1/*-
2 * Copyright (c) 2004 Pawel Jakub Dawidek <pjd@FreeBSD.org>
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 *
26 * $FreeBSD$
27 */
28
29#include <sys/param.h>
30#include <sys/bio.h>
31#include <sys/disk.h>
32#include <sys/endian.h>
33#include <sys/ioctl.h>
34#include <sys/queue.h>
35#include <sys/socket.h>
36#include <sys/stat.h>
37#include <sys/time.h>
38#include <arpa/inet.h>
39#include <netinet/in.h>
40#include <netinet/tcp.h>
41#include <assert.h>
42#include <err.h>
43#include <errno.h>
44#include <fcntl.h>
45#include <libgen.h>
46#include <libutil.h>
47#include <paths.h>
48#include <pthread.h>
49#include <signal.h>
50#include <stdarg.h>
51#include <stdio.h>
52#include <stdlib.h>
53#include <stdint.h>
54#include <string.h>
55#include <syslog.h>
56#include <unistd.h>
57
58#include "ggate.h"
59
60
61#define	GGATED_EXPORT_FILE	"/etc/gg.exports"
62
63struct ggd_connection {
64	off_t		 c_mediasize;
65	unsigned	 c_sectorsize;
66	unsigned	 c_flags;	/* flags (RO/RW) */
67	int		 c_diskfd;
68	int		 c_sendfd;
69	int		 c_recvfd;
70	time_t		 c_birthtime;
71	char		*c_path;
72	uint64_t	 c_token;
73	in_addr_t	 c_srcip;
74	LIST_ENTRY(ggd_connection) c_next;
75};
76
77struct ggd_request {
78	struct g_gate_hdr	 r_hdr;
79	char			*r_data;
80	TAILQ_ENTRY(ggd_request) r_next;
81};
82#define	r_cmd		r_hdr.gh_cmd
83#define	r_offset	r_hdr.gh_offset
84#define	r_length	r_hdr.gh_length
85#define	r_error		r_hdr.gh_error
86
87struct ggd_export {
88	char		*e_path;	/* path to device/file */
89	in_addr_t	 e_ip;		/* remote IP address */
90	in_addr_t	 e_mask;	/* IP mask */
91	unsigned	 e_flags;	/* flags (RO/RW) */
92	SLIST_ENTRY(ggd_export) e_next;
93};
94
95static const char *exports_file = GGATED_EXPORT_FILE;
96static int got_sighup = 0;
97static in_addr_t bindaddr;
98
99static TAILQ_HEAD(, ggd_request) inqueue = TAILQ_HEAD_INITIALIZER(inqueue);
100static TAILQ_HEAD(, ggd_request) outqueue = TAILQ_HEAD_INITIALIZER(outqueue);
101static pthread_mutex_t inqueue_mtx, outqueue_mtx;
102static pthread_cond_t inqueue_cond, outqueue_cond;
103
104static SLIST_HEAD(, ggd_export) exports = SLIST_HEAD_INITIALIZER(exports);
105static LIST_HEAD(, ggd_connection) connections = LIST_HEAD_INITIALIZER(connections);
106
107static void *recv_thread(void *arg);
108static void *disk_thread(void *arg);
109static void *send_thread(void *arg);
110
111static void
112usage(void)
113{
114
115	fprintf(stderr, "usage: %s [-nv] [-a address] [-F pidfile] [-p port] "
116	    "[-R rcvbuf] [-S sndbuf] [exports file]\n", getprogname());
117	exit(EXIT_FAILURE);
118}
119
120static char *
121ip2str(in_addr_t ip)
122{
123	static char sip[16];
124
125	snprintf(sip, sizeof(sip), "%u.%u.%u.%u",
126	    ((ip >> 24) & 0xff),
127	    ((ip >> 16) & 0xff),
128	    ((ip >> 8) & 0xff),
129	    (ip & 0xff));
130	return (sip);
131}
132
133static in_addr_t
134countmask(unsigned m)
135{
136	in_addr_t mask;
137
138	if (m == 0) {
139		mask = 0x0;
140	} else {
141		mask = 1 << (32 - m);
142		mask--;
143		mask = ~mask;
144	}
145	return (mask);
146}
147
148static void
149line_parse(char *line, unsigned lineno)
150{
151	struct ggd_export *ex;
152	char *word, *path, *sflags;
153	unsigned flags, i, vmask;
154	in_addr_t ip, mask;
155
156	ip = mask = flags = vmask = 0;
157	path = NULL;
158	sflags = NULL;
159
160	for (i = 0, word = strtok(line, " \t"); word != NULL;
161	    i++, word = strtok(NULL, " \t")) {
162		switch (i) {
163		case 0: /* IP address or host name */
164			ip = g_gate_str2ip(strsep(&word, "/"));
165			if (ip == INADDR_NONE) {
166				g_gate_xlog("Invalid IP/host name at line %u.",
