 32) | ((uint64_t)rand());
|
request_raw->handle.w =
|
||||||
|
(((uint64_t) rand()) << 32) | ((uint64_t) rand());
|
||||||
request_raw->from = htobe64(from);
|
request_raw->from = htobe64(from);
|
||||||
request_raw->len = htobe32(len);
|
request_raw->len = htobe32(len);
|
||||||
}
|
}
|
||||||
|
|
||||||
void read_reply(int fd, uint64_t request_raw_handle, struct nbd_reply *reply)
|
void read_reply(int fd, uint64_t request_raw_handle,
|
||||||
|
struct nbd_reply *reply)
|
||||||
{
|
{
|
||||||
struct nbd_reply_raw reply_raw;
|
struct nbd_reply_raw reply_raw;
|
||||||
|
|
||||||
ERROR_IF_NEGATIVE(readloop(fd, &reply_raw, sizeof(struct nbd_reply_raw)),
|
ERROR_IF_NEGATIVE(readloop
|
||||||
|
(fd, &reply_raw, sizeof(struct nbd_reply_raw)),
|
||||||
"Couldn't read reply");
|
"Couldn't read reply");
|
||||||
|
|
||||||
nbd_r2h_reply(&reply_raw, reply);
|
nbd_r2h_reply(&reply_raw, reply);
|
||||||
@@ -145,16 +154,17 @@ void wait_for_data( int fd, int timeout_secs )
|
|||||||
FD_ZERO(&fds);
|
FD_ZERO(&fds);
|
||||||
FD_SET(fd, &fds);
|
FD_SET(fd, &fds);
|
||||||
|
|
||||||
selected = sock_try_select(
|
selected =
|
||||||
FD_SETSIZE, &fds, NULL, NULL, timeout_secs >=0 ? &tv : NULL
|
sock_try_select(FD_SETSIZE, &fds, NULL, NULL,
|
||||||
);
|
timeout_secs >= 0 ? &tv : NULL);
|
||||||
|
|
||||||
FATAL_IF(-1 == selected, "Select failed");
|
FATAL_IF(-1 == selected, "Select failed");
|
||||||
ERROR_IF(0 == selected, "Timed out waiting for reply");
|
ERROR_IF(0 == selected, "Timed out waiting for reply");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void socket_nbd_read(int fd, uint64_t from, uint32_t len, int out_fd, void* out_buf, int timeout_secs)
|
void socket_nbd_read(int fd, uint64_t from, uint32_t len, int out_fd,
|
||||||
|
void *out_buf, int timeout_secs)
|
||||||
{
|
{
|
||||||
struct nbd_request_raw request_raw;
|
struct nbd_request_raw request_raw;
|
||||||
struct nbd_reply reply;
|
struct nbd_reply reply;
|
||||||
@@ -168,18 +178,15 @@ void socket_nbd_read(int fd, uint64_t from, uint32_t len, int out_fd, void* out_
|
|||||||
read_reply(fd, request_raw.handle.w, &reply);
|
read_reply(fd, request_raw.handle.w, &reply);
|
||||||
|
|
||||||
if (out_buf) {
|
if (out_buf) {
|
||||||
FATAL_IF_NEGATIVE(readloop(fd, out_buf, len),
|
FATAL_IF_NEGATIVE(readloop(fd, out_buf, len), "Read failed");
|
||||||
"Read failed");
|
} else {
|
||||||
}
|
FATAL_IF_NEGATIVE(splice_via_pipe_loop(fd, out_fd, len),
|
||||||
else {
|
"Splice failed");
|
||||||
FATAL_IF_NEGATIVE(
|
|
||||||
splice_via_pipe_loop(fd, out_fd, len),
|
|
||||||
"Splice failed"
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void socket_nbd_write(int fd, uint64_t from, uint32_t len, int in_fd, void* in_buf, int timeout_secs)
|
void socket_nbd_write(int fd, uint64_t from, uint32_t len, int in_fd,
|
||||||
|
void *in_buf, int timeout_secs)
|
||||||
{
|
{
|
||||||
struct nbd_request_raw request_raw;
|
struct nbd_request_raw request_raw;
|
||||||
struct nbd_reply reply;
|
struct nbd_reply reply;
|
||||||
@@ -189,14 +196,10 @@ void socket_nbd_write(int fd, uint64_t from, uint32_t len, int in_fd, void* in_b
|
|||||||
"Couldn't write request");
|
"Couldn't write request");
|
||||||
|
|
||||||
if (in_buf) {
|
if (in_buf) {
|
||||||
ERROR_IF_NEGATIVE(writeloop(fd, in_buf, len),
|
ERROR_IF_NEGATIVE(writeloop(fd, in_buf, len), "Write failed");
|
||||||
"Write failed");
|
} else {
|
||||||
}
|
ERROR_IF_NEGATIVE(splice_via_pipe_loop(in_fd, fd, len),
|
||||||
else {
|
"Splice failed");
|
||||||
ERROR_IF_NEGATIVE(
|
|
||||||
splice_via_pipe_loop(in_fd, fd, len),
|
|
||||||
"Splice failed"
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
wait_for_data(fd, timeout_secs);
|
wait_for_data(fd, timeout_secs);
|
||||||
@@ -239,7 +242,9 @@ int socket_nbd_disconnect( int fd )
|
|||||||
|
|
||||||
void do_read(struct mode_readwrite_params *params)
|
void do_read(struct mode_readwrite_params *params)
|
||||||
{
|
{
|
||||||
params->client = socket_connect(¶ms->connect_to.generic, ¶ms->connect_from.generic);
|
params->client =
|
||||||
|
socket_connect(¶ms->connect_to.generic,
|
||||||
|
¶ms->connect_from.generic);
|
||||||
FATAL_IF_NEGATIVE(params->client, "Couldn't connect.");
|
FATAL_IF_NEGATIVE(params->client, "Couldn't connect.");
|
||||||
CHECK_RANGE("read");
|
CHECK_RANGE("read");
|
||||||
socket_nbd_read(params->client, params->from, params->len,
|
socket_nbd_read(params->client, params->from, params->len,
|
||||||
@@ -249,11 +254,12 @@ void do_read(struct mode_readwrite_params* params)
|
|||||||
|
|
||||||
void do_write(struct mode_readwrite_params *params)
|
void do_write(struct mode_readwrite_params *params)
|
||||||
{
|
{
|
||||||
params->client = socket_connect(¶ms->connect_to.generic, ¶ms->connect_from.generic);
|
params->client =
|
||||||
|
socket_connect(¶ms->connect_to.generic,
|
||||||
|
¶ms->connect_from.generic);
|
||||||
FATAL_IF_NEGATIVE(params->client, "Couldn't connect.");
|
FATAL_IF_NEGATIVE(params->client, "Couldn't connect.");
|
||||||
CHECK_RANGE("write");
|
CHECK_RANGE("write");
|
||||||
socket_nbd_write(params->client, params->from, params->len,
|
socket_nbd_write(params->client, params->from, params->len,
|
||||||
params->data_fd, NULL, 10);
|
params->data_fd, NULL, 10);
|
||||||
close(params->client);
|
close(params->client);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -9,15 +9,18 @@
|
|||||||
int socket_connect(struct sockaddr *to, struct sockaddr *from);
|
int socket_connect(struct sockaddr *to, struct sockaddr *from);
|
||||||
int socket_nbd_read_hello(int fd, uint64_t * size, uint32_t * flags);
|
int socket_nbd_read_hello(int fd, uint64_t * size, uint32_t * flags);
|
||||||
int socket_nbd_write_hello(int fd, uint64_t size, uint32_t flags);
|
int socket_nbd_write_hello(int fd, uint64_t size, uint32_t flags);
|
||||||
void socket_nbd_read(int fd, uint64_t from, uint32_t len, int out_fd, void* out_buf, int timeout_secs);
|
void socket_nbd_read(int fd, uint64_t from, uint32_t len, int out_fd,
|
||||||
void socket_nbd_write(int fd, uint64_t from, uint32_t len, int out_fd, void* out_buf, int timeout_secs);
|
void *out_buf, int timeout_secs);
|
||||||
|
void socket_nbd_write(int fd, uint64_t from, uint32_t len, int out_fd,
|
||||||
|
void *out_buf, int timeout_secs);
|
||||||
int socket_nbd_disconnect(int fd);
|
int socket_nbd_disconnect(int fd);
|
||||||
|
|
||||||
/* as you can see, we're slowly accumulating code that should really be in an
|
/* as you can see, we're slowly accumulating code that should really be in an
|
||||||
* NBD library */
|
* NBD library */
|
||||||
|
|
||||||
void nbd_hello_to_buf( struct nbd_init_raw* buf, uint64_t out_size, uint32_t out_flags );
|
void nbd_hello_to_buf(struct nbd_init_raw *buf, uint64_t out_size,
|
||||||
int nbd_check_hello( struct nbd_init_raw* init_raw, uint64_t* out_size, uint32_t* out_flags );
|
uint32_t out_flags);
|
||||||
|
int nbd_check_hello(struct nbd_init_raw *init_raw, uint64_t * out_size,
|
||||||
|
uint32_t * out_flags);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -24,7 +24,8 @@ void print_response( const char * response )
|
|||||||
fprintf(out, "%s\n", response_text + 2);
|
fprintf(out, "%s\n", response_text + 2);
|
||||||
}
|
}
|
||||||
|
|
||||||
void do_remote_command(char* command, char* socket_name, int argc, char** argv)
|
void do_remote_command(char *command, char *socket_name, int argc,
|
||||||
|
char **argv)
|
||||||
{
|
{
|
||||||
char newline = 10;
|
char newline = 10;
|
||||||
int i;
|
int i;
|
||||||
@@ -40,10 +41,10 @@ void do_remote_command(char* command, char* socket_name, int argc, char** argv)
|
|||||||
address.sun_family = AF_UNIX;
|
address.sun_family = AF_UNIX;
|
||||||
strncpy(address.sun_path, socket_name, sizeof(address.sun_path));
|
strncpy(address.sun_path, socket_name, sizeof(address.sun_path));
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(connect
|
||||||
connect(remote, (struct sockaddr*) &address, sizeof(address)),
|
(remote, (struct sockaddr *) &address,
|
||||||
"Couldn't connect to %s", socket_name
|
sizeof(address)), "Couldn't connect to %s",
|
||||||
);
|
socket_name);
|
||||||
|
|
||||||
write(remote, command, strlen(command));
|
write(remote, command, strlen(command));
|
||||||
write(remote, &newline, 1);
|
write(remote, &newline, 1);
|
||||||
@@ -55,13 +56,10 @@ void do_remote_command(char* command, char* socket_name, int argc, char** argv)
|
|||||||
}
|
}
|
||||||
write(remote, &newline, 1);
|
write(remote, &newline, 1);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(read_until_newline(remote, response, max_response),
|
||||||
read_until_newline(remote, response, max_response),
|
"Couldn't read response from %s", socket_name);
|
||||||
"Couldn't read response from %s", socket_name
|
|
||||||
);
|
|
||||||
|
|
||||||
print_response(response);
|
print_response(response);
|
||||||
|
|
||||||
exit(atoi(response));
|
exit(atoi(response));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -52,7 +52,9 @@ struct self_pipe * self_pipe_create(void)
|
|||||||
struct self_pipe *sig = xmalloc(sizeof(struct self_pipe));
|
struct self_pipe *sig = xmalloc(sizeof(struct self_pipe));
|
||||||
int fds[2];
|
int fds[2];
|
||||||
|
|
||||||
if ( NULL == sig ) { return NULL; }
|
if (NULL == sig) {
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
if (pipe(fds)) {
|
if (pipe(fds)) {
|
||||||
free(sig);
|
free(sig);
|
||||||
@@ -60,7 +62,8 @@ struct self_pipe * self_pipe_create(void)
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ( fcntl( fds[0], F_SETFL, O_NONBLOCK ) || fcntl( fds[1], F_SETFL, O_NONBLOCK ) ) {
|
if (fcntl(fds[0], F_SETFL, O_NONBLOCK)
|
||||||
|
|| fcntl(fds[1], F_SETFL, O_NONBLOCK)) {
|
||||||
int fcntl_err = errno;
|
int fcntl_err = errno;
|
||||||
while (close(fds[0]) == -1 && errno == EINTR);
|
while (close(fds[0]) == -1 && errno == EINTR);
|
||||||
while (close(fds[1]) == -1 && errno == EINTR);
|
while (close(fds[1]) == -1 && errno == EINTR);
|
||||||
|
@@ -29,7 +29,8 @@ size_t sockaddr_size( const struct sockaddr* sa )
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
const char* sockaddr_address_string( const struct sockaddr* sa, char* dest, size_t len )
|
const char *sockaddr_address_string(const struct sockaddr *sa, char *dest,
|
||||||
|
size_t len)
|
||||||
{
|
{
|
||||||
NULLCHECK(sa);
|
NULLCHECK(sa);
|
||||||
NULLCHECK(dest);
|
NULLCHECK(dest);
|
||||||
@@ -65,7 +66,8 @@ const char* sockaddr_address_string( const struct sockaddr* sa, char* dest, size
|
|||||||
|
|
||||||
int sock_set_reuseaddr(int fd, int optval)
|
int sock_set_reuseaddr(int fd, int optval)
|
||||||
{
|
{
|
||||||
return setsockopt( fd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval) );
|
return setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &optval,
|
||||||
|
sizeof(optval));
|
||||||
}
|
}
|
||||||
|
|
||||||
int sock_set_keepalive_params(int fd, int time, int intvl, int probes)
|
int sock_set_keepalive_params(int fd, int time, int intvl, int probes)
|
||||||
@@ -81,28 +83,33 @@ int sock_set_keepalive_params( int fd, int time, int intvl, int probes)
|
|||||||
|
|
||||||
int sock_set_keepalive(int fd, int optval)
|
int sock_set_keepalive(int fd, int optval)
|
||||||
{
|
{
|
||||||
return setsockopt( fd, SOL_SOCKET, SO_KEEPALIVE, &optval, sizeof(optval) );
|
return setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &optval,
|
||||||
|
sizeof(optval));
|
||||||
}
|
}
|
||||||
|
|
||||||
int sock_set_tcp_keepidle(int fd, int optval)
|
int sock_set_tcp_keepidle(int fd, int optval)
|
||||||
{
|
{
|
||||||
return setsockopt( fd, IPPROTO_TCP, TCP_KEEPIDLE, &optval, sizeof(optval) );
|
return setsockopt(fd, IPPROTO_TCP, TCP_KEEPIDLE, &optval,
|
||||||
|
sizeof(optval));
|
||||||
}
|
}
|
||||||
|
|
||||||
int sock_set_tcp_keepintvl(int fd, int optval)
|
int sock_set_tcp_keepintvl(int fd, int optval)
|
||||||
{
|
{
|
||||||
return setsockopt( fd, IPPROTO_TCP, TCP_KEEPINTVL, &optval, sizeof(optval) );
|
return setsockopt(fd, IPPROTO_TCP, TCP_KEEPINTVL, &optval,
|
||||||
|
sizeof(optval));
|
||||||
}
|
}
|
||||||
|
|
||||||
int sock_set_tcp_keepcnt(int fd, int optval)
|
int sock_set_tcp_keepcnt(int fd, int optval)
|
||||||
{
|
{
|
||||||
return setsockopt( fd, IPPROTO_TCP, TCP_KEEPCNT, &optval, sizeof(optval) );
|
return setsockopt(fd, IPPROTO_TCP, TCP_KEEPCNT, &optval,
|
||||||
|
sizeof(optval));
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Set the tcp_nodelay option */
|
/* Set the tcp_nodelay option */
|
||||||
int sock_set_tcp_nodelay(int fd, int optval)
|
int sock_set_tcp_nodelay(int fd, int optval)
|
||||||
{
|
{
|
||||||
return setsockopt( fd, IPPROTO_TCP, TCP_NODELAY, &optval, sizeof(optval) );
|
return setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &optval,
|
||||||
|
sizeof(optval));
|
||||||
}
|
}
|
||||||
|
|
||||||
int sock_set_tcp_cork(int fd, int optval)
|
int sock_set_tcp_cork(int fd, int optval)
|
||||||
@@ -140,8 +147,7 @@ int sock_try_bind( int fd, const struct sockaddr* sa )
|
|||||||
if (0 == bind_result) {
|
if (0 == bind_result) {
|
||||||
info("Bound to %s", s_address);
|
info("Bound to %s", s_address);
|
||||||
break;
|
break;
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
warn(SHOW_ERRNO("Couldn't bind to %s", s_address));
|
warn(SHOW_ERRNO("Couldn't bind to %s", s_address));
|
||||||
|
|
||||||
switch (errno) {
|
switch (errno) {
|
||||||
@@ -177,7 +183,8 @@ int sock_try_bind( int fd, const struct sockaddr* sa )
|
|||||||
return bind_result;
|
return bind_result;
|
||||||
}
|
}
|
||||||
|
|
||||||
int sock_try_select(int nfds, fd_set *readfds, fd_set *writefds, fd_set *exceptfds, struct timeval *timeout)
|
int sock_try_select(int nfds, fd_set * readfds, fd_set * writefds,
|
||||||
|
fd_set * exceptfds, struct timeval *timeout)
|
||||||
{
|
{
|
||||||
int result;
|
int result;
|
||||||
|
|
||||||
@@ -192,14 +199,16 @@ int sock_try_select(int nfds, fd_set *readfds, fd_set *writefds, fd_set *exceptf
|
|||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
int sock_try_connect( int fd, struct sockaddr* to, socklen_t addrlen, int wait )
|
int sock_try_connect(int fd, struct sockaddr *to, socklen_t addrlen,
|
||||||
|
int wait)
|
||||||
{
|
{
|
||||||
fd_set fds;
|
fd_set fds;
|
||||||
struct timeval tv = { wait, 0 };
|
struct timeval tv = { wait, 0 };
|
||||||
int result = 0;
|
int result = 0;
|
||||||
|
|
||||||
if (sock_set_nonblock(fd, 1) == -1) {
|
if (sock_set_nonblock(fd, 1) == -1) {
|
||||||
warn( SHOW_ERRNO( "Failed to set socket non-blocking for connect()" ) );
|
warn(SHOW_ERRNO
|
||||||
|
("Failed to set socket non-blocking for connect()"));
|
||||||
return connect(fd, to, addrlen);
|
return connect(fd, to, addrlen);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -284,4 +293,3 @@ int sock_try_close( int fd )
|
|||||||
|
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -12,7 +12,8 @@ size_t sockaddr_size(const struct sockaddr* sa);
|
|||||||
/* Convert a sockaddr into an address. Like inet_ntop, it returns dest if
|
/* Convert a sockaddr into an address. Like inet_ntop, it returns dest if
|
||||||
* successful, NULL otherwise. In the latter case, dest will contain "???"
|
* successful, NULL otherwise. In the latter case, dest will contain "???"
|
||||||
*/
|
*/
|
||||||
const char* sockaddr_address_string(const struct sockaddr* sa, char* dest, size_t len);
|
const char *sockaddr_address_string(const struct sockaddr *sa, char *dest,
|
||||||
|
size_t len);
|
||||||
|
|
||||||
/* Configure TCP keepalive on a socket */
|
/* Configure TCP keepalive on a socket */
|
||||||
int sock_set_keepalive_params(int fd, int time, int intvl, int probes);
|
int sock_set_keepalive_params(int fd, int time, int intvl, int probes);
|
||||||
@@ -44,13 +45,14 @@ int sock_set_nonblock(int fd, int optval);
|
|||||||
int sock_try_bind(int fd, const struct sockaddr *sa);
|
int sock_try_bind(int fd, const struct sockaddr *sa);
|
||||||
|
|
||||||
/* Try to call select(), retrying EINTR */
|
/* Try to call select(), retrying EINTR */
|
||||||
int sock_try_select(int nfds, fd_set *readfds, fd_set *writefds, fd_set *exceptfds, struct timeval *timeout);
|
int sock_try_select(int nfds, fd_set * readfds, fd_set * writefds,
|
||||||
|
fd_set * exceptfds, struct timeval *timeout);
|
||||||
|
|
||||||
/* Try to call connect(), timing out after wait seconds */
|
/* Try to call connect(), timing out after wait seconds */
|
||||||
int sock_try_connect( int fd, struct sockaddr* to, socklen_t addrlen, int wait );
|
int sock_try_connect(int fd, struct sockaddr *to, socklen_t addrlen,
|
||||||
|
int wait);
|
||||||
|
|
||||||
/* Try to call close(), retrying EINTR */
|
/* Try to call close(), retrying EINTR */
|
||||||
int sock_try_close(int fd);
|
int sock_try_close(int fd);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -26,10 +26,12 @@ void error_handler(int fatal)
|
|||||||
|
|
||||||
if (context) {
|
if (context) {
|
||||||
longjmp(context->jmp, fatal ? 1 : 2);
|
longjmp(context->jmp, fatal ? 1 : 2);
|
||||||
|
} else {
|
||||||
|
if (fatal) {
|
||||||
|
abort();
|
||||||
|
} else {
|
||||||
|
pthread_exit((void *) 1);
|
||||||
}
|
}
|
||||||
else {
|
|
||||||
if ( fatal ) { abort(); }
|
|
||||||
else { pthread_exit((void*) 1); }
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -43,7 +45,9 @@ void exit_err( const char *msg )
|
|||||||
|
|
||||||
void mylog(int line_level, const char *format, ...)
|
void mylog(int line_level, const char *format, ...)
|
||||||
{
|
{
|
||||||
if (line_level < log_level) { return; }
|
if (line_level < log_level) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
va_list argptr;
|
va_list argptr;
|
||||||
|
|
||||||
@@ -57,8 +61,7 @@ uint64_t monotonic_time_ms()
|
|||||||
struct timespec ts;
|
struct timespec ts;
|
||||||
uint64_t seconds_ms, nanoseconds_ms;
|
uint64_t seconds_ms, nanoseconds_ms;
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(clock_gettime(CLOCK_MONOTONIC, &ts),
|
||||||
clock_gettime(CLOCK_MONOTONIC, &ts),
|
|
||||||
SHOW_ERRNO("clock_gettime failed")
|
SHOW_ERRNO("clock_gettime failed")
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -75,7 +78,8 @@ uint64_t monotonic_time_ms()
|
|||||||
void *xrealloc(void *ptr, size_t size)
|
void *xrealloc(void *ptr, size_t size)
|
||||||
{
|
{
|
||||||
void *p = realloc(ptr, size);
|
void *p = realloc(ptr, size);
|
||||||
FATAL_IF_NULL(p, "couldn't xrealloc %d bytes", ptr ? "realloc" : "malloc", size);
|
FATAL_IF_NULL(p, "couldn't xrealloc %d bytes",
|
||||||
|
ptr ? "realloc" : "malloc", size);
|
||||||
return p;
|
return p;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -85,4 +89,3 @@ void* xmalloc(size_t size)
|
|||||||
memset(p, 0, size);
|
memset(p, 0, size);
|
||||||
return p;
|
return p;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -13,7 +13,8 @@
|
|||||||
void *xrealloc(void *ptr, size_t size);
|
void *xrealloc(void *ptr, size_t size);
|
||||||
void *xmalloc(size_t size);
|
void *xmalloc(size_t size);
|
||||||
|
|
||||||
typedef void (cleanup_handler)(void* /* context */, int /* is fatal? */);
|
typedef void (cleanup_handler) (void * /* context */ ,
|
||||||
|
int /* is fatal? */ );
|
||||||
|
|
||||||
/* set from 0 - 5 depending on what level of verbosity you want */
|
/* set from 0 - 5 depending on what level of verbosity you want */
|
||||||
extern int log_level;
|
extern int log_level;
|
||||||
@@ -162,4 +163,3 @@ uint64_t monotonic_time_ms(void);
|
|||||||
#define WARN_IF_NEGATIVE( value, msg, ... ) if ( value < 0 ) { warn( msg, ##__VA_ARGS__ ); }
|
#define WARN_IF_NEGATIVE( value, msg, ... ) if ( value < 0 ) { warn( msg, ##__VA_ARGS__ ); }
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -19,4 +19,3 @@ int main(int argc, char** argv)
|
|||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -19,6 +19,7 @@ static struct option proxy_options[] = {
|
|||||||
GETOPT_VERBOSE,
|
GETOPT_VERBOSE,
|
||||||
{0}
|
{0}
|
||||||
};
|
};
|
||||||
|
|
||||||
static char proxy_short_options[] = "hl:p:C:P:b:" SOPT_QUIET SOPT_VERBOSE;
|
static char proxy_short_options[] = "hl:p:C:P:b:" SOPT_QUIET SOPT_VERBOSE;
|
||||||
static char proxy_help_text[] =
|
static char proxy_help_text[] =
|
||||||
"Usage: flexnbd-proxy <options>\n\n"
|
"Usage: flexnbd-proxy <options>\n\n"
|
||||||
@@ -26,24 +27,24 @@ static char proxy_help_text[] =
|
|||||||
"We can listen on TCP or UNIX socket, but only connect to TCP servers.\n\n"
|
"We can listen on TCP or UNIX socket, but only connect to TCP servers.\n\n"
|
||||||
HELP_LINE
|
HELP_LINE
|
||||||
"\t--" OPT_ADDR ",-l <ADDR>\tThe address we will bind to as a proxy.\n"
|
"\t--" OPT_ADDR ",-l <ADDR>\tThe address we will bind to as a proxy.\n"
|
||||||
"\t--" OPT_PORT ",-p <PORT>\tThe port we will bind to as a proxy, if required.\n"
|
"\t--" OPT_PORT
|
||||||
|
",-p <PORT>\tThe port we will bind to as a proxy, if required.\n"
|
||||||
"\t--" OPT_CONNECT_ADDR ",-C <ADDR>\tAddress of the proxied server.\n"
|
"\t--" OPT_CONNECT_ADDR ",-C <ADDR>\tAddress of the proxied server.\n"
|
||||||
"\t--" OPT_CONNECT_PORT ",-P <PORT>\tPort of the proxied server.\n"
|
"\t--" OPT_CONNECT_PORT ",-P <PORT>\tPort of the proxied server.\n"
|
||||||
"\t--" OPT_BIND ",-b <ADDR>\tThe address we connect from, as a proxy.\n"
|
"\t--" OPT_BIND
|
||||||
"\t--" OPT_CACHE ",-c[=<CACHE-BYTES>]\tUse a RAM read cache of the given size.\n"
|
",-b <ADDR>\tThe address we connect from, as a proxy.\n" "\t--"
|
||||||
QUIET_LINE
|
OPT_CACHE
|
||||||
VERBOSE_LINE;
|
",-c[=<CACHE-BYTES>]\tUse a RAM read cache of the given size.\n"
|
||||||
|
QUIET_LINE VERBOSE_LINE;
|
||||||
|
|
||||||
static char proxy_default_cache_size[] = "4096";
|
static char proxy_default_cache_size[] = "4096";
|
||||||
|
|
||||||
void read_proxy_param(
|
void read_proxy_param(int c,
|
||||||
int c,
|
|
||||||
char **downstream_addr,
|
char **downstream_addr,
|
||||||
char **downstream_port,
|
char **downstream_port,
|
||||||
char **upstream_addr,
|
char **upstream_addr,
|
||||||
char **upstream_port,
|
char **upstream_port,
|
||||||
char **bind_addr,
|
char **bind_addr, char **cache_bytes)
|
||||||
char **cache_bytes)
|
|
||||||
{
|
{
|
||||||
switch (c) {
|
switch (c) {
|
||||||
case 'h':
|
case 'h':
|
||||||
@@ -116,34 +117,31 @@ int main( int argc, char *argv[] )
|
|||||||
srand(time(NULL));
|
srand(time(NULL));
|
||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long( argc, argv, proxy_short_options, proxy_options, NULL );
|
c = getopt_long(argc, argv, proxy_short_options, proxy_options,
|
||||||
if ( -1 == c ) { break; }
|
NULL);
|
||||||
|
if (-1 == c) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
read_proxy_param(c,
|
read_proxy_param(c,
|
||||||
&downstream_addr,
|
&downstream_addr,
|
||||||
&downstream_port,
|
&downstream_port,
|
||||||
&upstream_addr,
|
&upstream_addr,
|
||||||
&upstream_port,
|
&upstream_port, &bind_addr, &cache_bytes);
|
||||||
&bind_addr,
|
|
||||||
&cache_bytes
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (NULL == downstream_addr) {
|
if (NULL == downstream_addr) {
|
||||||
fprintf(stderr, "--addr is required.\n");
|
fprintf(stderr, "--addr is required.\n");
|
||||||
exit_err(proxy_help_text);
|
exit_err(proxy_help_text);
|
||||||
} else if (NULL == upstream_addr || NULL == upstream_port) {
|
} else if (NULL == upstream_addr || NULL == upstream_port) {
|
||||||
fprintf( stderr, "both --conn-addr and --conn-port are required.\n" );
|
fprintf(stderr,
|
||||||
|
"both --conn-addr and --conn-port are required.\n");
|
||||||
exit_err(proxy_help_text);
|
exit_err(proxy_help_text);
|
||||||
}
|
}
|
||||||
|
|
||||||
proxy = proxy_create(
|
proxy = proxy_create(downstream_addr,
|
||||||
downstream_addr,
|
|
||||||
downstream_port,
|
downstream_port,
|
||||||
upstream_addr,
|
upstream_addr,
|
||||||
upstream_port,
|
upstream_port, bind_addr, cache_bytes);
|
||||||
bind_addr,
|
|
||||||
cache_bytes
|
|
||||||
);
|
|
||||||
|
|
||||||
/* Set these *after* proxy has been assigned to */
|
/* Set these *after* proxy has been assigned to */
|
||||||
sigaction(SIGTERM, &exit_action, NULL);
|
sigaction(SIGTERM, &exit_action, NULL);
|
||||||
@@ -152,15 +150,12 @@ int main( int argc, char *argv[] )
|
|||||||
signal(SIGPIPE, SIG_IGN); /* calls to splice() unhelpfully throw this */
|
signal(SIGPIPE, SIG_IGN); /* calls to splice() unhelpfully throw this */
|
||||||
|
|
||||||
if (NULL != downstream_port) {
|
if (NULL != downstream_port) {
|
||||||
info(
|
info("Proxying between %s %s (downstream) and %s %s (upstream)",
|
||||||
"Proxying between %s %s (downstream) and %s %s (upstream)",
|
downstream_addr, downstream_port, upstream_addr,
|
||||||
downstream_addr, downstream_port, upstream_addr, upstream_port
|
upstream_port);
|
||||||
);
|
|
||||||
} else {
|
} else {
|
||||||
info(
|
info("Proxying between %s (downstream) and %s %s (upstream)",
|
||||||
"Proxying between %s (downstream) and %s %s (upstream)",
|
downstream_addr, upstream_addr, upstream_port);
|
||||||
downstream_addr, upstream_addr, upstream_port
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
success = do_proxy(proxy);
|
success = do_proxy(proxy);
|
||||||
@@ -168,4 +163,3 @@ int main( int argc, char *argv[] )
|
|||||||
|
|
||||||
return success ? 0 : 1;
|
return success ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -2,7 +2,8 @@
|
|||||||
#include "util.h"
|
#include "util.h"
|
||||||
|
|
||||||
|
|
||||||
struct prefetch* prefetch_create( size_t size_bytes ){
|
struct prefetch *prefetch_create(size_t size_bytes)
|
||||||
|
{
|
||||||
|
|
||||||
struct prefetch *out = xmalloc(sizeof(struct prefetch));
|
struct prefetch *out = xmalloc(sizeof(struct prefetch));
|
||||||
NULLCHECK(out);
|
NULLCHECK(out);
|
||||||
@@ -19,14 +20,16 @@ struct prefetch* prefetch_create( size_t size_bytes ){
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void prefetch_destroy( struct prefetch *prefetch ) {
|
void prefetch_destroy(struct prefetch *prefetch)
|
||||||
|
{
|
||||||
if (prefetch) {
|
if (prefetch) {
|
||||||
free(prefetch->buffer);
|
free(prefetch->buffer);
|
||||||
free(prefetch);
|
free(prefetch);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
size_t prefetch_size( struct prefetch *prefetch){
|
size_t prefetch_size(struct prefetch *prefetch)
|
||||||
|
{
|
||||||
if (prefetch) {
|
if (prefetch) {
|
||||||
return prefetch->size;
|
return prefetch->size;
|
||||||
} else {
|
} else {
|
||||||
@@ -34,21 +37,25 @@ size_t prefetch_size( struct prefetch *prefetch){
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void prefetch_set_is_empty( struct prefetch *prefetch ){
|
void prefetch_set_is_empty(struct prefetch *prefetch)
|
||||||
|
{
|
||||||
prefetch_set_full(prefetch, 0);
|
prefetch_set_full(prefetch, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
void prefetch_set_is_full( struct prefetch *prefetch ){
|
void prefetch_set_is_full(struct prefetch *prefetch)
|
||||||
|
{
|
||||||
prefetch_set_full(prefetch, 1);
|
prefetch_set_full(prefetch, 1);
|
||||||
}
|
}
|
||||||
|
|
||||||
void prefetch_set_full( struct prefetch *prefetch, int val ){
|
void prefetch_set_full(struct prefetch *prefetch, int val)
|
||||||
|
{
|
||||||
if (prefetch) {
|
if (prefetch) {
|
||||||
prefetch->is_full = val;
|
prefetch->is_full = val;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
int prefetch_is_full( struct prefetch *prefetch ){
|
int prefetch_is_full(struct prefetch *prefetch)
|
||||||
|
{
|
||||||
if (prefetch) {
|
if (prefetch) {
|
||||||
return prefetch->is_full;
|
return prefetch->is_full;
|
||||||
} else {
|
} else {
|
||||||
@@ -56,13 +63,16 @@ int prefetch_is_full( struct prefetch *prefetch ){
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
int prefetch_contains( struct prefetch *prefetch, uint64_t from, uint32_t len ){
|
int prefetch_contains(struct prefetch *prefetch, uint64_t from,
|
||||||
|
uint32_t len)
|
||||||
|
{
|
||||||
NULLCHECK(prefetch);
|
NULLCHECK(prefetch);
|
||||||
return from >= prefetch->from &&
|
return from >= prefetch->from &&
|
||||||
from + len <= prefetch->from + prefetch->len;
|
from + len <= prefetch->from + prefetch->len;
|
||||||
}
|
}
|
||||||
|
|
||||||
char *prefetch_offset( struct prefetch *prefetch, uint64_t from ){
|
char *prefetch_offset(struct prefetch *prefetch, uint64_t from)
|
||||||
|
{
|
||||||
NULLCHECK(prefetch);
|
NULLCHECK(prefetch);
|
||||||
return prefetch->buffer + (from - prefetch->from);
|
return prefetch->buffer + (from - prefetch->from);
|
||||||
}
|
}
|
||||||
|
@@ -27,7 +27,8 @@ void prefetch_set_is_empty( struct prefetch *prefetch );
|
|||||||
void prefetch_set_is_full(struct prefetch *prefetch);
|
void prefetch_set_is_full(struct prefetch *prefetch);
|
||||||
void prefetch_set_full(struct prefetch *prefetch, int val);
|
void prefetch_set_full(struct prefetch *prefetch, int val);
|
||||||
int prefetch_is_full(struct prefetch *prefetch);
|
int prefetch_is_full(struct prefetch *prefetch);
|
||||||
int prefetch_contains( struct prefetch *prefetch, uint64_t from, uint32_t len );
|
int prefetch_contains(struct prefetch *prefetch, uint64_t from,
|
||||||
|
uint32_t len);
|
||||||
char *prefetch_offset(struct prefetch *prefetch, uint64_t from);
|
char *prefetch_offset(struct prefetch *prefetch, uint64_t from);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
@@ -13,13 +13,11 @@
|
|||||||
#include <sys/socket.h>
|
#include <sys/socket.h>
|
||||||
#include <netinet/tcp.h>
|
#include <netinet/tcp.h>
|
||||||
|
|
||||||
struct proxier* proxy_create(
|
struct proxier *proxy_create(char *s_downstream_address,
|
||||||
char* s_downstream_address,
|
|
||||||
char *s_downstream_port,
|
char *s_downstream_port,
|
||||||
char *s_upstream_address,
|
char *s_upstream_address,
|
||||||
char *s_upstream_port,
|
char *s_upstream_port,
|
||||||
char* s_upstream_bind,
|
char *s_upstream_bind, char *s_cache_bytes)
|
||||||
char* s_cache_bytes )
|
|
||||||
{
|
{
|
||||||
struct proxier *out;
|
struct proxier *out;
|
||||||
out = xmalloc(sizeof(struct proxier));
|
out = xmalloc(sizeof(struct proxier));
|
||||||
@@ -27,10 +25,9 @@ struct proxier* proxy_create(
|
|||||||
FATAL_IF_NULL(s_downstream_address, "Listen address not specified");
|
FATAL_IF_NULL(s_downstream_address, "Listen address not specified");
|
||||||
NULLCHECK(s_downstream_address);
|
NULLCHECK(s_downstream_address);
|
||||||
|
|
||||||
FATAL_UNLESS(
|
FATAL_UNLESS(parse_to_sockaddr
|
||||||
parse_to_sockaddr( &out->listen_on.generic, s_downstream_address ),
|
(&out->listen_on.generic, s_downstream_address),
|
||||||
"Couldn't parse downstream address %s"
|
"Couldn't parse downstream address %s");
|
||||||
);
|
|
||||||
|
|
||||||
if (out->listen_on.family != AF_UNIX) {
|
if (out->listen_on.family != AF_UNIX) {
|
||||||
FATAL_IF_NULL(s_downstream_port, "Downstream port not specified");
|
FATAL_IF_NULL(s_downstream_port, "Downstream port not specified");
|
||||||
@@ -41,22 +38,19 @@ struct proxier* proxy_create(
|
|||||||
FATAL_IF_NULL(s_upstream_address, "Upstream address not specified");
|
FATAL_IF_NULL(s_upstream_address, "Upstream address not specified");
|
||||||
NULLCHECK(s_upstream_address);
|
NULLCHECK(s_upstream_address);
|
||||||
|
|
||||||
FATAL_UNLESS(
|
FATAL_UNLESS(parse_ip_to_sockaddr
|
||||||
parse_ip_to_sockaddr( &out->connect_to.generic, s_upstream_address ),
|
(&out->connect_to.generic, s_upstream_address),
|
||||||
"Couldn't parse upstream address '%s'",
|
"Couldn't parse upstream address '%s'",
|
||||||
s_upstream_address
|
s_upstream_address);
|
||||||
);
|
|
||||||
|
|
||||||
FATAL_IF_NULL(s_upstream_port, "Upstream port not specified");
|
FATAL_IF_NULL(s_upstream_port, "Upstream port not specified");
|
||||||
NULLCHECK(s_upstream_port);
|
NULLCHECK(s_upstream_port);
|
||||||
parse_port(s_upstream_port, &out->connect_to.v4);
|
parse_port(s_upstream_port, &out->connect_to.v4);
|
||||||
|
|
||||||
if (s_upstream_bind) {
|
if (s_upstream_bind) {
|
||||||
FATAL_IF_ZERO(
|
FATAL_IF_ZERO(parse_ip_to_sockaddr
|
||||||
parse_ip_to_sockaddr( &out->connect_from.generic, s_upstream_bind ),
|
(&out->connect_from.generic, s_upstream_bind),
|
||||||
"Couldn't parse bind address '%s'",
|
"Couldn't parse bind address '%s'", s_upstream_bind);
|
||||||
s_upstream_bind
|
|
||||||
);
|
|
||||||
out->bind = 1;
|
out->bind = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -83,18 +77,21 @@ struct proxier* proxy_create(
|
|||||||
out->req.buf = xmalloc(NBD_MAX_SIZE + NBD_REQUEST_SIZE);
|
out->req.buf = xmalloc(NBD_MAX_SIZE + NBD_REQUEST_SIZE);
|
||||||
out->rsp.buf = xmalloc(NBD_MAX_SIZE + NBD_REPLY_SIZE);
|
out->rsp.buf = xmalloc(NBD_MAX_SIZE + NBD_REPLY_SIZE);
|
||||||
|
|
||||||
log_context = xmalloc( strlen(s_upstream_address) + strlen(s_upstream_port) + 2 );
|
log_context =
|
||||||
|
xmalloc(strlen(s_upstream_address) + strlen(s_upstream_port) + 2);
|
||||||
sprintf(log_context, "%s:%s", s_upstream_address, s_upstream_port);
|
sprintf(log_context, "%s:%s", s_upstream_address, s_upstream_port);
|
||||||
|
|
||||||
return out;
|
return out;
|
||||||
}
|
}
|
||||||
|
|
||||||
int proxy_prefetches( struct proxier* proxy ) {
|
int proxy_prefetches(struct proxier *proxy)
|
||||||
|
{
|
||||||
NULLCHECK(proxy);
|
NULLCHECK(proxy);
|
||||||
return proxy->prefetch != NULL;
|
return proxy->prefetch != NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
int proxy_prefetch_bufsize( struct proxier* proxy ){
|
int proxy_prefetch_bufsize(struct proxier *proxy)
|
||||||
|
{
|
||||||
NULLCHECK(proxy);
|
NULLCHECK(proxy);
|
||||||
return prefetch_size(proxy->prefetch);
|
return prefetch_size(proxy->prefetch);
|
||||||
}
|
}
|
||||||
@@ -110,7 +107,8 @@ void proxy_destroy( struct proxier* proxy )
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Shared between our two different connect_to_upstream paths */
|
/* Shared between our two different connect_to_upstream paths */
|
||||||
void proxy_finish_connect_to_upstream( struct proxier *proxy, uint64_t size, uint32_t flags );
|
void proxy_finish_connect_to_upstream(struct proxier *proxy, uint64_t size,
|
||||||
|
uint32_t flags);
|
||||||
|
|
||||||
/* Try to establish a connection to our upstream server. Return 1 on success,
|
/* Try to establish a connection to our upstream server. Return 1 on success,
|
||||||
* 0 on failure. this is a blocking call that returns a non-blocking socket.
