hammer2 - SPAN protocol work
[dragonfly.git] / sbin / hammer2 / cmd_service.c
... / ...
CommitLineData
1/*
2 * Copyright (c) 2011-2012 The DragonFly Project. All rights reserved.
3 *
4 * This code is derived from software contributed to The DragonFly Project
5 * by Matthew Dillon <dillon@dragonflybsd.org>
6 * by Venkatesh Srinivas <vsrinivas@dragonflybsd.org>
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
17 * distribution.
18 * 3. Neither the name of The DragonFly Project nor the names of its
19 * contributors may be used to endorse or promote products derived
20 * from this software without specific, prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
25 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
26 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
27 * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
28 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
29 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
30 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
31 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
32 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 */
35
36#include "hammer2.h"
37
38static void *master_accept(void *data);
39static void master_auth_state(hammer2_iocom_t *iocom);
40static void master_auth_rxmsg(hammer2_iocom_t *iocom, hammer2_msg_t *msg);
41static void master_link_state(hammer2_iocom_t *iocom);
42static void master_link_rxmsg(hammer2_iocom_t *iocom, hammer2_msg_t *msg);
43
44/*
45 * Start-up the master listener daemon for the machine.
46 *
47 * The master listener serves as a rendezvous point in the cluster, accepting
48 * connections, performing registrations and authentications, maintaining
49 * the spanning tree, and keeping track of message state so disconnects can
50 * be handled properly.
51 *
52 * Once authenticated only low-level messaging protocols (which includes
53 * tracking persistent messages) are handled by this daemon. This daemon
54 * does not run the higher level quorum or locking protocols.
55 *
56 * This daemon can also be told to maintain connections to other nodes,
57 * forming a messaging backbone, which in turn allows PFS's (if desired) to
58 * simply connect to the master daemon via localhost if desired.
59 * Backbones are specified via /etc/hammer2.conf.
60 */
61int
62cmd_service(void)
63{
64 struct sockaddr_in lsin;
65 int on;
66 int lfd;
67
68 /*
69 * Acquire socket and set options
70 */
71 if ((lfd = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
72 fprintf(stderr, "master_listen: socket(): %s\n",
73 strerror(errno));
74 return 1;
75 }
76 on = 1;
77 setsockopt(lfd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
78
79 /*
80 * Setup listen port and try to bind. If the bind fails we assume
81 * that a master listener process is already running and silently
82 * fail.
83 */
84 bzero(&lsin, sizeof(lsin));
85 lsin.sin_family = AF_INET;
86 lsin.sin_addr.s_addr = INADDR_ANY;
87 lsin.sin_port = htons(HAMMER2_LISTEN_PORT);
88 if (bind(lfd, (struct sockaddr *)&lsin, sizeof(lsin)) < 0) {
89 close(lfd);
90 if (QuietOpt == 0) {
91 fprintf(stderr,
92 "master listen: daemon already running\n");
93 }
94 return 0;
95 }
96 if (QuietOpt == 0)
97 fprintf(stderr, "master listen: startup\n");
98 listen(lfd, 50);
99
100 /*
101 * Fork and disconnect the controlling terminal and parent process,
102 * executing the specified function as a pthread.
103 *
104 * Returns to the original process which can then continue running.
105 * In debug mode this call will create the pthread without forking
106 * and set NormalExit to 0, instead of fork.
107 */
108 hammer2_demon(master_accept, (void *)(intptr_t)lfd);
109 if (NormalExit)
110 close(lfd);
111 return 0;
112}
113
114/*
115 * Master listen/accept thread. Accept connections on the master socket,
116 * starting a pthread for each one.
117 */
118static
119void *
120master_accept(void *data)
121{
122 struct sockaddr_in asin;
123 socklen_t alen;
124 pthread_t thread;
125 int lfd = (int)(intptr_t)data;
126 int fd;
127
128 /*
129 * Nobody waits for us
130 */
131 setproctitle("hammer2 master listen");
132 pthread_detach(pthread_self());
133
134 /*
135 * Accept connections and create pthreads to handle them after
136 * validating the IP.