167				    lineno);
168			}
169			ip = ntohl(ip);
170			if (word == NULL)
171				vmask = 32;
172			else {
173				errno = 0;
174				vmask = strtoul(word, NULL, 10);
175				if (vmask == 0 && errno != 0) {
176					g_gate_xlog("Invalid IP mask value at "
177					    "line %u.", lineno);
178				}
179				if ((unsigned)vmask > 32) {
180					g_gate_xlog("Invalid IP mask value at line %u.",
181					    lineno);
182				}
183			}
184			mask = countmask(vmask);
185			break;
186		case 1:	/* flags */
187			if (strcasecmp("rd", word) == 0 ||
188			    strcasecmp("ro", word) == 0) {
189				flags = O_RDONLY;
190			} else if (strcasecmp("wo", word) == 0) {
191				flags = O_WRONLY;
192			} else if (strcasecmp("rw", word) == 0) {
193				flags = O_RDWR;
194			} else {
195				g_gate_xlog("Invalid value in flags field at "
196				    "line %u.", lineno);
197			}
198			sflags = word;
199			break;
200		case 2:	/* path */
201			if (strlen(word) >= MAXPATHLEN) {
202				g_gate_xlog("Path too long at line %u. ",
203				    lineno);
204			}
205			path = word;
206			break;
207		default:
208			g_gate_xlog("Too many arguments at line %u. ", lineno);
209		}
210	}
211	if (i != 3)
212		g_gate_xlog("Too few arguments at line %u.", lineno);
213
214	ex = malloc(sizeof(*ex));
215	if (ex == NULL)
216		g_gate_xlog("Not enough memory.");
217	ex->e_path = strdup(path);
218	if (ex->e_path == NULL)
219		g_gate_xlog("Not enough memory.");
220
221	/* Made 'and' here. */
222	ex->e_ip = (ip & mask);
223	ex->e_mask = mask;
224	ex->e_flags = flags;
225
226	SLIST_INSERT_HEAD(&exports, ex, e_next);
227
228	g_gate_log(LOG_DEBUG, "Added %s/%u %s %s to exports list.",
229	    ip2str(ex->e_ip), vmask, path, sflags);
230}
231
232static void
233exports_clear(void)
234{
235	struct ggd_export *ex;
236
237	while (!SLIST_EMPTY(&exports)) {
238		ex = SLIST_FIRST(&exports);
239		SLIST_REMOVE_HEAD(&exports, e_next);
240		free(ex);
241	}
242}
243
244#define	EXPORTS_LINE_SIZE	2048
245static void
246exports_get(void)
247{
248	char buf[EXPORTS_LINE_SIZE], *line;
249	unsigned lineno = 0, objs = 0, len;
250	FILE *fd;
251
252	exports_clear();
253
254	fd = fopen(exports_file, "r");
255	if (fd == NULL) {
256		g_gate_xlog("Cannot open exports file (%s): %s.", exports_file,
257		    strerror(errno));
258	}
259
260	g_gate_log(LOG_INFO, "Reading exports file (%s).", exports_file);
261
262	for (;;) {
263		if (fgets(buf, sizeof(buf), fd) == NULL) {
264			if (feof(fd))
265				break;
266
267			g_gate_xlog("Error while reading exports file: %s.",
268			    strerror(errno));
269		}
270
271		/* Increase line count. */
272		lineno++;
273
274		/* Skip spaces and tabs. */
275		for (line = buf; *line == ' ' || *line == '\t'; ++line)
276			;
277
278		/* Empty line, comment or empty line at the end of file. */
279		if (*line == '\n' || *line == '#' || *line == '\0')
280			continue;
281
282		len = strlen(line);
283		if (line[len - 1] == '\n') {
284			/* Remove new line char. */
285			line[len - 1] = '\0';
286		} else {
287			if (!feof(fd))
288				g_gate_xlog("Line %u too long.", lineno);
289		}
290
291		line_parse(line, lineno);
292		objs++;
293	}
294
295	fclose(fd);
296
297	if (objs == 0)
298		g_gate_xlog("There are no objects to export.");
299
300	g_gate_log(LOG_INFO, "Exporting %u object(s).", objs);
301}
302
303static int
304exports_check(struct ggd_export *ex, struct g_gate_cinit *cinit,
305    struct ggd_connection *conn)
306{
307	char ipmask[32]; /* 32 == strlen("xxx.xxx.xxx.xxx/xxx.xxx.xxx.xxx")+1 */
308	int error = 0, flags;
309
310	strlcpy(ipmask, ip2str(ex->e_ip), sizeof(ipmask));