|
* 0 on failure. this is a blocking call that returns a non-blocking socket.
|
||||||
@@ -131,10 +129,9 @@ int proxy_connect_to_upstream( struct proxier* proxy )
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (!socket_nbd_read_hello(fd, &size, &flags)) {
|
if (!socket_nbd_read_hello(fd, &size, &flags)) {
|
||||||
WARN_IF_NEGATIVE(
|
WARN_IF_NEGATIVE(sock_try_close(fd),
|
||||||
sock_try_close( fd ),
|
"Couldn't close() after failed read of NBD hello on fd %i",
|
||||||
"Couldn't close() after failed read of NBD hello on fd %i", fd
|
fd);
|
||||||
);
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -161,7 +158,8 @@ void proxy_start_connect_to_upstream( struct proxier* proxy )
|
|||||||
fd = socket(to->sa_family, SOCK_STREAM, 0);
|
fd = socket(to->sa_family, SOCK_STREAM, 0);
|
||||||
|
|
||||||
if (fd < 0) {
|
if (fd < 0) {
|
||||||
warn( SHOW_ERRNO( "Couldn't create socket to reconnect to upstream" ) );
|
warn(SHOW_ERRNO
|
||||||
|
("Couldn't create socket to reconnect to upstream"));
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -196,15 +194,15 @@ error:
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
void proxy_finish_connect_to_upstream( struct proxier *proxy, uint64_t size, uint32_t flags ) {
|
void proxy_finish_connect_to_upstream(struct proxier *proxy, uint64_t size,
|
||||||
|
uint32_t flags)
|
||||||
|
{
|
||||||
|
|
||||||
if (proxy->upstream_size == 0) {
|
if (proxy->upstream_size == 0) {
|
||||||
info("Size of upstream image is %" PRIu64 " bytes", size);
|
info("Size of upstream image is %" PRIu64 " bytes", size);
|
||||||
} else if (proxy->upstream_size != size) {
|
} else if (proxy->upstream_size != size) {
|
||||||
warn(
|
warn("Size changed from %" PRIu64 " to %" PRIu64 " bytes",
|
||||||
"Size changed from %"PRIu64" to %"PRIu64" bytes",
|
proxy->upstream_size, size);
|
||||||
proxy->upstream_size, size
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
proxy->upstream_size = size;
|
proxy->upstream_size = size;
|
||||||
@@ -212,10 +210,8 @@ void proxy_finish_connect_to_upstream( struct proxier *proxy, uint64_t size, uin
|
|||||||
if (proxy->upstream_flags == 0) {
|
if (proxy->upstream_flags == 0) {
|
||||||
info("Upstream transmission flags set to %" PRIu32 "", flags);
|
info("Upstream transmission flags set to %" PRIu32 "", flags);
|
||||||
} else if (proxy->upstream_flags != flags) {
|
} else if (proxy->upstream_flags != flags) {
|
||||||
warn(
|
warn("Upstream transmission flags changed from %" PRIu32 " to %"
|
||||||
"Upstream transmission flags changed from %"PRIu32" to %"PRIu32"",
|
PRIu32 "", proxy->upstream_flags, flags);
|
||||||
proxy->upstream_flags, flags
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
proxy->upstream_flags = flags;
|
proxy->upstream_flags = flags;
|
||||||
@@ -237,11 +233,9 @@ void proxy_disconnect_from_upstream( struct proxier* proxy )
|
|||||||
info("Closing upstream connection on fd %i", proxy->upstream_fd);
|
info("Closing upstream connection on fd %i", proxy->upstream_fd);
|
||||||
|
|
||||||
/* TODO: An NBD disconnect would be pleasant here */
|
/* TODO: An NBD disconnect would be pleasant here */
|
||||||
WARN_IF_NEGATIVE(
|
WARN_IF_NEGATIVE(sock_try_close(proxy->upstream_fd),
|
||||||
sock_try_close( proxy->upstream_fd ),
|
|
||||||
"Failed to close() fd %i when disconnecting from upstream",
|
"Failed to close() fd %i when disconnecting from upstream",
|
||||||
proxy->upstream_fd
|
proxy->upstream_fd);
|
||||||
);
|
|
||||||
proxy->upstream_fd = -1;
|
proxy->upstream_fd = -1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -253,31 +247,28 @@ void proxy_open_listen_socket(struct proxier* params)
|
|||||||
NULLCHECK(params);
|
NULLCHECK(params);
|
||||||
|
|
||||||
params->listen_fd = socket(params->listen_on.family, SOCK_STREAM, 0);
|
params->listen_fd = socket(params->listen_on.family, SOCK_STREAM, 0);
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(params->listen_fd,
|
||||||
params->listen_fd, SHOW_ERRNO( "Couldn't create listen socket" )
|
SHOW_ERRNO("Couldn't create listen socket")
|
||||||
);
|
);
|
||||||
|
|
||||||
/* Allow us to restart quickly */
|
/* Allow us to restart quickly */
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(sock_set_reuseaddr(params->listen_fd, 1),
|
||||||
sock_set_reuseaddr(params->listen_fd, 1),
|
|
||||||
SHOW_ERRNO("Couldn't set SO_REUSEADDR")
|
SHOW_ERRNO("Couldn't set SO_REUSEADDR")
|
||||||
);
|
);
|
||||||
|
|
||||||
if (AF_UNIX != params->listen_on.family) {
|
if (AF_UNIX != params->listen_on.family) {
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(sock_set_tcp_nodelay(params->listen_fd, 1),
|
||||||
sock_set_tcp_nodelay(params->listen_fd, 1),
|
|
||||||
SHOW_ERRNO("Couldn't set TCP_NODELAY")
|
SHOW_ERRNO("Couldn't set TCP_NODELAY")
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
FATAL_UNLESS_ZERO(
|
FATAL_UNLESS_ZERO(sock_try_bind
|
||||||
sock_try_bind( params->listen_fd, ¶ms->listen_on.generic ),
|
(params->listen_fd, ¶ms->listen_on.generic),
|
||||||
SHOW_ERRNO("Failed to bind to listening socket")
|
SHOW_ERRNO("Failed to bind to listening socket")
|
||||||
);
|
);
|
||||||
|
|
||||||
/* We're only serving one client at a time, hence backlog of 1 */
|
/* We're only serving one client at a time, hence backlog of 1 */
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(listen(params->listen_fd, 1),
|
||||||
listen(params->listen_fd, 1),
|
|
||||||
SHOW_ERRNO("Failed to listen on listening socket")
|
SHOW_ERRNO("Failed to listen on listening socket")
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -308,8 +299,8 @@ static char* proxy_session_state_names[] = {
|
|||||||
|
|
||||||
static inline int proxy_state_upstream(int state)
|
static inline int proxy_state_upstream(int state)
|
||||||
{
|
{
|
||||||
return state == CONNECT_TO_UPSTREAM || state == READ_INIT_FROM_UPSTREAM ||
|
return state == CONNECT_TO_UPSTREAM || state == READ_INIT_FROM_UPSTREAM
|
||||||
state == WRITE_TO_UPSTREAM || state == READ_FROM_UPSTREAM;
|
|| state == WRITE_TO_UPSTREAM || state == READ_FROM_UPSTREAM;
|
||||||
}
|
}
|
||||||
|
|
||||||
int proxy_prefetch_for_request(struct proxier *proxy, int state)
|
int proxy_prefetch_for_request(struct proxier *proxy, int state)
|
||||||
@@ -318,8 +309,10 @@ int proxy_prefetch_for_request( struct proxier* proxy, int state )
|
|||||||
struct nbd_request *req = &proxy->req_hdr;
|
struct nbd_request *req = &proxy->req_hdr;
|
||||||
struct nbd_reply *rsp = &proxy->rsp_hdr;
|
struct nbd_reply *rsp = &proxy->rsp_hdr;
|
||||||
|
|
||||||
struct nbd_request_raw* req_raw = (struct nbd_request_raw*) proxy->req.buf;
|
struct nbd_request_raw *req_raw =
|
||||||
struct nbd_reply_raw *rsp_raw = (struct nbd_reply_raw*) proxy->rsp.buf;
|
(struct nbd_request_raw *) proxy->req.buf;
|
||||||
|
struct nbd_reply_raw *rsp_raw =
|
||||||
|
(struct nbd_reply_raw *) proxy->rsp.buf;
|
||||||
|
|
||||||
int is_read = req->type == REQUEST_READ;
|
int is_read = req->type == REQUEST_READ;
|
||||||
|
|
||||||
@@ -340,11 +333,8 @@ int proxy_prefetch_for_request( struct proxier* proxy, int state )
|
|||||||
nbd_h2r_reply(rsp, rsp_raw);
|
nbd_h2r_reply(rsp, rsp_raw);
|
||||||
|
|
||||||
/* and the data */
|
/* and the data */
|
||||||
memcpy(
|
memcpy(proxy->rsp.buf + NBD_REPLY_SIZE,
|
||||||
proxy->rsp.buf + NBD_REPLY_SIZE,
|
prefetch_offset(proxy->prefetch, req->from), req->len);
|
||||||
prefetch_offset( proxy->prefetch, req->from ),
|
|
||||||
req->len
|
|
||||||
);
|
|
||||||
|
|
||||||
proxy->rsp.size = NBD_REPLY_SIZE + req->len;
|
proxy->rsp.size = NBD_REPLY_SIZE + req->len;
|
||||||
proxy->rsp.needle = 0;
|
proxy->rsp.needle = 0;
|
||||||
@@ -352,14 +342,14 @@ int proxy_prefetch_for_request( struct proxier* proxy, int state )
|
|||||||
/* return early, our work here is done */
|
/* return early, our work here is done */
|
||||||
return WRITE_TO_DOWNSTREAM;
|
return WRITE_TO_DOWNSTREAM;
|
||||||
}
|
}
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
/* Safety catch. If we're sending a write request, we
|
/* Safety catch. If we're sending a write request, we
|
||||||
* blow away the cache. This is very pessimistic, but
|
* blow away the cache. This is very pessimistic, but
|
||||||
* it's simpler (and therefore safer) than working out
|
* it's simpler (and therefore safer) than working out
|
||||||
* whether we can keep it or not.
|
* whether we can keep it or not.
|
||||||
*/
|
*/
|
||||||
debug( "Blowing away prefetch cache on type %d request.", req->type );
|
debug("Blowing away prefetch cache on type %d request.",
|
||||||
|
req->type);
|
||||||
prefetch_set_is_empty(proxy->prefetch);
|
prefetch_set_is_empty(proxy->prefetch);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -407,13 +397,12 @@ int proxy_prefetch_for_reply( struct proxier* proxy, int state )
|
|||||||
prefetched_bytes = proxy->req_hdr.len - proxy->prefetch_req_orig_len;
|
prefetched_bytes = proxy->req_hdr.len - proxy->prefetch_req_orig_len;
|
||||||
|
|
||||||
debug("Prefetched additional %d bytes", prefetched_bytes);
|
debug("Prefetched additional %d bytes", prefetched_bytes);
|
||||||
memcpy(
|
memcpy(proxy->prefetch->buffer,
|
||||||
proxy->prefetch->buffer,
|
|
||||||
proxy->rsp.buf + proxy->prefetch_req_orig_len + NBD_REPLY_SIZE,
|
proxy->rsp.buf + proxy->prefetch_req_orig_len + NBD_REPLY_SIZE,
|
||||||
prefetched_bytes
|
prefetched_bytes);
|
||||||
);
|
|
||||||
|
|
||||||
proxy->prefetch->from = proxy->req_hdr.from + proxy->prefetch_req_orig_len;
|
proxy->prefetch->from =
|
||||||
|
proxy->req_hdr.from + proxy->prefetch_req_orig_len;
|
||||||
proxy->prefetch->len = prefetched_bytes;
|
proxy->prefetch->len = prefetched_bytes;
|
||||||
|
|
||||||
/* We've finished with proxy->req by now, so don't need to alter it to make
|
/* We've finished with proxy->req by now, so don't need to alter it to make
|
||||||
@@ -436,12 +425,14 @@ int proxy_read_from_downstream( struct proxier *proxy, int state )
|
|||||||
{
|
{
|
||||||
ssize_t count;
|
ssize_t count;
|
||||||
|
|
||||||
struct nbd_request_raw* request_raw = (struct nbd_request_raw*) proxy->req.buf;
|
struct nbd_request_raw *request_raw =
|
||||||
|
(struct nbd_request_raw *) proxy->req.buf;
|
||||||
struct nbd_request *request = &(proxy->req_hdr);
|
struct nbd_request *request = &(proxy->req_hdr);
|
||||||
|
|
||||||
// assert( state == READ_FROM_DOWNSTREAM );
|
// assert( state == READ_FROM_DOWNSTREAM );
|
||||||
|
|
||||||
count = iobuf_read( proxy->downstream_fd, &proxy->req, NBD_REQUEST_SIZE );
|
count =
|
||||||
|
iobuf_read(proxy->downstream_fd, &proxy->req, NBD_REQUEST_SIZE);
|
||||||
|
|
||||||
if (count == -1) {
|
if (count == -1) {
|
||||||
warn(SHOW_ERRNO("Couldn't read request from downstream"));
|
warn(SHOW_ERRNO("Couldn't read request from downstream"));
|
||||||
@@ -462,13 +453,15 @@ int proxy_read_from_downstream( struct proxier *proxy, int state )
|
|||||||
*/
|
*/
|
||||||
if (request->type == REQUEST_READ) {
|
if (request->type == REQUEST_READ) {
|
||||||
if (request->len > NBD_MAX_SIZE) {
|
if (request->len > NBD_MAX_SIZE) {
|
||||||
warn( "NBD read request size %"PRIu32" too large", request->len );
|
warn("NBD read request size %" PRIu32 " too large",
|
||||||
|
request->len);
|
||||||
return EXIT;
|
return EXIT;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (request->type == REQUEST_WRITE) {
|
if (request->type == REQUEST_WRITE) {
|
||||||
if (request->len > NBD_MAX_SIZE) {
|
if (request->len > NBD_MAX_SIZE) {
|
||||||
warn( "NBD write request size %"PRIu32" too large", request->len );
|
warn("NBD write request size %" PRIu32 " too large",
|
||||||
|
request->len);
|
||||||
return EXIT;
|
return EXIT;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -477,10 +470,9 @@ int proxy_read_from_downstream( struct proxier *proxy, int state )
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (proxy->req.needle == proxy->req.size) {
|
if (proxy->req.needle == proxy->req.size) {
|
||||||
debug(
|
debug("Received NBD request from downstream. type=%" PRIu16
|
||||||
"Received NBD request from downstream. type=%"PRIu16" flags=%"PRIu16" from=%"PRIu64" len=%"PRIu32,
|
" flags=%" PRIu16 " from=%" PRIu64 " len=%" PRIu32,
|
||||||
request->type, request->flags, request->from, request->len
|
request->type, request->flags, request->from, request->len);
|
||||||
);
|
|
||||||
|
|
||||||
/* Finished reading, so advance state. Leave size untouched so the next
|
/* Finished reading, so advance state. Leave size untouched so the next
|
||||||
* state knows how many bytes to write */
|
* state knows how many bytes to write */
|
||||||
@@ -498,9 +490,8 @@ int proxy_continue_connecting_to_upstream( struct proxier* proxy, int state )
|
|||||||
|
|
||||||
// assert( state == CONNECT_TO_UPSTREAM );
|
// assert( state == CONNECT_TO_UPSTREAM );
|
||||||
|
|
||||||
result = getsockopt(
|
result =
|
||||||
proxy->upstream_fd, SOL_SOCKET, SO_ERROR, &error, &len
|
getsockopt(proxy->upstream_fd, SOL_SOCKET, SO_ERROR, &error, &len);
|
||||||
);
|
|
||||||
|
|
||||||
if (result == -1) {
|
if (result == -1) {
|
||||||
warn(SHOW_ERRNO("Failed to tell if connected to upstream"));
|
warn(SHOW_ERRNO("Failed to tell if connected to upstream"));
|
||||||
@@ -526,7 +517,9 @@ int proxy_read_init_from_upstream( struct proxier* proxy, int state )
|
|||||||
|
|
||||||
// assert( state == READ_INIT_FROM_UPSTREAM );
|
// assert( state == READ_INIT_FROM_UPSTREAM );
|
||||||
|
|
||||||
count = iobuf_read( proxy->upstream_fd, &proxy->init, sizeof( struct nbd_init_raw ) );
|
count =
|
||||||
|
iobuf_read(proxy->upstream_fd, &proxy->init,
|
||||||
|
sizeof(struct nbd_init_raw));
|
||||||
|
|
||||||
if (count == -1) {
|
if (count == -1) {
|
||||||
warn(SHOW_ERRNO("Failed to read init from upstream"));
|
warn(SHOW_ERRNO("Failed to read init from upstream"));
|
||||||
@@ -536,13 +529,16 @@ int proxy_read_init_from_upstream( struct proxier* proxy, int state )
|
|||||||
if (proxy->init.needle == proxy->init.size) {
|
if (proxy->init.needle == proxy->init.size) {
|
||||||
uint64_t upstream_size;
|
uint64_t upstream_size;
|
||||||
uint32_t upstream_flags;
|
uint32_t upstream_flags;
|
||||||
if ( !nbd_check_hello( (struct nbd_init_raw*) proxy->init.buf, &upstream_size, &upstream_flags ) ) {
|
if (!nbd_check_hello
|
||||||
|
((struct nbd_init_raw *) proxy->init.buf, &upstream_size,
|
||||||
|
&upstream_flags)) {
|
||||||
warn("Upstream sent invalid init");
|
warn("Upstream sent invalid init");
|
||||||
goto disconnect;
|
goto disconnect;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* record the flags, and log the reconnection, set TCP_NODELAY */
|
/* record the flags, and log the reconnection, set TCP_NODELAY */
|
||||||
proxy_finish_connect_to_upstream( proxy, upstream_size, upstream_flags );
|
proxy_finish_connect_to_upstream(proxy, upstream_size,
|
||||||
|
upstream_flags);
|
||||||
|
|
||||||
/* Currently, we only get disconnected from upstream (so needing to come
|
/* Currently, we only get disconnected from upstream (so needing to come
|
||||||
* here) when we have an outstanding request. If that becomes false,
|
* here) when we have an outstanding request. If that becomes false,
|
||||||
@@ -607,7 +603,8 @@ int proxy_read_from_upstream( struct proxier* proxy, int state )
|
|||||||
ssize_t count;
|
ssize_t count;
|
||||||
|
|
||||||
struct nbd_reply *reply = &(proxy->rsp_hdr);
|
struct nbd_reply *reply = &(proxy->rsp_hdr);
|
||||||
struct nbd_reply_raw* reply_raw = (struct nbd_reply_raw*) proxy->rsp.buf;
|
struct nbd_reply_raw *reply_raw =
|
||||||
|
(struct nbd_reply_raw *) proxy->rsp.buf;
|
||||||
|
|
||||||
/* We can't assume the NBD_REPLY_SIZE + req->len is what we'll get back */
|
/* We can't assume the NBD_REPLY_SIZE + req->len is what we'll get back */
|
||||||
count = iobuf_read(proxy->upstream_fd, &proxy->rsp, NBD_REPLY_SIZE);
|
count = iobuf_read(proxy->upstream_fd, &proxy->rsp, NBD_REPLY_SIZE);
|
||||||
@@ -701,7 +698,8 @@ void proxy_session( struct proxier* proxy )
|
|||||||
|
|
||||||
|
|
||||||
/* First action: Write hello to downstream */
|
/* First action: Write hello to downstream */
|
||||||
nbd_hello_to_buf( (struct nbd_init_raw *) proxy->rsp.buf, proxy->upstream_size, proxy->upstream_flags );
|
nbd_hello_to_buf((struct nbd_init_raw *) proxy->rsp.buf,
|
||||||
|
proxy->upstream_size, proxy->upstream_flags);
|
||||||
proxy->rsp.size = sizeof(struct nbd_init_raw);
|
proxy->rsp.size = sizeof(struct nbd_init_raw);
|
||||||
proxy->rsp.needle = 0;
|
proxy->rsp.needle = 0;
|
||||||
state = WRITE_TO_DOWNSTREAM;
|
state = WRITE_TO_DOWNSTREAM;
|
||||||
@@ -729,13 +727,13 @@ void proxy_session( struct proxier* proxy )
|
|||||||
if (state != old_state) {
|
if (state != old_state) {
|
||||||
state_started = monotonic_time_ms();
|
state_started = monotonic_time_ms();
|
||||||
|
|
||||||
debug(
|
debug("State transition from %s to %s",
|
||||||
"State transition from %s to %s",
|
|
||||||
proxy_session_state_names[old_state],
|
proxy_session_state_names[old_state],
|
||||||
proxy_session_state_names[state]
|
proxy_session_state_names[state]
|
||||||
);
|
);
|
||||||
} else {
|
} else {
|
||||||
debug( "Proxy is in state %s", proxy_session_state_names[state], state );
|
debug("Proxy is in state %s", proxy_session_state_names[state],
|
||||||
|
state);
|
||||||
}
|
}
|
||||||
|
|
||||||
old_state = state;
|
old_state = state;
|
||||||
@@ -780,7 +778,9 @@ void proxy_session( struct proxier* proxy )
|
|||||||
select_timeout_ptr = &select_timeout;
|
select_timeout_ptr = &select_timeout;
|
||||||
}
|
}
|
||||||
|
|
||||||
result = sock_try_select( FD_SETSIZE, &rfds, &wfds, NULL, select_timeout_ptr );
|
result =
|
||||||
|
sock_try_select(FD_SETSIZE, &rfds, &wfds, NULL,
|
||||||
|
select_timeout_ptr);
|
||||||
|
|
||||||
if (result == -1) {
|
if (result == -1) {
|
||||||
warn(SHOW_ERRNO("select() failed: "));
|
warn(SHOW_ERRNO("select() failed: "));
|
||||||
@@ -806,7 +806,8 @@ void proxy_session( struct proxier* proxy )
|
|||||||
break;
|
break;
|
||||||
case CONNECT_TO_UPSTREAM:
|
case CONNECT_TO_UPSTREAM:
|
||||||
if (FD_ISSET(proxy->upstream_fd, &wfds)) {
|
if (FD_ISSET(proxy->upstream_fd, &wfds)) {
|
||||||
state = proxy_continue_connecting_to_upstream( proxy, state );
|
state =
|
||||||
|
proxy_continue_connecting_to_upstream(proxy, state);
|
||||||
}
|
}
|
||||||
/* Leaving state untouched will retry connecting to upstream -
|
/* Leaving state untouched will retry connecting to upstream -
|
||||||
* so introduce a bit of sleep */
|
* so introduce a bit of sleep */
|
||||||
@@ -848,9 +849,7 @@ void proxy_session( struct proxier* proxy )
|
|||||||
*/
|
*/
|
||||||
if (old_state == state && proxy_state_upstream(state)) {
|
if (old_state == state && proxy_state_upstream(state)) {
|
||||||
if ((monotonic_time_ms()) - state_started > UPSTREAM_TIMEOUT) {
|
if ((monotonic_time_ms()) - state_started > UPSTREAM_TIMEOUT) {
|
||||||
warn(
|
warn("Timed out in state %s while communicating with upstream", proxy_session_state_names[state]
|
||||||
"Timed out in state %s while communicating with upstream",
|
|
||||||
proxy_session_state_names[state]
|
|
||||||
);
|
);
|
||||||
state = CONNECT_TO_UPSTREAM;
|
state = CONNECT_TO_UPSTREAM;
|
||||||
|
|
||||||
@@ -864,10 +863,8 @@ void proxy_session( struct proxier* proxy )
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
info(
|
info("Finished proxy session on fd %i after %" PRIu64
|
||||||
"Finished proxy session on fd %i after %"PRIu64" successful request(s)",
|
" successful request(s)", proxy->downstream_fd, proxy->req_count);
|
||||||
proxy->downstream_fd, proxy->req_count
|
|
||||||
);
|
|
||||||
|
|
||||||
/* Reset these two for the next session */
|
/* Reset these two for the next session */
|
||||||
proxy->req_count = 0;
|
proxy->req_count = 0;
|
||||||
@@ -892,13 +889,13 @@ int proxy_accept( struct proxier* params )
|
|||||||
FD_ZERO(&fds);
|
FD_ZERO(&fds);
|
||||||
FD_SET(params->listen_fd, &fds);
|
FD_SET(params->listen_fd, &fds);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(sock_try_select(FD_SETSIZE, &fds, NULL, NULL, NULL),
|
||||||
sock_try_select(FD_SETSIZE, &fds, NULL, NULL, NULL),
|
|
||||||
SHOW_ERRNO("select() failed")
|
SHOW_ERRNO("select() failed")
|
||||||
);
|
);
|
||||||
|
|
||||||
if (FD_ISSET(params->listen_fd, &fds)) {
|
if (FD_ISSET(params->listen_fd, &fds)) {
|
||||||
client_fd = accept( params->listen_fd, &client_address.generic, &socklen );
|
client_fd =
|
||||||
|
accept(params->listen_fd, &client_address.generic, &socklen);
|
||||||
|
|
||||||
if (client_address.family != AF_UNIX) {
|
if (client_address.family != AF_UNIX) {
|
||||||
if (sock_set_tcp_nodelay(client_fd, 1) == -1) {
|
if (sock_set_tcp_nodelay(client_fd, 1) == -1) {
|
||||||
@@ -911,11 +908,9 @@ int proxy_accept( struct proxier* params )
|
|||||||
params->downstream_fd = client_fd;
|
params->downstream_fd = client_fd;
|
||||||
proxy_session(params);
|
proxy_session(params);
|
||||||
|
|
||||||
WARN_IF_NEGATIVE(
|
WARN_IF_NEGATIVE(sock_try_close(params->downstream_fd),
|
||||||
sock_try_close( params->downstream_fd ),
|
|
||||||
"Couldn't close() downstram fd %i after proxy session",
|
"Couldn't close() downstram fd %i after proxy session",
|
||||||
params->downstream_fd
|
params->downstream_fd);
|
||||||
);
|
|
||||||
params->downstream_fd = -1;
|
params->downstream_fd = -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -940,33 +935,31 @@ void proxy_cleanup( struct proxier* proxy )
|
|||||||
|
|
||||||
if (AF_UNIX == proxy->listen_on.family) {
|
if (AF_UNIX == proxy->listen_on.family) {
|
||||||
if (-1 == unlink(proxy->listen_on.un.sun_path)) {
|
if (-1 == unlink(proxy->listen_on.un.sun_path)) {
|
||||||
warn( SHOW_ERRNO( "Failed to unlink %s", proxy->listen_on.un.sun_path ) );
|
warn(SHOW_ERRNO
|
||||||
|
("Failed to unlink %s",
|
||||||
|
proxy->listen_on.un.sun_path));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
WARN_IF_NEGATIVE(
|
WARN_IF_NEGATIVE(sock_try_close(proxy->listen_fd),
|
||||||
sock_try_close( proxy->listen_fd ),
|
SHOW_ERRNO("Failed to close() listen fd %i",
|
||||||
SHOW_ERRNO( "Failed to close() listen fd %i", proxy->listen_fd )
|
proxy->listen_fd)
|
||||||
);
|
);
|
||||||
proxy->listen_fd = -1;
|
proxy->listen_fd = -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (-1 != proxy->downstream_fd) {
|
if (-1 != proxy->downstream_fd) {
|
||||||
WARN_IF_NEGATIVE(
|
WARN_IF_NEGATIVE(sock_try_close(proxy->downstream_fd),
|
||||||
sock_try_close( proxy->downstream_fd ),
|
SHOW_ERRNO("Failed to close() downstream fd %i",
|
||||||
SHOW_ERRNO(
|
proxy->downstream_fd)
|
||||||
"Failed to close() downstream fd %i", proxy->downstream_fd
|
|
||||||
)
|
|
||||||
);
|
);
|
||||||
proxy->downstream_fd = -1;
|
proxy->downstream_fd = -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (-1 != proxy->upstream_fd) {
|
if (-1 != proxy->upstream_fd) {
|
||||||
WARN_IF_NEGATIVE(
|
WARN_IF_NEGATIVE(sock_try_close(proxy->upstream_fd),
|
||||||
sock_try_close( proxy->upstream_fd ),
|
SHOW_ERRNO("Failed to close() upstream fd %i",
|
||||||
SHOW_ERRNO(
|
proxy->upstream_fd)
|
||||||
"Failed to close() upstream fd %i", proxy->upstream_fd
|
|
||||||
)
|
|
||||||
);
|
);
|
||||||
proxy->upstream_fd = -1;
|
proxy->upstream_fd = -1;
|
||||||
}
|
}
|
||||||
@@ -993,4 +986,3 @@ int do_proxy( struct proxier* params )
|
|||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -85,16 +85,13 @@ struct proxier {
|
|||||||
/** */
|
/** */
|
||||||
};
|
};
|
||||||
|
|
||||||
struct proxier* proxy_create(
|
struct proxier *proxy_create(char *s_downstream_address,
|
||||||
char* s_downstream_address,
|
|
||||||
char *s_downstream_port,
|
char *s_downstream_port,
|
||||||
char *s_upstream_address,
|
char *s_upstream_address,
|
||||||
char *s_upstream_port,
|
char *s_upstream_port,
|
||||||
char* s_upstream_bind,
|
char *s_upstream_bind, char *s_cache_bytes);
|
||||||
char* s_cache_bytes);
|
|
||||||
int do_proxy(struct proxier *proxy);
|
int do_proxy(struct proxier *proxy);
|
||||||
void proxy_cleanup(struct proxier *proxy);
|
void proxy_cleanup(struct proxier *proxy);
|
||||||
void proxy_destroy(struct proxier *proxy);
|
void proxy_destroy(struct proxier *proxy);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -22,7 +22,9 @@ static int testmasks[9] = { 0,128,192,224,240,248,252,254,255 };
|
|||||||
/** Test whether AF_INET or AF_INET6 sockaddr is included in the given access
|
/** Test whether AF_INET or AF_INET6 sockaddr is included in the given access
|
||||||
* control list, returning 1 if it is, and 0 if not.
|
* control list, returning 1 if it is, and 0 if not.