137 */
138 for (;;) {
139 alen = sizeof(asin);
140 fd = accept(lfd, (struct sockaddr *)&asin, &alen);
141 if (fd < 0) {
142 if (errno == EINTR)
143 continue;
144 break;
145 }
146 thread = NULL;
147 fprintf(stderr, "master_accept: accept fd %d\n", fd);
148 pthread_create(&thread, NULL,
149 master_service, (void *)(intptr_t)fd);
150 }
151 return (NULL);
152}
153
154/*
155 * Service an accepted connection (runs as a pthread)
156 *
157 * (also called from a couple of other places)
158 */
159void *
160master_service(void *data)
161{
162 hammer2_iocom_t iocom;
163 int fd;
164
165 fd = (int)(intptr_t)data;
166 hammer2_iocom_init(&iocom, fd, -1,
167 master_auth_state, master_auth_rxmsg, NULL);
168 hammer2_iocom_core(&iocom);
169
170 fprintf(stderr,
171 "iocom on fd %d terminated error rx=%d, tx=%d\n",
172 fd, iocom.ioq_rx.error, iocom.ioq_tx.error);
173 close(fd);
174
175 return (NULL);
176}
177
178/************************************************************************
179 * AUTHENTICATION *
180 ************************************************************************
181 *
182 * Callback via hammer2_iocom_core().
183 *
184 * Additional messaging-based authentication must occur before normal
185 * message operation. The connection has already been encrypted at
186 * this point.
187 */
188static void master_auth_conn_rx(hammer2_state_t *state, hammer2_msg_t *msg);
189
190static
191void
192master_auth_state(hammer2_iocom_t *iocom __unused)
193{
194 hammer2_msg_t *msg;
195
196 /*
197 * Transmit LNK_CONN, enabling the SPAN protocol if both sides
198 * agree.
199 *
200 * XXX put additional authentication states here
201 */
202 msg = hammer2_msg_alloc(iocom, 0, HAMMER2_LNK_CONN |
203 HAMMER2_MSGF_CREATE);
204 snprintf(msg->any.lnk_conn.label, sizeof(msg->any.lnk_conn.label), "*");
205 hammer2_msg_write(iocom, msg, master_auth_conn_rx, NULL, NULL);
206
207 hammer2_iocom_restate(iocom,
208 master_link_state, master_link_rxmsg, NULL);
209}
210
211static
212void
213master_auth_conn_rx(hammer2_state_t *state, hammer2_msg_t *msg)
214{
215 if (msg->any.head.cmd & HAMMER2_MSGF_DELETE)
216 hammer2_msg_reply(state->iocom, msg, 0);
217}
218
219static
220void
221master_auth_rxmsg(hammer2_iocom_t *iocom __unused, hammer2_msg_t *msg __unused)
222{
223}
224
225/************************************************************************
226 * POST-AUTHENTICATION SERVICE MSGS *
227 ************************************************************************
228 *
229 * Callback via hammer2_iocom_core().
230 */
231static
232void
233master_link_state(hammer2_iocom_t *iocom __unused)
234{
235}
236
237static
238void
239master_link_rxmsg(hammer2_iocom_t *iocom, hammer2_msg_t *msg)
240{
241 hammer2_state_t *state;
242 uint32_t cmd;
243
244 /*
245 * If the message state has a function established we just
246 * call the function, otherwise we call the appropriate
247 * link-level protocol related to the original command and
248 * let it sort it out.
249 *
250 * Non-transactional one-off messages, on the otherhand,
251 * might have REPLY set.
252 */
253 state = msg->state;
254 if (state) {
255 cmd = state->msg->any.head.cmd;
256 fprintf(stderr,
257 "MSGRX persist=%08x cmd=%08x error %d\n",
258 cmd, msg->any.head.cmd, msg->any.head.error);
259 } else {
260 cmd = msg->any.head.cmd;
261 fprintf(stderr,
262 "MSGRX persist=-------- cmd=%08x error %d\n",
263 cmd, msg->any.head.error);
264 }
265 if (state && state->func) {
266 assert(state->func != NULL);
267 state->func(state, msg);
268 } else {
269 switch(cmd & HAMMER2_MSGF_PROTOS) {
270 case HAMMER2_MSG_PROTO_LNK:
271 hammer2_msg_lnk(iocom, msg);
272 break;
273 case HAMMER2_MSG_PROTO_DBG:
274 hammer2_msg_dbg(iocom, msg);
275 break;
276 default:
277 hammer2_msg_reply(iocom, msg,
278 HAMMER2_MSG_ERR_UNKNOWN);
279 break;
280 }
281 }
282}