311	strlcat(ipmask, "/", sizeof(ipmask));
312	strlcat(ipmask, ip2str(ex->e_mask), sizeof(ipmask));
313	if ((cinit->gc_flags & GGATE_FLAG_RDONLY) != 0) {
314		if (ex->e_flags == O_WRONLY) {
315			g_gate_log(LOG_WARNING, "Read-only access requested, "
316			    "but %s (%s) is exported write-only.", ex->e_path,
317			    ipmask);
318			return (EPERM);
319		} else {
320			conn->c_flags |= GGATE_FLAG_RDONLY;
321		}
322	} else if ((cinit->gc_flags & GGATE_FLAG_WRONLY) != 0) {
323		if (ex->e_flags == O_RDONLY) {
324			g_gate_log(LOG_WARNING, "Write-only access requested, "
325			    "but %s (%s) is exported read-only.", ex->e_path,
326			    ipmask);
327			return (EPERM);
328		} else {
329			conn->c_flags |= GGATE_FLAG_WRONLY;
330		}
331	} else {
332		if (ex->e_flags == O_RDONLY) {
333			g_gate_log(LOG_WARNING, "Read-write access requested, "
334			    "but %s (%s) is exported read-only.", ex->e_path,
335			    ipmask);
336			return (EPERM);
337		} else if (ex->e_flags == O_WRONLY) {
338			g_gate_log(LOG_WARNING, "Read-write access requested, "
339			    "but %s (%s) is exported write-only.", ex->e_path,
340			    ipmask);
341			return (EPERM);
342		}
343	}
344	if ((conn->c_flags & GGATE_FLAG_RDONLY) != 0)
345		flags = O_RDONLY;
346	else if ((conn->c_flags & GGATE_FLAG_WRONLY) != 0)
347		flags = O_WRONLY;
348	else
349		flags = O_RDWR;
350	conn->c_diskfd = open(ex->e_path, flags);
351	if (conn->c_diskfd == -1) {
352		error = errno;
353		g_gate_log(LOG_ERR, "Cannot open %s: %s.", ex->e_path,
354		    strerror(error));
355		return (error);
356	}
357	return (0);
358}
359
360static struct ggd_export *
361exports_find(struct sockaddr *s, struct g_gate_cinit *cinit,
362    struct ggd_connection *conn)
363{
364	struct ggd_export *ex;
365	in_addr_t ip;
366	int error;
367
368	ip = htonl(((struct sockaddr_in *)(void *)s)->sin_addr.s_addr);
369	SLIST_FOREACH(ex, &exports, e_next) {
370		if ((ip & ex->e_mask) != ex->e_ip) {
371			g_gate_log(LOG_DEBUG, "exports[%s]: IP mismatch.",
372			    ex->e_path);
373			continue;
374		}
375		if (strcmp(cinit->gc_path, ex->e_path) != 0) {
376			g_gate_log(LOG_DEBUG, "exports[%s]: Path mismatch.",
377			    ex->e_path);
378			continue;
379		}
380		error = exports_check(ex, cinit, conn);
381		if (error == 0)
382			return (ex);
383		else {
384			errno = error;
385			return (NULL);
386		}
387	}
388	g_gate_log(LOG_WARNING, "Unauthorized connection from: %s.",
389	    ip2str(ip));
390	errno = EPERM;
391	return (NULL);
392}
393
394/*
395 * Remove timed out connections.
396 */
397static void
398connection_cleanups(void)
399{
400	struct ggd_connection *conn, *tconn;
401	time_t now;
402
403	time(&now);
404	LIST_FOREACH_SAFE(conn, &connections, c_next, tconn) {
405		if (now - conn->c_birthtime > 10) {
406			LIST_REMOVE(conn, c_next);
407			g_gate_log(LOG_NOTICE,
408			    "Connection from %s [%s] removed.",
409			    ip2str(conn->c_srcip), conn->c_path);
410			close(conn->c_diskfd);
411			close(conn->c_sendfd);
412			close(conn->c_recvfd);
413			free(conn->c_path);
414			free(conn);
415		}
416	}
417}
418
419static struct ggd_connection *
420connection_find(struct g_gate_cinit *cinit)
421{
422	struct ggd_connection *conn;
423
424	LIST_FOREACH(conn, &connections, c_next) {
425		if (conn->c_token == cinit->gc_token)
426			break;
427	}
428	return (conn);
429}
430
431static struct ggd_connection *
432connection_new(struct g_gate_cinit *cinit, struct sockaddr *s, int sfd)
433{
434	struct ggd_connection *conn;
435	in_addr_t ip;
436
437	/*
438	 * First, look for old connections.