|
||||||
*/
|
*/
|
||||||
static int is_included_in_acl(int list_length, struct ip_and_mask (*list)[], union mysockaddr* test)
|
static int is_included_in_acl(int list_length,
|
||||||
|
struct ip_and_mask (*list)[],
|
||||||
|
union mysockaddr *test)
|
||||||
{
|
{
|
||||||
NULLCHECK(test);
|
NULLCHECK(test);
|
||||||
|
|
||||||
@@ -33,7 +35,8 @@ static int is_included_in_acl(int list_length, struct ip_and_mask (*list)[], uni
|
|||||||
int testbits;
|
int testbits;
|
||||||
unsigned char *raw_address1 = NULL, *raw_address2 = NULL;
|
unsigned char *raw_address1 = NULL, *raw_address2 = NULL;
|
||||||
|
|
||||||
debug("checking acl entry %d (%d/%d)", i, test->generic.sa_family, entry->ip.family);
|
debug("checking acl entry %d (%d/%d)", i, test->generic.sa_family,
|
||||||
|
entry->ip.family);
|
||||||
|
|
||||||
if (test->generic.sa_family != entry->ip.family) {
|
if (test->generic.sa_family != entry->ip.family) {
|
||||||
continue;
|
continue;
|
||||||
@@ -43,24 +46,24 @@ static int is_included_in_acl(int list_length, struct ip_and_mask (*list)[], uni
|
|||||||
debug("it's an AF_INET");
|
debug("it's an AF_INET");
|
||||||
raw_address1 = (unsigned char *) &test->v4.sin_addr;
|
raw_address1 = (unsigned char *) &test->v4.sin_addr;
|
||||||
raw_address2 = (unsigned char *) &entry->ip.v4.sin_addr;
|
raw_address2 = (unsigned char *) &entry->ip.v4.sin_addr;
|
||||||
}
|
} else if (test->generic.sa_family == AF_INET6) {
|
||||||
else if (test->generic.sa_family == AF_INET6) {
|
|
||||||
debug("it's an AF_INET6");
|
debug("it's an AF_INET6");
|
||||||
raw_address1 = (unsigned char *) &test->v6.sin6_addr;
|
raw_address1 = (unsigned char *) &test->v6.sin6_addr;
|
||||||
raw_address2 = (unsigned char *) &entry->ip.v6.sin6_addr;
|
raw_address2 = (unsigned char *) &entry->ip.v6.sin6_addr;
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
fatal("Can't check an ACL for this address type.");
|
fatal("Can't check an ACL for this address type.");
|
||||||
}
|
}
|
||||||
|
|
||||||
debug("testbits=%d", entry->mask);
|
debug("testbits=%d", entry->mask);
|
||||||
|
|
||||||
for (testbits = entry->mask; testbits > 0; testbits -= 8) {
|
for (testbits = entry->mask; testbits > 0; testbits -= 8) {
|
||||||
debug("testbits=%d, c1=%02x, c2=%02x", testbits, raw_address1[0], raw_address2[0]);
|
debug("testbits=%d, c1=%02x, c2=%02x", testbits,
|
||||||
|
raw_address1[0], raw_address2[0]);
|
||||||
if (testbits >= 8) {
|
if (testbits >= 8) {
|
||||||
if (raw_address1[0] != raw_address2[0]) { goto no_match; }
|
if (raw_address1[0] != raw_address2[0]) {
|
||||||
|
goto no_match;
|
||||||
}
|
}
|
||||||
else {
|
} else {
|
||||||
if ((raw_address1[0] & testmasks[testbits % 8]) !=
|
if ((raw_address1[0] & testmasks[testbits % 8]) !=
|
||||||
(raw_address2[0] & testmasks[testbits % 8])) {
|
(raw_address2[0] & testmasks[testbits % 8])) {
|
||||||
goto no_match;
|
goto no_match;
|
||||||
@@ -86,8 +89,7 @@ int acl_includes( struct acl * acl, union mysockaddr * addr )
|
|||||||
|
|
||||||
if (0 == acl->len) {
|
if (0 == acl->len) {
|
||||||
return !(acl->default_deny);
|
return !(acl->default_deny);
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
return is_included_in_acl(acl->len, acl->entries, addr);
|
return is_included_in_acl(acl->len, acl->entries, addr);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -105,4 +107,3 @@ void acl_destroy( struct acl * acl )
|
|||||||
acl->entries = NULL;
|
acl->entries = NULL;
|
||||||
free(acl);
|
free(acl);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -30,30 +30,41 @@ typedef bitfield_word_t * bitfield_p;
|
|||||||
((_bytes + (BITFIELD_WORD_SIZE-1)) / BITFIELD_WORD_SIZE)
|
((_bytes + (BITFIELD_WORD_SIZE-1)) / BITFIELD_WORD_SIZE)
|
||||||
|
|
||||||
/** Return the bit value ''idx'' in array ''b'' */
|
/** Return the bit value ''idx'' in array ''b'' */
|
||||||
static inline int bit_get(bitfield_p b, uint64_t idx) {
|
static inline int bit_get(bitfield_p b, uint64_t idx)
|
||||||
|
{
|
||||||
return (BIT_WORD(b, idx) >> (idx & (BITS_PER_WORD - 1))) & 1;
|
return (BIT_WORD(b, idx) >> (idx & (BITS_PER_WORD - 1))) & 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Return 1 if the bit at ''idx'' in array ''b'' is set */
|
/** Return 1 if the bit at ''idx'' in array ''b'' is set */
|
||||||
static inline int bit_is_set(bitfield_p b, uint64_t idx) {
|
static inline int bit_is_set(bitfield_p b, uint64_t idx)
|
||||||
|
{
|
||||||
return bit_get(b, idx);
|
return bit_get(b, idx);
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Return 1 if the bit at ''idx'' in array ''b'' is clear */
|
/** Return 1 if the bit at ''idx'' in array ''b'' is clear */
|
||||||
static inline int bit_is_clear(bitfield_p b, uint64_t idx) {
|
static inline int bit_is_clear(bitfield_p b, uint64_t idx)
|
||||||
|
{
|
||||||
return !bit_get(b, idx);
|
return !bit_get(b, idx);
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Tests whether the bit at ''idx'' in array ''b'' has value ''value'' */
|
/** Tests whether the bit at ''idx'' in array ''b'' has value ''value'' */
|
||||||
static inline int bit_has_value(bitfield_p b, uint64_t idx, int value) {
|
static inline int bit_has_value(bitfield_p b, uint64_t idx, int value)
|
||||||
|
{
|
||||||
return bit_get(b, idx) == ! !value;
|
return bit_get(b, idx) == ! !value;
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Sets the bit ''idx'' in array ''b'' */
|
/** Sets the bit ''idx'' in array ''b'' */
|
||||||
static inline void bit_set(bitfield_p b, uint64_t idx) {
|
static inline void bit_set(bitfield_p b, uint64_t idx)
|
||||||
|
{
|
||||||
BIT_WORD(b, idx) |= BIT_MASK(idx);
|
BIT_WORD(b, idx) |= BIT_MASK(idx);
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Clears the bit ''idx'' in array ''b'' */
|
/** Clears the bit ''idx'' in array ''b'' */
|
||||||
static inline void bit_clear(bitfield_p b, uint64_t idx) {
|
static inline void bit_clear(bitfield_p b, uint64_t idx)
|
||||||
|
{
|
||||||
BIT_WORD(b, idx) &= ~BIT_MASK(idx);
|
BIT_WORD(b, idx) &= ~BIT_MASK(idx);
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Sets ''len'' bits in array ''b'' starting at offset ''from'' */
|
/** Sets ''len'' bits in array ''b'' starting at offset ''from'' */
|
||||||
static inline void bit_set_range(bitfield_p b, uint64_t from, uint64_t len)
|
static inline void bit_set_range(bitfield_p b, uint64_t from, uint64_t len)
|
||||||
{
|
{
|
||||||
@@ -72,8 +83,10 @@ static inline void bit_set_range(bitfield_p b, uint64_t from, uint64_t len)
|
|||||||
bit_set(b, from++);
|
bit_set(b, from++);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/** Clears ''len'' bits in array ''b'' starting at offset ''from'' */
|
/** Clears ''len'' bits in array ''b'' starting at offset ''from'' */
|
||||||
static inline void bit_clear_range(bitfield_p b, uint64_t from, uint64_t len)
|
static inline void bit_clear_range(bitfield_p b, uint64_t from,
|
||||||
|
uint64_t len)
|
||||||
{
|
{
|
||||||
for (; (from % BITS_PER_WORD) != 0 && len > 0; len--) {
|
for (; (from % BITS_PER_WORD) != 0 && len > 0; len--) {
|
||||||
bit_clear(b, from++);
|
bit_clear(b, from++);
|
||||||
@@ -96,7 +109,9 @@ static inline void bit_clear_range(bitfield_p b, uint64_t from, uint64_t len)
|
|||||||
* bits that are the same as the first one specified. If ''run_is_set'' is
|
* bits that are the same as the first one specified. If ''run_is_set'' is
|
||||||
* non-NULL, the value of that bit is placed into it.
|
* non-NULL, the value of that bit is placed into it.
|
||||||
*/
|
*/
|
||||||
static inline uint64_t bit_run_count(bitfield_p b, uint64_t from, uint64_t len, int *run_is_set) {
|
static inline uint64_t bit_run_count(bitfield_p b, uint64_t from,
|
||||||
|
uint64_t len, int *run_is_set)
|
||||||
|
{
|
||||||
uint64_t count = 0;
|
uint64_t count = 0;
|
||||||
int first_value = bit_get(b, from);
|
int first_value = bit_get(b, from);
|
||||||
bitfield_word_t word_match = first_value ? -1 : 0;
|
bitfield_word_t word_match = first_value ? -1 : 0;
|
||||||
@@ -185,8 +200,10 @@ static inline struct bitset *bitset_alloc( uint64_t size, int resolution )
|
|||||||
// calculate a size to allocate that is a multiple of the size of the
|
// calculate a size to allocate that is a multiple of the size of the
|
||||||
// bitfield word
|
// bitfield word
|
||||||
size_t bitfield_size =
|
size_t bitfield_size =
|
||||||
BIT_WORDS_FOR_SIZE((( size + resolution - 1 ) / resolution)) * sizeof( bitfield_word_t );
|
BIT_WORDS_FOR_SIZE(((size + resolution -
|
||||||
struct bitset *bitset = xmalloc(sizeof( struct bitset ) + ( bitfield_size / 8 ) );
|
1) / resolution)) * sizeof(bitfield_word_t);
|
||||||
|
struct bitset *bitset =
|
||||||
|
xmalloc(sizeof(struct bitset) + (bitfield_size / 8));
|
||||||
|
|
||||||
bitset->size = size;
|
bitset->size = size;
|
||||||
bitset->resolution = resolution;
|
bitset->resolution = resolution;
|
||||||
@@ -224,12 +241,9 @@ static inline void bitset_free( struct bitset * set )
|
|||||||
FATAL_IF_NEGATIVE(pthread_mutex_unlock(&set->lock), "Error unlocking bitset")
|
FATAL_IF_NEGATIVE(pthread_mutex_unlock(&set->lock), "Error unlocking bitset")
|
||||||
|
|
||||||
|
|
||||||
static inline void bitset_stream_enqueue(
|
static inline void bitset_stream_enqueue(struct bitset *set,
|
||||||
struct bitset * set,
|
|
||||||
enum bitset_stream_events event,
|
enum bitset_stream_events event,
|
||||||
uint64_t from,
|
uint64_t from, uint64_t len)
|
||||||
uint64_t len
|
|
||||||
)
|
|
||||||
{
|
{
|
||||||
struct bitset_stream *stream = set->stream;
|
struct bitset_stream *stream = set->stream;
|
||||||
|
|
||||||
@@ -254,10 +268,8 @@ static inline void bitset_stream_enqueue(
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline void bitset_stream_dequeue(
|
static inline void bitset_stream_dequeue(struct bitset *set,
|
||||||
struct bitset * set,
|
struct bitset_stream_entry *out)
|
||||||
struct bitset_stream_entry * out
|
|
||||||
)
|
|
||||||
{
|
{
|
||||||
struct bitset_stream *stream = set->stream;
|
struct bitset_stream *stream = set->stream;
|
||||||
struct bitset_stream_entry *dequeued;
|
struct bitset_stream_entry *dequeued;
|
||||||
@@ -298,10 +310,9 @@ static inline size_t bitset_stream_size( struct bitset * set )
|
|||||||
return size;
|
return size;
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline uint64_t bitset_stream_queued_bytes(
|
static inline uint64_t bitset_stream_queued_bytes(struct bitset *set,
|
||||||
struct bitset * set,
|
enum bitset_stream_events
|
||||||
enum bitset_stream_events event
|
event)
|
||||||
)
|
|
||||||
{
|
{
|
||||||
uint64_t total;
|
uint64_t total;
|
||||||
|
|
||||||
@@ -331,10 +342,8 @@ static inline void bitset_disable_stream( struct bitset * set )
|
|||||||
/** Set the bits in a bitset which correspond to the given bytes in the larger
|
/** Set the bits in a bitset which correspond to the given bytes in the larger
|
||||||
* file.
|
* file.
|
||||||
*/
|
*/
|
||||||
static inline void bitset_set_range(
|
static inline void bitset_set_range(struct bitset *set,
|
||||||
struct bitset * set,
|
uint64_t from, uint64_t len)
|
||||||
uint64_t from,
|
|
||||||
uint64_t len)
|
|
||||||
{
|
{
|
||||||
INT_FIRST_AND_LAST;
|
INT_FIRST_AND_LAST;
|
||||||
BITSET_LOCK;
|
BITSET_LOCK;
|
||||||
@@ -357,10 +366,8 @@ static inline void bitset_set( struct bitset * set )
|
|||||||
/** Clear the bits in a bitset which correspond to the given bytes in the
|
/** Clear the bits in a bitset which correspond to the given bytes in the
|
||||||
* larger file.
|
* larger file.
|
||||||
*/
|
*/
|
||||||
static inline void bitset_clear_range(
|
static inline void bitset_clear_range(struct bitset *set,
|
||||||
struct bitset * set,
|
uint64_t from, uint64_t len)
|
||||||
uint64_t from,
|
|
||||||
uint64_t len)
|
|
||||||
{
|
{
|
||||||
INT_FIRST_AND_LAST;
|
INT_FIRST_AND_LAST;
|
||||||
BITSET_LOCK;
|
BITSET_LOCK;
|
||||||
@@ -383,12 +390,9 @@ static inline void bitset_clear( struct bitset * set )
|
|||||||
/** As per bitset_run_count but also tells you whether the run it found was set
|
/** As per bitset_run_count but also tells you whether the run it found was set
|
||||||
* or unset, atomically.
|
* or unset, atomically.
|
||||||
*/
|
*/
|
||||||
static inline uint64_t bitset_run_count_ex(
|
static inline uint64_t bitset_run_count_ex(struct bitset *set,
|
||||||
struct bitset * set,
|
|
||||||
uint64_t from,
|
uint64_t from,
|
||||||
uint64_t len,
|
uint64_t len, int *run_is_set)
|
||||||
int* run_is_set
|
|
||||||
)
|
|
||||||
{
|
{
|
||||||
uint64_t run;
|
uint64_t run;
|
||||||
|
|
||||||
@@ -401,7 +405,9 @@ static inline uint64_t bitset_run_count_ex(
|
|||||||
INT_FIRST_AND_LAST;
|
INT_FIRST_AND_LAST;
|
||||||
|
|
||||||
BITSET_LOCK;
|
BITSET_LOCK;
|
||||||
run = bit_run_count(set->bits, first, bitlen, run_is_set) * set->resolution;
|
run =
|
||||||
|
bit_run_count(set->bits, first, bitlen,
|
||||||
|
run_is_set) * set->resolution;
|
||||||
run -= (from % set->resolution);
|
run -= (from % set->resolution);
|
||||||
BITSET_UNLOCK;
|
BITSET_UNLOCK;
|
||||||
|
|
||||||
@@ -411,10 +417,8 @@ static inline uint64_t bitset_run_count_ex(
|
|||||||
/** Counts the number of contiguous bytes that are represented as a run in
|
/** Counts the number of contiguous bytes that are represented as a run in
|
||||||
* the bit field.
|
* the bit field.
|
||||||
*/
|
*/
|
||||||
static inline uint64_t bitset_run_count(
|
static inline uint64_t bitset_run_count(struct bitset *set,
|
||||||
struct bitset * set,
|
uint64_t from, uint64_t len)
|
||||||
uint64_t from,
|
|
||||||
uint64_t len)
|
|
||||||
{
|
{
|
||||||
return bitset_run_count_ex(set, from, len, NULL);
|
return bitset_run_count_ex(set, from, len, NULL);
|
||||||
}
|
}
|
||||||
@@ -435,4 +439,3 @@ static inline int bitset_is_set_at( struct bitset * set, uint64_t at )
|
|||||||
|
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -18,14 +18,16 @@
|
|||||||
|
|
||||||
// When this signal is invoked, we call shutdown() on the client fd, which
|
// When this signal is invoked, we call shutdown() on the client fd, which
|
||||||
// results in the thread being wound up
|
// results in the thread being wound up
|
||||||
void client_killswitch_hit(int signal __attribute__ ((unused)), siginfo_t *info, void *ptr __attribute__ ((unused)))
|
void client_killswitch_hit(int signal
|
||||||
|
__attribute__ ((unused)), siginfo_t * info,
|
||||||
|
void *ptr __attribute__ ((unused)))
|
||||||
{
|
{
|
||||||
int fd = info->si_value.sival_int;
|
int fd = info->si_value.sival_int;
|
||||||
warn("Killswitch for fd %i activated, calling shutdown on socket", fd);
|
warn("Killswitch for fd %i activated, calling shutdown on socket", fd);
|
||||||
|
|
||||||
FATAL_IF(
|
FATAL_IF(-1 == shutdown(fd, SHUT_RDWR),
|
||||||
-1 == shutdown( fd, SHUT_RDWR ),
|
SHOW_ERRNO
|
||||||
SHOW_ERRNO( "Failed to shutdown() the socket, killing the server" )
|
("Failed to shutdown() the socket, killing the server")
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -53,8 +55,8 @@ struct client *client_create( struct server *serve, int socket )
|
|||||||
|
|
||||||
c->stop_signal = self_pipe_create();
|
c->stop_signal = self_pipe_create();
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(timer_create
|
||||||
timer_create( CLOCK_MONOTONIC, &evp, &(c->killswitch) ),
|
(CLOCK_MONOTONIC, &evp, &(c->killswitch)),
|
||||||
SHOW_ERRNO("Failed to create killswitch timer")
|
SHOW_ERRNO("Failed to create killswitch timer")
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -67,7 +69,8 @@ void client_signal_stop( struct client *c)
|
|||||||
{
|
{
|
||||||
NULLCHECK(c);
|
NULLCHECK(c);
|
||||||
|
|
||||||
debug("client %p: signal stop (%d, %d)", c,c->stop_signal->read_fd, c->stop_signal->write_fd );
|
debug("client %p: signal stop (%d, %d)", c, c->stop_signal->read_fd,
|
||||||
|
c->stop_signal->write_fd);
|
||||||
self_pipe_signal(c->stop_signal);
|
self_pipe_signal(c->stop_signal);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -75,8 +78,7 @@ void client_destroy( struct client *client )
|
|||||||
{
|
{
|
||||||
NULLCHECK(client);
|
NULLCHECK(client);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(timer_delete(client->killswitch),
|
||||||
timer_delete( client->killswitch ),
|
|
||||||
SHOW_ERRNO("Couldn't delete killswitch")
|
SHOW_ERRNO("Couldn't delete killswitch")
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -119,7 +121,8 @@ void write_not_zeroes(struct client* client, uint64_t from, uint64_t len)
|
|||||||
|
|
||||||
uint64_t run = bitset_run_count(map, from, len);
|
uint64_t run = bitset_run_count(map, from, len);
|
||||||
|
|
||||||
debug("write_not_zeroes: from=%ld, len=%d, run=%d", from, len, run);
|
debug("write_not_zeroes: from=%ld, len=%d, run=%d", from, len,
|
||||||
|
run);
|
||||||
|
|
||||||
if (run > len) {
|
if (run > len) {
|
||||||
run = len;
|
run = len;
|
||||||
@@ -164,8 +167,7 @@ void write_not_zeroes(struct client* client, uint64_t from, uint64_t len)
|
|||||||
bitset_set_range(map, from, run);
|
bitset_set_range(map, from, run);
|
||||||
len -= run;
|
len -= run;
|
||||||
from += run;
|
from += run;
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
char zerobuffer[block_allocation_resolution];
|
char zerobuffer[block_allocation_resolution];
|
||||||
/* not allocated, read in block_allocation_resoution */
|
/* not allocated, read in block_allocation_resoution */
|
||||||
while (run > 0) {
|
while (run > 0) {
|
||||||
@@ -183,7 +185,8 @@ void write_not_zeroes(struct client* client, uint64_t from, uint64_t len)
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
int all_zeros = (zerobuffer[0] == 0) &&
|
int all_zeros = (zerobuffer[0] == 0) &&
|
||||||
(0 == memcmp( zerobuffer, zerobuffer+1, blockrun-1 ));
|
(0 ==
|
||||||
|
memcmp(zerobuffer, zerobuffer + 1, blockrun - 1));
|
||||||
|
|
||||||
if (!all_zeros) {
|
if (!all_zeros) {
|
||||||
memcpy(client->mapped + from, zerobuffer, blockrun);
|
memcpy(client->mapped + from, zerobuffer, blockrun);
|
||||||
@@ -217,7 +220,8 @@ int fd_read_request( int fd, struct nbd_request_raw *out_request)
|
|||||||
|
|
||||||
/* Returns 1 if *request was filled with a valid request which we should
|
/* Returns 1 if *request was filled with a valid request which we should
|
||||||
* try to honour. 0 otherwise. */
|
* try to honour. 0 otherwise. */
|
||||||
int client_read_request( struct client * client , struct nbd_request *out_request, int * disconnected )
|
int client_read_request(struct client *client,
|
||||||
|
struct nbd_request *out_request, int *disconnected)
|
||||||
{
|
{
|
||||||
NULLCHECK(client);
|
NULLCHECK(client);
|
||||||
NULLCHECK(out_request);
|
NULLCHECK(out_request);
|
||||||
@@ -231,12 +235,10 @@ int client_read_request( struct client * client , struct nbd_request *out_reques
|
|||||||
warn("EOF while reading request");
|
warn("EOF while reading request");
|
||||||
return 0;
|
return 0;
|
||||||
case ECONNRESET:
|
case ECONNRESET:
|
||||||
warn( "Connection reset while"
|
warn("Connection reset while" " reading request");
|
||||||
" reading request" );
|
|
||||||
return 0;
|
return 0;
|
||||||
case ETIMEDOUT:
|
case ETIMEDOUT:
|
||||||
warn( "Connection timed out while"
|
warn("Connection timed out while" " reading request");
|
||||||
" reading request" );
|
|
||||||
return 0;
|
return 0;
|
||||||
default:
|
default:
|
||||||
/* FIXME: I've seen this happen, but I
|
/* FIXME: I've seen this happen, but I
|
||||||
@@ -246,9 +248,7 @@ int client_read_request( struct client * client , struct nbd_request *out_reques
|
|||||||
* again. It should *probably* be an
|
* again. It should *probably* be an
|
||||||
* error() call, but I want to be sure.
|
* error() call, but I want to be sure.
|
||||||
* */
|
* */
|
||||||
fatal("Error reading request: %d, %s",
|
fatal("Error reading request: %d, %s", errno, strerror(errno));
|
||||||
errno,
|
|
||||||
strerror( errno ));
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -293,7 +293,8 @@ int fd_write_reply( int fd, uint64_t handle, int error )
|
|||||||
* Returns 1; we don't check for errors on the write.
|
* Returns 1; we don't check for errors on the write.
|
||||||
* TODO: Check for errors on the write.
|
* TODO: Check for errors on the write.
|
||||||
*/
|
*/
|
||||||
int client_write_reply( struct client * client, struct nbd_request *request, int error )
|
int client_write_reply(struct client *client, struct nbd_request *request,
|
||||||
|
int error)
|
||||||
{
|
{
|
||||||
return fd_write_reply(client->socket, request->handle.w, error);
|
return fd_write_reply(client->socket, request->handle.w, error);
|
||||||
}
|
}
|
||||||
@@ -315,10 +316,9 @@ void client_write_init( struct client * client, uint64_t size )
|
|||||||
|
|
||||||
nbd_h2r_init(&init, &init_raw);
|
nbd_h2r_init(&init, &init_raw);
|
||||||
|
|
||||||
ERROR_IF_NEGATIVE(
|
ERROR_IF_NEGATIVE(writeloop
|
||||||
writeloop(client->socket, &init_raw, sizeof(init_raw)),
|
(client->socket, &init_raw, sizeof(init_raw)),
|
||||||
"Couldn't send hello"
|
"Couldn't send hello");
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@@ -338,23 +338,15 @@ void client_flush( struct client * client, size_t len )
|
|||||||
size_t spliced = 0;
|
size_t spliced = 0;
|
||||||
|
|
||||||
while (spliced < len) {
|
while (spliced < len) {
|
||||||
ssize_t received = splice(
|
ssize_t received = splice(client->socket, NULL,
|
||||||
client->socket, NULL,
|
|
||||||
pipes[1], NULL,
|
pipes[1], NULL,
|
||||||
len - spliced, flags);
|
len - spliced, flags);
|
||||||
FATAL_IF_NEGATIVE( received,
|
FATAL_IF_NEGATIVE(received, "splice error: %s", strerror(errno));
|
||||||
"splice error: %s",
|
|
||||||
strerror(errno));
|
|
||||||
ssize_t junked = 0;
|
ssize_t junked = 0;
|
||||||
while (junked < received) {
|
while (junked < received) {
|
||||||
ssize_t junk;
|
ssize_t junk;
|
||||||
junk = splice(
|
junk = splice(pipes[0], NULL, devnull, NULL, received, flags);
|
||||||
pipes[0], NULL,
|
FATAL_IF_NEGATIVE(junk, "splice error: %s", strerror(errno));
|
||||||
devnull, NULL,
|
|
||||||
received, flags );
|
|
||||||
FATAL_IF_NEGATIVE( junk,
|
|
||||||
"splice error: %s",
|
|
||||||
strerror(errno));
|
|
||||||
junked += junk;
|
junked += junk;
|
||||||
}
|
}
|
||||||
spliced += received;
|
spliced += received;
|
||||||
@@ -386,18 +378,16 @@ int client_request_needs_reply( struct client * client,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
debug(
|
debug("request type=%" PRIu16 ", flags=%" PRIu16 ", from=%" PRIu64
|
||||||
"request type=%"PRIu16", flags=%"PRIu16", from=%"PRIu64", len=%"PRIu32", handle=0x%08X",
|
", len=%" PRIu32 ", handle=0x%08X", request.type, request.flags,
|
||||||
request.type, request.flags, request.from, request.len, request.handle
|
request.from, request.len, request.handle);
|
||||||
);
|
|
||||||
|
|
||||||
/* check it's not out of range. NBD protocol requires ENOSPC to be
|
/* check it's not out of range. NBD protocol requires ENOSPC to be
|
||||||
* returned in this instance
|
* returned in this instance
|
||||||
*/
|
*/
|
||||||
if (request.from + request.len > client->serve->size) {
|
if (request.from + request.len > client->serve->size) {
|
||||||
warn("write request %" PRIu64 "+%" PRIu32 " out of range",
|
warn("write request %" PRIu64 "+%" PRIu32 " out of range",
|
||||||
request.from, request.len
|
request.from, request.len);
|
||||||
);
|
|
||||||
if (request.type == REQUEST_WRITE) {
|
if (request.type == REQUEST_WRITE) {
|
||||||
client_flush(client, request.len);
|
client_flush(client, request.len);
|
||||||
}
|
}
|
||||||
@@ -407,8 +397,7 @@ int client_request_needs_reply( struct client * client,
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
switch (request.type)
|
switch (request.type) {
|
||||||
{
|
|
||||||
case REQUEST_READ:
|
case REQUEST_READ:
|
||||||
break;
|
break;
|
||||||
case REQUEST_WRITE:
|
case REQUEST_WRITE:
|
||||||
@@ -431,7 +420,8 @@ int client_request_needs_reply( struct client * client,
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void client_reply_to_read( struct client* client, struct nbd_request request )
|
void client_reply_to_read(struct client *client,
|
||||||
|
struct nbd_request request)
|
||||||
{
|
{
|
||||||
off64_t offset;
|
off64_t offset;
|
||||||
|
|
||||||
@@ -444,72 +434,69 @@ void client_reply_to_read( struct client* client, struct nbd_request request )
|
|||||||
/* If we get cut off partway through this sendfile, we don't
|
/* If we get cut off partway through this sendfile, we don't
|
||||||
* want to kill the server. This should be an error.
|
* want to kill the server. This should be an error.
|
||||||
*/
|
*/
|
||||||
ERROR_IF_NEGATIVE(
|
ERROR_IF_NEGATIVE(sendfileloop(client->socket,
|
||||||
sendfileloop(
|
|
||||||
client->socket,
|
|
||||||
client->fileno,
|
client->fileno,
|
||||||
&offset,
|
&offset,
|
||||||
request.len),
|
request.len),
|
||||||
"sendfile failed from=%ld, len=%d",
|
"sendfile failed from=%ld, len=%d",
|
||||||
offset,
|
offset, request.len);
|
||||||
request.len);
|
|
||||||
|
|
||||||
sock_set_tcp_cork(client->socket, 0);
|
sock_set_tcp_cork(client->socket, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void client_reply_to_write( struct client* client, struct nbd_request request )
|
void client_reply_to_write(struct client *client,
|
||||||
|
struct nbd_request request)
|
||||||
{
|
{
|
||||||
debug("request write from=%"PRIu64", len=%"PRIu32", handle=0x%08X", request.from, request.len, request.handle);
|
debug("request write from=%" PRIu64 ", len=%" PRIu32 ", handle=0x%08X",
|
||||||
|
request.from, request.len, request.handle);
|
||||||
if (client->serve->allocation_map_built) {
|
if (client->serve->allocation_map_built) {
|
||||||
write_not_zeroes(client, request.from, request.len);
|
write_not_zeroes(client, request.from, request.len);
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
debug("No allocation map, writing directly.");
|
debug("No allocation map, writing directly.");
|
||||||
/* If we get cut off partway through reading this data:
|
/* If we get cut off partway through reading this data:
|
||||||
* */
|
* */
|
||||||
ERROR_IF_NEGATIVE(
|
ERROR_IF_NEGATIVE(readloop(client->socket,
|
||||||
readloop( client->socket,
|
|
||||||
client->mapped + request.from,
|
client->mapped + request.from,
|
||||||
request.len),
|
request.len),
|
||||||
"reading write data failed from=%ld, len=%d",
|
"reading write data failed from=%ld, len=%d",
|
||||||
request.from,
|
request.from, request.len);
|
||||||
request.len
|
|
||||||
);
|
|
||||||
|
|
||||||
/* the allocation_map is shared between client threads, and may be
|
/* the allocation_map is shared between client threads, and may be
|
||||||
* being built. We need to reflect the write in it, as it may be in
|
* being built. We need to reflect the write in it, as it may be in
|
||||||
* a position the builder has already gone over.
|
* a position the builder has already gone over.
