#include <sys/types.h>
#include <sys/event.h>
#include <sys/nv.h>
#include <sys/time.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/wait.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <assert.h>
#include <ctype.h>
#include <errno.h>
#include <libnvmf.h>
#include <netdb.h>
#include <signal.h>
#include <stdbool.h>
#include <stdio.h>
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <cam/scsi/scsi_all.h>
#include <algorithm>
#include <libutil++.hh>
#include "conf.h"
#include "ctld.hh"
#include "isns.hh"
bool proxy_mode = false;
static volatile bool sighup_received = false;
static volatile bool sigterm_received = false;
static volatile bool sigalrm_received = false;
static int kqfd;
static int nchildren = 0;
uint32_t conf::global_genctr;
static void
usage(void)
{
fprintf(stderr, "usage: ctld [-d][-u][-f config-file]\n");
fprintf(stderr, " ctld -t [-u][-f config-file]\n");
exit(1);
}
conf::conf()
{
conf_genctr = global_genctr++;
}
void
conf::set_debug(int debug)
{
conf_debug = debug;
}
void
conf::set_isns_period(int period)
{
conf_isns_period = period;
}
void
conf::set_isns_timeout(int timeout)
{
conf_isns_timeout = timeout;
}
void
conf::set_maxproc(int maxproc)
{
conf_maxproc = maxproc;
}
void
conf::set_timeout(int timeout)
{
conf_timeout = timeout;
}
bool
conf::set_pidfile_path(std::string_view path)
{
if (!conf_pidfile_path.empty()) {
log_warnx("pidfile specified more than once");
return (false);
}
conf_pidfile_path = path;
return (true);
}
void
conf::open_pidfile()
{
const char *path;
pid_t otherpid;
assert(!conf_pidfile_path.empty());
path = conf_pidfile_path.c_str();
log_debugx("opening pidfile %s", path);
conf_pidfile = pidfile_open(path, 0600, &otherpid);
if (!conf_pidfile) {
if (errno == EEXIST)
log_errx(1, "daemon already running, pid: %jd.",
(intmax_t)otherpid);
log_err(1, "cannot open or create pidfile \"%s\"", path);
}
}
void
conf::write_pidfile()
{
conf_pidfile.write();
}
void
conf::close_pidfile()
{
conf_pidfile.close();
}
#ifdef ICL_KERNEL_PROXY
int
conf::add_proxy_portal(portal *portal)
{
conf_proxy_portals.push_back(portal);
return (conf_proxy_portals.size() - 1);
}
portal *
conf::proxy_portal(int id)
{
if (id >= conf_proxy_portals.size())
return (nullptr);
return (conf_proxy_portals[id]);
}
#endif
bool
auth_group::set_type(const char *str)
{
auth_type type;
if (strcmp(str, "none") == 0) {
type = auth_type::NO_AUTHENTICATION;
} else if (strcmp(str, "deny") == 0) {
type = auth_type::DENY;
} else if (strcmp(str, "chap") == 0) {
type = auth_type::CHAP;
} else if (strcmp(str, "chap-mutual") == 0) {
type = auth_type::CHAP_MUTUAL;
} else {
log_warnx("invalid auth-type \"%s\" for %s", str, label());
return (false);
}
if (ag_type != auth_type::UNKNOWN && ag_type != type) {
log_warnx("cannot set auth-type to \"%s\" for %s; "
"already has a different type", str, label());
return (false);
}
ag_type = type;
return (true);
}
void
auth_group::set_type(auth_type type)
{
assert(ag_type == auth_type::UNKNOWN);
ag_type = type;
}
const struct auth *
auth_group::find_auth(std::string_view user) const
{
auto it = ag_auths.find(std::string(user));
if (it == ag_auths.end())
return (nullptr);
return (&it->second);
}
void
auth_group::check_secret_length(const char *user, const char *secret,
const char *secret_type)
{
size_t len;
len = strlen(secret);
assert(len != 0);
if (len > 16) {
log_warnx("%s for user \"%s\", %s, is too long; it should be "
"at most 16 characters long", secret_type, user, label());
}
if (len < 12) {
log_warnx("%s for user \"%s\", %s, is too short; it should be "
"at least 12 characters long", secret_type, user, label());
}
}
bool
auth_group::add_chap(const char *user, const char *secret)
{
if (ag_type == auth_type::UNKNOWN)
ag_type = auth_type::CHAP;
if (ag_type != auth_type::CHAP) {
log_warnx("cannot mix \"chap\" authentication with "
"other types for %s", label());
return (false);
}
check_secret_length(user, secret, "secret");
const auto &pair = ag_auths.try_emplace(user, secret);
if (!pair.second) {
log_warnx("duplicate credentials for user \"%s\" for %s",
user, label());
return (false);
}
return (true);
}
bool
auth_group::add_chap_mutual(const char *user, const char *secret,
const char *user2, const char *secret2)
{
if (ag_type == auth_type::UNKNOWN)
ag_type = auth_type::CHAP_MUTUAL;
if (ag_type != auth_type::CHAP_MUTUAL) {
log_warnx("cannot mix \"chap-mutual\" authentication "
"with other types for %s", label());
return (false);
}
check_secret_length(user, secret, "secret");
check_secret_length(user, secret2, "mutual secret");
const auto &pair = ag_auths.try_emplace(user, secret, user2, secret2);
if (!pair.second) {
log_warnx("duplicate credentials for user \"%s\" for %s",
user, label());
return (false);
}
return (true);
}
bool