439	 * We probably should do it every X seconds, but what for?
440	 * It is only dangerous if an attacker wants to overload connections
441	 * queue, so here is a good place to do the cleanups.
442	 */
443	connection_cleanups();
444
445	conn = malloc(sizeof(*conn));
446	if (conn == NULL)
447		return (NULL);
448	conn->c_path = strdup(cinit->gc_path);
449	if (conn->c_path == NULL) {
450		free(conn);
451		return (NULL);
452	}
453	conn->c_token = cinit->gc_token;
454	ip = htonl(((struct sockaddr_in *)(void *)s)->sin_addr.s_addr);
455	conn->c_srcip = ip;
456	conn->c_sendfd = conn->c_recvfd = -1;
457	if ((cinit->gc_flags & GGATE_FLAG_SEND) != 0)
458		conn->c_sendfd = sfd;
459	else
460		conn->c_recvfd = sfd;
461	conn->c_mediasize = 0;
462	conn->c_sectorsize = 0;
463	time(&conn->c_birthtime);
464	conn->c_flags = cinit->gc_flags;
465	LIST_INSERT_HEAD(&connections, conn, c_next);
466	g_gate_log(LOG_DEBUG, "Connection created [%s, %s].", ip2str(ip),
467	    conn->c_path);
468	return (conn);
469}
470
471static int
472connection_add(struct ggd_connection *conn, struct g_gate_cinit *cinit,
473    struct sockaddr *s, int sfd)
474{
475	in_addr_t ip;
476
477	ip = htonl(((struct sockaddr_in *)(void *)s)->sin_addr.s_addr);
478	if ((cinit->gc_flags & GGATE_FLAG_SEND) != 0) {
479		if (conn->c_sendfd != -1) {
480			g_gate_log(LOG_WARNING,
481			    "Send socket already exists [%s, %s].", ip2str(ip),
482			    conn->c_path);
483			return (EEXIST);
484		}
485		conn->c_sendfd = sfd;
486	} else {
487		if (conn->c_recvfd != -1) {
488			g_gate_log(LOG_WARNING,
489			    "Receive socket already exists [%s, %s].",
490			    ip2str(ip), conn->c_path);
491			return (EEXIST);
492		}
493		conn->c_recvfd = sfd;
494	}
495	g_gate_log(LOG_DEBUG, "Connection added [%s, %s].", ip2str(ip),
496	    conn->c_path);
497	return (0);
498}
499
500/*
501 * Remove one socket from the given connection or the whole
502 * connection if sfd == -1.
503 */
504static void
505connection_remove(struct ggd_connection *conn)
506{
507
508	LIST_REMOVE(conn, c_next);
509	g_gate_log(LOG_DEBUG, "Connection removed [%s %s].",
510	    ip2str(conn->c_srcip), conn->c_path);
511	if (conn->c_sendfd != -1)
512		close(conn->c_sendfd);
513	if (conn->c_recvfd != -1)
514		close(conn->c_recvfd);
515	free(conn->c_path);
516	free(conn);
517}
518
519static int
520connection_ready(struct ggd_connection *conn)
521{
522
523	return (conn->c_sendfd != -1 && conn->c_recvfd != -1);
524}
525
526static void
527connection_launch(struct ggd_connection *conn)
528{
529	pthread_t td;
530	int error, pid;
531
532	pid = fork();
533	if (pid > 0)
534		return;
535	else if (pid == -1) {
536		g_gate_log(LOG_ERR, "Cannot fork: %s.", strerror(errno));
537		return;
538	}
539	g_gate_log(LOG_DEBUG, "Process created [%s].", conn->c_path);
540
541	/*
542	 * Create condition variables and mutexes for in-queue and out-queue
543	 * synchronization.