|
||||||
*/
|
*/
|
||||||
bitset_set_range(client->serve->allocation_map, request.from, request.len);
|
bitset_set_range(client->serve->allocation_map, request.from,
|
||||||
|
request.len);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Only flush if FUA is set
|
// Only flush if FUA is set
|
||||||
if (request.flags & CMD_FLAG_FUA)
|
if (request.flags & CMD_FLAG_FUA) {
|
||||||
{
|
|
||||||
/* multiple of page size */
|
/* multiple of page size */
|
||||||
uint64_t from_rounded = request.from & (~(sysconf(_SC_PAGE_SIZE)-1));
|
uint64_t from_rounded =
|
||||||
|
request.from & (~(sysconf(_SC_PAGE_SIZE) - 1));
|
||||||
uint64_t len_rounded = request.len + (request.from - from_rounded);
|
uint64_t len_rounded = request.len + (request.from - from_rounded);
|
||||||
debug("Calling msync from=%"PRIu64", len=%"PRIu64"",from_rounded, len_rounded);
|
debug("Calling msync from=%" PRIu64 ", len=%" PRIu64 "",
|
||||||
|
from_rounded, len_rounded);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(msync(client->mapped + from_rounded,
|
||||||
msync( client->mapped + from_rounded,
|
|
||||||
len_rounded,
|
len_rounded,
|
||||||
MS_SYNC | MS_INVALIDATE),
|
MS_SYNC | MS_INVALIDATE),
|
||||||
"msync failed %ld %ld", request.from, request.len
|
"msync failed %ld %ld", request.from,
|
||||||
);
|
request.len);
|
||||||
}
|
}
|
||||||
client_write_reply(client, &request, 0);
|
client_write_reply(client, &request, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
void client_reply_to_flush( struct client* client, struct nbd_request request )
|
void client_reply_to_flush(struct client *client,
|
||||||
|
struct nbd_request request)
|
||||||
{
|
{
|
||||||
debug("request flush from=%"PRIu64", len=%"PRIu32", handle=0x%08X", request.from, request.len, request.handle);
|
debug("request flush from=%" PRIu64 ", len=%" PRIu32 ", handle=0x%08X",
|
||||||
|
request.from, request.len, request.handle);
|
||||||
|
|
||||||
ERROR_IF_NEGATIVE(
|
ERROR_IF_NEGATIVE(msync
|
||||||
msync(client->mapped, client->mapped_size, MS_SYNC | MS_INVALIDATE),
|
(client->mapped, client->mapped_size,
|
||||||
"flush failed"
|
MS_SYNC | MS_INVALIDATE), "flush failed");
|
||||||
);
|
|
||||||
|
|
||||||
client_write_reply(client, &request, 0);
|
client_write_reply(client, &request, 0);
|
||||||
}
|
}
|
||||||
@@ -546,8 +533,7 @@ void client_arm_killswitch( struct client* client )
|
|||||||
|
|
||||||
debug("Arming killswitch");
|
debug("Arming killswitch");
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(timer_settime(client->killswitch, 0, &its, NULL),
|
||||||
timer_settime( client->killswitch, 0, &its, NULL ),
|
|
||||||
SHOW_ERRNO("Failed to arm killswitch")
|
SHOW_ERRNO("Failed to arm killswitch")
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -567,8 +553,7 @@ void client_disarm_killswitch( struct client* client )
|
|||||||
|
|
||||||
debug("Disarming killswitch");
|
debug("Disarming killswitch");
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(timer_settime(client->killswitch, 0, &its, NULL),
|
||||||
timer_settime( client->killswitch, 0, &its, NULL ),
|
|
||||||
SHOW_ERRNO("Failed to disarm killswitch")
|
SHOW_ERRNO("Failed to disarm killswitch")
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -604,8 +589,9 @@ int client_serve_request(struct client* client)
|
|||||||
if (fd_count == 0) {
|
if (fd_count == 0) {
|
||||||
/* This "can't ever happen" */
|
/* This "can't ever happen" */
|
||||||
fatal("No FDs selected, and no timeout!");
|
fatal("No FDs selected, and no timeout!");
|
||||||
|
} else if (fd_count < 0) {
|
||||||
|
fatal("Select failed");
|
||||||
}
|
}
|
||||||
else if ( fd_count < 0 ) { fatal( "Select failed" ); }
|
|
||||||
|
|
||||||
if (self_pipe_fd_isset(client->stop_signal, &rfds)) {
|
if (self_pipe_fd_isset(client->stop_signal, &rfds)) {
|
||||||
debug("Client received stop signal.");
|
debug("Client received stop signal.");
|
||||||
@@ -683,13 +669,14 @@ void client_cleanup(struct client* client,
|
|||||||
}
|
}
|
||||||
if (client->fileno) {
|
if (client->fileno) {
|
||||||
FATAL_IF_NEGATIVE(close(client->fileno),
|
FATAL_IF_NEGATIVE(close(client->fileno),
|
||||||
"Error closing file %d",
|
"Error closing file %d", client->fileno);
|
||||||
client->fileno );
|
|
||||||
debug("Closed client file fd %d", client->fileno);
|
debug("Closed client file fd %d", client->fileno);
|
||||||
client->fileno = -1;
|
client->fileno = -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ( server_acl_locked( client->serve ) ) { server_unlock_acl( client->serve ); }
|
if (server_acl_locked(client->serve)) {
|
||||||
|
server_unlock_acl(client->serve);
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -700,19 +687,18 @@ void* client_serve(void* client_uncast)
|
|||||||
error_set_handler((cleanup_handler *) client_cleanup, client);
|
error_set_handler((cleanup_handler *) client_cleanup, client);
|
||||||
|
|
||||||
info("client: mmaping file");
|
info("client: mmaping file");
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(open_and_mmap(client->serve->filename,
|
||||||
open_and_mmap(
|
|
||||||
client->serve->filename,
|
|
||||||
&client->fileno,
|
&client->fileno,
|
||||||
&client->mapped_size,
|
&client->mapped_size,
|
||||||
(void**) &client->mapped
|
(void **) &client->mapped),
|
||||||
),
|
"Couldn't open/mmap file %s: %s",
|
||||||
"Couldn't open/mmap file %s: %s", client->serve->filename, strerror( errno )
|
client->serve->filename, strerror(errno)
|
||||||
);
|
);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(madvise
|
||||||
madvise( client->mapped, client->serve->size, MADV_RANDOM ),
|
(client->mapped, client->serve->size, MADV_RANDOM),
|
||||||
SHOW_ERRNO( "Failed to madvise() %s", client->serve->filename )
|
SHOW_ERRNO("Failed to madvise() %s",
|
||||||
|
client->serve->filename)
|
||||||
);
|
);
|
||||||
|
|
||||||
debug("Opened client file fd %d", client->fileno);
|
debug("Opened client file fd %d", client->fileno);
|
||||||
@@ -720,8 +706,7 @@ void* client_serve(void* client_uncast)
|
|||||||
client_send_hello(client);
|
client_send_hello(client);
|
||||||
|
|
||||||
debug("client: serving requests");
|
debug("client: serving requests");
|
||||||
while (client_serve_request(client) == 0)
|
while (client_serve_request(client) == 0);
|
||||||
;
|
|
||||||
debug("client: stopped serving requests");
|
debug("client: stopped serving requests");
|
||||||
client->stopped = 1;
|
client->stopped = 1;
|
||||||
|
|
||||||
@@ -730,10 +715,10 @@ void* client_serve(void* client_uncast)
|
|||||||
server_control_arrived(client->serve);
|
server_control_arrived(client->serve);
|
||||||
}
|
}
|
||||||
|
|
||||||
debug("Cleaning client %p up normally in thread %p", client, pthread_self());
|
debug("Cleaning client %p up normally in thread %p", client,
|
||||||
|
pthread_self());
|
||||||
client_cleanup(client, 0);
|
client_cleanup(client, 0);
|
||||||
debug("Client thread done");
|
debug("Client thread done");
|
||||||
|
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -56,4 +56,3 @@ void client_destroy( struct client * client );
|
|||||||
void client_signal_stop(struct client *client);
|
void client_signal_stop(struct client *client);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -44,9 +44,7 @@
|
|||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
|
|
||||||
|
|
||||||
struct control * control_create(
|
struct control *control_create(struct flexnbd *flexnbd, const char *csn)
|
||||||
struct flexnbd * flexnbd,
|
|
||||||
const char * csn)
|
|
||||||
{
|
{
|
||||||
struct control *control = xmalloc(sizeof(struct control));
|
struct control *control = xmalloc(sizeof(struct control));
|
||||||
|
|
||||||
@@ -80,8 +78,7 @@ void control_destroy( struct control * control )
|
|||||||
free(control);
|
free(control);
|
||||||
}
|
}
|
||||||
|
|
||||||
struct control_client * control_client_create(
|
struct control_client *control_client_create(struct flexnbd *flexnbd,
|
||||||
struct flexnbd * flexnbd,
|
|
||||||
int client_fd,
|
int client_fd,
|
||||||
struct mbox *state_mbox)
|
struct mbox *state_mbox)
|
||||||
{
|
{
|
||||||
@@ -112,8 +109,7 @@ void control_handle_client( struct control * control, int client_fd )
|
|||||||
NULLCHECK(control);
|
NULLCHECK(control);
|
||||||
NULLCHECK(control->flexnbd);
|
NULLCHECK(control->flexnbd);
|
||||||
struct control_client *control_client =
|
struct control_client *control_client =
|
||||||
control_client_create(
|
control_client_create(control->flexnbd,
|
||||||
control->flexnbd,
|
|
||||||
client_fd,
|
client_fd,
|
||||||
control->mirror_state_mbox);
|
control->mirror_state_mbox);
|
||||||
|
|
||||||
@@ -132,7 +128,8 @@ void control_accept_client( struct control * control )
|
|||||||
union mysockaddr client_address;
|
union mysockaddr client_address;
|
||||||
socklen_t addrlen = sizeof(union mysockaddr);
|
socklen_t addrlen = sizeof(union mysockaddr);
|
||||||
|
|
||||||
client_fd = accept( control->control_fd, &client_address.generic, &addrlen );
|
client_fd =
|
||||||
|
accept(control->control_fd, &client_address.generic, &addrlen);
|
||||||
FATAL_IF(-1 == client_fd, "control accept failed");
|
FATAL_IF(-1 == client_fd, "control accept failed");
|
||||||
|
|
||||||
control_handle_client(control, client_fd);
|
control_handle_client(control, client_fd);
|
||||||
@@ -178,25 +175,23 @@ int open_control_socket( const char * socket_name )
|
|||||||
}
|
}
|
||||||
|
|
||||||
control_fd = socket(AF_UNIX, SOCK_STREAM, 0);
|
control_fd = socket(AF_UNIX, SOCK_STREAM, 0);
|
||||||
FATAL_IF_NEGATIVE(control_fd ,
|
FATAL_IF_NEGATIVE(control_fd, "Couldn't create control socket");
|
||||||
"Couldn't create control socket");
|
|
||||||
|
|
||||||
memset(&bind_address, 0, sizeof(struct sockaddr_un));
|
memset(&bind_address, 0, sizeof(struct sockaddr_un));
|
||||||
bind_address.sun_family = AF_UNIX;
|
bind_address.sun_family = AF_UNIX;
|
||||||
strncpy(bind_address.sun_path, socket_name, sizeof(bind_address.sun_path)-1);
|
strncpy(bind_address.sun_path, socket_name,
|
||||||
|
sizeof(bind_address.sun_path) - 1);
|
||||||
|
|
||||||
//unlink(socket_name); /* ignore failure */
|
//unlink(socket_name); /* ignore failure */
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(bind
|
||||||
bind(control_fd , &bind_address, sizeof(bind_address)),
|
(control_fd, &bind_address, sizeof(bind_address)),
|
||||||
"Couldn't bind control socket to %s: %s",
|
"Couldn't bind control socket to %s: %s",
|
||||||
socket_name, strerror(errno)
|
socket_name, strerror(errno)
|
||||||
);
|
);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(listen(control_fd, 5),
|
||||||
listen(control_fd , 5),
|
"Couldn't listen on control socket");
|
||||||
"Couldn't listen on control socket"
|
|
||||||
);
|
|
||||||
return control_fd;
|
return control_fd;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -229,8 +224,7 @@ void control_serve( struct control * control )
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void control_cleanup(
|
void control_cleanup(struct control *control,
|
||||||
struct control * control,
|
|
||||||
int fatal __attribute__ ((unused)))
|
int fatal __attribute__ ((unused)))
|
||||||
{
|
{
|
||||||
NULLCHECK(control);
|
NULLCHECK(control);
|
||||||
@@ -256,7 +250,8 @@ void * control_runner( void * control_uncast )
|
|||||||
|
|
||||||
#define write_socket(msg) write(client_fd, (msg "\n"), strlen((msg))+1)
|
#define write_socket(msg) write(client_fd, (msg "\n"), strlen((msg))+1)
|
||||||
|
|
||||||
void control_write_mirror_response( enum mirror_state mirror_state, int client_fd )
|
void control_write_mirror_response(enum mirror_state mirror_state,
|
||||||
|
int client_fd)
|
||||||
{
|
{
|
||||||
switch (mirror_state) {
|
switch (mirror_state) {
|
||||||
case MS_INIT:
|
case MS_INIT:
|
||||||
@@ -286,12 +281,12 @@ void control_write_mirror_response( enum mirror_state mirror_state, int client_f
|
|||||||
fatal("Unhandled mirror state: %d", mirror_state);
|
fatal("Unhandled mirror state: %d", mirror_state);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#undef write_socket
|
#undef write_socket
|
||||||
|
|
||||||
|
|
||||||
/* Call this in the thread where you want to receive the mirror state */
|
/* Call this in the thread where you want to receive the mirror state */
|
||||||
enum mirror_state control_client_mirror_wait(
|
enum mirror_state control_client_mirror_wait(struct control_client *client)
|
||||||
struct control_client* client)
|
|
||||||
{
|
{
|
||||||
NULLCHECK(client);
|
NULLCHECK(client);
|
||||||
NULLCHECK(client->mirror_state_mbox);
|
NULLCHECK(client->mirror_state_mbox);
|
||||||
@@ -345,14 +340,11 @@ int control_mirror(struct control_client* client, int linesc, char** lines)
|
|||||||
if (linesc > 2) {
|
if (linesc > 2) {
|
||||||
if (strcmp("exit", lines[2]) == 0) {
|
if (strcmp("exit", lines[2]) == 0) {
|
||||||
action_at_finish = ACTION_EXIT;
|
action_at_finish = ACTION_EXIT;
|
||||||
}
|
} else if (strcmp("unlink", lines[2]) == 0) {
|
||||||
else if (strcmp( "unlink", lines[2]) == 0 ) {
|
|
||||||
action_at_finish = ACTION_UNLINK;
|
action_at_finish = ACTION_UNLINK;
|
||||||
}
|
} else if (strcmp("nothing", lines[2]) == 0) {
|
||||||
else if (strcmp("nothing", lines[2]) == 0) {
|
|
||||||
action_at_finish = ACTION_NOTHING;
|
action_at_finish = ACTION_NOTHING;
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
write_socket("1: action must be 'exit' or 'nothing'");
|
write_socket("1: action must be 'exit' or 'nothing'");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
@@ -389,13 +381,13 @@ int control_mirror(struct control_client* client, int linesc, char** lines)
|
|||||||
server_lock_start_mirror(serve);
|
server_lock_start_mirror(serve);
|
||||||
{
|
{
|
||||||
if (server_mirror_can_start(serve)) {
|
if (server_mirror_can_start(serve)) {
|
||||||
serve->mirror_super = mirror_super_create(
|
serve->mirror_super = mirror_super_create(serve->filename,
|
||||||
serve->filename,
|
|
||||||
connect_to,
|
connect_to,
|
||||||
connect_from,
|
connect_from,
|
||||||
max_Bps,
|
max_Bps,
|
||||||
action_at_finish,
|
action_at_finish,
|
||||||
client->mirror_state_mbox );
|
client->
|
||||||
|
mirror_state_mbox);
|
||||||
serve->mirror = serve->mirror_super->mirror;
|
serve->mirror = serve->mirror_super->mirror;
|
||||||
server_prevent_mirror_start(serve);
|
server_prevent_mirror_start(serve);
|
||||||
} else {
|
} else {
|
||||||
@@ -415,18 +407,14 @@ int control_mirror(struct control_client* client, int linesc, char** lines)
|
|||||||
* sighandler can block the serve thread
|
* sighandler can block the serve thread
|
||||||
*/
|
*/
|
||||||
if (serve->mirror_super) {
|
if (serve->mirror_super) {
|
||||||
FATAL_IF( 0 != pthread_create(
|
FATAL_IF(0 != pthread_create(&serve->mirror_super->thread,
|
||||||
&serve->mirror_super->thread,
|
|
||||||
NULL,
|
NULL,
|
||||||
mirror_super_runner,
|
mirror_super_runner,
|
||||||
serve
|
serve),
|
||||||
),
|
"Failed to create mirror thread");
|
||||||
"Failed to create mirror thread"
|
|
||||||
);
|
|
||||||
|
|
||||||
debug("Control thread mirror super waiting");
|
debug("Control thread mirror super waiting");
|
||||||
enum mirror_state state =
|
enum mirror_state state = control_client_mirror_wait(client);
|
||||||
control_client_mirror_wait( client );
|
|
||||||
debug("Control thread writing response");
|
debug("Control thread writing response");
|
||||||
control_write_mirror_response(state, client->socket);
|
control_write_mirror_response(state, client->socket);
|
||||||
}
|
}
|
||||||
@@ -436,7 +424,8 @@ int control_mirror(struct control_client* client, int linesc, char** lines)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int control_mirror_max_bps( struct control_client* client, int linesc, char** lines )
|
int control_mirror_max_bps(struct control_client *client, int linesc,
|
||||||
|
char **lines)
|
||||||
{
|
{
|
||||||
NULLCHECK(client);
|
NULLCHECK(client);
|
||||||
NULLCHECK(client->flexnbd);
|
NULLCHECK(client->flexnbd);
|
||||||
@@ -489,8 +478,7 @@ int control_acl(struct control_client* client, int linesc, char** lines)
|
|||||||
strlen(lines[new_acl->len]));
|
strlen(lines[new_acl->len]));
|
||||||
write(client->socket, "\n", 1);
|
write(client->socket, "\n", 1);
|
||||||
acl_destroy(new_acl);
|
acl_destroy(new_acl);
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
flexnbd_replace_acl(flexnbd, new_acl);
|
flexnbd_replace_acl(flexnbd, new_acl);
|
||||||
info("ACL set");
|
info("ACL set");
|
||||||
write(client->socket, "0: updated\n", 11);
|
write(client->socket, "0: updated\n", 11);
|
||||||
@@ -500,8 +488,7 @@ int control_acl(struct control_client* client, int linesc, char** lines)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int control_break(
|
int control_break(struct control_client *client,
|
||||||
struct control_client* client,
|
|
||||||
int linesc __attribute__ ((unused)),
|
int linesc __attribute__ ((unused)),
|
||||||
char **lines __attribute__ ((unused))
|
char **lines __attribute__ ((unused))
|
||||||
)
|
)
|
||||||
@@ -524,13 +511,10 @@ int control_break(
|
|||||||
|
|
||||||
if (server_is_closed(serve)) {
|
if (server_is_closed(serve)) {
|
||||||
info("Mirror completed while canceling");
|
info("Mirror completed while canceling");
|
||||||
write( client->socket,
|
write(client->socket, "1: mirror completed\n", 20);
|
||||||
"1: mirror completed\n", 20 );
|
} else {
|
||||||
}
|
|
||||||
else {
|
|
||||||
info("Mirror successfully stopped.");
|
info("Mirror successfully stopped.");
|
||||||
write( client->socket,
|
write(client->socket, "0: mirror stopped\n", 18);
|
||||||
"0: mirror stopped\n", 18 );
|
|
||||||
result = 1;
|
result = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -546,8 +530,7 @@ int control_break(
|
|||||||
|
|
||||||
|
|
||||||
/** FIXME: add some useful statistics */
|
/** FIXME: add some useful statistics */
|
||||||
int control_status(
|
int control_status(struct control_client *client,
|
||||||
struct control_client* client,
|
|
||||||
int linesc __attribute__ ((unused)),
|
int linesc __attribute__ ((unused)),
|
||||||
char **lines __attribute__ ((unused))
|
char **lines __attribute__ ((unused))
|
||||||
)
|
)
|
||||||
@@ -566,10 +549,14 @@ int control_status(
|
|||||||
void control_client_cleanup(struct control_client *client,
|
void control_client_cleanup(struct control_client *client,
|
||||||
int fatal __attribute__ ((unused)))
|
int fatal __attribute__ ((unused)))
|
||||||
{
|
{
|
||||||
if (client->socket) { close(client->socket); }
|
if (client->socket) {
|
||||||
|
close(client->socket);
|
||||||
|
}
|
||||||
|
|
||||||
/* This is wrongness */
|
/* This is wrongness */
|
||||||
if ( server_acl_locked( client->flexnbd->serve ) ) { server_unlock_acl( client->flexnbd->serve ); }
|
if (server_acl_locked(client->flexnbd->serve)) {
|
||||||
|
server_unlock_acl(client->flexnbd->serve);
|
||||||
|
}
|
||||||
|
|
||||||
control_client_destroy(client);
|
control_client_destroy(client);
|
||||||
}
|
}
|
||||||
@@ -584,30 +571,25 @@ void control_respond(struct control_client * client)
|
|||||||
int i, linesc;
|
int i, linesc;
|
||||||
linesc = read_lines_until_blankline(client->socket, 256, &lines);
|
linesc = read_lines_until_blankline(client->socket, 256, &lines);
|
||||||
|
|
||||||
if (linesc < 1)
|
if (linesc < 1) {
|
||||||
{
|
|
||||||
write(client->socket, "9: missing command\n", 19);
|
write(client->socket, "9: missing command\n", 19);
|
||||||
/* ignore failure */
|
/* ignore failure */
|
||||||
}
|
} else if (strcmp(lines[0], "acl") == 0) {
|
||||||
else if (strcmp(lines[0], "acl") == 0) {
|
|
||||||
info("acl command received");
|
info("acl command received");
|
||||||
if (control_acl(client, linesc - 1, lines + 1) < 0) {
|
if (control_acl(client, linesc - 1, lines + 1) < 0) {
|
||||||
debug("acl command failed");
|
debug("acl command failed");
|
||||||
}
|
}
|
||||||
}
|
} else if (strcmp(lines[0], "mirror") == 0) {
|
||||||
else if (strcmp(lines[0], "mirror") == 0) {
|
|
||||||
info("mirror command received");
|
info("mirror command received");
|
||||||
if (control_mirror(client, linesc - 1, lines + 1) < 0) {
|
if (control_mirror(client, linesc - 1, lines + 1) < 0) {
|
||||||
debug("mirror command failed");
|
debug("mirror command failed");
|
||||||
}
|
}
|
||||||
}
|
} else if (strcmp(lines[0], "break") == 0) {
|
||||||
else if (strcmp(lines[0], "break") == 0) {
|
|
||||||
info("break command received");
|
info("break command received");
|
||||||
if (control_break(client, linesc - 1, lines + 1) < 0) {
|
if (control_break(client, linesc - 1, lines + 1) < 0) {
|
||||||
debug("break command failed");
|
debug("break command failed");
|
||||||
}
|
}
|
||||||
}
|
} else if (strcmp(lines[0], "status") == 0) {
|
||||||
else if (strcmp(lines[0], "status") == 0) {
|
|
||||||
info("status command received");
|
info("status command received");
|
||||||
if (control_status(client, linesc - 1, lines + 1) < 0) {
|
if (control_status(client, linesc - 1, lines + 1) < 0) {
|
||||||
debug("status command failed");
|
debug("status command failed");
|
||||||
@@ -617,8 +599,7 @@ void control_respond(struct control_client * client)
|
|||||||
if (control_mirror_max_bps(client, linesc - 1, lines + 1) < 0) {
|
if (control_mirror_max_bps(client, linesc - 1, lines + 1) < 0) {
|
||||||
debug("mirror_max_bps command failed");
|
debug("mirror_max_bps command failed");
|
||||||
}
|
}
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
write(client->socket, "10: unknown command\n", 23);
|
write(client->socket, "10: unknown command\n", 23);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -630,4 +611,3 @@ void control_respond(struct control_client * client)
|
|||||||
control_client_cleanup(client, 0);
|
control_client_cleanup(client, 0);
|
||||||
debug("control command handled");
|
debug("control command handled");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -44,16 +44,15 @@ struct control_client{
|
|||||||
struct mbox *mirror_state_mbox;
|
struct mbox *mirror_state_mbox;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct control * control_create(
|
struct control *control_create(struct flexnbd *,
|
||||||
struct flexnbd *,
|
|
||||||
const char *control_socket_name);
|
const char *control_socket_name);
|
||||||
void control_signal_close(struct control *);
|
void control_signal_close(struct control *);
|
||||||
void control_destroy(struct control *);
|
void control_destroy(struct control *);
|
||||||
|
|
||||||
void *control_runner(void *);
|
void *control_runner(void *);
|
||||||
|
|
||||||
void accept_control_connection(struct server* params, int client_fd, union mysockaddr* client_address);
|
void accept_control_connection(struct server *params, int client_fd,
|
||||||
|
union mysockaddr *client_address);
|
||||||
void serve_open_control_socket(struct server *params);
|
void serve_open_control_socket(struct server *params);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -61,16 +61,13 @@ int flexnbd_build_signal_fd(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
void flexnbd_create_shared(
|
void flexnbd_create_shared(struct flexnbd *flexnbd,
|
||||||
struct flexnbd * flexnbd,
|
|
||||||
const char *s_ctrl_sock)
|
const char *s_ctrl_sock)
|
||||||
{
|
{
|
||||||
NULLCHECK(flexnbd);
|
NULLCHECK(flexnbd);
|
||||||
if (s_ctrl_sock) {
|
if (s_ctrl_sock) {
|
||||||
flexnbd->control =
|
flexnbd->control = control_create(flexnbd, s_ctrl_sock);
|
||||||
control_create( flexnbd, s_ctrl_sock );
|
} else {
|
||||||
}
|
|
||||||
else {
|
|
||||||
flexnbd->control = NULL;
|
flexnbd->control = NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -78,8 +75,7 @@ void flexnbd_create_shared(
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
struct flexnbd * flexnbd_create_serving(
|
struct flexnbd *flexnbd_create_serving(char *s_ip_address,
|
||||||
char* s_ip_address,
|
|
||||||
char *s_port,
|
char *s_port,
|
||||||
char *s_file,
|
char *s_file,
|
||||||
char *s_ctrl_sock,
|
char *s_ctrl_sock,
|
||||||
@@ -90,17 +86,14 @@ struct flexnbd * flexnbd_create_serving(
|
|||||||
int use_killswitch)
|
int use_killswitch)
|
||||||
{
|
{
|
||||||
struct flexnbd *flexnbd = xmalloc(sizeof(struct flexnbd));
|
struct flexnbd *flexnbd = xmalloc(sizeof(struct flexnbd));
|
||||||
flexnbd->serve = server_create(
|
flexnbd->serve = server_create(flexnbd,
|
||||||
flexnbd,
|
|
||||||
s_ip_address,
|
s_ip_address,
|
||||||
s_port,
|
s_port,
|
||||||
s_file,
|
s_file,
|
||||||
default_deny,
|
default_deny,
|
||||||
acl_entries,
|
acl_entries,
|
||||||
s_acl_entries,
|
s_acl_entries,
|
||||||
max_nbd_clients,
|
max_nbd_clients, use_killswitch, 1);
|
||||||
use_killswitch,
|
|
||||||
1);
|
|
||||||
flexnbd_create_shared(flexnbd, s_ctrl_sock);
|
flexnbd_create_shared(flexnbd, s_ctrl_sock);
|
||||||
|
|
||||||
// Beats installing one handler per client instance
|
// Beats installing one handler per client instance
|
||||||
@@ -110,17 +103,14 @@ struct flexnbd * flexnbd_create_serving(
|
|||||||
.sa_flags = SA_RESTART | SA_SIGINFO
|
.sa_flags = SA_RESTART | SA_SIGINFO
|
||||||
};
|
};
|
||||||
|
|
||||||
FATAL_UNLESS(
|
FATAL_UNLESS(0 == sigaction(CLIENT_KILLSWITCH_SIGNAL, &act, NULL),
|
||||||
0 == sigaction( CLIENT_KILLSWITCH_SIGNAL, &act, NULL ),
|
"Installing client killswitch signal failed");
|
||||||
"Installing client killswitch signal failed"
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return flexnbd;
|
return flexnbd;
|
||||||
}
|
}
|
||||||
|
|
||||||
struct flexnbd * flexnbd_create_listening(
|
struct flexnbd *flexnbd_create_listening(char *s_ip_address,
|
||||||
char* s_ip_address,
|
|
||||||
char *s_port,
|
char *s_port,
|
||||||
char *s_file,
|
char *s_file,
|
||||||
char *s_ctrl_sock,
|
char *s_ctrl_sock,
|
||||||
@@ -129,15 +119,12 @@ struct flexnbd * flexnbd_create_listening(
|
|||||||
char **s_acl_entries)
|
char **s_acl_entries)
|
||||||
{
|
{
|
||||||
struct flexnbd *flexnbd = xmalloc(sizeof(struct flexnbd));
|
struct flexnbd *flexnbd = xmalloc(sizeof(struct flexnbd));
|
||||||
flexnbd->serve = server_create(
|
flexnbd->serve = server_create(flexnbd,
|
||||||
flexnbd,
|
|
||||||
s_ip_address,
|
s_ip_address,
|
||||||
s_port,
|
s_port,
|
||||||
s_file,
|
s_file,
|
||||||
default_deny,
|
default_deny,
|
||||||
acl_entries,
|
acl_entries, s_acl_entries, 1, 0, 0);
|
||||||
s_acl_entries,
|
|
||||||
1, 0, 0);
|
|
||||||
flexnbd_create_shared(flexnbd, s_ctrl_sock);
|
flexnbd_create_shared(flexnbd, s_ctrl_sock);
|
||||||
|
|
||||||
// listen can't use killswitch, as mirror may pause on sending things
|
// listen can't use killswitch, as mirror may pause on sending things
|
||||||
@@ -153,8 +140,7 @@ void flexnbd_spawn_control(struct flexnbd * flexnbd )
|
|||||||
|
|
||||||
pthread_t *control_thread = &flexnbd->control->thread;
|
pthread_t *control_thread = &flexnbd->control->thread;
|
||||||
|
|
||||||
FATAL_UNLESS( 0 == pthread_create(
|
FATAL_UNLESS(0 == pthread_create(control_thread,
|
||||||
control_thread,
|
|
||||||
NULL,
|
NULL,
|
||||||
control_runner,
|
control_runner,
|
||||||
flexnbd->control),
|
flexnbd->control),
|
||||||
@@ -233,9 +219,7 @@ void make_writable( const char * filename )
|
|||||||
{
|
{
|
||||||
NULLCHECK(filename);
|
NULLCHECK(filename);
|
||||||
FATAL_IF_NEGATIVE(chmod(filename, S_IWUSR),
|
FATAL_IF_NEGATIVE(chmod(filename, S_IWUSR),
|
||||||
"Couldn't chmod %s: %s",
|
"Couldn't chmod %s: %s", filename, strerror(errno));
|
||||||
filename,
|
|
||||||
strerror( errno ) );
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@@ -262,4 +246,3 @@ int flexnbd_serve( struct flexnbd * flexnbd )
|
|||||||
|
|
||||||
return success;
|
return success;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -29,8 +29,7 @@ struct flexnbd {
|
|||||||
|
|
||||||
|
|
||||||
struct flexnbd *flexnbd_create(void);
|
struct flexnbd *flexnbd_create(void);
|
||||||
struct flexnbd * flexnbd_create_serving(
|
struct flexnbd *flexnbd_create_serving(char *s_ip_address,
|
||||||
char* s_ip_address,
|
|
||||||
char *s_port,
|
char *s_port,
|
||||||
char *s_file,
|
char *s_file,
|
||||||
char *s_ctrl_sock,
|
char *s_ctrl_sock,
|
||||||
@@ -40,8 +39,7 @@ struct flexnbd * flexnbd_create_serving(
|
|||||||
int max_nbd_clients,
|
int max_nbd_clients,
|
||||||
int use_killswitch);
|
int use_killswitch);
|
||||||
|
|
||||||
struct flexnbd * flexnbd_create_listening(
|
struct flexnbd *flexnbd_create_listening(char *s_ip_address,
|
||||||
char* s_ip_address,
|
|
||||||
char *s_port,
|
char *s_port,
|
||||||
char *s_file,
|
char *s_file,
|
||||||
char *s_ctrl_sock,
|
char *s_ctrl_sock,
|
||||||
@@ -63,4 +61,3 @@ struct server * flexnbd_server( struct flexnbd * flexnbd );
|
|||||||
void flexnbd_replace_acl(struct flexnbd *flexnbd, struct acl *acl);
|
void flexnbd_replace_acl(struct flexnbd *flexnbd, struct acl *acl);
|
||||||
struct status *flexnbd_status_create(struct flexnbd *flexnbd);
|
struct status *flexnbd_status_create(struct flexnbd *flexnbd);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -22,15 +22,14 @@ void flexthread_mutex_destroy( struct flexthread_mutex * ftm )
|
|||||||
|
|
||||||
if (flexthread_mutex_held(ftm)) {
|
if (flexthread_mutex_held(ftm)) {
|
||||||
flexthread_mutex_unlock(ftm);
|
flexthread_mutex_unlock(ftm);
|
||||||
}
|
} else if ((pthread_t) NULL != ftm->holder) {
|
||||||
else if ( (pthread_t)NULL != ftm->holder ) {
|
|
||||||
/* This "should never happen": if we can try to destroy
|
/* This "should never happen": if we can try to destroy
|
||||||
* a mutex currently held by another thread, there's a
|
* a mutex currently held by another thread, there's a
|
||||||
* logic bug somewhere. I know the test here is racy,
|
* logic bug somewhere. I know the test here is racy,
|
||||||
* but there's not a lot we can do about it at this
|
* but there's not a lot we can do about it at this
|
||||||
* point.
|
* point.
|
||||||
*/
|
*/
|
||||||
fatal( "Attempted to destroy a flexthread_mutex"\
|
fatal("Attempted to destroy a flexthread_mutex"
|
||||||
" held by another thread!");
|
" held by another thread!");
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -72,4 +71,3 @@ int flexthread_mutex_held( struct flexthread_mutex * ftm )
|
|||||||
NULLCHECK(ftm);
|
NULLCHECK(ftm);
|
||||||
return pthread_self() == ftm->holder;
|
return pthread_self() == ftm->holder;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -90,8 +90,7 @@ struct mirror_ctrl {
|
|||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
struct mirror * mirror_alloc(
|
struct mirror *mirror_alloc(union mysockaddr *connect_to,
|
||||||
union mysockaddr * connect_to,
|
|
||||||
union mysockaddr *connect_from,
|
union mysockaddr *connect_from,
|
||||||
uint64_t max_Bps,
|
uint64_t max_Bps,
|
||||||
enum mirror_finish_action action_at_finish,
|
enum mirror_finish_action action_at_finish,
|
||||||
@@ -144,19 +143,13 @@ void mirror_init( struct mirror * mirror, const char * filename )
|
|||||||
NULLCHECK(mirror);
|
NULLCHECK(mirror);
|
||||||
NULLCHECK(filename);
|
NULLCHECK(filename);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(open_and_mmap(filename,
|
||||||
open_and_mmap(
|
|
||||||
filename,
|
|
||||||
&map_fd,
|
&map_fd,
|
||||||
&size,
|
&size,
|
||||||
(void**) &mirror->mapped
|
(void **) &mirror->mapped),
|
||||||
),
|
"Failed to open and mmap %s", filename);
|
||||||
"Failed to open and mmap %s",
|
|
||||||
filename
|
|
||||||
);
|
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(madvise(mirror->mapped, size, MADV_SEQUENTIAL),
|
||||||
madvise( mirror->mapped, size, MADV_SEQUENTIAL ),
|
|
||||||
SHOW_ERRNO("Failed to madvise() %s", filename)
|
SHOW_ERRNO("Failed to madvise() %s", filename)
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
@@ -176,8 +169,7 @@ void mirror_reset( struct mirror * mirror )
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
struct mirror * mirror_create(
|
struct mirror *mirror_create(const char *filename,
|
||||||
const char * filename,
|
|
||||||
union mysockaddr *connect_to,
|
union mysockaddr *connect_to,
|
||||||
union mysockaddr *connect_from,
|
union mysockaddr *connect_from,
|
||||||
uint64_t max_Bps,
|
uint64_t max_Bps,
|
||||||
@@ -189,9 +181,7 @@ struct mirror * mirror_create(
|
|||||||
|
|
||||||
mirror = mirror_alloc(connect_to,
|
mirror = mirror_alloc(connect_to,
|
||||||
connect_from,
|
connect_from,
|
||||||
max_Bps,
|
max_Bps, action_at_finish, commit_signal);
|
||||||
action_at_finish,
|
|
||||||
commit_signal);
|
|
||||||
|
|
||||||
mirror_init(mirror, filename);
|
mirror_init(mirror, filename);
|
||||||
mirror_reset(mirror);
|
mirror_reset(mirror);
|
||||||
@@ -281,7 +271,8 @@ int mirror_connect( struct mirror * mirror, uint64_t local_size )
|
|||||||
|
|
||||||
NULLCHECK(mirror->connect_to);
|
NULLCHECK(mirror->connect_to);
|
||||||
|
|
||||||
mirror->client = socket_connect(&mirror->connect_to->generic, connect_from);
|
mirror->client =
|
||||||
|
socket_connect(&mirror->connect_to->generic, connect_from);
|
||||||
if (0 < mirror->client) {
|
if (0 < mirror->client) {
|
||||||
fd_set fds;
|
fd_set fds;
|
||||||
struct timeval tv = { MS_HELLO_TIME_SECS, 0 };
|
struct timeval tv = { MS_HELLO_TIME_SECS, 0 };
|
||||||
@@ -294,30 +285,29 @@ int mirror_connect( struct mirror * mirror, uint64_t local_size )
|
|||||||
if (FD_ISSET(mirror->client, &fds)) {
|
if (FD_ISSET(mirror->client, &fds)) {
|
||||||
uint64_t remote_size;
|
uint64_t remote_size;
|
||||||
uint32_t remote_flags;
|
uint32_t remote_flags;
|
||||||
if ( socket_nbd_read_hello( mirror->client, &remote_size, &remote_flags ) ) {
|
if (socket_nbd_read_hello
|
||||||
|
(mirror->client, &remote_size, &remote_flags)) {
|
||||||
if (remote_size == local_size) {
|
if (remote_size == local_size) {
|
||||||
connected = 1;
|
connected = 1;
|
||||||
mirror_set_state(mirror, MS_GO);
|
mirror_set_state(mirror, MS_GO);
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
warn("Remote size (%d) doesn't match local (%d)",
|
warn("Remote size (%d) doesn't match local (%d)",
|
||||||
remote_size, local_size);
|
remote_size, local_size);
|
||||||
mirror_set_state(mirror, MS_FAIL_SIZE_MISMATCH);
|
mirror_set_state(mirror, MS_FAIL_SIZE_MISMATCH);
|
||||||
}
|
}
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
warn("Mirror attempt rejected.");
|
warn("Mirror attempt rejected.");
|
||||||
mirror_set_state(mirror, MS_FAIL_REJECTED);
|
mirror_set_state(mirror, MS_FAIL_REJECTED);
|
||||||
}
|
}
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
warn("No NBD Hello received.");
|
warn("No NBD Hello received.");
|
||||||
mirror_set_state(mirror, MS_FAIL_NO_HELLO);
|
mirror_set_state(mirror, MS_FAIL_NO_HELLO);
|
||||||
}
|
}
|
||||||
|
|
||||||
if ( !connected ) { close( mirror->client ); }
|
if (!connected) {
|
||||||
|
close(mirror->client);
|
||||||
}
|
}
|
||||||
else {
|
} else {
|
||||||
warn("Mirror failed to connect.");
|
warn("Mirror failed to connect.");
|
||||||
mirror_set_state(mirror, MS_FAIL_CONNECT);
|
mirror_set_state(mirror, MS_FAIL_CONNECT);
|
||||||
}
|
}
|
||||||
@@ -372,12 +362,15 @@ int mirror_setup_next_xfer( struct mirror_ctrl *ctrl )
|
|||||||
* full, and stop when it's a quarter full. This stops a busy client from
|
* full, and stop when it's a quarter full. This stops a busy client from
|
||||||
* stalling a migration forever. FIXME: made-up numbers.
|
* stalling a migration forever. FIXME: made-up numbers.