544	 */
545	error = pthread_mutex_init(&inqueue_mtx, NULL);
546	if (error != 0) {
547		g_gate_xlog("pthread_mutex_init(inqueue_mtx): %s.",
548		    strerror(error));
549	}
550	error = pthread_cond_init(&inqueue_cond, NULL);
551	if (error != 0) {
552		g_gate_xlog("pthread_cond_init(inqueue_cond): %s.",
553		    strerror(error));
554	}
555	error = pthread_mutex_init(&outqueue_mtx, NULL);
556	if (error != 0) {
557		g_gate_xlog("pthread_mutex_init(outqueue_mtx): %s.",
558		    strerror(error));
559	}
560	error = pthread_cond_init(&outqueue_cond, NULL);
561	if (error != 0) {
562		g_gate_xlog("pthread_cond_init(outqueue_cond): %s.",
563		    strerror(error));
564	}
565
566	/*
567	 * Create threads:
568	 * recvtd - thread for receiving I/O request
569	 * diskio - thread for doing I/O request
570	 * sendtd - thread for sending I/O requests back
571	 */
572	error = pthread_create(&td, NULL, send_thread, conn);
573	if (error != 0) {
574		g_gate_xlog("pthread_create(send_thread): %s.",
575		    strerror(error));
576	}
577	error = pthread_create(&td, NULL, recv_thread, conn);
578	if (error != 0) {
579		g_gate_xlog("pthread_create(recv_thread): %s.",
580		    strerror(error));
581	}
582	disk_thread(conn);
583}
584
585static void
586sendfail(int sfd, int error, const char *fmt, ...)
587{
588	struct g_gate_sinit sinit;
589	va_list ap;
590	ssize_t data;
591
592	sinit.gs_error = error;
593	g_gate_swap2n_sinit(&sinit);
594	data = g_gate_send(sfd, &sinit, sizeof(sinit), 0);
595	g_gate_swap2h_sinit(&sinit);
596	if (data != sizeof(sinit)) {
597		g_gate_log(LOG_WARNING, "Cannot send initial packet: %s.",
598		    strerror(errno));
599		return;
600	}
601	if (fmt != NULL) {
602		va_start(ap, fmt);
603		g_gate_vlog(LOG_WARNING, fmt, ap);
604		va_end(ap);
605	}
606}
607
608static void *
609malloc_waitok(size_t size)
610{
611	void *p;
612
613	while ((p = malloc(size)) == NULL) {
614		g_gate_log(LOG_DEBUG, "Cannot allocate %zu bytes.", size);
615		sleep(1);
616	}
617	return (p);
618}
619
620static void *
621recv_thread(void *arg)
622{
623	struct ggd_connection *conn;
624	struct ggd_request *req;
625	ssize_t data;
626	int error, fd;
627
628	conn = arg;
629	g_gate_log(LOG_NOTICE, "%s: started [%s]!", __func__, conn->c_path);
630	fd = conn->c_recvfd;
631	for (;;) {
632		/*
633		 * Get header packet.
634		 */
635		req = malloc_waitok(sizeof(*req));
636		data = g_gate_recv(fd, &req->r_hdr, sizeof(req->r_hdr),
637		    MSG_WAITALL);
638		if (data == 0) {
639			g_gate_log(LOG_DEBUG, "Process %u exiting.", getpid());
640			exit(EXIT_SUCCESS);
641		} else if (data == -1) {
642			g_gate_xlog("Error while receiving hdr packet: %s.",
643			    strerror(errno));
644		} else if (data != sizeof(req->r_hdr)) {
645			g_gate_xlog("Malformed hdr packet received.");
646		}
647		g_gate_log(LOG_DEBUG, "Received hdr packet.");
648		g_gate_swap2h_hdr(&req->r_hdr);
649
650		g_gate_log(LOG_DEBUG, "%s: offset=%jd length=%u", __func__,
651		    (intmax_t)req->r_offset, (unsigned)req->r_length);
652
653		/*
654		 * Allocate memory for data.
655		 */
656		req->r_data = malloc_waitok(req->r_length);
657
658		/*
659		 * Receive data to write for WRITE request.
660		 */
661		if (req->r_cmd == GGATE_CMD_WRITE) {
662			g_gate_log(LOG_DEBUG, "Waiting for %u bytes of data...",
663			    req->r_length);
664			data = g_gate_recv(fd, req->r_data, req->r_length,
665			    MSG_WAITALL);
666			if (data == -1) {
667				g_gate_xlog("Error while receiving data: %s.",
668				    strerror(errno));
669			}
670		}
671
672		/*
673		 * Put the request onto the incoming queue.
674		 */
675		error = pthread_mutex_lock(&inqueue_mtx);
676		assert(error == 0);
677		TAILQ_INSERT_TAIL(&inqueue, req, r_next);
678		error = pthread_cond_signal(&inqueue_cond);
679		assert(error == 0);
680		error = pthread_mutex_unlock(&inqueue_mtx);
681		assert(error == 0);
682	}
683}
684
685static void *
686disk_thread(void *arg)
687{
688	struct ggd_connection *conn;
689	struct ggd_request *req;
690	ssize_t data;
691	int error, fd;
692
693	conn = arg;
694	g_gate_log(LOG_NOTICE, "%s: started [%s]!", __func__, conn->c_path);
695	fd = conn->c_diskfd;
696	for (;;) {
697		/*
698		 * Get a request from the incoming queue.