|
||||||
*/
|
*/
|
||||||
if ( mirror->offset < serve->size && bitset_stream_size( serve->allocation_map ) > BITSET_STREAM_SIZE / 2 ) {
|
if (mirror->offset < serve->size
|
||||||
|
&& bitset_stream_size(serve->allocation_map) >
|
||||||
|
BITSET_STREAM_SIZE / 2) {
|
||||||
ctrl->clear_events = 1;
|
ctrl->clear_events = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
while ( ( mirror->offset == serve->size || ctrl->clear_events ) && e.event != BITSET_STREAM_SET ) {
|
while ((mirror->offset == serve->size || ctrl->clear_events)
|
||||||
|
&& e.event != BITSET_STREAM_SET) {
|
||||||
uint64_t events = bitset_stream_size(serve->allocation_map);
|
uint64_t events = bitset_stream_size(serve->allocation_map);
|
||||||
|
|
||||||
if (events == 0) {
|
if (events == 0) {
|
||||||
@@ -409,7 +402,8 @@ int mirror_setup_next_xfer( struct mirror_ctrl *ctrl )
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
debug( "Next transfer: current=%"PRIu64", run=%"PRIu64, current, run );
|
debug("Next transfer: current=%" PRIu64 ", run=%" PRIu64, current,
|
||||||
|
run);
|
||||||
struct nbd_request req = {
|
struct nbd_request req = {
|
||||||
.magic = REQUEST_MAGIC,
|
.magic = REQUEST_MAGIC,
|
||||||
.type = REQUEST_WRITE,
|
.type = REQUEST_WRITE,
|
||||||
@@ -461,7 +455,8 @@ static void mirror_write_cb( struct ev_loop *loop, ev_io *w, int revents )
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
debug( "Mirror write callback invoked with events %d. fd: %i", revents, ctrl->mirror->client );
|
debug("Mirror write callback invoked with events %d. fd: %i", revents,
|
||||||
|
ctrl->mirror->client);
|
||||||
|
|
||||||
/* FIXME: We can end up corking multiple times in unusual circumstances; this
|
/* FIXME: We can end up corking multiple times in unusual circumstances; this
|
||||||
* is annoying, but harmless */
|
* is annoying, but harmless */
|
||||||
@@ -473,7 +468,8 @@ static void mirror_write_cb( struct ev_loop *loop, ev_io *w, int revents )
|
|||||||
data_loc = ((char *) &xfer->hdr.req_raw) + ctrl->xfer.written;
|
data_loc = ((char *) &xfer->hdr.req_raw) + ctrl->xfer.written;
|
||||||
to_write = hdr_size - xfer->written;
|
to_write = hdr_size - xfer->written;
|
||||||
} else {
|
} else {
|
||||||
data_loc = ctrl->mirror->mapped + xfer->from + ( xfer->written - hdr_size );
|
data_loc =
|
||||||
|
ctrl->mirror->mapped + xfer->from + (xfer->written - hdr_size);
|
||||||
to_write = xfer->len - (ctrl->xfer.written - hdr_size);
|
to_write = xfer->len - (ctrl->xfer.written - hdr_size);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -486,14 +482,14 @@ static void mirror_write_cb( struct ev_loop *loop, ev_io *w, int revents )
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
debug("Wrote %" PRIu64 " bytes", count);
|
debug("Wrote %" PRIu64 " bytes", count);
|
||||||
debug( "to_write was %"PRIu64", xfer->written was %"PRIu64, to_write, xfer->written );
|
debug("to_write was %" PRIu64 ", xfer->written was %" PRIu64, to_write,
|
||||||
|
xfer->written);
|
||||||
|
|
||||||
// We wrote some bytes, so reset the timer and keep track for the next pass
|
// We wrote some bytes, so reset the timer and keep track for the next pass
|
||||||
if (count > 0) {
|
if (count > 0) {
|
||||||
ctrl->xfer.written += count;
|
ctrl->xfer.written += count;
|
||||||
ev_timer_again(ctrl->ev_loop, &ctrl->timeout_watcher);
|
ev_timer_again(ctrl->ev_loop, &ctrl->timeout_watcher);
|
||||||
}
|
}
|
||||||
|
|
||||||
// All bytes written, so now we need to read the NBD reply back.
|
// All bytes written, so now we need to read the NBD reply back.
|
||||||
if (ctrl->xfer.written == ctrl->xfer.len + hdr_size) {
|
if (ctrl->xfer.written == ctrl->xfer.len + hdr_size) {
|
||||||
sock_set_tcp_cork(ctrl->mirror->client, 0);
|
sock_set_tcp_cork(ctrl->mirror->client, 0);
|
||||||
@@ -524,10 +520,13 @@ static void mirror_read_cb( struct ev_loop *loop, ev_io *w, int revents )
|
|||||||
ssize_t count;
|
ssize_t count;
|
||||||
uint64_t left = sizeof(struct nbd_reply_raw) - xfer->read;
|
uint64_t left = sizeof(struct nbd_reply_raw) - xfer->read;
|
||||||
|
|
||||||
debug( "Mirror read callback invoked with events %d. fd:%i", revents, m->client );
|
debug("Mirror read callback invoked with events %d. fd:%i", revents,
|
||||||
|
m->client);
|
||||||
|
|
||||||
/* Start / continue reading the NBD response from the mirror. */
|
/* Start / continue reading the NBD response from the mirror. */
|
||||||
if ( ( count = read( m->client, ((void*) &xfer->hdr.rsp_raw) + xfer->read, left ) ) < 0 ) {
|
if ((count =
|
||||||
|
read(m->client, ((void *) &xfer->hdr.rsp_raw) + xfer->read,
|
||||||
|
left)) < 0) {
|
||||||
if (errno != EAGAIN && errno != EWOULDBLOCK && errno != EINTR) {
|
if (errno != EAGAIN && errno != EWOULDBLOCK && errno != EINTR) {
|
||||||
warn(SHOW_ERRNO("Couldn't read from listener"));
|
warn(SHOW_ERRNO("Couldn't read from listener"));
|
||||||
ev_break(loop, EVBREAK_ONE);
|
ev_break(loop, EVBREAK_ONE);
|
||||||
@@ -541,12 +540,12 @@ static void mirror_read_cb( struct ev_loop *loop, ev_io *w, int revents )
|
|||||||
ev_break(loop, EVBREAK_ONE);
|
ev_break(loop, EVBREAK_ONE);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
// We read some bytes, so reset the timer
|
// We read some bytes, so reset the timer
|
||||||
ev_timer_again(ctrl->ev_loop, &ctrl->timeout_watcher);
|
ev_timer_again(ctrl->ev_loop, &ctrl->timeout_watcher);
|
||||||
|
|
||||||
debug("Read %i bytes", count);
|
debug("Read %i bytes", count);
|
||||||
debug( "left was %"PRIu64", xfer->read was %"PRIu64, left, xfer->read );
|
debug("left was %" PRIu64 ", xfer->read was %" PRIu64, left,
|
||||||
|
xfer->read);
|
||||||
xfer->read += count;
|
xfer->read += count;
|
||||||
|
|
||||||
if (xfer->read < sizeof(struct nbd_reply_raw)) {
|
if (xfer->read < sizeof(struct nbd_reply_raw)) {
|
||||||
@@ -603,7 +602,9 @@ static void mirror_read_cb( struct ev_loop *loop, ev_io *w, int revents )
|
|||||||
debug("next_xfer: %d", next_xfer);
|
debug("next_xfer: %d", next_xfer);
|
||||||
|
|
||||||
/* Regardless of time estimates, if there's no waiting transfer, we can start closing clients down. */
|
/* Regardless of time estimates, if there's no waiting transfer, we can start closing clients down. */
|
||||||
if ( !ctrl->clients_closed && ( !next_xfer || server_mirror_eta( ctrl->serve ) < MS_CONVERGE_TIME_SECS ) ) {
|
if (!ctrl->clients_closed
|
||||||
|
&& (!next_xfer
|
||||||
|
|| server_mirror_eta(ctrl->serve) < MS_CONVERGE_TIME_SECS)) {
|
||||||
info("Closing clients to allow mirroring to converge");
|
info("Closing clients to allow mirroring to converge");
|
||||||
server_forbid_new_clients(ctrl->serve);
|
server_forbid_new_clients(ctrl->serve);
|
||||||
server_close_clients(ctrl->serve);
|
server_close_clients(ctrl->serve);
|
||||||
@@ -644,7 +645,8 @@ static void mirror_read_cb( struct ev_loop *loop, ev_io *w, int revents )
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void mirror_timeout_cb( struct ev_loop *loop, ev_timer *w __attribute__((unused)), int revents )
|
static void mirror_timeout_cb(struct ev_loop *loop, ev_timer * w
|
||||||
|
__attribute__ ((unused)), int revents)
|
||||||
{
|
{
|
||||||
if (!(revents & EV_TIMER)) {
|
if (!(revents & EV_TIMER)) {
|
||||||
warn("Mirror timeout called but no timer event signalled");
|
warn("Mirror timeout called but no timer event signalled");
|
||||||
@@ -674,7 +676,8 @@ static void mirror_abandon_cb( struct ev_loop *loop, ev_io *w, int revents )
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static void mirror_limit_cb( struct ev_loop *loop, ev_timer *w, int revents )
|
static void mirror_limit_cb(struct ev_loop *loop, ev_timer * w,
|
||||||
|
int revents)
|
||||||
{
|
{
|
||||||
struct mirror_ctrl *ctrl = (struct mirror_ctrl *) w->data;
|
struct mirror_ctrl *ctrl = (struct mirror_ctrl *) w->data;
|
||||||
NULLCHECK(ctrl);
|
NULLCHECK(ctrl);
|
||||||
@@ -685,7 +688,8 @@ static void mirror_limit_cb( struct ev_loop *loop, ev_timer *w, int revents )
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (mirror_should_wait(ctrl)) {
|
if (mirror_should_wait(ctrl)) {
|
||||||
debug( "max_bps exceeded, waiting", ctrl->mirror->max_bytes_per_second );
|
debug("max_bps exceeded, waiting",
|
||||||
|
ctrl->mirror->max_bytes_per_second);
|
||||||
ev_timer_again(loop, w);
|
ev_timer_again(loop, w);
|
||||||
} else {
|
} else {
|
||||||
/* We're below the limit, so do the next request */
|
/* We're below the limit, so do the next request */
|
||||||
@@ -702,7 +706,8 @@ static void mirror_limit_cb( struct ev_loop *loop, ev_timer *w, int revents )
|
|||||||
* if it has, start migrating. If it's not finished, then enabling the bitset
|
* if it has, start migrating. If it's not finished, then enabling the bitset
|
||||||
* stream does not go well for us.
|
* stream does not go well for us.
|
||||||
*/
|
*/
|
||||||
static void mirror_begin_cb( struct ev_loop *loop, ev_timer *w, int revents )
|
static void mirror_begin_cb(struct ev_loop *loop, ev_timer * w,
|
||||||
|
int revents)
|
||||||
{
|
{
|
||||||
struct mirror_ctrl *ctrl = (struct mirror_ctrl *) w->data;
|
struct mirror_ctrl *ctrl = (struct mirror_ctrl *) w->data;
|
||||||
NULLCHECK(ctrl);
|
NULLCHECK(ctrl);
|
||||||
@@ -712,7 +717,8 @@ static void mirror_begin_cb( struct ev_loop *loop, ev_timer *w, int revents )
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ( ctrl->serve->allocation_map_built || ctrl->serve->allocation_map_not_built ) {
|
if (ctrl->serve->allocation_map_built
|
||||||
|
|| ctrl->serve->allocation_map_not_built) {
|
||||||
info("allocation map builder is finished, beginning migration");
|
info("allocation map builder is finished, beginning migration");
|
||||||
ev_timer_stop(loop, w);
|
ev_timer_stop(loop, w);
|
||||||
/* Start by writing xfer 0 to the listener */
|
/* Start by writing xfer 0 to the listener */
|
||||||
@@ -797,10 +803,8 @@ void mirror_run( struct server *serve )
|
|||||||
ctrl.abandon_watcher.data = (void *) &ctrl;
|
ctrl.abandon_watcher.data = (void *) &ctrl;
|
||||||
ev_io_start(ctrl.ev_loop, &ctrl.abandon_watcher);
|
ev_io_start(ctrl.ev_loop, &ctrl.abandon_watcher);
|
||||||
|
|
||||||
ERROR_UNLESS(
|
ERROR_UNLESS(mirror_setup_next_xfer(&ctrl),
|
||||||
mirror_setup_next_xfer( &ctrl ),
|
"Couldn't find first transfer for mirror!");
|
||||||
"Couldn't find first transfer for mirror!"
|
|
||||||
);
|
|
||||||
|
|
||||||
|
|
||||||
if (serve->allocation_map_built) {
|
if (serve->allocation_map_built) {
|
||||||
@@ -831,7 +835,8 @@ void mirror_run( struct server *serve )
|
|||||||
* it to something sane - they just terminate the event loop with state !=
|
* it to something sane - they just terminate the event loop with state !=
|
||||||
* MS_DONE. We re-allow new clients here if necessary.
|
* MS_DONE. We re-allow new clients here if necessary.
|
||||||
*/
|
*/
|
||||||
if ( m->action_at_finish == ACTION_NOTHING || m->commit_state != MS_DONE ) {
|
if (m->action_at_finish == ACTION_NOTHING
|
||||||
|
|| m->commit_state != MS_DONE) {
|
||||||
server_allow_new_clients(serve);
|
server_allow_new_clients(serve);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -897,7 +902,9 @@ void* mirror_runner(void* serve_params_uncast)
|
|||||||
time_t start_time = time(NULL);
|
time_t start_time = time(NULL);
|
||||||
int connected = mirror_connect(mirror, serve->size);
|
int connected = mirror_connect(mirror, serve->size);
|
||||||
mirror_signal_commit(mirror);
|
mirror_signal_commit(mirror);
|
||||||
if ( !connected ) { goto abandon_mirror; }
|
if (!connected) {
|
||||||
|
goto abandon_mirror;
|
||||||
|
}
|
||||||
|
|
||||||
/* After this point, if we see a failure we need to disconnect
|
/* After this point, if we see a failure we need to disconnect
|
||||||
* and retry everything from mirror_set_state(_, MS_INIT), but
|
* and retry everything from mirror_set_state(_, MS_INIT), but
|
||||||
@@ -933,38 +940,33 @@ abandon_mirror:
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
struct mirror_super * mirror_super_create(
|
struct mirror_super *mirror_super_create(const char *filename,
|
||||||
const char * filename,
|
|
||||||
union mysockaddr *connect_to,
|
union mysockaddr *connect_to,
|
||||||
union mysockaddr *connect_from,
|
union mysockaddr *connect_from,
|
||||||
uint64_t max_Bps,
|
uint64_t max_Bps,
|
||||||
enum mirror_finish_action action_at_finish,
|
enum mirror_finish_action
|
||||||
|
action_at_finish,
|
||||||
struct mbox *state_mbox)
|
struct mbox *state_mbox)
|
||||||
{
|
{
|
||||||
struct mirror_super *super = xmalloc(sizeof(struct mirror_super));
|
struct mirror_super *super = xmalloc(sizeof(struct mirror_super));
|
||||||
super->mirror = mirror_create(
|
super->mirror = mirror_create(filename,
|
||||||
filename,
|
|
||||||
connect_to,
|
connect_to,
|
||||||
connect_from,
|
connect_from,
|
||||||
max_Bps,
|
max_Bps,
|
||||||
action_at_finish,
|
action_at_finish, mbox_create());
|
||||||
mbox_create() ) ;
|
|
||||||
super->state_mbox = state_mbox;
|
super->state_mbox = state_mbox;
|
||||||
return super;
|
return super;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
/* Post the current state of the mirror into super->state_mbox.*/
|
/* Post the current state of the mirror into super->state_mbox.*/
|
||||||
void mirror_super_signal_committed(
|
void mirror_super_signal_committed(struct mirror_super *super,
|
||||||
struct mirror_super * super ,
|
|
||||||
enum mirror_state commit_state)
|
enum mirror_state commit_state)
|
||||||
{
|
{
|
||||||
NULLCHECK(super);
|
NULLCHECK(super);
|
||||||
NULLCHECK(super->state_mbox);
|
NULLCHECK(super->state_mbox);
|
||||||
|
|
||||||
mbox_post_mirror_state(
|
mbox_post_mirror_state(super->state_mbox, commit_state);
|
||||||
super->state_mbox,
|
|
||||||
commit_state );
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@@ -998,8 +1000,7 @@ void * mirror_super_runner( void * serve_uncast )
|
|||||||
struct mirror_super *super = serve->mirror_super;
|
struct mirror_super *super = serve->mirror_super;
|
||||||
|
|
||||||
do {
|
do {
|
||||||
FATAL_IF( 0 != pthread_create(
|
FATAL_IF(0 != pthread_create(&mirror->thread,
|
||||||
&mirror->thread,
|
|
||||||
NULL,
|
NULL,
|
||||||
mirror_runner,
|
mirror_runner,
|
||||||
serve),
|
serve),
|
||||||
@@ -1019,9 +1020,7 @@ void * mirror_super_runner( void * serve_uncast )
|
|||||||
should_retry = *commit_state == MS_GO;
|
should_retry = *commit_state == MS_GO;
|
||||||
|
|
||||||
/* Only send this signal the first time */
|
/* Only send this signal the first time */
|
||||||
mirror_super_signal_committed(
|
mirror_super_signal_committed(super, *commit_state);
|
||||||
super,
|
|
||||||
*commit_state);
|
|
||||||
debug("Mirror supervisor committed");
|
debug("Mirror supervisor committed");
|
||||||
}
|
}
|
||||||
/* We only care about the value of the commit signal on
|
/* We only care about the value of the commit signal on
|
||||||
|
@@ -127,15 +127,13 @@ struct mirror_super {
|
|||||||
struct server;
|
struct server;
|
||||||
struct flexnbd;
|
struct flexnbd;
|
||||||
|
|
||||||
struct mirror_super * mirror_super_create(
|
struct mirror_super *mirror_super_create(const char *filename,
|
||||||
const char * filename,
|
|
||||||
union mysockaddr *connect_to,
|
union mysockaddr *connect_to,
|
||||||
union mysockaddr *connect_from,
|
union mysockaddr *connect_from,
|
||||||
uint64_t max_Bps,
|
uint64_t max_Bps,
|
||||||
enum mirror_finish_action action_at_finish,
|
enum mirror_finish_action
|
||||||
struct mbox * state_mbox
|
action_at_finish,
|
||||||
);
|
struct mbox *state_mbox);
|
||||||
void *mirror_super_runner(void *serve_uncast);
|
void *mirror_super_runner(void *serve_uncast);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -19,6 +19,7 @@ static struct option serve_options[] = {
|
|||||||
GETOPT_VERBOSE,
|
GETOPT_VERBOSE,
|
||||||
{0}
|
{0}
|
||||||
};
|
};
|
||||||
|
|
||||||
static char serve_short_options[] = "hl:p:f:s:dk" SOPT_QUIET SOPT_VERBOSE;
|
static char serve_short_options[] = "hl:p:f:s:dk" SOPT_QUIET SOPT_VERBOSE;
|
||||||
static char serve_help_text[] =
|
static char serve_help_text[] =
|
||||||
"Usage: flexnbd " CMD_SERVE " <options> [<acl address>*]\n\n"
|
"Usage: flexnbd " CMD_SERVE " <options> [<acl address>*]\n\n"
|
||||||
@@ -28,10 +29,9 @@ static char serve_help_text[] =
|
|||||||
"\t--" OPT_PORT ",-p <PORT>\tThe port to serve on.\n"
|
"\t--" OPT_PORT ",-p <PORT>\tThe port to serve on.\n"
|
||||||
"\t--" OPT_FILE ",-f <FILE>\tThe file to serve.\n"
|
"\t--" OPT_FILE ",-f <FILE>\tThe file to serve.\n"
|
||||||
"\t--" OPT_DENY ",-d\tDeny connections by default unless in ACL.\n"
|
"\t--" OPT_DENY ",-d\tDeny connections by default unless in ACL.\n"
|
||||||
"\t--" OPT_KILLSWITCH",-k \tKill the server if a request takes 120 seconds.\n"
|
"\t--" OPT_KILLSWITCH
|
||||||
SOCK_LINE
|
",-k \tKill the server if a request takes 120 seconds.\n" SOCK_LINE
|
||||||
VERBOSE_LINE
|
VERBOSE_LINE QUIET_LINE;
|
||||||
QUIET_LINE;
|
|
||||||
|
|
||||||
|
|
||||||
static struct option listen_options[] = {
|
static struct option listen_options[] = {
|
||||||
@@ -45,6 +45,7 @@ static struct option listen_options[] = {
|
|||||||
GETOPT_VERBOSE,
|
GETOPT_VERBOSE,
|
||||||
{0}
|
{0}
|
||||||
};
|
};
|
||||||
|
|
||||||
static char listen_short_options[] = "hl:p:f:s:d" SOPT_QUIET SOPT_VERBOSE;
|
static char listen_short_options[] = "hl:p:f:s:d" SOPT_QUIET SOPT_VERBOSE;
|
||||||
static char listen_help_text[] =
|
static char listen_help_text[] =
|
||||||
"Usage: flexnbd " CMD_LISTEN " <options> [<acl_address>*]\n\n"
|
"Usage: flexnbd " CMD_LISTEN " <options> [<acl_address>*]\n\n"
|
||||||
@@ -54,9 +55,7 @@ static char listen_help_text[] =
|
|||||||
"\t--" OPT_PORT ",-p <PORT>\tThe port to listen on.\n"
|
"\t--" OPT_PORT ",-p <PORT>\tThe port to listen on.\n"
|
||||||
"\t--" OPT_FILE ",-f <FILE>\tThe file to serve.\n"
|
"\t--" OPT_FILE ",-f <FILE>\tThe file to serve.\n"
|
||||||
"\t--" OPT_DENY ",-d\tDeny connections by default unless in ACL.\n"
|
"\t--" OPT_DENY ",-d\tDeny connections by default unless in ACL.\n"
|
||||||
SOCK_LINE
|
SOCK_LINE VERBOSE_LINE QUIET_LINE;
|
||||||
VERBOSE_LINE
|
|
||||||
QUIET_LINE;
|
|
||||||
|
|
||||||
static struct option read_options[] = {
|
static struct option read_options[] = {
|
||||||
GETOPT_HELP,
|
GETOPT_HELP,
|
||||||
@@ -69,6 +68,7 @@ static struct option read_options[] = {
|
|||||||
GETOPT_VERBOSE,
|
GETOPT_VERBOSE,
|
||||||
{0}
|
{0}
|
||||||
};
|
};
|
||||||
|
|
||||||
static char read_short_options[] = "hl:p:F:S:b:" SOPT_QUIET SOPT_VERBOSE;
|
static char read_short_options[] = "hl:p:F:S:b:" SOPT_QUIET SOPT_VERBOSE;
|
||||||
static char read_help_text[] =
|
static char read_help_text[] =
|
||||||
"Usage: flexnbd " CMD_READ " <options>\n\n"
|
"Usage: flexnbd " CMD_READ " <options>\n\n"
|
||||||
@@ -78,9 +78,7 @@ static char read_help_text[] =
|
|||||||
"\t--" OPT_PORT ",-p <PORT>\tThe port to read from.\n"
|
"\t--" OPT_PORT ",-p <PORT>\tThe port to read from.\n"
|
||||||
"\t--" OPT_FROM ",-F <OFFSET>\tByte offset to read from.\n"
|
"\t--" OPT_FROM ",-F <OFFSET>\tByte offset to read from.\n"
|
||||||
"\t--" OPT_SIZE ",-S <SIZE>\tBytes to read.\n"
|
"\t--" OPT_SIZE ",-S <SIZE>\tBytes to read.\n"
|
||||||
BIND_LINE
|
BIND_LINE VERBOSE_LINE QUIET_LINE;
|
||||||
VERBOSE_LINE
|
|
||||||
QUIET_LINE;
|
|
||||||
|
|
||||||
|
|
||||||
static struct option *write_options = read_options;
|
static struct option *write_options = read_options;
|
||||||
@@ -93,9 +91,7 @@ static char write_help_text[] =
|
|||||||
"\t--" OPT_PORT ",-p <PORT>\tThe port to write to.\n"
|
"\t--" OPT_PORT ",-p <PORT>\tThe port to write to.\n"
|
||||||
"\t--" OPT_FROM ",-F <OFFSET>\tByte offset to write from.\n"
|
"\t--" OPT_FROM ",-F <OFFSET>\tByte offset to write from.\n"
|
||||||
"\t--" OPT_SIZE ",-S <SIZE>\tBytes to write.\n"
|
"\t--" OPT_SIZE ",-S <SIZE>\tBytes to write.\n"
|
||||||
BIND_LINE
|
BIND_LINE VERBOSE_LINE QUIET_LINE;
|
||||||
VERBOSE_LINE
|
|
||||||
QUIET_LINE;
|
|
||||||
|
|
||||||
static struct option acl_options[] = {
|
static struct option acl_options[] = {
|
||||||
GETOPT_HELP,
|
GETOPT_HELP,
|
||||||
@@ -104,14 +100,12 @@ static struct option acl_options[] = {
|
|||||||
GETOPT_VERBOSE,
|
GETOPT_VERBOSE,
|
||||||
{0}
|
{0}
|
||||||
};
|
};
|
||||||
|
|
||||||
static char acl_short_options[] = "hs:" SOPT_QUIET SOPT_VERBOSE;
|
static char acl_short_options[] = "hs:" SOPT_QUIET SOPT_VERBOSE;
|
||||||
static char acl_help_text[] =
|
static char acl_help_text[] =
|
||||||
"Usage: flexnbd " CMD_ACL " <options> [<acl address>+]\n\n"
|
"Usage: flexnbd " CMD_ACL " <options> [<acl address>+]\n\n"
|
||||||
"Set the access control list for a server with control socket SOCK.\n\n"
|
"Set the access control list for a server with control socket SOCK.\n\n"
|
||||||
HELP_LINE
|
HELP_LINE SOCK_LINE VERBOSE_LINE QUIET_LINE;
|
||||||
SOCK_LINE
|
|
||||||
VERBOSE_LINE
|
|
||||||
QUIET_LINE;
|
|
||||||
|
|
||||||
static struct option mirror_speed_options[] = {
|
static struct option mirror_speed_options[] = {
|
||||||
GETOPT_HELP,
|
GETOPT_HELP,
|
||||||
@@ -121,15 +115,12 @@ static struct option mirror_speed_options[] = {
|
|||||||
GETOPT_VERBOSE,
|
GETOPT_VERBOSE,
|
||||||
{0}
|
{0}
|
||||||
};
|
};
|
||||||
|
|
||||||
static char mirror_speed_short_options[] = "hs:m:" SOPT_QUIET SOPT_VERBOSE;
|
static char mirror_speed_short_options[] = "hs:m:" SOPT_QUIET SOPT_VERBOSE;
|
||||||
static char mirror_speed_help_text[] =
|
static char mirror_speed_help_text[] =
|
||||||
"Usage: flexnbd " CMD_MIRROR_SPEED " <options>\n\n"
|
"Usage: flexnbd " CMD_MIRROR_SPEED " <options>\n\n"
|
||||||
"Set the maximum speed of a migration from a mirring server listening on SOCK.\n\n"
|
"Set the maximum speed of a migration from a mirring server listening on SOCK.\n\n"
|
||||||
HELP_LINE
|
HELP_LINE SOCK_LINE MAX_SPEED_LINE VERBOSE_LINE QUIET_LINE;
|
||||||
SOCK_LINE
|
|
||||||
MAX_SPEED_LINE
|
|
||||||
VERBOSE_LINE
|
|
||||||
QUIET_LINE;
|
|
||||||
|
|
||||||
static struct option mirror_options[] = {
|
static struct option mirror_options[] = {
|
||||||
GETOPT_HELP,
|
GETOPT_HELP,
|
||||||
@@ -142,6 +133,7 @@ static struct option mirror_options[] = {
|
|||||||
GETOPT_VERBOSE,
|
GETOPT_VERBOSE,
|
||||||
{0}
|
{0}
|
||||||
};
|
};
|
||||||
|
|
||||||
static char mirror_short_options[] = "hs:l:p:ub:" SOPT_QUIET SOPT_VERBOSE;
|
static char mirror_short_options[] = "hs:l:p:ub:" SOPT_QUIET SOPT_VERBOSE;
|
||||||
static char mirror_help_text[] =
|
static char mirror_help_text[] =
|
||||||
"Usage: flexnbd " CMD_MIRROR " <options>\n\n"
|
"Usage: flexnbd " CMD_MIRROR " <options>\n\n"
|
||||||
@@ -151,9 +143,7 @@ static char mirror_help_text[] =
|
|||||||
"\t--" OPT_PORT ",-p <PORT>\tThe port to mirror to.\n"
|
"\t--" OPT_PORT ",-p <PORT>\tThe port to mirror to.\n"
|
||||||
SOCK_LINE
|
SOCK_LINE
|
||||||
"\t--" OPT_UNLINK ",-u\tUnlink the local file when done.\n"
|
"\t--" OPT_UNLINK ",-u\tUnlink the local file when done.\n"
|
||||||
BIND_LINE
|
BIND_LINE VERBOSE_LINE QUIET_LINE;
|
||||||
VERBOSE_LINE
|
|
||||||
QUIET_LINE;
|
|
||||||
|
|
||||||
static struct option break_options[] = {
|
static struct option break_options[] = {
|
||||||
GETOPT_HELP,
|
GETOPT_HELP,
|
||||||
@@ -162,14 +152,12 @@ static struct option break_options[] = {
|
|||||||
GETOPT_VERBOSE,
|
GETOPT_VERBOSE,
|
||||||
{0}
|
{0}
|
||||||
};
|
};
|
||||||
|
|
||||||
static char break_short_options[] = "hs:" SOPT_QUIET SOPT_VERBOSE;
|
static char break_short_options[] = "hs:" SOPT_QUIET SOPT_VERBOSE;
|
||||||
static char break_help_text[] =
|
static char break_help_text[] =
|
||||||
"Usage: flexnbd " CMD_BREAK " <options>\n\n"
|
"Usage: flexnbd " CMD_BREAK " <options>\n\n"
|
||||||
"Stop mirroring from the server with control socket SOCK.\n\n"
|
"Stop mirroring from the server with control socket SOCK.\n\n"
|
||||||
HELP_LINE
|
HELP_LINE SOCK_LINE VERBOSE_LINE QUIET_LINE;
|
||||||
SOCK_LINE
|
|
||||||
VERBOSE_LINE
|
|
||||||
QUIET_LINE;
|
|
||||||
|
|
||||||
|
|
||||||
static struct option status_options[] = {
|
static struct option status_options[] = {
|
||||||
@@ -179,14 +167,12 @@ static struct option status_options[] = {
|
|||||||
GETOPT_VERBOSE,
|
GETOPT_VERBOSE,
|
||||||
{0}
|
{0}
|
||||||
};
|
};
|
||||||
|
|
||||||
static char status_short_options[] = "hs:" SOPT_QUIET SOPT_VERBOSE;
|
static char status_short_options[] = "hs:" SOPT_QUIET SOPT_VERBOSE;
|
||||||
static char status_help_text[] =
|
static char status_help_text[] =
|
||||||
"Usage: flexnbd " CMD_STATUS " <options>\n\n"
|
"Usage: flexnbd " CMD_STATUS " <options>\n\n"
|
||||||
"Get the status for a server with control socket SOCK.\n\n"
|
"Get the status for a server with control socket SOCK.\n\n"
|
||||||
HELP_LINE
|
HELP_LINE SOCK_LINE VERBOSE_LINE QUIET_LINE;
|
||||||
SOCK_LINE
|
|
||||||
VERBOSE_LINE
|
|
||||||
QUIET_LINE;
|
|
||||||
|
|
||||||
char help_help_text_arr[] =
|
char help_help_text_arr[] =
|
||||||
"Usage: flexnbd <cmd> [cmd options]\n\n"
|
"Usage: flexnbd <cmd> [cmd options]\n\n"
|
||||||
@@ -200,8 +186,7 @@ char help_help_text_arr[] =
|
|||||||
"\tflexnbd mirror-speed\n"
|
"\tflexnbd mirror-speed\n"
|
||||||
"\tflexnbd break\n"
|
"\tflexnbd break\n"
|
||||||
"\tflexnbd status\n"
|
"\tflexnbd status\n"
|
||||||
"\tflexnbd help\n\n"
|
"\tflexnbd help\n\n" "See flexnbd help <cmd> for further info\n";
|
||||||
"See flexnbd help <cmd> for further info\n";
|
|
||||||
/* Slightly odd array/pointer pair to stop the compiler from complaining
|
/* Slightly odd array/pointer pair to stop the compiler from complaining
|
||||||
* about symbol sizes
|
* about symbol sizes
|
||||||
*/
|
*/
|
||||||
@@ -214,7 +199,8 @@ void do_write(struct mode_readwrite_params* params);
|
|||||||
void do_remote_command(char *command, char *mode, int argc, char **argv);
|
void do_remote_command(char *command, char *mode, int argc, char **argv);
|
||||||
|
|
||||||
|
|
||||||
void read_serve_param( int c, char **ip_addr, char **ip_port, char **file, char **sock, int *default_deny, int *use_killswitch )
|
void read_serve_param(int c, char **ip_addr, char **ip_port, char **file,
|
||||||
|
char **sock, int *default_deny, int *use_killswitch)
|
||||||
{
|
{
|
||||||
switch (c) {
|
switch (c) {
|
||||||
case 'h':
|
case 'h':
|
||||||
@@ -254,9 +240,7 @@ void read_serve_param( int c, char **ip_addr, char **ip_port, char **file, char
|
|||||||
void read_listen_param(int c,
|
void read_listen_param(int c,
|
||||||
char **ip_addr,
|
char **ip_addr,
|
||||||
char **ip_port,
|
char **ip_port,
|
||||||
char **file,
|
char **file, char **sock, int *default_deny)
|
||||||
char **sock,
|
|
||||||
int *default_deny )
|
|
||||||
{
|
{
|
||||||
switch (c) {
|
switch (c) {
|
||||||
case 'h':
|
case 'h':
|
||||||
@@ -289,7 +273,9 @@ void read_listen_param( int c,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void read_readwrite_param( int c, char **ip_addr, char **ip_port, char **bind_addr, char **from, char **size, char *err_text )
|
void read_readwrite_param(int c, char **ip_addr, char **ip_port,
|
||||||
|
char **bind_addr, char **from, char **size,
|
||||||
|
char *err_text)
|
||||||
{
|
{
|
||||||
switch (c) {
|
switch (c) {
|
||||||
case 'h':
|
case 'h':
|
||||||
@@ -348,11 +334,7 @@ void read_acl_param( int c, char **sock )
|
|||||||
read_sock_param(c, sock, acl_help_text);
|
read_sock_param(c, sock, acl_help_text);
|
||||||
}
|
}
|
||||||
|
|
||||||
void read_mirror_speed_param(
|
void read_mirror_speed_param(int c, char **sock, char **max_speed)
|
||||||
int c,
|
|
||||||
char **sock,
|
|
||||||
char **max_speed
|
|
||||||
)
|
|
||||||
{
|
{
|
||||||
switch (c) {
|
switch (c) {
|
||||||
case 'h':
|
case 'h':
|
||||||
@@ -377,13 +359,10 @@ void read_mirror_speed_param(
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
void read_mirror_param(
|
void read_mirror_param(int c,
|
||||||
int c,
|
|
||||||
char **sock,
|
char **sock,
|
||||||
char **ip_addr,
|
char **ip_addr,
|
||||||
char **ip_port,
|
char **ip_port, int *unlink, char **bind_addr)
|
||||||
int *unlink,
|
|
||||||
char **bind_addr )
|
|
||||||
{
|
{
|
||||||
switch (c) {
|
switch (c) {
|
||||||
case 'h':
|
case 'h':
|
||||||
@@ -459,10 +438,14 @@ int mode_serve( int argc, char *argv[] )
|
|||||||
struct flexnbd *flexnbd;