699		 */
700		error = pthread_mutex_lock(&inqueue_mtx);
701		assert(error == 0);
702		while ((req = TAILQ_FIRST(&inqueue)) == NULL) {
703			error = pthread_cond_wait(&inqueue_cond, &inqueue_mtx);
704			assert(error == 0);
705		}
706		TAILQ_REMOVE(&inqueue, req, r_next);
707		error = pthread_mutex_unlock(&inqueue_mtx);
708		assert(error == 0);
709
710		/*
711		 * Check the request.
712		 */
713		assert(req->r_cmd == GGATE_CMD_READ || req->r_cmd == GGATE_CMD_WRITE);
714		assert(req->r_offset + req->r_length <= (uintmax_t)conn->c_mediasize);
715		assert((req->r_offset % conn->c_sectorsize) == 0);
716		assert((req->r_length % conn->c_sectorsize) == 0);
717
718		g_gate_log(LOG_DEBUG, "%s: offset=%jd length=%u", __func__,
719		    (intmax_t)req->r_offset, (unsigned)req->r_length);
720
721		/*
722		 * Do the request.
723		 */
724		data = 0;
725		switch (req->r_cmd) {
726		case GGATE_CMD_READ:
727			data = pread(fd, req->r_data, req->r_length,
728			    req->r_offset);
729			break;
730		case GGATE_CMD_WRITE:
731			data = pwrite(fd, req->r_data, req->r_length,
732			    req->r_offset);
733			/* Free data memory here - better sooner. */
734			free(req->r_data);
735			req->r_data = NULL;
736			break;
737		}
738		if (data != (ssize_t)req->r_length) {
739			/* Report short reads/writes as I/O errors. */
740			if (errno == 0)
741				errno = EIO;
742			g_gate_log(LOG_ERR, "Disk error: %s", strerror(errno));
743			req->r_error = errno;
744			if (req->r_data != NULL) {
745				free(req->r_data);
746				req->r_data = NULL;
747			}
748		}
749
750		/*
751		 * Put the request onto the outgoing queue.
752		 */
753		error = pthread_mutex_lock(&outqueue_mtx);
754		assert(error == 0);
755		TAILQ_INSERT_TAIL(&outqueue, req, r_next);
756		error = pthread_cond_signal(&outqueue_cond);
757		assert(error == 0);
758		error = pthread_mutex_unlock(&outqueue_mtx);
759		assert(error == 0);
760	}
761
762	/* NOTREACHED */
763	return (NULL);
764}
765
766static void *
767send_thread(void *arg)
768{
769	struct ggd_connection *conn;
770	struct ggd_request *req;
771	ssize_t data;
772	int error, fd;
773
774	conn = arg;
775	g_gate_log(LOG_NOTICE, "%s: started [%s]!", __func__, conn->c_path);
776	fd = conn->c_sendfd;
777	for (;;) {
778		/*
779		 * Get a request from the outgoing queue.
780		 */
781		error = pthread_mutex_lock(&outqueue_mtx);
782		assert(error == 0);
783		while ((req = TAILQ_FIRST(&outqueue)) == NULL) {
784			error = pthread_cond_wait(&outqueue_cond,
785			    &outqueue_mtx);
786			assert(error == 0);
787		}
788		TAILQ_REMOVE(&outqueue, req, r_next);
789		error = pthread_mutex_unlock(&outqueue_mtx);
790		assert(error == 0);
791
792		g_gate_log(LOG_DEBUG, "%s: offset=%jd length=%u", __func__,
793		    (intmax_t)req->r_offset, (unsigned)req->r_length);
794
795		/*
796		 * Send the request.