|
struct flexnbd *flexnbd;
|
||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long(argc, argv, serve_short_options, serve_options, NULL);
|
c = getopt_long(argc, argv, serve_short_options, serve_options,
|
||||||
if ( c == -1 ) { break; }
|
NULL);
|
||||||
|
if (c == -1) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
read_serve_param( c, &ip_addr, &ip_port, &file, &sock, &default_deny, &use_killswitch );
|
read_serve_param(c, &ip_addr, &ip_port, &file, &sock,
|
||||||
|
&default_deny, &use_killswitch);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (NULL == ip_addr || NULL == ip_port) {
|
if (NULL == ip_addr || NULL == ip_port) {
|
||||||
@@ -473,9 +456,14 @@ int mode_serve( int argc, char *argv[] )
|
|||||||
err = 1;
|
err = 1;
|
||||||
fprintf(stderr, "--file is required\n");
|
fprintf(stderr, "--file is required\n");
|
||||||
}
|
}
|
||||||
if ( err ) { exit_err( serve_help_text ); }
|
if (err) {
|
||||||
|
exit_err(serve_help_text);
|
||||||
|
}
|
||||||
|
|
||||||
flexnbd = flexnbd_create_serving( ip_addr, ip_port, file, sock, default_deny, argc - optind, argv + optind, MAX_NBD_CLIENTS, use_killswitch );
|
flexnbd =
|
||||||
|
flexnbd_create_serving(ip_addr, ip_port, file, sock, default_deny,
|
||||||
|
argc - optind, argv + optind,
|
||||||
|
MAX_NBD_CLIENTS, use_killswitch);
|
||||||
info("Serving file %s", file);
|
info("Serving file %s", file);
|
||||||
success = flexnbd_serve(flexnbd);
|
success = flexnbd_serve(flexnbd);
|
||||||
flexnbd_destroy(flexnbd);
|
flexnbd_destroy(flexnbd);
|
||||||
@@ -499,8 +487,11 @@ int mode_listen( int argc, char *argv[] )
|
|||||||
struct flexnbd *flexnbd;
|
struct flexnbd *flexnbd;
|
||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long(argc, argv, listen_short_options, listen_options, NULL);
|
c = getopt_long(argc, argv, listen_short_options, listen_options,
|
||||||
if ( c == -1 ) { break; }
|
NULL);
|
||||||
|
if (c == -1) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
read_listen_param(c, &ip_addr, &ip_port,
|
read_listen_param(c, &ip_addr, &ip_port,
|
||||||
&file, &sock, &default_deny);
|
&file, &sock, &default_deny);
|
||||||
@@ -514,16 +505,16 @@ int mode_listen( int argc, char *argv[] )
|
|||||||
err = 1;
|
err = 1;
|
||||||
fprintf(stderr, "--file is required\n");
|
fprintf(stderr, "--file is required\n");
|
||||||
}
|
}
|
||||||
if ( err ) { exit_err( listen_help_text ); }
|
if (err) {
|
||||||
|
exit_err(listen_help_text);
|
||||||
|
}
|
||||||
|
|
||||||
flexnbd = flexnbd_create_listening(
|
flexnbd = flexnbd_create_listening(ip_addr,
|
||||||
ip_addr,
|
|
||||||
ip_port,
|
ip_port,
|
||||||
file,
|
file,
|
||||||
sock,
|
sock,
|
||||||
default_deny,
|
default_deny,
|
||||||
argc - optind,
|
argc - optind, argv + optind);
|
||||||
argv + optind);
|
|
||||||
success = flexnbd_serve(flexnbd);
|
success = flexnbd_serve(flexnbd);
|
||||||
flexnbd_destroy(flexnbd);
|
flexnbd_destroy(flexnbd);
|
||||||
|
|
||||||
@@ -545,29 +536,25 @@ int mode_listen( int argc, char *argv[] )
|
|||||||
* char *s_length,
|
* char *s_length,
|
||||||
* char *s_filename )
|
* char *s_filename )
|
||||||
*/
|
*/
|
||||||
void params_readwrite(
|
void params_readwrite(int write_not_read,
|
||||||
int write_not_read,
|
|
||||||
struct mode_readwrite_params *out,
|
struct mode_readwrite_params *out,
|
||||||
char *s_ip_address,
|
char *s_ip_address,
|
||||||
char *s_port,
|
char *s_port,
|
||||||
char *s_bind_address,
|
char *s_bind_address,
|
||||||
char* s_from,
|
char *s_from, char *s_length_or_filename)
|
||||||
char* s_length_or_filename
|
|
||||||
)
|
|
||||||
{
|
{
|
||||||
FATAL_IF_NULL(s_ip_address, "No IP address supplied");
|
FATAL_IF_NULL(s_ip_address, "No IP address supplied");
|
||||||
FATAL_IF_NULL(s_port, "No port number supplied");
|
FATAL_IF_NULL(s_port, "No port number supplied");
|
||||||
FATAL_IF_NULL(s_from, "No from supplied");
|
FATAL_IF_NULL(s_from, "No from supplied");
|
||||||
FATAL_IF_NULL(s_length_or_filename, "No length supplied");
|
FATAL_IF_NULL(s_length_or_filename, "No length supplied");
|
||||||
|
|
||||||
FATAL_IF_ZERO(
|
FATAL_IF_ZERO(parse_ip_to_sockaddr
|
||||||
parse_ip_to_sockaddr(&out->connect_to.generic, s_ip_address),
|
(&out->connect_to.generic, s_ip_address),
|
||||||
"Couldn't parse connection address '%s'",
|
"Couldn't parse connection address '%s'", s_ip_address);
|
||||||
s_ip_address
|
|
||||||
);
|
|
||||||
|
|
||||||
if (s_bind_address != NULL &&
|
if (s_bind_address != NULL &&
|
||||||
parse_ip_to_sockaddr(&out->connect_from.generic, s_bind_address) == 0) {
|
parse_ip_to_sockaddr(&out->connect_from.generic,
|
||||||
|
s_bind_address) == 0) {
|
||||||
fatal("Couldn't parse bind address '%s'", s_bind_address);
|
fatal("Couldn't parse bind address '%s'", s_bind_address);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -575,30 +562,27 @@ void params_readwrite(
|
|||||||
|
|
||||||
long signed_from = atol(s_from);
|
long signed_from = atol(s_from);
|
||||||
FATAL_IF_NEGATIVE(signed_from,
|
FATAL_IF_NEGATIVE(signed_from,
|
||||||
"Can't read from a negative offset %d.", signed_from);
|
"Can't read from a negative offset %d.",
|
||||||
|
signed_from);
|
||||||
out->from = signed_from;
|
out->from = signed_from;
|
||||||
|
|
||||||
if (write_not_read) {
|
if (write_not_read) {
|
||||||
if (s_length_or_filename[0] - 48 < 10) {
|
if (s_length_or_filename[0] - 48 < 10) {
|
||||||
out->len = atol(s_length_or_filename);
|
out->len = atol(s_length_or_filename);
|
||||||
out->data_fd = 0;
|
out->data_fd = 0;
|
||||||
}
|
} else {
|
||||||
else {
|
out->data_fd = open(s_length_or_filename, O_RDONLY);
|
||||||
out->data_fd = open(
|
|
||||||
s_length_or_filename, O_RDONLY);
|
|
||||||
FATAL_IF_NEGATIVE(out->data_fd,
|
FATAL_IF_NEGATIVE(out->data_fd,
|
||||||
"Couldn't open %s", s_length_or_filename);
|
"Couldn't open %s", s_length_or_filename);
|
||||||
off64_t signed_len = lseek64(out->data_fd, 0, SEEK_END);
|
off64_t signed_len = lseek64(out->data_fd, 0, SEEK_END);
|
||||||
FATAL_IF_NEGATIVE(signed_len,
|
FATAL_IF_NEGATIVE(signed_len,
|
||||||
"Couldn't find length of %s", s_length_or_filename);
|
"Couldn't find length of %s",
|
||||||
|
s_length_or_filename);
|
||||||
out->len = signed_len;
|
out->len = signed_len;
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(lseek64(out->data_fd, 0, SEEK_SET),
|
||||||
lseek64(out->data_fd, 0, SEEK_SET),
|
"Couldn't rewind %s", s_length_or_filename);
|
||||||
"Couldn't rewind %s", s_length_or_filename
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
out->len = atol(s_length_or_filename);
|
out->len = atol(s_length_or_filename);
|
||||||
out->data_fd = 1;
|
out->data_fd = 1;
|
||||||
}
|
}
|
||||||
@@ -618,11 +602,15 @@ int mode_read( int argc, char *argv[] )
|
|||||||
struct mode_readwrite_params readwrite;
|
struct mode_readwrite_params readwrite;
|
||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long(argc, argv, read_short_options, read_options, NULL);
|
c = getopt_long(argc, argv, read_short_options, read_options,
|
||||||
|
NULL);
|
||||||
|
|
||||||
if ( c == -1 ) { break; }
|
if (c == -1) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
read_readwrite_param( c, &ip_addr, &ip_port, &bind_addr, &from, &size, read_help_text );
|
read_readwrite_param(c, &ip_addr, &ip_port, &bind_addr, &from,
|
||||||
|
&size, read_help_text);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (NULL == ip_addr || NULL == ip_port) {
|
if (NULL == ip_addr || NULL == ip_port) {
|
||||||
@@ -633,10 +621,13 @@ int mode_read( int argc, char *argv[] )
|
|||||||
err = 1;
|
err = 1;
|
||||||
fprintf(stderr, "both --from and --size are required.\n");
|
fprintf(stderr, "both --from and --size are required.\n");
|
||||||
}
|
}
|
||||||
if ( err ) { exit_err( read_help_text ); }
|
if (err) {
|
||||||
|
exit_err(read_help_text);
|
||||||
|
}
|
||||||
|
|
||||||
memset(&readwrite, 0, sizeof(readwrite));
|
memset(&readwrite, 0, sizeof(readwrite));
|
||||||
params_readwrite( 0, &readwrite, ip_addr, ip_port, bind_addr, from, size );
|
params_readwrite(0, &readwrite, ip_addr, ip_port, bind_addr, from,
|
||||||
|
size);
|
||||||
do_read(&readwrite);
|
do_read(&readwrite);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@@ -654,10 +645,14 @@ int mode_write( int argc, char *argv[] )
|
|||||||
struct mode_readwrite_params readwrite;
|
struct mode_readwrite_params readwrite;
|
||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long(argc, argv, write_short_options, write_options, NULL);
|
c = getopt_long(argc, argv, write_short_options, write_options,
|
||||||
if ( c == -1 ) { break; }
|
NULL);
|
||||||
|
if (c == -1) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
read_readwrite_param( c, &ip_addr, &ip_port, &bind_addr, &from, &size, write_help_text );
|
read_readwrite_param(c, &ip_addr, &ip_port, &bind_addr, &from,
|
||||||
|
&size, write_help_text);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (NULL == ip_addr || NULL == ip_port) {
|
if (NULL == ip_addr || NULL == ip_port) {
|
||||||
@@ -668,10 +663,13 @@ int mode_write( int argc, char *argv[] )
|
|||||||
err = 1;
|
err = 1;
|
||||||
fprintf(stderr, "both --from and --size are required.\n");
|
fprintf(stderr, "both --from and --size are required.\n");
|
||||||
}
|
}
|
||||||
if ( err ) { exit_err( write_help_text ); }
|
if (err) {
|
||||||
|
exit_err(write_help_text);
|
||||||
|
}
|
||||||
|
|
||||||
memset(&readwrite, 0, sizeof(readwrite));
|
memset(&readwrite, 0, sizeof(readwrite));
|
||||||
params_readwrite( 1, &readwrite, ip_addr, ip_port, bind_addr, from, size );
|
params_readwrite(1, &readwrite, ip_addr, ip_port, bind_addr, from,
|
||||||
|
size);
|
||||||
do_write(&readwrite);
|
do_write(&readwrite);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@@ -683,7 +681,9 @@ int mode_acl( int argc, char *argv[] )
|
|||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long(argc, argv, acl_short_options, acl_options, NULL);
|
c = getopt_long(argc, argv, acl_short_options, acl_options, NULL);
|
||||||
if ( c == -1 ) { break; }
|
if (c == -1) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
read_acl_param(c, &sock);
|
read_acl_param(c, &sock);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -708,8 +708,11 @@ int mode_mirror_speed( int argc, char *argv[] )
|
|||||||
char *speed = NULL;
|
char *speed = NULL;
|
||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long( argc, argv, mirror_speed_short_options, mirror_speed_options, NULL );
|
c = getopt_long(argc, argv, mirror_speed_short_options,
|
||||||
if ( -1 == c ) { break; }
|
mirror_speed_options, NULL);
|
||||||
|
if (-1 == c) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
read_mirror_speed_param(c, &sock, &speed);
|
read_mirror_speed_param(c, &sock, &speed);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -739,14 +742,15 @@ int mode_mirror( int argc, char *argv[] )
|
|||||||
remote_argv[2] = "exit";
|
remote_argv[2] = "exit";
|
||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long( argc, argv, mirror_short_options, mirror_options, NULL);
|
c = getopt_long(argc, argv, mirror_short_options, mirror_options,
|
||||||
if ( -1 == c ) { break; }
|
NULL);
|
||||||
|
if (-1 == c) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
read_mirror_param(c,
|
read_mirror_param(c,
|
||||||
&sock,
|
&sock,
|
||||||
&remote_argv[0],
|
&remote_argv[0],
|
||||||
&remote_argv[1],
|
&remote_argv[1], &unlink, &remote_argv[3]);
|
||||||
&unlink,
|
|
||||||
&remote_argv[3] );
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (NULL == sock) {
|
if (NULL == sock) {
|
||||||
@@ -757,13 +761,16 @@ int mode_mirror( int argc, char *argv[] )
|
|||||||
fprintf(stderr, "both --addr and --port are required.\n");
|
fprintf(stderr, "both --addr and --port are required.\n");
|
||||||
err = 1;
|
err = 1;
|
||||||
}
|
}
|
||||||
if ( err ) { exit_err( mirror_help_text ); }
|
if (err) {
|
||||||
if ( unlink ) { remote_argv[2] = "unlink"; }
|
exit_err(mirror_help_text);
|
||||||
|
}
|
||||||
|
if (unlink) {
|
||||||
|
remote_argv[2] = "unlink";
|
||||||
|
}
|
||||||
|
|
||||||
if (remote_argv[3] == NULL) {
|
if (remote_argv[3] == NULL) {
|
||||||
do_remote_command("mirror", sock, 3, remote_argv);
|
do_remote_command("mirror", sock, 3, remote_argv);
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
do_remote_command("mirror", sock, 4, remote_argv);
|
do_remote_command("mirror", sock, 4, remote_argv);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -777,8 +784,11 @@ int mode_break( int argc, char *argv[] )
|
|||||||
char *sock = NULL;
|
char *sock = NULL;
|
||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long( argc, argv, break_short_options, break_options, NULL );
|
c = getopt_long(argc, argv, break_short_options, break_options,
|
||||||
if ( -1 == c ) { break; }
|
NULL);
|
||||||
|
if (-1 == c) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
read_break_param(c, &sock);
|
read_break_param(c, &sock);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -798,8 +808,11 @@ int mode_status( int argc, char *argv[] )
|
|||||||
char *sock = NULL;
|
char *sock = NULL;
|
||||||
|
|
||||||
while (1) {
|
while (1) {
|
||||||
c = getopt_long( argc, argv, status_short_options, status_options, NULL );
|
c = getopt_long(argc, argv, status_short_options, status_options,
|
||||||
if ( -1 == c ) { break; }
|
NULL);
|
||||||
|
if (-1 == c) {
|
||||||
|
break;
|
||||||
|
}
|
||||||
read_status_param(c, &sock);
|
read_status_param(c, &sock);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -836,7 +849,9 @@ int mode_help( int argc, char *argv[] )
|
|||||||
help_text = mirror_help_text;
|
help_text = mirror_help_text;
|
||||||
} else if (IS_CMD(CMD_STATUS, cmd)) {
|
} else if (IS_CMD(CMD_STATUS, cmd)) {
|
||||||
help_text = status_help_text;
|
help_text = status_help_text;
|
||||||
} else { exit_err( help_help_text ); }
|
} else {
|
||||||
|
exit_err(help_help_text);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
fprintf(stdout, "%s\n", help_text);
|
fprintf(stdout, "%s\n", help_text);
|
||||||
@@ -848,37 +863,27 @@ void mode(char* mode, int argc, char **argv)
|
|||||||
{
|
{
|
||||||
if (IS_CMD(CMD_SERVE, mode)) {
|
if (IS_CMD(CMD_SERVE, mode)) {
|
||||||
exit(mode_serve(argc, argv));
|
exit(mode_serve(argc, argv));
|
||||||
}
|
} else if (IS_CMD(CMD_LISTEN, mode)) {
|
||||||
else if ( IS_CMD( CMD_LISTEN, mode ) ) {
|
|
||||||
exit(mode_listen(argc, argv));
|
exit(mode_listen(argc, argv));
|
||||||
}
|
} else if (IS_CMD(CMD_READ, mode)) {
|
||||||
else if ( IS_CMD( CMD_READ, mode ) ) {
|
|
||||||
mode_read(argc, argv);
|
mode_read(argc, argv);
|
||||||
}
|
} else if (IS_CMD(CMD_WRITE, mode)) {
|
||||||
else if ( IS_CMD( CMD_WRITE, mode ) ) {
|
|
||||||
mode_write(argc, argv);
|
mode_write(argc, argv);
|
||||||
}
|
} else if (IS_CMD(CMD_ACL, mode)) {
|
||||||
else if ( IS_CMD( CMD_ACL, mode ) ) {
|
|
||||||
mode_acl(argc, argv);
|
mode_acl(argc, argv);
|
||||||
} else if (IS_CMD(CMD_MIRROR_SPEED, mode)) {
|
} else if (IS_CMD(CMD_MIRROR_SPEED, mode)) {
|
||||||
mode_mirror_speed(argc, argv);
|
mode_mirror_speed(argc, argv);
|
||||||
}
|
} else if (IS_CMD(CMD_MIRROR, mode)) {
|
||||||
else if ( IS_CMD( CMD_MIRROR, mode ) ) {
|
|
||||||
mode_mirror(argc, argv);
|
mode_mirror(argc, argv);
|
||||||
}
|
} else if (IS_CMD(CMD_BREAK, mode)) {
|
||||||
else if ( IS_CMD( CMD_BREAK, mode ) ) {
|
|
||||||
mode_break(argc, argv);
|
mode_break(argc, argv);
|
||||||
}
|
} else if (IS_CMD(CMD_STATUS, mode)) {
|
||||||
else if ( IS_CMD( CMD_STATUS, mode ) ) {
|
|
||||||
mode_status(argc, argv);
|
mode_status(argc, argv);
|
||||||
}
|
} else if (IS_CMD(CMD_HELP, mode)) {
|
||||||
else if ( IS_CMD( CMD_HELP, mode ) ) {
|
|
||||||
mode_help(argc - 1, argv + 1);
|
mode_help(argc - 1, argv + 1);
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
mode_help(argc - 1, argv + 1);
|
mode_help(argc - 1, argv + 1);
|
||||||
exit(1);
|
exit(1);
|
||||||
}
|
}
|
||||||
exit(0);
|
exit(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -21,8 +21,7 @@
|
|||||||
#include <sys/socket.h>
|
#include <sys/socket.h>
|
||||||
#include <netinet/tcp.h>
|
#include <netinet/tcp.h>
|
||||||
|
|
||||||
struct server * server_create (
|
struct server *server_create(struct flexnbd *flexnbd,
|
||||||
struct flexnbd * flexnbd,
|
|
||||||
char *s_ip_address,
|
char *s_ip_address,
|
||||||
char *s_port,
|
char *s_port,
|
||||||
char *s_file,
|
char *s_file,
|
||||||
@@ -30,8 +29,7 @@ struct server * server_create (
|
|||||||
int acl_entries,
|
int acl_entries,
|
||||||
char **s_acl_entries,
|
char **s_acl_entries,
|
||||||
int max_nbd_clients,
|
int max_nbd_clients,
|
||||||
int use_killswitch,
|
int use_killswitch, int success)
|
||||||
int success)
|
|
||||||
{
|
{
|
||||||
NULLCHECK(flexnbd);
|
NULLCHECK(flexnbd);
|
||||||
struct server *out;
|
struct server *out;
|
||||||
@@ -43,19 +41,18 @@ struct server * server_create (
|
|||||||
|
|
||||||
server_allow_new_clients(out);
|
server_allow_new_clients(out);
|
||||||
|
|
||||||
out->nbd_client = xmalloc( max_nbd_clients * sizeof( struct client_tbl_entry ) );
|
out->nbd_client =
|
||||||
|
xmalloc(max_nbd_clients * sizeof(struct client_tbl_entry));
|
||||||
out->tcp_backlog = 10; /* does this need to be settable? */
|
out->tcp_backlog = 10; /* does this need to be settable? */
|
||||||
|
|
||||||
FATAL_IF_NULL(s_ip_address, "No IP address supplied");
|
FATAL_IF_NULL(s_ip_address, "No IP address supplied");
|
||||||
FATAL_IF_NULL(s_port, "No port number supplied");
|
FATAL_IF_NULL(s_port, "No port number supplied");
|
||||||
FATAL_IF_NULL(s_file, "No filename supplied");
|
FATAL_IF_NULL(s_file, "No filename supplied");
|
||||||
NULLCHECK(s_ip_address);
|
NULLCHECK(s_ip_address);
|
||||||
FATAL_IF_ZERO(
|
FATAL_IF_ZERO(parse_ip_to_sockaddr
|
||||||
parse_ip_to_sockaddr(&out->bind_to.generic, s_ip_address),
|
(&out->bind_to.generic, s_ip_address),
|
||||||
"Couldn't parse server address '%s' (use 0 if "
|
"Couldn't parse server address '%s' (use 0 if "
|
||||||
"you want to bind to all IPs)",
|
"you want to bind to all IPs)", s_ip_address);
|
||||||
s_ip_address
|
|
||||||
);
|
|
||||||
|
|
||||||
|
|
||||||
out->acl = acl_create(acl_entries, s_acl_entries, default_deny);
|
out->acl = acl_create(acl_entries, s_acl_entries, default_deny);
|
||||||
@@ -110,8 +107,7 @@ void server_unlink( struct server * serve )
|
|||||||
|
|
||||||
FATAL_IF_NEGATIVE(unlink(serve->filename),
|
FATAL_IF_NEGATIVE(unlink(serve->filename),
|
||||||
"Failed to unlink %s: %s",
|
"Failed to unlink %s: %s",
|
||||||
serve->filename,
|
serve->filename, strerror(errno));
|
||||||
strerror( errno ) );
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -155,7 +151,8 @@ void server_unlock_start_mirror( struct server *serve )
|
|||||||
{
|
{
|
||||||
debug("Mirror start unlocking");
|
debug("Mirror start unlocking");
|
||||||
|
|
||||||
SERVER_UNLOCK( serve, l_start_mirror, "Problem with start mirror unlock" );
|
SERVER_UNLOCK(serve, l_start_mirror,
|
||||||
|
"Problem with start mirror unlock");
|
||||||
}
|
}
|
||||||
|
|
||||||
int server_start_mirror_locked(struct server *serve)
|
int server_start_mirror_locked(struct server *serve)
|
||||||
@@ -186,8 +183,9 @@ void serve_open_server_socket(struct server* params)
|
|||||||
{
|
{
|
||||||
NULLCHECK(params);
|
NULLCHECK(params);
|
||||||
|
|
||||||
params->server_fd = socket(params->bind_to.generic.sa_family == AF_INET ?
|
params->server_fd =
|
||||||
PF_INET : PF_INET6, SOCK_STREAM, 0);
|
socket(params->bind_to.generic.sa_family ==
|
||||||
|
AF_INET ? PF_INET : PF_INET6, SOCK_STREAM, 0);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(params->server_fd, "Couldn't create server socket");
|
FATAL_IF_NEGATIVE(params->server_fd, "Couldn't create server socket");
|
||||||
|
|
||||||
@@ -199,35 +197,32 @@ void serve_open_server_socket(struct server* params)
|
|||||||
* problem. It's also indicative of something odd going on, so
|
* problem. It's also indicative of something odd going on, so
|
||||||
* we barf.
|
* we barf.
|
||||||
*/
|
*/
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(sock_set_reuseaddr(params->server_fd, 1),
|
||||||
sock_set_reuseaddr( params->server_fd, 1 ), "Couldn't set SO_REUSEADDR"
|
"Couldn't set SO_REUSEADDR");
|
||||||
);
|
|
||||||
|
|
||||||
/* TCP_NODELAY makes everything not be slow. If we can't set
|
/* TCP_NODELAY makes everything not be slow. If we can't set
|
||||||
* this, again, there's something odd going on which we don't
|
* this, again, there's something odd going on which we don't
|
||||||
* understand.
|
* understand.
|
||||||
*/
|
*/
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(sock_set_tcp_nodelay(params->server_fd, 1),
|
||||||
sock_set_tcp_nodelay( params->server_fd, 1 ), "Couldn't set TCP_NODELAY"
|
"Couldn't set TCP_NODELAY");
|
||||||
);
|
|
||||||
|
|
||||||
/* If we can't bind, presumably that's because someone else is
|
/* If we can't bind, presumably that's because someone else is
|
||||||
* squatting on our ip/port combo, or the ip isn't yet
|
* squatting on our ip/port combo, or the ip isn't yet
|
||||||
* configured. Ideally we want to retry this. */
|
* configured. Ideally we want to retry this. */
|
||||||
FATAL_UNLESS_ZERO(
|
FATAL_UNLESS_ZERO(sock_try_bind
|
||||||
sock_try_bind( params->server_fd, ¶ms->bind_to.generic ),
|
(params->server_fd, ¶ms->bind_to.generic),
|
||||||
SHOW_ERRNO("Failed to bind() socket")
|
SHOW_ERRNO("Failed to bind() socket")
|
||||||
);
|
);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(listen(params->server_fd, params->tcp_backlog),
|
||||||
listen(params->server_fd, params->tcp_backlog),
|
"Couldn't listen on server socket");
|
||||||
"Couldn't listen on server socket"
|
|
||||||
);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
int tryjoin_client_thread( struct client_tbl_entry *entry, int (*joinfunc)(pthread_t, void **) )
|
int tryjoin_client_thread(struct client_tbl_entry *entry,
|
||||||
|
int (*joinfunc) (pthread_t, void **))
|
||||||
{
|
{
|
||||||
|
|
||||||
NULLCHECK(entry);
|
NULLCHECK(entry);
|
||||||
@@ -239,25 +234,25 @@ int tryjoin_client_thread( struct client_tbl_entry *entry, int (*joinfunc)(pthre
|
|||||||
if (entry->thread != 0) {
|
if (entry->thread != 0) {
|
||||||
char s_client_address[128];
|
char s_client_address[128];
|
||||||
|
|
||||||
sockaddr_address_string( &entry->address.generic, &s_client_address[0], 128 );
|
sockaddr_address_string(&entry->address.generic,
|
||||||
|
&s_client_address[0], 128);
|
||||||
|
|
||||||
debug( "%s(%p,...)", joinfunc == pthread_join ? "joining" : "tryjoining", entry->thread );
|
debug("%s(%p,...)",
|
||||||
|
joinfunc == pthread_join ? "joining" : "tryjoining",
|
||||||
|
entry->thread);
|
||||||
int join_errno = joinfunc(entry->thread, &status);
|
int join_errno = joinfunc(entry->thread, &status);
|
||||||
|
|
||||||
/* join_errno can legitimately be ESRCH if the thread is
|
/* join_errno can legitimately be ESRCH if the thread is
|
||||||
* already dead, but the client still needs tidying up. */
|
* already dead, but the client still needs tidying up. */
|
||||||
if (join_errno != 0 && !entry->client->stopped) {
|
if (join_errno != 0 && !entry->client->stopped) {
|
||||||
debug( "join_errno was %s, stopped was %d", strerror( join_errno ), entry->client->stopped );
|
debug("join_errno was %s, stopped was %d",
|
||||||
|
strerror(join_errno), entry->client->stopped);
|
||||||
FATAL_UNLESS(join_errno == EBUSY,
|
FATAL_UNLESS(join_errno == EBUSY,
|
||||||
"Problem with joining thread %p: %s",
|
"Problem with joining thread %p: %s",
|
||||||
entry->thread,
|
entry->thread, strerror(join_errno));
|
||||||
strerror(join_errno) );
|
} else if (join_errno == 0) {
|
||||||
}
|
|
||||||
else if ( join_errno == 0 ) {
|
|
||||||
debug("nbd thread %016x exited (%s) with status %ld",
|
debug("nbd thread %016x exited (%s) with status %ld",
|
||||||
entry->thread,
|
entry->thread, s_client_address, (uintptr_t) status);
|
||||||
s_client_address,
|
|
||||||
(uintptr_t)status);
|
|
||||||
client_destroy(entry->client);
|
client_destroy(entry->client);
|
||||||
entry->client = NULL;
|
entry->client = NULL;
|
||||||
entry->thread = 0;
|
entry->thread = 0;
|
||||||
@@ -287,7 +282,8 @@ int cleanup_client_thread( struct client_tbl_entry * entry )
|
|||||||
return tryjoin_client_thread(entry, pthread_tryjoin_np);
|
return tryjoin_client_thread(entry, pthread_tryjoin_np);
|
||||||
}
|
}
|
||||||
|
|
||||||
void cleanup_client_threads( struct client_tbl_entry * entries, size_t entries_len )
|
void cleanup_client_threads(struct client_tbl_entry *entries,
|
||||||
|
size_t entries_len)
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
for (i = 0; i < entries_len; i++) {
|
for (i = 0; i < entries_len; i++) {
|
||||||
@@ -349,7 +345,8 @@ int server_count_clients( struct server *params )
|
|||||||
* to the current acl. If params->acl is NULL, the result will be 1,
|
* to the current acl. If params->acl is NULL, the result will be 1,
|
||||||
* otherwise it will be the result of acl_includes().
|
* otherwise it will be the result of acl_includes().
|
||||||
*/
|
*/
|
||||||
int server_acl_accepts( struct server *params, union mysockaddr * client_address )
|
int server_acl_accepts(struct server *params,
|
||||||
|
union mysockaddr *client_address)
|
||||||
{
|
{
|
||||||
NULLCHECK(params);
|
NULLCHECK(params);
|
||||||
NULLCHECK(client_address);
|
NULLCHECK(client_address);
|
||||||
@@ -368,8 +365,7 @@ int server_acl_accepts( struct server *params, union mysockaddr * client_address
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
int server_should_accept_client(
|
int server_should_accept_client(struct server *params,
|
||||||
struct server * params,
|
|
||||||
union mysockaddr *client_address,
|
union mysockaddr *client_address,
|
||||||
char *s_client_address,
|
char *s_client_address,
|
||||||
size_t s_client_address_len)
|
size_t s_client_address_len)
|
||||||
@@ -378,9 +374,9 @@ int server_should_accept_client(
|
|||||||
NULLCHECK(client_address);
|
NULLCHECK(client_address);
|
||||||
NULLCHECK(s_client_address);
|
NULLCHECK(s_client_address);
|
||||||
|
|
||||||
const char* result = sockaddr_address_string(
|
const char *result =
|
||||||
&client_address->generic, s_client_address, s_client_address_len
|
sockaddr_address_string(&client_address->generic, s_client_address,
|
||||||
);
|
s_client_address_len);
|
||||||
|
|
||||||
if (NULL == result) {
|
if (NULL == result) {
|
||||||
warn("Rejecting client %s: Bad client_address", s_client_address);
|
warn("Rejecting client %s: Bad client_address", s_client_address);
|
||||||
@@ -388,7 +384,8 @@ int server_should_accept_client(
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (!server_acl_accepts(params, client_address)) {
|
if (!server_acl_accepts(params, client_address)) {
|
||||||
warn( "Rejecting client %s: Access control error", s_client_address );
|
warn("Rejecting client %s: Access control error",
|
||||||
|
s_client_address);
|
||||||
debug("We %s have an acl, and default_deny is %s",
|
debug("We %s have an acl, and default_deny is %s",
|
||||||
(params->acl ? "do" : "do not"),
|
(params->acl ? "do" : "do not"),
|
||||||
(params->acl->default_deny ? "true" : "false"));
|
(params->acl->default_deny ? "true" : "false"));
|
||||||
@@ -400,11 +397,11 @@ int server_should_accept_client(
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
int spawn_client_thread(
|
int spawn_client_thread(struct client *client_params,
|
||||||
struct client * client_params,
|
|
||||||
pthread_t * out_thread)
|
pthread_t * out_thread)
|
||||||
{
|
{
|
||||||
int result = pthread_create(out_thread, NULL, client_serve, client_params);
|
int result =
|
||||||
|
pthread_create(out_thread, NULL, client_serve, client_params);
|
||||||
|
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
@@ -414,10 +411,8 @@ int spawn_client_thread(
|
|||||||
* to handle it. Rejects the connection if there is an ACL, and the far end's
|
* to handle it. Rejects the connection if there is an ACL, and the far end's
|
||||||
* address doesn't match, or if there are too many clients already connected.
|
* address doesn't match, or if there are too many clients already connected.