797		 */
798		g_gate_swap2n_hdr(&req->r_hdr);
799		if (g_gate_send(fd, &req->r_hdr, sizeof(req->r_hdr), 0) == -1) {
800			g_gate_xlog("Error while sending hdr packet: %s.",
801			    strerror(errno));
802		}
803		g_gate_log(LOG_DEBUG, "Sent hdr packet.");
804		g_gate_swap2h_hdr(&req->r_hdr);
805		if (req->r_data != NULL) {
806			data = g_gate_send(fd, req->r_data, req->r_length, 0);
807			if (data != (ssize_t)req->r_length) {
808				g_gate_xlog("Error while sending data: %s.",
809				    strerror(errno));
810			}
811			g_gate_log(LOG_DEBUG,
812			    "Sent %zd bytes (offset=%ju, size=%zu).", data,
813			    (uintmax_t)req->r_offset, (size_t)req->r_length);
814			free(req->r_data);
815		}
816		free(req);
817	}
818
819	/* NOTREACHED */
820	return (NULL);
821}
822
823static void
824log_connection(struct sockaddr *from)
825{
826	in_addr_t ip;
827
828	ip = htonl(((struct sockaddr_in *)(void *)from)->sin_addr.s_addr);
829	g_gate_log(LOG_INFO, "Connection from: %s.", ip2str(ip));
830}
831
832static int
833handshake(struct sockaddr *from, int sfd)
834{
835	struct g_gate_version ver;
836	struct g_gate_cinit cinit;
837	struct g_gate_sinit sinit;
838	struct ggd_connection *conn;
839	struct ggd_export *ex;
840	ssize_t data;
841
842	log_connection(from);
843	/*
844	 * Phase 1: Version verification.
845	 */
846	g_gate_log(LOG_DEBUG, "Receiving version packet.");
847	data = g_gate_recv(sfd, &ver, sizeof(ver), MSG_WAITALL);
848	g_gate_swap2h_version(&ver);
849	if (data != sizeof(ver)) {
850		g_gate_log(LOG_WARNING, "Malformed version packet.");
851		return (0);
852	}
853	g_gate_log(LOG_DEBUG, "Version packet received.");
854	if (memcmp(ver.gv_magic, GGATE_MAGIC, strlen(GGATE_MAGIC)) != 0) {
855		g_gate_log(LOG_WARNING, "Invalid magic field.");
856		return (0);
857	}
858	if (ver.gv_version != GGATE_VERSION) {
859		g_gate_log(LOG_WARNING, "Version %u is not supported.",
860		    ver.gv_version);
861		return (0);
862	}
863	ver.gv_error = 0;
864	g_gate_swap2n_version(&ver);
865	data = g_gate_send(sfd, &ver, sizeof(ver), 0);
866	g_gate_swap2h_version(&ver);
867	if (data == -1) {
868		sendfail(sfd, errno, "Error while sending version packet: %s.",
869		    strerror(errno));
870		return (0);
871	}
872
873	/*
874	 * Phase 2: Request verification.
875	 */
876	g_gate_log(LOG_DEBUG, "Receiving initial packet.");
877	data = g_gate_recv(sfd, &cinit, sizeof(cinit), MSG_WAITALL);
878	g_gate_swap2h_cinit(&cinit);
879	if (data != sizeof(cinit)) {
880		g_gate_log(LOG_WARNING, "Malformed initial packet.");
881		return (0);
882	}
883	g_gate_log(LOG_DEBUG, "Initial packet received.");
884	conn = connection_find(&cinit);
885	if (conn != NULL) {
886		/*
887		 * Connection should already exists.
888		 */
889		g_gate_log(LOG_DEBUG, "Found existing connection (token=%lu).",
890		    (unsigned long)conn->c_token);
891		if (connection_add(conn, &cinit, from, sfd) == -1) {
892			connection_remove(conn);
893			return (0);
894		}
895	} else {
896		/*
897		 * New connection, allocate space.