|
||||||
*/
|
*/
|
||||||
void accept_nbd_client(
|
void accept_nbd_client(struct server *params,
|
||||||
struct server* params,
|
int client_fd, union mysockaddr *client_address)
|
||||||
int client_fd,
|
|
||||||
union mysockaddr* client_address)
|
|
||||||
{
|
{
|
||||||
NULLCHECK(params);
|
NULLCHECK(params);
|
||||||
NULLCHECK(client_address);
|
NULLCHECK(client_address);
|
||||||
@@ -426,11 +421,15 @@ void accept_nbd_client(
|
|||||||
int slot;
|
int slot;
|
||||||
char s_client_address[64] = { 0 };
|
char s_client_address[64] = { 0 };
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE( sock_set_keepalive_params( client_fd, CLIENT_KEEPALIVE_TIME, CLIENT_KEEPALIVE_INTVL, CLIENT_KEEPALIVE_PROBES),
|
FATAL_IF_NEGATIVE(sock_set_keepalive_params
|
||||||
"Error setting keepalive parameters on client socket fd %d", client_fd );
|
(client_fd, CLIENT_KEEPALIVE_TIME,
|
||||||
|
CLIENT_KEEPALIVE_INTVL, CLIENT_KEEPALIVE_PROBES),
|
||||||
|
"Error setting keepalive parameters on client socket fd %d",
|
||||||
|
client_fd);
|
||||||
|
|
||||||
|
|
||||||
if ( !server_should_accept_client( params, client_address, s_client_address, 64 ) ) {
|
if (!server_should_accept_client
|
||||||
|
(params, client_address, s_client_address, 64)) {
|
||||||
FATAL_IF_NEGATIVE(close(client_fd),
|
FATAL_IF_NEGATIVE(close(client_fd),
|
||||||
"Error closing client socket fd %d", client_fd);
|
"Error closing client socket fd %d", client_fd);
|
||||||
debug("Closed client socket fd %d", client_fd);
|
debug("Closed client socket fd %d", client_fd);
|
||||||
@@ -464,7 +463,8 @@ void accept_nbd_client(
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
debug("nbd thread %p started (%s)", params->nbd_client[slot].thread, s_client_address);
|
debug("nbd thread %p started (%s)", params->nbd_client[slot].thread,
|
||||||
|
s_client_address);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@@ -485,8 +485,12 @@ void server_audit_clients( struct server * serve)
|
|||||||
*/
|
*/
|
||||||
for (i = 0; i < serve->max_nbd_clients; i++) {
|
for (i = 0; i < serve->max_nbd_clients; i++) {
|
||||||
entry = &serve->nbd_client[i];
|
entry = &serve->nbd_client[i];
|
||||||
if ( 0 == entry->thread ) { continue; }
|
if (0 == entry->thread) {
|
||||||
if ( server_acl_accepts( serve, &entry->address ) ) { continue; }
|
continue;
|
||||||
|
}
|
||||||
|
if (server_acl_accepts(serve, &entry->address)) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
client_signal_stop(entry->client);
|
client_signal_stop(entry->client);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -546,7 +550,9 @@ void server_replace_acl( struct server *serve, struct acl * new_acl )
|
|||||||
struct acl *old_acl = serve->acl;
|
struct acl *old_acl = serve->acl;
|
||||||
serve->acl = new_acl;
|
serve->acl = new_acl;
|
||||||
/* We should always have an old_acl, but just in case... */
|
/* We should always have an old_acl, but just in case... */
|
||||||
if ( old_acl ) { acl_destroy( old_acl ); }
|
if (old_acl) {
|
||||||
|
acl_destroy(old_acl);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
server_unlock_acl(serve);
|
server_unlock_acl(serve);
|
||||||
|
|
||||||
@@ -614,12 +620,13 @@ int server_accept( struct server * params )
|
|||||||
|
|
||||||
FD_ZERO(&fds);
|
FD_ZERO(&fds);
|
||||||
FD_SET(params->server_fd, &fds);
|
FD_SET(params->server_fd, &fds);
|
||||||
if( 0 < signal_fd ) { FD_SET(signal_fd, &fds); }
|
if (0 < signal_fd) {
|
||||||
|
FD_SET(signal_fd, &fds);
|
||||||
|
}
|
||||||
self_pipe_fd_set(params->close_signal, &fds);
|
self_pipe_fd_set(params->close_signal, &fds);
|
||||||
self_pipe_fd_set(params->acl_updated_signal, &fds);
|
self_pipe_fd_set(params->acl_updated_signal, &fds);
|
||||||
|
|
||||||
FATAL_IF_NEGATIVE(
|
FATAL_IF_NEGATIVE(sock_try_select(FD_SETSIZE, &fds, NULL, NULL, NULL),
|
||||||
sock_try_select(FD_SETSIZE, &fds, NULL, NULL, NULL),
|
|
||||||
SHOW_ERRNO("select() failed")
|
SHOW_ERRNO("select() failed")
|
||||||
);
|
);
|
||||||
|
|
||||||
@@ -632,7 +639,8 @@ int server_accept( struct server * params )
|
|||||||
if (0 < signal_fd && FD_ISSET(signal_fd, &fds)) {
|
if (0 < signal_fd && FD_ISSET(signal_fd, &fds)) {
|
||||||
debug("Stop signal received.");
|
debug("Stop signal received.");
|
||||||
server_close_clients(params);
|
server_close_clients(params);
|
||||||
params->success = params->success && serve_shutdown_is_graceful( params );
|
params->success = params->success
|
||||||
|
&& serve_shutdown_is_graceful(params);
|
||||||
should_continue = 0;
|
should_continue = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -643,7 +651,8 @@ int server_accept( struct server * params )
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (FD_ISSET(params->server_fd, &fds)) {
|
if (FD_ISSET(params->server_fd, &fds)) {
|
||||||
int client_fd = accept( params->server_fd, &client_address.generic, &socklen );
|
int client_fd =
|
||||||
|
accept(params->server_fd, &client_address.generic, &socklen);
|
||||||
|
|
||||||
if (params->allow_new_clients) {
|
if (params->allow_new_clients) {
|
||||||
debug("Accepted nbd client socket fd %d", client_fd);
|
debug("Accepted nbd client socket fd %d", client_fd);
|
||||||
@@ -678,8 +687,7 @@ void* build_allocation_map_thread(void* serve_uncast)
|
|||||||
|
|
||||||
if (build_allocation_map(serve->allocation_map, fd)) {
|
if (build_allocation_map(serve->allocation_map, fd)) {
|
||||||
serve->allocation_map_built = 1;
|
serve->allocation_map_built = 1;
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
/* We can operate without it, but we can't free it without a race.
|
/* We can operate without it, but we can't free it without a race.
|
||||||
* All that happens if we leave it is that it gradually builds up an
|
* All that happens if we leave it is that it gradually builds up an
|
||||||
* *incomplete* record of writes. Nobody will use it, as
|
* *incomplete* record of writes. Nobody will use it, as
|
||||||
@@ -722,8 +730,7 @@ void serve_init_allocation_map(struct server* params)
|
|||||||
}
|
}
|
||||||
|
|
||||||
params->size = size;
|
params->size = size;
|
||||||
FATAL_IF_NEGATIVE( size, "Couldn't find size of %s",
|
FATAL_IF_NEGATIVE(size, "Couldn't find size of %s", params->filename);
|
||||||
params->filename );
|
|
||||||
|
|
||||||
params->allocation_map =
|
params->allocation_map =
|
||||||
bitset_alloc(params->size, block_allocation_resolution);
|
bitset_alloc(params->size, block_allocation_resolution);
|
||||||
@@ -749,7 +756,8 @@ void server_allow_new_clients( struct server * serve )
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
void server_join_clients( struct server * serve ) {
|
void server_join_clients(struct server *serve)
|
||||||
|
{
|
||||||
int i;
|
int i;
|
||||||
void *status;
|
void *status;
|
||||||
|
|
||||||
@@ -762,7 +770,8 @@ void server_join_clients( struct server * serve ) {
|
|||||||
if (0 == err) {
|
if (0 == err) {
|
||||||
serve->nbd_client[i].thread = 0;
|
serve->nbd_client[i].thread = 0;
|
||||||
} else {
|
} else {
|
||||||
warn( "Error %s (%i) joining thread %p", strerror( err ), err, thread_id );
|
warn("Error %s (%i) joining thread %p", strerror(err), err,
|
||||||
|
thread_id);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -814,7 +823,9 @@ void serve_cleanup(struct server* params,
|
|||||||
|
|
||||||
info("cleaning up");
|
info("cleaning up");
|
||||||
|
|
||||||
if (params->server_fd){ close(params->server_fd); }
|
if (params->server_fd) {
|
||||||
|
close(params->server_fd);
|
||||||
|
}
|
||||||
|
|
||||||
/* need to stop background build if we're killed very early on */
|
/* need to stop background build if we're killed very early on */
|
||||||
pthread_cancel(params->allocation_map_builder_thread);
|
pthread_cancel(params->allocation_map_builder_thread);
|
||||||
@@ -823,14 +834,18 @@ void serve_cleanup(struct server* params,
|
|||||||
int need_mirror_lock;
|
int need_mirror_lock;
|
||||||
need_mirror_lock = !server_start_mirror_locked(params);
|
need_mirror_lock = !server_start_mirror_locked(params);
|
||||||
|
|
||||||
if ( need_mirror_lock ) { server_lock_start_mirror( params ); }
|
if (need_mirror_lock) {
|
||||||
|
server_lock_start_mirror(params);
|
||||||
|
}
|
||||||
{
|
{
|
||||||
if (server_is_mirroring(params)) {
|
if (server_is_mirroring(params)) {
|
||||||
server_abandon_mirror(params);
|
server_abandon_mirror(params);
|
||||||
}
|
}
|
||||||
server_prevent_mirror_start(params);
|
server_prevent_mirror_start(params);
|
||||||
}
|
}
|
||||||
if ( need_mirror_lock ) { server_unlock_start_mirror( params ); }
|
if (need_mirror_lock) {
|
||||||
|
server_unlock_start_mirror(params);
|
||||||
|
}
|
||||||
|
|
||||||
server_join_clients(params);
|
server_join_clients(params);
|
||||||
|
|
||||||
@@ -875,8 +890,11 @@ uint64_t server_mirror_bytes_remaining( struct server * serve )
|
|||||||
{
|
{
|
||||||
if (server_is_mirroring(serve)) {
|
if (server_is_mirroring(serve)) {
|
||||||
uint64_t bytes_to_xfer =
|
uint64_t bytes_to_xfer =
|
||||||
bitset_stream_queued_bytes( serve->allocation_map, BITSET_STREAM_SET ) +
|
bitset_stream_queued_bytes(serve->allocation_map,
|
||||||
( serve->size - serve->mirror->offset );
|
BITSET_STREAM_SET) + (serve->size -
|
||||||
|
serve->
|
||||||
|
mirror->
|
||||||
|
offset);
|
||||||
|
|
||||||
return bytes_to_xfer;
|
return bytes_to_xfer;
|
||||||
}
|
}
|
||||||
@@ -922,10 +940,8 @@ void server_abandon_mirror( struct server * serve )
|
|||||||
* We can set abandon_signal after mirror_super has checked it, but
|
* We can set abandon_signal after mirror_super has checked it, but
|
||||||
* before the reset. However, mirror_reset doesn't clear abandon_signal
|
* before the reset. However, mirror_reset doesn't clear abandon_signal
|
||||||
* so it'll just terminate early on the next pass. */
|
* so it'll just terminate early on the next pass. */
|
||||||
ERROR_UNLESS(
|
ERROR_UNLESS(self_pipe_signal(serve->mirror->abandon_signal),
|
||||||
self_pipe_signal( serve->mirror->abandon_signal ),
|
"Failed to signal abandon to mirror");
|
||||||
"Failed to signal abandon to mirror"
|
|
||||||
);
|
|
||||||
|
|
||||||
pthread_t tid = serve->mirror_super->thread;
|
pthread_t tid = serve->mirror_super->thread;
|
||||||
pthread_join(tid, NULL);
|
pthread_join(tid, NULL);
|
||||||
@@ -959,7 +975,9 @@ int do_serve( struct server* params, struct self_pipe * open_signal )
|
|||||||
|
|
||||||
/* Only signal that we are open for business once the server
|
/* Only signal that we are open for business once the server
|
||||||
socket is open */
|
socket is open */
|
||||||
if ( NULL != open_signal ) { self_pipe_signal( open_signal ); }
|
if (NULL != open_signal) {
|
||||||
|
self_pipe_signal(open_signal);
|
||||||
|
}
|
||||||
|
|
||||||
serve_init_allocation_map(params);
|
serve_init_allocation_map(params);
|
||||||
serve_accept_loop(params);
|
serve_accept_loop(params);
|
||||||
|
@@ -103,8 +103,7 @@ struct server {
|
|||||||
int success;
|
int success;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct server * server_create(
|
struct server *server_create(struct flexnbd *flexnbd,
|
||||||
struct flexnbd * flexnbd,
|
|
||||||
char *s_ip_address,
|
char *s_ip_address,
|
||||||
char *s_port,
|
char *s_port,
|
||||||
char *s_file,
|
char *s_file,
|
||||||
@@ -112,8 +111,7 @@ struct server * server_create(
|
|||||||
int acl_entries,
|
int acl_entries,
|
||||||
char **s_acl_entries,
|
char **s_acl_entries,
|
||||||
int max_nbd_clients,
|
int max_nbd_clients,
|
||||||
int use_killswitch,
|
int use_killswitch, int success);
|
||||||
int success );
|
|
||||||
void server_destroy(struct server *);
|
void server_destroy(struct server *);
|
||||||
int server_is_closed(struct server *serve);
|
int server_is_closed(struct server *serve);
|
||||||
void serve_signal_close(struct server *serve);
|
void serve_signal_close(struct server *serve);
|
||||||
@@ -167,4 +165,3 @@ struct mode_readwrite_params {
|
|||||||
|
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -21,17 +21,20 @@ struct status * status_create( struct server * serve )
|
|||||||
if (status->is_mirroring) {
|
if (status->is_mirroring) {
|
||||||
status->migration_duration = monotonic_time_ms();
|
status->migration_duration = monotonic_time_ms();
|
||||||
|
|
||||||
if ( ( serve->mirror->migration_started ) < status->migration_duration ) {
|
if ((serve->mirror->migration_started) <
|
||||||
|
status->migration_duration) {
|
||||||
status->migration_duration -= serve->mirror->migration_started;
|
status->migration_duration -= serve->mirror->migration_started;
|
||||||
} else {
|
} else {
|
||||||
status->migration_duration = 0;
|
status->migration_duration = 0;
|
||||||
}
|
}
|
||||||
status->migration_duration /= 1000;
|
status->migration_duration /= 1000;
|
||||||
status->migration_speed = server_mirror_bps(serve);
|
status->migration_speed = server_mirror_bps(serve);
|
||||||
status->migration_speed_limit = serve->mirror->max_bytes_per_second;
|
status->migration_speed_limit =
|
||||||
|
serve->mirror->max_bytes_per_second;
|
||||||
|
|
||||||
status->migration_seconds_left = server_mirror_eta(serve);
|
status->migration_seconds_left = server_mirror_eta(serve);
|
||||||
status->migration_bytes_left = server_mirror_bytes_remaining( serve );
|
status->migration_bytes_left =
|
||||||
|
server_mirror_bytes_remaining(serve);
|
||||||
}
|
}
|
||||||
|
|
||||||
server_unlock_start_mirror(serve);
|
server_unlock_start_mirror(serve);
|
||||||
@@ -77,4 +80,3 @@ void status_destroy( struct status * status )
|
|||||||
NULLCHECK(status);
|
NULLCHECK(status);
|
||||||
free(status);
|
free(status);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -101,4 +101,3 @@ void status_destroy( struct status * );
|
|||||||
|
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -13,7 +13,6 @@ START_TEST( test_null_acl )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_parses_single_line)
|
START_TEST(test_parses_single_line)
|
||||||
{
|
{
|
||||||
char *lines[] = { "127.0.0.1" };
|
char *lines[] = { "127.0.0.1" };
|
||||||
@@ -37,9 +36,11 @@ START_TEST( test_parses_multiple_lines )
|
|||||||
|
|
||||||
struct ip_and_mask *entry;
|
struct ip_and_mask *entry;
|
||||||
entry = &(*acl->entries)[0];
|
entry = &(*acl->entries)[0];
|
||||||
fail_unless(entry->ip.family == e0.family, "entry 0 has wrong family!");
|
fail_unless(entry->ip.family == e0.family,
|
||||||
|
"entry 0 has wrong family!");
|
||||||
entry = &(*acl->entries)[1];
|
entry = &(*acl->entries)[1];
|
||||||
fail_unless(entry->ip.family == e1.family, "entry 1 has wrong family!");
|
fail_unless(entry->ip.family == e1.family,
|
||||||
|
"entry 1 has wrong family!");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
@@ -52,7 +53,6 @@ START_TEST( test_destroy_doesnt_crash )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_includes_single_address)
|
START_TEST(test_includes_single_address)
|
||||||
{
|
{
|
||||||
char *lines[] = { "127.0.0.1" };
|
char *lines[] = { "127.0.0.1" };
|
||||||
@@ -109,12 +109,13 @@ START_TEST( test_includes_single_address_when_multiple_entries_exist )
|
|||||||
parse_ip_to_sockaddr(&e0.generic, "127.0.0.1");
|
parse_ip_to_sockaddr(&e0.generic, "127.0.0.1");
|
||||||
parse_ip_to_sockaddr(&e1.generic, "::1");
|
parse_ip_to_sockaddr(&e1.generic, "::1");
|
||||||
|
|
||||||
fail_unless( acl_includes( acl, &e0 ), "Included address 0 wasn't covered" );
|
fail_unless(acl_includes(acl, &e0),
|
||||||
fail_unless( acl_includes( acl, &e1 ), "Included address 1 wasn't covered" );
|
"Included address 0 wasn't covered");
|
||||||
|
fail_unless(acl_includes(acl, &e1),
|
||||||
|
"Included address 1 wasn't covered");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_doesnt_include_other_address)
|
START_TEST(test_doesnt_include_other_address)
|
||||||
{
|
{
|
||||||
char *lines[] = { "127.0.0.1" };
|
char *lines[] = { "127.0.0.1" };
|
||||||
@@ -163,7 +164,6 @@ START_TEST( test_default_deny_rejects )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_default_accept_rejects)
|
START_TEST(test_default_accept_rejects)
|
||||||
{
|
{
|
||||||
struct acl *acl = acl_create(0, NULL, 0);
|
struct acl *acl = acl_create(0, NULL, 0);
|
||||||
@@ -175,7 +175,6 @@ START_TEST( test_default_accept_rejects )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * acl_suite(void)
|
Suite * acl_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("acl");
|
Suite *s = suite_create("acl");
|
||||||
@@ -189,14 +188,19 @@ Suite* acl_suite(void)
|
|||||||
tcase_add_test(tc_includes, test_parses_multiple_lines);
|
tcase_add_test(tc_includes, test_parses_multiple_lines);
|
||||||
|
|
||||||
tcase_add_test(tc_includes, test_includes_single_address);
|
tcase_add_test(tc_includes, test_includes_single_address);
|
||||||
tcase_add_test(tc_includes, test_includes_single_address_when_netmask_specified_ipv4);
|
tcase_add_test(tc_includes,
|
||||||
tcase_add_test(tc_includes, test_includes_single_address_when_netmask_specified_ipv6);
|
test_includes_single_address_when_netmask_specified_ipv4);
|
||||||
|
tcase_add_test(tc_includes,
|
||||||
|
test_includes_single_address_when_netmask_specified_ipv6);
|
||||||
|
|
||||||
tcase_add_test(tc_includes, test_includes_single_address_when_multiple_entries_exist);
|
tcase_add_test(tc_includes,
|
||||||
|
test_includes_single_address_when_multiple_entries_exist);
|
||||||
|
|
||||||
tcase_add_test(tc_includes, test_doesnt_include_other_address);
|
tcase_add_test(tc_includes, test_doesnt_include_other_address);
|
||||||
tcase_add_test(tc_includes, test_doesnt_include_other_address_when_netmask_specified);
|
tcase_add_test(tc_includes,
|
||||||
tcase_add_test(tc_includes, test_doesnt_include_other_address_when_multiple_entries_exist);
|
test_doesnt_include_other_address_when_netmask_specified);
|
||||||
|
tcase_add_test(tc_includes,
|
||||||
|
test_doesnt_include_other_address_when_multiple_entries_exist);
|
||||||
|
|
||||||
tcase_add_test(tc_includes, test_default_deny_rejects);
|
tcase_add_test(tc_includes, test_default_deny_rejects);
|
||||||
tcase_add_test(tc_includes, test_default_accept_rejects);
|
tcase_add_test(tc_includes, test_default_accept_rejects);
|
||||||
@@ -226,4 +230,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -66,18 +66,18 @@ START_TEST(test_bit_ranges)
|
|||||||
|
|
||||||
for (i = 0; i < 64; i++) {
|
for (i = 0; i < 64; i++) {
|
||||||
bit_set_range(buffer, i * 64, i);
|
bit_set_range(buffer, i * 64, i);
|
||||||
fail_unless(
|
fail_unless(longs[i] == (1ULL << i) - 1,
|
||||||
longs[i] == (1ULL<<i)-1,
|
|
||||||
"longs[%ld] = %lx SHOULD BE %lx",
|
"longs[%ld] = %lx SHOULD BE %lx",
|
||||||
i, longs[i], (1ULL<<i)-1
|
i, longs[i], (1ULL << i) - 1);
|
||||||
);
|
|
||||||
|
|
||||||
fail_unless(longs[i+1] == 0, "bit_set_range overshot at i=%d", i);
|
fail_unless(longs[i + 1] == 0, "bit_set_range overshot at i=%d",
|
||||||
|
i);
|
||||||
}
|
}
|
||||||
|
|
||||||
for (i = 0; i < 64; i++) {
|
for (i = 0; i < 64; i++) {
|
||||||
bit_clear_range(buffer, i * 64, i);
|
bit_clear_range(buffer, i * 64, i);
|
||||||
fail_unless(longs[i] == 0, "bit_clear_range didn't work at i=%d", i);
|
fail_unless(longs[i] == 0, "bit_clear_range didn't work at i=%d",
|
||||||
|
i);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
@@ -86,7 +86,8 @@ START_TEST(test_bit_runs)
|
|||||||
{
|
{
|
||||||
bitfield_word_t buffer[BIT_WORDS_FOR_SIZE(256)];
|
bitfield_word_t buffer[BIT_WORDS_FOR_SIZE(256)];
|
||||||
int i, ptr = 0, runs[] = {
|
int i, ptr = 0, runs[] = {
|
||||||
56,97,22,12,83,1,45,80,85,51,64,40,63,67,75,64,94,81,79,62
|
56, 97, 22, 12, 83, 1, 45, 80, 85, 51, 64, 40, 63, 67, 75, 64, 94,
|
||||||
|
81, 79, 62
|
||||||
};
|
};
|
||||||
|
|
||||||
memset(buffer, 0, 256);
|
memset(buffer, 0, 256);
|
||||||
@@ -101,11 +102,8 @@ START_TEST(test_bit_runs)
|
|||||||
|
|
||||||
for (i = 0; i < 20; i += 1) {
|
for (i = 0; i < 20; i += 1) {
|
||||||
int run = bit_run_count(buffer, ptr, 2048 - ptr, NULL);
|
int run = bit_run_count(buffer, ptr, 2048 - ptr, NULL);
|
||||||
fail_unless(
|
fail_unless(run == runs[i],
|
||||||
run == runs[i],
|
"run %d should have been %d, was %d", i, runs[i], run);
|
||||||
"run %d should have been %d, was %d",
|
|
||||||
i, runs[i], run
|
|
||||||
);
|
|
||||||
ptr += runs[i];
|
ptr += runs[i];
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -145,7 +143,6 @@ START_TEST(test_bitset)
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_bitset_set)
|
START_TEST(test_bitset_set)
|
||||||
{
|
{
|
||||||
struct bitset *map;
|
struct bitset *map;
|
||||||
@@ -176,7 +173,6 @@ START_TEST( test_bitset_set )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_bitset_clear)
|
START_TEST(test_bitset_clear)
|
||||||
{
|
{
|
||||||
struct bitset *map;
|
struct bitset *map;
|
||||||
@@ -443,10 +439,14 @@ START_TEST(test_bitset_stream_queued_bytes)
|
|||||||
bitset_clear_range(map, 0, 2);
|
bitset_clear_range(map, 0, 2);
|
||||||
bitset_disable_stream(map);
|
bitset_disable_stream(map);
|
||||||
|
|
||||||
ck_assert_int_eq( 64, bitset_stream_queued_bytes( map, BITSET_STREAM_ON ) );
|
ck_assert_int_eq(64,
|
||||||
ck_assert_int_eq( 80, bitset_stream_queued_bytes( map, BITSET_STREAM_SET ) );
|
bitset_stream_queued_bytes(map, BITSET_STREAM_ON));
|
||||||
ck_assert_int_eq( 82, bitset_stream_queued_bytes( map, BITSET_STREAM_UNSET ) );
|
ck_assert_int_eq(80,
|
||||||
ck_assert_int_eq( 64, bitset_stream_queued_bytes( map, BITSET_STREAM_OFF ) );
|
bitset_stream_queued_bytes(map, BITSET_STREAM_SET));
|
||||||
|
ck_assert_int_eq(82,
|
||||||
|
bitset_stream_queued_bytes(map, BITSET_STREAM_UNSET));
|
||||||
|
ck_assert_int_eq(64,
|
||||||
|
bitset_stream_queued_bytes(map, BITSET_STREAM_OFF));
|
||||||
bitset_free(map);
|
bitset_free(map);
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
@@ -471,7 +471,8 @@ Suite* bitset_suite(void)
|
|||||||
tcase_add_test(tc_bitset, test_bitset_set_range);
|
tcase_add_test(tc_bitset, test_bitset_set_range);
|
||||||
tcase_add_test(tc_bitset, test_bitset_clear_range);
|
tcase_add_test(tc_bitset, test_bitset_clear_range);
|
||||||
tcase_add_test(tc_bitset, test_bitset_set_range_doesnt_push_to_stream);
|
tcase_add_test(tc_bitset, test_bitset_set_range_doesnt_push_to_stream);
|
||||||
tcase_add_test(tc_bitset, test_bitset_clear_range_doesnt_push_to_stream);
|
tcase_add_test(tc_bitset,
|
||||||
|
test_bitset_clear_range_doesnt_push_to_stream);
|
||||||
suite_add_tcase(s, tc_bitset);
|
suite_add_tcase(s, tc_bitset);
|
||||||
|
|
||||||
|
|
||||||
@@ -497,4 +498,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -10,6 +10,7 @@
|
|||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
|
|
||||||
struct server fake_server = { 0 };
|
struct server fake_server = { 0 };
|
||||||
|
|
||||||
#define FAKE_SERVER &fake_server
|
#define FAKE_SERVER &fake_server
|
||||||
#define FAKE_SOCKET (42)
|
#define FAKE_SOCKET (42)
|
||||||
|
|
||||||
@@ -23,7 +24,6 @@ START_TEST( test_assigns_socket )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_assigns_server)
|
START_TEST(test_assigns_server)
|
||||||
{
|
{
|
||||||
struct client *c;
|
struct client *c;
|
||||||
@@ -37,7 +37,6 @@ START_TEST( test_assigns_server )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_opens_stop_signal)
|
START_TEST(test_opens_stop_signal)
|
||||||
{
|
{
|
||||||
struct client *c = client_create(FAKE_SERVER, FAKE_SOCKET);
|
struct client *c = client_create(FAKE_SERVER, FAKE_SOCKET);
|
||||||
@@ -50,7 +49,6 @@ START_TEST( test_opens_stop_signal )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
int fd_is_closed(int);
|
int fd_is_closed(int);
|
||||||
|
|
||||||
START_TEST(test_closes_stop_signal)
|
START_TEST(test_closes_stop_signal)
|
||||||
@@ -66,7 +64,6 @@ START_TEST( test_closes_stop_signal )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_read_request_quits_on_stop_signal)
|
START_TEST(test_read_request_quits_on_stop_signal)
|
||||||
{
|
{
|
||||||
int fds[2];
|
int fds[2];
|
||||||
@@ -84,7 +81,6 @@ START_TEST( test_read_request_quits_on_stop_signal )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * client_suite(void)
|
Suite * client_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("client");
|
Suite *s = suite_create("client");
|
||||||
@@ -119,4 +115,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -15,7 +15,6 @@ START_TEST( test_assigns_sock_name )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * control_suite(void)
|
Suite * control_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("control");
|
Suite *s = suite_create("control");
|
||||||
@@ -39,4 +38,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -5,8 +5,7 @@
|
|||||||
|
|
||||||
START_TEST(test_listening_assigns_sock)
|
START_TEST(test_listening_assigns_sock)
|
||||||
{
|
{
|
||||||
struct flexnbd * flexnbd = flexnbd_create_listening(
|
struct flexnbd *flexnbd = flexnbd_create_listening("127.0.0.1",
|
||||||
"127.0.0.1",
|
|
||||||
"4777",
|
"4777",
|
||||||
"fakefile",
|
"fakefile",
|
||||||
"fakesock",
|
"fakesock",
|
||||||
@@ -17,7 +16,6 @@ START_TEST( test_listening_assigns_sock )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * flexnbd_suite(void)
|
Suite * flexnbd_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("flexnbd");
|
Suite *s = suite_create("flexnbd");
|
||||||
@@ -41,4 +39,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -12,22 +12,23 @@ START_TEST( test_mutex_create )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_mutex_lock)
|
START_TEST(test_mutex_lock)
|
||||||
{
|
{
|
||||||
struct flexthread_mutex *ftm = flexthread_mutex_create();
|
struct flexthread_mutex *ftm = flexthread_mutex_create();
|
||||||
|
|
||||||
fail_if( flexthread_mutex_held( ftm ), "Flexthread_mutex is held before lock" );
|
fail_if(flexthread_mutex_held(ftm),
|
||||||
|
"Flexthread_mutex is held before lock");
|
||||||
flexthread_mutex_lock(ftm);
|
flexthread_mutex_lock(ftm);
|
||||||
fail_unless( flexthread_mutex_held( ftm ), "Flexthread_mutex is not held inside lock" );
|
fail_unless(flexthread_mutex_held(ftm),
|
||||||
|
"Flexthread_mutex is not held inside lock");
|
||||||
flexthread_mutex_unlock(ftm);
|
flexthread_mutex_unlock(ftm);
|
||||||
fail_if( flexthread_mutex_held( ftm ), "Flexthread_mutex is held after unlock" );
|
fail_if(flexthread_mutex_held(ftm),
|
||||||
|
"Flexthread_mutex is held after unlock");
|
||||||
|
|
||||||
flexthread_mutex_destroy(ftm);
|
flexthread_mutex_destroy(ftm);
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * flexthread_suite(void)
|
Suite * flexthread_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("flexthread");
|
Suite *s = suite_create("flexthread");
|
||||||
@@ -59,4 +60,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -17,7 +17,6 @@ START_TEST( test_read_until_newline_returns_line_length_plus_null )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_read_until_newline_inserts_null)
|
START_TEST(test_read_until_newline_inserts_null)
|
||||||
{
|
{
|
||||||
int fds[2];
|
int fds[2];
|
||||||
@@ -34,7 +33,6 @@ START_TEST( test_read_until_newline_inserts_null )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_read_empty_line_inserts_null)
|
START_TEST(test_read_empty_line_inserts_null)
|
||||||
{
|
{
|
||||||
int fds[2];
|
int fds[2];
|
||||||
@@ -50,7 +48,6 @@ START_TEST( test_read_empty_line_inserts_null )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_read_eof_returns_err)
|
START_TEST(test_read_eof_returns_err)
|
||||||
{
|
{
|
||||||
int fds[2];
|
int fds[2];
|
||||||
@@ -65,7 +62,6 @@ START_TEST( test_read_eof_returns_err )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_read_eof_fills_line)
|
START_TEST(test_read_eof_fills_line)
|
||||||
{
|
{
|
||||||
int fds[2];
|
int fds[2];
|
||||||
@@ -82,7 +78,6 @@ START_TEST( test_read_eof_fills_line )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_read_lines_until_blankline)
|
START_TEST(test_read_lines_until_blankline)
|
||||||
{
|
{
|
||||||
char **lines = NULL;
|
char **lines = NULL;
|
||||||
@@ -98,21 +93,25 @@ START_TEST( test_read_lines_until_blankline )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * ioutil_suite(void)
|
Suite * ioutil_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("ioutil");
|
Suite *s = suite_create("ioutil");
|
||||||
|
|
||||||
TCase *tc_read_until_newline = tcase_create("read_until_newline");
|
TCase *tc_read_until_newline = tcase_create("read_until_newline");
|
||||||
TCase *tc_read_lines_until_blankline = tcase_create("read_lines_until_blankline");
|
TCase *tc_read_lines_until_blankline =
|
||||||
|
tcase_create("read_lines_until_blankline");
|
||||||
|
|
||||||
tcase_add_test(tc_read_until_newline, test_read_until_newline_returns_line_length_plus_null);
|
tcase_add_test(tc_read_until_newline,
|
||||||
tcase_add_test(tc_read_until_newline, test_read_until_newline_inserts_null);
|
test_read_until_newline_returns_line_length_plus_null);
|
||||||
tcase_add_test(tc_read_until_newline, test_read_empty_line_inserts_null);
|
tcase_add_test(tc_read_until_newline,
|
||||||
|
test_read_until_newline_inserts_null);
|
||||||
|
tcase_add_test(tc_read_until_newline,
|
||||||
|
test_read_empty_line_inserts_null);
|
||||||
tcase_add_test(tc_read_until_newline, test_read_eof_returns_err);
|
tcase_add_test(tc_read_until_newline, test_read_eof_returns_err);
|
||||||
tcase_add_test(tc_read_until_newline, test_read_eof_fills_line);
|
tcase_add_test(tc_read_until_newline, test_read_eof_fills_line);
|
||||||
|
|
||||||
tcase_add_test(tc_read_lines_until_blankline, test_read_lines_until_blankline );
|
tcase_add_test(tc_read_lines_until_blankline,
|
||||||
|
test_read_lines_until_blankline);
|
||||||
|
|
||||||
suite_add_tcase(s, tc_read_until_newline);
|
suite_add_tcase(s, tc_read_until_newline);
|
||||||
suite_add_tcase(s, tc_read_lines_until_blankline);
|
suite_add_tcase(s, tc_read_lines_until_blankline);
|
||||||
@@ -131,4 +130,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -14,12 +14,11 @@ START_TEST( test_allocs_cvar )
|
|||||||
memset(&cond_zero, 'X', sizeof(cond_zero));
|
memset(&cond_zero, 'X', sizeof(cond_zero));
|
||||||
fail_if(memcmp(&cond_zero, &mbox->filled_cond, sizeof(cond_zero)) == 0,
|
fail_if(memcmp(&cond_zero, &mbox->filled_cond, sizeof(cond_zero)) == 0,
|
||||||
"Condition variable not allocated");
|
"Condition variable not allocated");
|
||||||
fail_if( memcmp( &cond_zero, &mbox->emptied_cond, sizeof( cond_zero ) ) == 0 ,
|
fail_if(memcmp(&cond_zero, &mbox->emptied_cond, sizeof(cond_zero)) ==
|
||||||
"Condition variable not allocated" );
|
0, "Condition variable not allocated");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_post_stores_value)
|
START_TEST(test_post_stores_value)
|
||||||
{
|
{
|
||||||
struct mbox *mbox = mbox_create();
|
struct mbox *mbox = mbox_create();
|
||||||
@@ -32,7 +31,6 @@ START_TEST( test_post_stores_value )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
void *mbox_receive_runner(void *mbox_uncast)
|
void *mbox_receive_runner(void *mbox_uncast)
|
||||||
{
|
{
|
||||||
struct mbox *mbox = (struct mbox *) mbox_uncast;
|
struct mbox *mbox = (struct mbox *) mbox_uncast;
|
||||||
@@ -58,14 +56,12 @@ START_TEST( test_receive_blocks_until_post )
|
|||||||
mbox_post(mbox, deadbeef);
|
mbox_post(mbox, deadbeef);
|
||||||
fail_unless(0 == pthread_join(receiver, &retval),
|
fail_unless(0 == pthread_join(receiver, &retval),
|
||||||
"Failed to join the receiver thread");
|
"Failed to join the receiver thread");
|
||||||
fail_unless( retval == deadbeef,
|
fail_unless(retval == deadbeef, "Return value was wrong");
|
||||||
"Return value was wrong" );
|
|
||||||
|
|
||||||
|
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * mbox_suite(void)
|
Suite * mbox_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("mbox");
|
Suite *s = suite_create("mbox");
|
||||||
@@ -101,4 +97,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -13,12 +13,13 @@ START_TEST(test_init_passwd)
|
|||||||
memset(init_raw.passwd, 0, 8);
|
memset(init_raw.passwd, 0, 8);
|
||||||
nbd_h2r_init(&init, &init_raw);
|
nbd_h2r_init(&init, &init_raw);
|
||||||
|
|
||||||
fail_unless( memcmp( init.passwd, INIT_PASSWD, 8 ) == 0, "The password was not copied." );
|
fail_unless(memcmp(init.passwd, INIT_PASSWD, 8) == 0,
|
||||||
fail_unless( memcmp( init_raw.passwd, INIT_PASSWD, 8 ) == 0, "The password was not copied back." );
|
"The password was not copied.");
|
||||||
|
fail_unless(memcmp(init_raw.passwd, INIT_PASSWD, 8) == 0,
|
||||||
|
"The password was not copied back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_init_magic)
|
START_TEST(test_init_magic)
|
||||||
{
|
{
|
||||||
struct nbd_init_raw init_raw;
|
struct nbd_init_raw init_raw;
|
||||||
@@ -30,11 +31,11 @@ START_TEST(test_init_magic)
|
|||||||
|
|
||||||
init.magic = 67890;
|
init.magic = 67890;
|
||||||
nbd_h2r_init(&init, &init_raw);
|
nbd_h2r_init(&init, &init_raw);
|
||||||
fail_unless( htobe64( 67890 ) == init_raw.magic, "Magic was not converted back." );
|
fail_unless(htobe64(67890) == init_raw.magic,
|
||||||
|
"Magic was not converted back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_init_size)
|
START_TEST(test_init_size)
|
||||||
{
|
{
|
||||||
struct nbd_init_raw init_raw;
|
struct nbd_init_raw init_raw;
|
||||||
@@ -46,11 +47,11 @@ START_TEST(test_init_size)
|
|||||||
|
|
||||||
init.size = 67890;
|
init.size = 67890;
|
||||||
nbd_h2r_init(&init, &init_raw);
|
nbd_h2r_init(&init, &init_raw);
|
||||||
fail_unless( htobe64( 67890 ) == init_raw.size, "Size was not converted back." );
|
fail_unless(htobe64(67890) == init_raw.size,
|
||||||
|
"Size was not converted back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_request_magic)
|
START_TEST(test_request_magic)
|
||||||
{
|
{
|
||||||
struct nbd_request_raw request_raw;
|
struct nbd_request_raw request_raw;
|
||||||
@@ -58,11 +59,13 @@ START_TEST(test_request_magic )
|
|||||||
|
|
||||||
request_raw.magic = 12345;
|
request_raw.magic = 12345;
|
||||||
nbd_r2h_request(&request_raw, &request);
|
nbd_r2h_request(&request_raw, &request);
|
||||||
fail_unless( be32toh( 12345 ) == request.magic, "Magic was not converted." );
|
fail_unless(be32toh(12345) == request.magic,
|
||||||
|
"Magic was not converted.");
|
||||||
|
|
||||||
request.magic = 67890;
|
request.magic = 67890;
|
||||||
nbd_h2r_request(&request, &request_raw);
|
nbd_h2r_request(&request, &request_raw);
|
||||||
fail_unless( htobe32( 67890 ) == request_raw.magic, "Magic was not converted back." );
|
fail_unless(htobe32(67890) == request_raw.magic,
|
||||||
|
"Magic was not converted back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
@@ -77,12 +80,11 @@ START_TEST(test_request_type)
|
|||||||
|
|
||||||
request.type = 234;
|
request.type = 234;
|
||||||
nbd_h2r_request(&request, &request_raw);
|
nbd_h2r_request(&request, &request_raw);
|
||||||
fail_unless( htobe16( 234 ) == request_raw.type, "Type was not converted back." );
|
fail_unless(htobe16(234) == request_raw.type,
|
||||||
|
"Type was not converted back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_request_flags)
|
START_TEST(test_request_flags)
|
||||||
{
|
{
|
||||||
struct nbd_request_raw request_raw;
|
struct nbd_request_raw request_raw;
|
||||||
@@ -90,16 +92,16 @@ START_TEST(test_request_flags)
|
|||||||
|
|
||||||
request_raw.flags = 123;
|
request_raw.flags = 123;
|
||||||
nbd_r2h_request(&request_raw, &request);
|
nbd_r2h_request(&request_raw, &request);
|
||||||
fail_unless( be16toh( 123 ) == request.flags, "Flags were not converted." );
|
fail_unless(be16toh(123) == request.flags,
|
||||||
|
"Flags were not converted.");
|
||||||
|
|
||||||
request.flags = 234;
|
request.flags = 234;
|
||||||
nbd_h2r_request(&request, &request_raw);
|
nbd_h2r_request(&request, &request_raw);
|
||||||
fail_unless( htobe16( 234 ) == request_raw.flags, "Flags were not converted back." );
|
fail_unless(htobe16(234) == request_raw.flags,
|
||||||
|
"Flags were not converted back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_request_handle)
|
START_TEST(test_request_handle)
|
||||||
{
|
{
|
||||||
struct nbd_request_raw request_raw;
|
struct nbd_request_raw request_raw;
|
||||||
@@ -111,13 +113,13 @@ START_TEST(test_request_handle)
|
|||||||
request_raw.handle.w = 0;
|
request_raw.handle.w = 0;
|
||||||
nbd_h2r_request(&request, &request_raw);
|
nbd_h2r_request(&request, &request_raw);
|
||||||
|
|
||||||
fail_unless( memcmp( request.handle.b, "MYHANDLE", 8 ) == 0, "The handle was not copied." );
|
fail_unless(memcmp(request.handle.b, "MYHANDLE", 8) == 0,
|
||||||
fail_unless( memcmp( request_raw.handle.b, "MYHANDLE", 8 ) == 0, "The handle was not copied back." );
|
"The handle was not copied.");
|
||||||
|
fail_unless(memcmp(request_raw.handle.b, "MYHANDLE", 8) == 0,
|
||||||
|
"The handle was not copied back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_request_from)
|
START_TEST(test_request_from)
|
||||||
{
|
{
|
||||||
struct nbd_request_raw request_raw;
|
struct nbd_request_raw request_raw;
|
||||||
@@ -129,12 +131,11 @@ START_TEST(test_request_from )
|
|||||||
|
|
||||||
request.from = 67890;
|
request.from = 67890;
|
||||||
nbd_h2r_request(&request, &request_raw);
|
nbd_h2r_request(&request, &request_raw);
|
||||||
fail_unless( htobe64( 67890 ) == request_raw.from, "From was not converted back." );
|
fail_unless(htobe64(67890) == request_raw.from,
|
||||||
|
"From was not converted back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_request_len)
|
START_TEST(test_request_len)
|
||||||
{
|
{
|
||||||
struct nbd_request_raw request_raw;
|
struct nbd_request_raw request_raw;
|
||||||
@@ -146,11 +147,11 @@ START_TEST(test_request_len )
|
|||||||
|
|
||||||
request.len = 67890;
|
request.len = 67890;
|
||||||
nbd_h2r_request(&request, &request_raw);
|
nbd_h2r_request(&request, &request_raw);
|
||||||
fail_unless( htobe32( 67890 ) == request_raw.len, "Type was not converted back." );
|
fail_unless(htobe32(67890) == request_raw.len,
|
||||||
|
"Type was not converted back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_reply_magic)
|
START_TEST(test_reply_magic)
|
||||||
{
|
{
|
||||||
struct nbd_reply_raw reply_raw;
|
struct nbd_reply_raw reply_raw;
|
||||||
@@ -162,11 +163,11 @@ START_TEST(test_reply_magic )
|
|||||||
|
|
||||||
reply.magic = 67890;
|
reply.magic = 67890;
|
||||||
nbd_h2r_reply(&reply, &reply_raw);
|
nbd_h2r_reply(&reply, &reply_raw);
|
||||||
fail_unless( htobe32( 67890 ) == reply_raw.magic, "Magic was not converted back." );
|
fail_unless(htobe32(67890) == reply_raw.magic,
|
||||||
|
"Magic was not converted back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_reply_error)
|
START_TEST(test_reply_error)
|
||||||
{
|
{
|
||||||
struct nbd_reply_raw reply_raw;
|
struct nbd_reply_raw reply_raw;
|
||||||
@@ -178,7 +179,8 @@ START_TEST(test_reply_error )
|
|||||||
|
|
||||||
reply.error = 67890;
|
reply.error = 67890;
|
||||||
nbd_h2r_reply(&reply, &reply_raw);
|
nbd_h2r_reply(&reply, &reply_raw);
|
||||||
fail_unless( htobe32( 67890 ) == reply_raw.error, "Error was not converted back." );
|
fail_unless(htobe32(67890) == reply_raw.error,
|
||||||
|
"Error was not converted back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
@@ -193,12 +195,13 @@ START_TEST(test_reply_handle)
|
|||||||
reply_raw.handle.w = 0;
|
reply_raw.handle.w = 0;
|
||||||
nbd_h2r_reply(&reply, &reply_raw);
|
nbd_h2r_reply(&reply, &reply_raw);
|
||||||
|
|
||||||
fail_unless( memcmp( reply.handle.b, "MYHANDLE", 8 ) == 0, "The handle was not copied." );
|
fail_unless(memcmp(reply.handle.b, "MYHANDLE", 8) == 0,
|
||||||
fail_unless( memcmp( reply_raw.handle.b, "MYHANDLE", 8 ) == 0, "The handle was not copied back." );
|
"The handle was not copied.");
|
||||||
|
fail_unless(memcmp(reply_raw.handle.b, "MYHANDLE", 8) == 0,
|
||||||
|
"The handle was not copied back.");
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_convert_from)
|
START_TEST(test_convert_from)
|
||||||
{
|
{
|
||||||
/* Check that we can correctly pull numbers out of an
|
/* Check that we can correctly pull numbers out of an
|
||||||
@@ -258,4 +261,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -13,8 +13,6 @@ START_TEST( test_can_parse_ip_address_twice )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Suite * parse_suite(void)
|
Suite * parse_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("parse");
|
Suite *s = suite_create("parse");
|
||||||
@@ -44,4 +42,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -54,8 +54,7 @@ void * responder( void *respond_uncast )
|
|||||||
nbd_r2h_request(&request_raw, &resp->received);
|
nbd_r2h_request(&request_raw, &resp->received);
|
||||||
if (resp->do_fail) {
|
if (resp->do_fail) {
|
||||||
fd_write_reply(sock_fd, wrong_handle, 0);
|
fd_write_reply(sock_fd, wrong_handle, 0);
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
fd_write_reply(sock_fd, resp->received.handle.w, 0);
|
fd_write_reply(sock_fd, resp->received.handle.w, 0);
|
||||||
}
|
}
|
||||||
write(sock_fd, "12345678", 8);
|
write(sock_fd, "12345678", 8);
|
||||||
@@ -66,17 +65,20 @@ void * responder( void *respond_uncast )
|
|||||||
|
|
||||||
struct respond *respond_create(int do_fail)
|
struct respond *respond_create(int do_fail)
|
||||||
{
|
{
|
||||||
struct respond * respond = (struct respond *)calloc( 1, sizeof( struct respond ) );
|
struct respond *respond =
|
||||||
|
(struct respond *) calloc(1, sizeof(struct respond));
|
||||||
socketpair(PF_UNIX, SOCK_STREAM, 0, respond->sock_fds);
|
socketpair(PF_UNIX, SOCK_STREAM, 0, respond->sock_fds);
|
||||||
respond->do_fail = do_fail;
|
respond->do_fail = do_fail;
|
||||||
|
|
||||||
pthread_attr_init(&respond->thread_attr);
|
pthread_attr_init(&respond->thread_attr);
|
||||||
pthread_create( &respond->thread_id, &respond->thread_attr, responder, respond );
|
pthread_create(&respond->thread_id, &respond->thread_attr, responder,
|
||||||
|
respond);
|
||||||
|
|
||||||
return respond;
|
return respond;
|
||||||
}
|
}
|
||||||
|
|
||||||
void respond_destroy( struct respond * respond ){
|
void respond_destroy(struct respond *respond)
|
||||||
|
{
|
||||||
NULLCHECK(respond);
|
NULLCHECK(respond);
|
||||||
|
|
||||||
pthread_join(respond->thread_id, NULL);
|
pthread_join(respond->thread_id, NULL);
|
||||||
@@ -121,7 +123,6 @@ START_TEST( test_rejects_mismatched_handle )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_accepts_matched_handle)
|
START_TEST(test_accepts_matched_handle)
|
||||||
{
|
{
|
||||||
struct respond *respond = respond_create(0);
|
struct respond *respond = respond_create(0);
|
||||||
@@ -135,7 +136,6 @@ START_TEST( test_accepts_matched_handle )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_disconnect_doesnt_read_reply)
|
START_TEST(test_disconnect_doesnt_read_reply)
|
||||||
{
|
{
|
||||||
struct respond *respond = respond_create(1);
|
struct respond *respond = respond_create(1);
|
||||||
@@ -146,7 +146,6 @@ START_TEST( test_disconnect_doesnt_read_reply )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * readwrite_suite(void)
|
Suite * readwrite_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("readwrite");
|
Suite *s = suite_create("readwrite");
|
||||||
@@ -162,7 +161,8 @@ Suite* readwrite_suite(void)
|
|||||||
* because we want to know that the sender won't even try to
|
* because we want to know that the sender won't even try to
|
||||||
* read the response.
|
* read the response.
|
||||||
*/
|
*/
|
||||||
tcase_add_exit_test( tc_disconnect, test_disconnect_doesnt_read_reply,0 );
|
tcase_add_exit_test(tc_disconnect, test_disconnect_doesnt_read_reply,
|
||||||
|
0);
|
||||||
|
|
||||||
suite_add_tcase(s, tc_transfer);
|
suite_add_tcase(s, tc_transfer);
|
||||||
suite_add_tcase(s, tc_disconnect);
|
suite_add_tcase(s, tc_disconnect);
|
||||||
@@ -190,4 +190,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -24,7 +24,6 @@ START_TEST( test_opens_pipe )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
void *signal_thread(void *thing)
|
void *signal_thread(void *thing)
|
||||||
{
|
{
|
||||||
struct self_pipe *sig = (struct self_pipe *) thing;
|
struct self_pipe *sig = (struct self_pipe *) thing;
|
||||||
@@ -63,14 +62,14 @@ START_TEST( test_signals )
|
|||||||
}
|
}
|
||||||
self_pipe_signal_clear(sig);
|
self_pipe_signal_clear(sig);
|
||||||
|
|
||||||
fail_unless( self_pipe_fd_isset( sig, &fds ), "Signalled pipe was not FD_ISSET." );
|
fail_unless(self_pipe_fd_isset(sig, &fds),
|
||||||
|
"Signalled pipe was not FD_ISSET.");
|
||||||
pthread_join(signal_thread_id, NULL);
|
pthread_join(signal_thread_id, NULL);
|
||||||
|
|
||||||
self_pipe_destroy(sig);
|
self_pipe_destroy(sig);
|
||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_clear_returns_immediately)
|
START_TEST(test_clear_returns_immediately)
|
||||||
{
|
{
|
||||||
struct self_pipe *sig;
|
struct self_pipe *sig;
|
||||||
@@ -79,7 +78,6 @@ START_TEST( test_clear_returns_immediately )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_destroy_closes_read_pipe)
|
START_TEST(test_destroy_closes_read_pipe)
|
||||||
{
|
{
|
||||||
struct self_pipe *sig;
|
struct self_pipe *sig;
|
||||||
@@ -116,7 +114,6 @@ START_TEST( test_destroy_closes_read_pipe )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_destroy_closes_write_pipe)
|
START_TEST(test_destroy_closes_write_pipe)
|
||||||
{
|
{
|
||||||
struct self_pipe *sig;
|
struct self_pipe *sig;
|
||||||
@@ -127,7 +124,8 @@ START_TEST( test_destroy_closes_write_pipe )
|
|||||||
orig_write_fd = sig->write_fd;
|
orig_write_fd = sig->write_fd;
|
||||||
self_pipe_destroy(sig);
|
self_pipe_destroy(sig);
|
||||||
|
|
||||||
while ( ( write_len = write( orig_write_fd, "", 0 ) ) == -1 && errno == EINTR );
|
while ((write_len = write(orig_write_fd, "", 0)) == -1
|
||||||
|
&& errno == EINTR);
|
||||||
|
|
||||||
switch (write_len) {
|
switch (write_len) {
|
||||||
case 0:
|
case 0:
|
||||||
@@ -158,8 +156,6 @@ START_TEST( test_destroy_closes_write_pipe )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Suite * self_pipe_suite(void)
|
Suite * self_pipe_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("self_pipe");
|
Suite *s = suite_create("self_pipe");
|
||||||
@@ -195,4 +191,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -54,7 +54,9 @@ void setup( void )
|
|||||||
|
|
||||||
void teardown(void)
|
void teardown(void)
|
||||||
{
|
{
|
||||||
if( dummy_file ){ unlink( dummy_file ); }
|
if (dummy_file) {
|
||||||
|
unlink(dummy_file);
|
||||||
|
}
|
||||||
free(dummy_file);
|
free(dummy_file);
|
||||||
dummy_file = NULL;
|
dummy_file = NULL;
|
||||||
}
|
}
|
||||||
@@ -64,7 +66,9 @@ START_TEST( test_replaces_acl )
|
|||||||
{
|
{
|
||||||
struct flexnbd flexnbd;
|
struct flexnbd flexnbd;
|
||||||
flexnbd.signal_fd = -1;
|
flexnbd.signal_fd = -1;
|
||||||
struct server * s = server_create( &flexnbd, "127.0.0.1", "0", dummy_file, 0, 0, NULL, 1, 0, 1 );
|
struct server *s =
|
||||||
|
server_create(&flexnbd, "127.0.0.1", "0", dummy_file, 0, 0, NULL,
|
||||||
|
1, 0, 1);
|
||||||
struct acl *new_acl = acl_create(0, NULL, 0);
|
struct acl *new_acl = acl_create(0, NULL, 0);
|
||||||
|
|
||||||
server_replace_acl(s, new_acl);
|
server_replace_acl(s, new_acl);
|
||||||
@@ -74,12 +78,13 @@ START_TEST( test_replaces_acl )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_signals_acl_updated)
|
START_TEST(test_signals_acl_updated)
|
||||||
{
|
{
|
||||||
struct flexnbd flexnbd;
|
struct flexnbd flexnbd;
|
||||||
flexnbd.signal_fd = -1;
|
flexnbd.signal_fd = -1;
|
||||||
struct server * s = server_create( &flexnbd, "127.0.0.1", "0", dummy_file, 0, 0, NULL, 1, 0, 1 );
|
struct server *s =
|
||||||
|
server_create(&flexnbd, "127.0.0.1", "0", dummy_file, 0, 0, NULL,
|
||||||
|
1, 0, 1);
|
||||||
struct acl *new_acl = acl_create(0, NULL, 0);
|
struct acl *new_acl = acl_create(0, NULL, 0);
|
||||||
|
|
||||||
server_replace_acl(s, new_acl);
|
server_replace_acl(s, new_acl);
|
||||||
@@ -90,7 +95,6 @@ START_TEST( test_signals_acl_updated )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
int connect_client(char *addr, int actual_port, char *source_addr)
|
int connect_client(char *addr, int actual_port, char *source_addr)
|
||||||
{
|
{
|
||||||
int client_fd = -1;
|
int client_fd = -1;
|
||||||
@@ -104,12 +108,15 @@ int connect_client( char *addr, int actual_port, char *source_addr )
|
|||||||
memset(&hint, '\0', sizeof(struct addrinfo));
|
memset(&hint, '\0', sizeof(struct addrinfo));
|
||||||
hint.ai_socktype = SOCK_STREAM;
|
hint.ai_socktype = SOCK_STREAM;
|
||||||
|
|
||||||
myfail_if( getaddrinfo( addr, NULL, &hint, &ailist ) != 0, "getaddrinfo failed." );
|
myfail_if(getaddrinfo(addr, NULL, &hint, &ailist) != 0,
|
||||||
|
"getaddrinfo failed.");
|
||||||
|
|
||||||
int connected = 0;
|
int connected = 0;
|
||||||
for (aip = ailist; aip; aip = aip->ai_next) {
|
for (aip = ailist; aip; aip = aip->ai_next) {
|
||||||
((struct sockaddr_in *)aip->ai_addr)->sin_port = htons( actual_port );
|
((struct sockaddr_in *) aip->ai_addr)->sin_port =
|
||||||
client_fd = socket( aip->ai_family, aip->ai_socktype, aip->ai_protocol );
|
htons(actual_port);
|
||||||
|
client_fd =
|
||||||
|
socket(aip->ai_family, aip->ai_socktype, aip->ai_protocol);
|
||||||
|
|
||||||
if (source_addr) {
|
if (source_addr) {
|
||||||
struct sockaddr src;
|
struct sockaddr src;
|
||||||
@@ -120,7 +127,9 @@ int connect_client( char *addr, int actual_port, char *source_addr )
|
|||||||
bind(client_fd, &src, sizeof(struct sockaddr_in6));
|
bind(client_fd, &src, sizeof(struct sockaddr_in6));
|
||||||
}
|
}
|
||||||
|
|
||||||
if( client_fd == -1) { continue; }
|
if (client_fd == -1) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
if (connect(client_fd, aip->ai_addr, aip->ai_addrlen) == 0) {
|
if (connect(client_fd, aip->ai_addr, aip->ai_addrlen) == 0) {
|
||||||
connected = 1;
|
connected = 1;
|
||||||
break;
|
break;
|
||||||
@@ -148,7 +157,9 @@ START_TEST( test_acl_update_closes_bad_client )
|
|||||||
*/
|
*/
|
||||||
struct flexnbd flexnbd;
|
struct flexnbd flexnbd;
|
||||||
flexnbd.signal_fd = -1;
|
flexnbd.signal_fd = -1;
|
||||||
struct server * s = server_create( &flexnbd, "127.0.0.7", "0", dummy_file, 0, 0, NULL, 1, 0, 1 );
|
struct server *s =
|
||||||
|
server_create(&flexnbd, "127.0.0.7", "0", dummy_file, 0, 0, NULL,
|
||||||
|
1, 0, 1);
|
||||||
struct acl *new_acl = acl_create(0, NULL, 1);
|
struct acl *new_acl = acl_create(0, NULL, 1);
|
||||||
struct client *c;
|
struct client *c;
|
||||||
struct client_tbl_entry *entry;
|
struct client_tbl_entry *entry;
|
||||||
@@ -187,13 +198,14 @@ START_TEST( test_acl_update_closes_bad_client )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_acl_update_leaves_good_client)
|
START_TEST(test_acl_update_leaves_good_client)
|
||||||
{
|
{
|
||||||
struct flexnbd flexnbd;
|
struct flexnbd flexnbd;
|
||||||
flexnbd.signal_fd = -1;
|
flexnbd.signal_fd = -1;
|
||||||
|
|
||||||
struct server * s = server_create( &flexnbd, "127.0.0.7", "0", dummy_file, 0, 0, NULL, 1, 0, 1 );
|
struct server *s =
|
||||||
|
server_create(&flexnbd, "127.0.0.7", "0", dummy_file, 0, 0, NULL,
|
||||||
|
1, 0, 1);
|
||||||
|
|
||||||
char *lines[] = { "127.0.0.1" };
|
char *lines[] = { "127.0.0.1" };
|
||||||
struct acl *new_acl = acl_create(1, lines, 1);
|
struct acl *new_acl = acl_create(1, lines, 1);
|
||||||
@@ -230,7 +242,6 @@ START_TEST( test_acl_update_leaves_good_client )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * serve_suite(void)
|
Suite * serve_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("serve");
|
Suite *s = suite_create("serve");
|
||||||
@@ -241,8 +252,10 @@ Suite* serve_suite(void)
|
|||||||
tcase_add_test(tc_acl_update, test_replaces_acl);
|
tcase_add_test(tc_acl_update, test_replaces_acl);
|
||||||
tcase_add_test(tc_acl_update, test_signals_acl_updated);
|
tcase_add_test(tc_acl_update, test_signals_acl_updated);
|
||||||
|
|
||||||
tcase_add_exit_test(tc_acl_update, test_acl_update_closes_bad_client, 0);
|
tcase_add_exit_test(tc_acl_update, test_acl_update_closes_bad_client,
|
||||||
tcase_add_exit_test(tc_acl_update, test_acl_update_leaves_good_client, 0);
|
0);
|
||||||
|
tcase_add_exit_test(tc_acl_update, test_acl_update_leaves_good_client,
|
||||||
|
0);
|
||||||
|
|
||||||
suite_add_tcase(s, tc_acl_update);
|
suite_add_tcase(s, tc_acl_update);
|
||||||
|
|
||||||
@@ -261,4 +274,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -24,7 +24,6 @@ START_TEST( test_sockaddr_address_string_af_inet_converts_to_string )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_sockaddr_address_string_af_inet6_converts_to_string)
|
START_TEST(test_sockaddr_address_string_af_inet6_converts_to_string)
|
||||||
{
|
{
|
||||||
struct sockaddr_in6 v6_raw;
|
struct sockaddr_in6 v6_raw;
|
||||||
@@ -90,12 +89,17 @@ Suite *sockutil_suite(void)
|
|||||||
{
|
{
|
||||||
Suite *s = suite_create("sockutil");
|
Suite *s = suite_create("sockutil");
|
||||||
|
|
||||||
TCase *tc_sockaddr_address_string = tcase_create("sockaddr_address_string");
|
TCase *tc_sockaddr_address_string =
|
||||||
|
tcase_create("sockaddr_address_string");
|
||||||
|
|
||||||
tcase_add_test(tc_sockaddr_address_string, test_sockaddr_address_string_af_inet_converts_to_string);
|
tcase_add_test(tc_sockaddr_address_string,
|
||||||
tcase_add_test(tc_sockaddr_address_string, test_sockaddr_address_string_af_inet6_converts_to_string);
|
test_sockaddr_address_string_af_inet_converts_to_string);
|
||||||
tcase_add_test(tc_sockaddr_address_string, test_sockaddr_address_string_af_unspec_is_failure);
|
tcase_add_test(tc_sockaddr_address_string,
|
||||||
tcase_add_test(tc_sockaddr_address_string, test_sockaddr_address_string_doesnt_overflow_short_buffer);
|
test_sockaddr_address_string_af_inet6_converts_to_string);
|
||||||
|
tcase_add_test(tc_sockaddr_address_string,
|
||||||
|
test_sockaddr_address_string_af_unspec_is_failure);
|
||||||
|
tcase_add_test(tc_sockaddr_address_string,
|
||||||
|
test_sockaddr_address_string_doesnt_overflow_short_buffer);
|
||||||
suite_add_tcase(s, tc_sockaddr_address_string);
|
suite_add_tcase(s, tc_sockaddr_address_string);
|
||||||
|
|
||||||
return s;
|
return s;
|
||||||
@@ -112,4 +116,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -68,7 +68,6 @@ START_TEST( test_gets_has_control )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_gets_is_mirroring)
|
START_TEST(test_gets_is_mirroring)
|
||||||
{
|
{
|
||||||
struct server *server = mock_server();
|
struct server *server = mock_server();
|
||||||
@@ -143,34 +142,31 @@ START_TEST( test_gets_migration_statistics )
|
|||||||
|
|
||||||
struct status *status = status_create(server);
|
struct status *status = status_create(server);
|
||||||
|
|
||||||
fail_unless (
|
fail_unless(0 == status->migration_duration ||
|
||||||
0 == status->migration_duration ||
|
|
||||||
1 == status->migration_duration ||
|
1 == status->migration_duration ||
|
||||||
2 == status->migration_duration,
|
2 == status->migration_duration,
|
||||||
"migration_duration is unreasonable!"
|
"migration_duration is unreasonable!");
|
||||||
);
|
|
||||||
|
|
||||||
fail_unless(
|
fail_unless(16384 / (status->migration_duration + 1) ==
|
||||||
16384 / ( status->migration_duration + 1 ) == status->migration_speed,
|
status->migration_speed,
|
||||||
"migration_speed not calculated correctly"
|
"migration_speed not calculated correctly");
|
||||||
);
|
|
||||||
|
|
||||||
fail_unless( 32768 == status->migration_speed_limit, "migration_speed_limit not read" );
|
fail_unless(32768 == status->migration_speed_limit,
|
||||||
|
"migration_speed_limit not read");
|
||||||
|
|
||||||
// ( size / current_bps ) + 1 happens to be 3 for this test
|
// ( size / current_bps ) + 1 happens to be 3 for this test
|
||||||
fail_unless( 3 == status->migration_seconds_left, "migration_seconds_left not gathered" );
|
fail_unless(3 == status->migration_seconds_left,
|
||||||
|
"migration_seconds_left not gathered");
|
||||||
|
|
||||||
status_destroy(status);
|
status_destroy(status);
|
||||||
destroy_mock_server(server);
|
destroy_mock_server(server);
|
||||||
}
|
}
|
||||||
|
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
#define RENDER_TEST_SETUP \
|
#define RENDER_TEST_SETUP \
|
||||||
struct status status; \
|
struct status status; \
|
||||||
int fds[2]; \
|
int fds[2]; \
|
||||||
pipe( fds );
|
pipe( fds );
|
||||||
|
|
||||||
void fail_unless_rendered(int fd, char *fragment)
|
void fail_unless_rendered(int fd, char *fragment)
|
||||||
{
|
{
|
||||||
char buf[1024] = { 0 };
|
char buf[1024] = { 0 };
|
||||||
@@ -203,9 +199,7 @@ void fail_if_rendered( int fd, char *fragment )
|
|||||||
|
|
||||||
START_TEST(test_renders_has_control)
|
START_TEST(test_renders_has_control)
|
||||||
{
|
{
|
||||||
RENDER_TEST_SETUP
|
RENDER_TEST_SETUP status.has_control = 1;
|
||||||
|
|
||||||
status.has_control = 1;
|
|
||||||
status_write(&status, fds[1]);
|
status_write(&status, fds[1]);
|
||||||
fail_unless_rendered(fds[0], "has_control=true");
|
fail_unless_rendered(fds[0], "has_control=true");
|
||||||
|
|
||||||
@@ -215,12 +209,9 @@ START_TEST( test_renders_has_control )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_renders_is_mirroring)
|
START_TEST(test_renders_is_mirroring)
|
||||||
{
|
{
|
||||||
RENDER_TEST_SETUP
|
RENDER_TEST_SETUP status.is_mirroring = 1;
|
||||||
|
|
||||||
status.is_mirroring = 1;
|
|
||||||
status_write(&status, fds[1]);
|
status_write(&status, fds[1]);
|
||||||
fail_unless_rendered(fds[0], "is_mirroring=true");
|
fail_unless_rendered(fds[0], "is_mirroring=true");
|
||||||
|
|
||||||
@@ -232,9 +223,7 @@ END_TEST
|
|||||||
|
|
||||||
START_TEST(test_renders_clients_allowed)
|
START_TEST(test_renders_clients_allowed)
|
||||||
{
|
{
|
||||||
RENDER_TEST_SETUP
|
RENDER_TEST_SETUP status.clients_allowed = 1;
|
||||||
|
|
||||||
status.clients_allowed = 1;
|
|
||||||
status_write(&status, fds[1]);
|
status_write(&status, fds[1]);
|
||||||
fail_unless_rendered(fds[0], "clients_allowed=true");
|
fail_unless_rendered(fds[0], "clients_allowed=true");
|
||||||
|
|
||||||
@@ -246,9 +235,7 @@ END_TEST
|
|||||||
|
|
||||||
START_TEST(test_renders_num_clients)
|
START_TEST(test_renders_num_clients)
|
||||||
{
|
{
|
||||||
RENDER_TEST_SETUP
|
RENDER_TEST_SETUP status.num_clients = 0;
|
||||||
|
|
||||||
status.num_clients = 0;
|
|
||||||
status_write(&status, fds[1]);
|
status_write(&status, fds[1]);
|
||||||
fail_unless_rendered(fds[0], "num_clients=0");
|
fail_unless_rendered(fds[0], "num_clients=0");
|
||||||
|
|
||||||
@@ -259,12 +246,9 @@ START_TEST( test_renders_num_clients )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_renders_pid)
|
START_TEST(test_renders_pid)
|
||||||
{
|
{
|
||||||
RENDER_TEST_SETUP
|
RENDER_TEST_SETUP status.pid = 42;
|
||||||
|
|
||||||
status.pid = 42;
|
|
||||||
status_write(&status, fds[1]);
|
status_write(&status, fds[1]);
|
||||||
fail_unless_rendered(fds[0], "pid=42");
|
fail_unless_rendered(fds[0], "pid=42");
|
||||||
}
|
}
|
||||||
@@ -272,9 +256,7 @@ END_TEST
|
|||||||
|
|
||||||
START_TEST(test_renders_size)
|
START_TEST(test_renders_size)
|
||||||
{
|
{
|
||||||
RENDER_TEST_SETUP
|
RENDER_TEST_SETUP status.size = ((uint64_t) 1 << 33);
|
||||||
|
|
||||||
status.size = ( (uint64_t)1 << 33 );
|
|
||||||
status_write(&status, fds[1]);
|
status_write(&status, fds[1]);
|
||||||
fail_unless_rendered(fds[0], "size=8589934592");
|
fail_unless_rendered(fds[0], "size=8589934592");
|
||||||
}
|
}
|
||||||
@@ -282,9 +264,7 @@ END_TEST
|
|||||||
|
|
||||||
START_TEST(test_renders_migration_statistics)
|
START_TEST(test_renders_migration_statistics)
|
||||||
{
|
{
|
||||||
RENDER_TEST_SETUP
|
RENDER_TEST_SETUP status.is_mirroring = 0;
|
||||||
|
|
||||||
status.is_mirroring = 0;
|
|
||||||
status.migration_duration = 8;
|
status.migration_duration = 8;
|
||||||
status.migration_speed = 40000000;
|
status.migration_speed = 40000000;
|
||||||
status.migration_speed_limit = 40000001;
|
status.migration_speed_limit = 40000001;
|
||||||
@@ -327,7 +307,6 @@ START_TEST( test_renders_migration_statistics )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite * status_suite(void)
|
Suite * status_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("status");
|
Suite *s = suite_create("status");
|
||||||
@@ -368,4 +347,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -14,7 +14,8 @@ struct cleanup_bucket {
|
|||||||
|
|
||||||
struct cleanup_bucket bkt;
|
struct cleanup_bucket bkt;
|
||||||
|
|
||||||
void bucket_init(void){
|
void bucket_init(void)
|
||||||
|
{
|
||||||
if (bkt.called_signal) {
|
if (bkt.called_signal) {
|
||||||
self_pipe_destroy(bkt.called_signal);
|
self_pipe_destroy(bkt.called_signal);
|
||||||
}
|
}
|
||||||
@@ -31,7 +32,8 @@ int handler_called(void)
|
|||||||
return self_pipe_signal_clear(bkt.called_signal);
|
return self_pipe_signal_clear(bkt.called_signal);
|
||||||
}
|
}
|
||||||
|
|
||||||
void dummy_cleanup( struct cleanup_bucket * foo, int fatal __attribute__((unused)) )
|
void dummy_cleanup(struct cleanup_bucket *foo, int fatal
|
||||||
|
__attribute__ ((unused)))
|
||||||
{
|
{
|
||||||
if (NULL != foo) {
|
if (NULL != foo) {
|
||||||
self_pipe_signal(foo->called_signal);
|
self_pipe_signal(foo->called_signal);
|
||||||
@@ -69,8 +71,7 @@ START_TEST( test_fatal_kills_process )
|
|||||||
/* If we get here, just block so the test timeout fails
|
/* If we get here, just block so the test timeout fails
|
||||||
* us */
|
* us */
|
||||||
sleep(10);
|
sleep(10);
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
int kidret, kidstatus, result;
|
int kidret, kidstatus, result;
|
||||||
result = waitpid(pid, &kidret, 0);
|
result = waitpid(pid, &kidret, 0);
|
||||||
fail_if(result < 0, "Wait failed.");
|
fail_if(result < 0, "Wait failed.");
|
||||||
@@ -82,7 +83,6 @@ START_TEST( test_fatal_kills_process )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
void *error_thread(void *nothing __attribute__ ((unused)))
|
void *error_thread(void *nothing __attribute__ ((unused)))
|
||||||
{
|
{
|
||||||
trigger_error();
|
trigger_error();
|
||||||
@@ -103,7 +103,6 @@ START_TEST( test_error_doesnt_kill_process )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_error_calls_handler)
|
START_TEST(test_error_calls_handler)
|
||||||
{
|
{
|
||||||
bucket_init();
|
bucket_init();
|
||||||
@@ -119,7 +118,6 @@ START_TEST( test_error_calls_handler )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
START_TEST(test_fatal_doesnt_call_handler)
|
START_TEST(test_fatal_doesnt_call_handler)
|
||||||
{
|
{
|
||||||
bucket_init();
|
bucket_init();
|
||||||
@@ -129,8 +127,7 @@ START_TEST( test_fatal_doesnt_call_handler )
|
|||||||
kidpid = fork();
|
kidpid = fork();
|
||||||
if (kidpid == 0) {
|
if (kidpid == 0) {
|
||||||
trigger_fatal();
|
trigger_fatal();
|
||||||
}
|
} else {
|
||||||
else {
|
|
||||||
int kidstatus;
|
int kidstatus;
|
||||||
int result = waitpid(kidpid, &kidstatus, 0);
|
int result = waitpid(kidpid, &kidstatus, 0);
|
||||||
fail_if(result < 0, "Wait failed");
|
fail_if(result < 0, "Wait failed");
|
||||||
@@ -140,7 +137,6 @@ START_TEST( test_fatal_doesnt_call_handler )
|
|||||||
}
|
}
|
||||||
END_TEST
|
END_TEST
|
||||||
|
|
||||||
|
|
||||||
Suite *util_suite(void)
|
Suite *util_suite(void)
|
||||||
{
|
{
|
||||||
Suite *s = suite_create("util");
|
Suite *s = suite_create("util");
|
||||||
@@ -170,4 +166,3 @@ int main(void)
|
|||||||
srunner_free(sr);
|
srunner_free(sr);
|
||||||
return (number_failed == 0) ? 0 : 1;
|
return (number_failed == 0) ? 0 : 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user