898		 */
899		conn = connection_new(&cinit, from, sfd);
900		if (conn == NULL) {
901			sendfail(sfd, ENOMEM,
902			    "Cannot allocate new connection.");
903			return (0);
904		}
905		g_gate_log(LOG_DEBUG, "New connection created (token=%lu).",
906		    (unsigned long)conn->c_token);
907	}
908
909	ex = exports_find(from, &cinit, conn);
910	if (ex == NULL) {
911		sendfail(sfd, errno, NULL);
912		connection_remove(conn);
913		return (0);
914	}
915	if (conn->c_mediasize == 0) {
916		conn->c_mediasize = g_gate_mediasize(conn->c_diskfd);
917		conn->c_sectorsize = g_gate_sectorsize(conn->c_diskfd);
918	}
919	sinit.gs_mediasize = conn->c_mediasize;
920	sinit.gs_sectorsize = conn->c_sectorsize;
921	sinit.gs_error = 0;
922
923	g_gate_log(LOG_DEBUG, "Sending initial packet.");
924
925	g_gate_swap2n_sinit(&sinit);
926	data = g_gate_send(sfd, &sinit, sizeof(sinit), 0);
927	g_gate_swap2h_sinit(&sinit);
928	if (data == -1) {
929		sendfail(sfd, errno, "Error while sending initial packet: %s.",
930		    strerror(errno));
931		return (0);
932	}
933
934	if (connection_ready(conn)) {
935		connection_launch(conn);
936		connection_remove(conn);
937	}
938	return (1);
939}
940
941static void
942huphandler(int sig __unused)
943{
944
945	got_sighup = 1;
946}
947
948int
949main(int argc, char *argv[])
950{
951	const char *ggated_pidfile = _PATH_VARRUN "/ggated.pid";
952	struct pidfh *pfh;
953	struct sockaddr_in serv;
954	struct sockaddr from;
955	socklen_t fromlen;
956	pid_t otherpid;
957	int ch, sfd, tmpsfd;
958	unsigned port;
959
960	bindaddr = htonl(INADDR_ANY);
961	port = G_GATE_PORT;
962	while ((ch = getopt(argc, argv, "a:hnp:F:R:S:v")) != -1) {
963		switch (ch) {
964		case 'a':
965			bindaddr = g_gate_str2ip(optarg);
966			if (bindaddr == INADDR_NONE) {
967				errx(EXIT_FAILURE,
968				    "Invalid IP/host name to bind to.");
969			}
970			break;
971		case 'F':
972			ggated_pidfile = optarg;
973			break;
974		case 'n':
975			nagle = 0;
976			break;
977		case 'p':
978			errno = 0;
979			port = strtoul(optarg, NULL, 10);
980			if (port == 0 && errno != 0)
981				errx(EXIT_FAILURE, "Invalid port.");
982			break;
983		case 'R':
984			errno = 0;
985			rcvbuf = strtoul(optarg, NULL, 10);
986			if (rcvbuf == 0 && errno != 0)
987				errx(EXIT_FAILURE, "Invalid rcvbuf.");
988			break;
989		case 'S':
990			errno = 0;
991			sndbuf = strtoul(optarg, NULL, 10);
992			if (sndbuf == 0 && errno != 0)
993				errx(EXIT_FAILURE, "Invalid sndbuf.");
994			break;
995		case 'v':
996			g_gate_verbose++;
997			break;
998		case 'h':
999		default:
1000			usage();
1001		}
1002	}
1003	argc -= optind;
1004	argv += optind;
1005
1006	if (argv[0] != NULL)
1007		exports_file = argv[0];
1008	exports_get();
1009
1010	pfh = pidfile_open(ggated_pidfile, 0600, &otherpid);
1011	if (pfh == NULL) {
1012		if (errno == EEXIST) {
1013			errx(EXIT_FAILURE, "Daemon already running, pid: %jd.",
1014			    (intmax_t)otherpid);
1015		}
1016		err(EXIT_FAILURE, "Cannot open/create pidfile");
1017	}
1018
1019	if (!g_gate_verbose) {
1020		/* Run in daemon mode. */
1021		if (daemon(0, 0) == -1)
1022			g_gate_xlog("Cannot daemonize: %s", strerror(errno));
1023	}
1024
1025	pidfile_write(pfh);
1026
1027	signal(SIGCHLD, SIG_IGN);
1028
1029	sfd = socket(AF_INET, SOCK_STREAM, 0);
1030	if (sfd == -1)
1031		g_gate_xlog("Cannot open stream socket: %s.", strerror(errno));
1032	bzero(&serv, sizeof(serv));
1033	serv.sin_family = AF_INET;
1034	serv.sin_addr.s_addr = bindaddr;
1035	serv.sin_port = htons(port);
1036
1037	g_gate_socket_settings(sfd);
1038
1039	if (bind(sfd, (struct sockaddr *)&serv, sizeof(serv)) == -1)
1040		g_gate_xlog("bind(): %s.", strerror(errno));
1041	if (listen(sfd, 5) == -1)
1042		g_gate_xlog("listen(): %s.", strerror(errno));
1043
1044	g_gate_log(LOG_INFO, "Listen on port: %d.", port);
1045
1046	signal(SIGHUP, huphandler);
1047
1048	for (;;) {
1049		fromlen = sizeof(from);
1050		tmpsfd = accept(sfd, &from, &fromlen);
1051		if (tmpsfd == -1)
1052			g_gate_xlog("accept(): %s.", strerror(errno));
1053
1054		if (got_sighup) {
1055			got_sighup = 0;
1056			exports_get();
1057		}
1058
1059		if (!handshake(&from, tmpsfd))
1060			close(tmpsfd);
1061	}
1062	close(sfd);
1063	pidfile_remove(pfh);
1064	exit(EXIT_SUCCESS);
1065}
1066