auth_group::add_host_nqn(std::string_view nqn)
{
ag_host_names.emplace(nqn);
return (true);
}
bool
auth_group::host_permitted(std::string_view nqn) const
{
if (ag_host_names.empty())
return (true);
return (ag_host_names.count(std::string(nqn)) != 0);
}
bool
auth_group::add_initiator_name(std::string_view name)
{
ag_initiator_names.emplace(name);
return (true);
}
bool
auth_group::initiator_permitted(std::string_view initiator_name) const
{
if (ag_initiator_names.empty())
return (true);
return (ag_initiator_names.count(std::string(initiator_name)) != 0);
}
bool
auth_portal::parse(const char *portal)
{
std::string net(portal);
std::string mask;
size_t pos = net.find('/');
if (pos != net.npos) {
mask = net.substr(pos + 1);
if (mask.empty())
return false;
net.resize(pos);
}
if (net.empty())
return false;
bool brackets = net[0] == '[';
if (brackets) {
net.erase(0, 1);
size_t len = net.length();
if (len < 2)
return false;
if (net[len - 1] != ']')
return false;
net.resize(len - 1);
}
if (brackets || net.find(':') != net.npos) {
struct sockaddr_in6 *sin6 =
(struct sockaddr_in6 *)&ap_sa;
sin6->sin6_len = sizeof(*sin6);
sin6->sin6_family = AF_INET6;
if (inet_pton(AF_INET6, net.c_str(), &sin6->sin6_addr) <= 0)
return false;
ap_mask = sizeof(sin6->sin6_addr) * 8;
} else {
struct sockaddr_in *sin =
(struct sockaddr_in *)&ap_sa;
sin->sin_len = sizeof(*sin);
sin->sin_family = AF_INET;
if (inet_pton(AF_INET, net.c_str(), &sin->sin_addr) <= 0)
return false;
ap_mask = sizeof(sin->sin_addr) * 8;
}
if (!mask.empty()) {
char *tmp;
long m = strtol(mask.c_str(), &tmp, 0);
if (m < 0 || m > ap_mask || tmp[0] != 0)
return false;
ap_mask = m;
}
return true;
}
bool
auth_group::add_host_address(const char *address)
{
auth_portal ap;
if (!ap.parse(address)) {
log_warnx("invalid controller address \"%s\" for %s", address,
label());
return (false);
}
ag_host_addresses.emplace_back(ap);
return (true);
}
bool
auth_group::add_initiator_portal(const char *portal)
{
auth_portal ap;
if (!ap.parse(portal)) {
log_warnx("invalid initiator portal \"%s\" for %s", portal,
label());
return (false);
}
ag_initiator_portals.emplace_back(ap);
return (true);
}
bool
auth_portal::matches(const struct sockaddr *sa) const
{
const uint8_t *a, *b;
int i;
if (ap_sa.ss_family != sa->sa_family)
return (false);
if (sa->sa_family == AF_INET) {
a = (const uint8_t *)
&((const struct sockaddr_in *)sa)->sin_addr;
b = (const uint8_t *)
&((const struct sockaddr_in *)&ap_sa)->sin_addr;
} else {
a = (const uint8_t *)
&((const struct sockaddr_in6 *)sa)->sin6_addr;
b = (const uint8_t *)
&((const struct sockaddr_in6 *)&ap_sa)->sin6_addr;
}
for (i = 0; i < ap_mask / 8; i++) {
if (a[i] != b[i])
return (false);
}
if ((ap_mask % 8) != 0) {
uint8_t bmask = 0xff << (8 - (ap_mask % 8));
if ((a[i] & bmask) != (b[i] & bmask))
return (false);
}
return (true);
}
bool
auth_group::host_permitted(const struct sockaddr *sa) const
{
if (ag_host_addresses.empty())
return (true);
for (const auth_portal &ap : ag_host_addresses)
if (ap.matches(sa))
return (true);
return (false);
}
bool
auth_group::initiator_permitted(const struct sockaddr *sa) const
{
if (ag_initiator_portals.empty())
return (true);
for (const auth_portal &ap : ag_initiator_portals)
if (ap.matches(sa))
return (true);
return (false);
}
struct auth_group *
conf::add_auth_group(const char *name)
{
const auto &pair = conf_auth_groups.try_emplace(name,
std::make_shared<auth_group>(freebsd::stringf("auth-group \"%s\"",
name)));
if (!pair.second) {
log_warnx("duplicated auth-group \"%s\"", name);
return (NULL);
}
return (pair.first->second.get());
}
struct auth_group *
conf::define_default_auth_group()
{
if (conf_default_ag_defined) {
log_warnx("duplicated auth-group \"default\"");
return (nullptr);
}
conf_default_ag_defined = true;
return (find_auth_group("default").get());
}
auth_group_sp
conf::find_auth_group(std::string_view name)
{
auto it = conf_auth_groups.find(std::string(name));
if (it == conf_auth_groups.end())
return {};
return (it->second);
}
portal_group::portal_group(struct conf *conf, std::string_view name) :
pg_conf(conf), pg_options(nvlist_create(0)), pg_name(name)
{
}
struct portal_group *
conf::add_portal_group(const char *name)
{
auto pair = conf_portal_groups.try_emplace(name,
iscsi_make_portal_group(this, name));
if (!pair.second) {
log_warnx("duplicated portal-group \"%s\"", name);
return (nullptr);
}
return (pair.first->second.get());
}
struct portal_group *
conf::define_default_portal_group()
{
if (conf_default_pg_defined) {
log_warnx("duplicated portal-group \"default\"");
return (nullptr);
}
conf_default_pg_defined = true;
return (find_portal_group("default"));
}
struct portal_group *
conf::find_portal_group(std::string_view name)
{
auto it = conf_portal_groups.find(std::string(name));
if (it == conf_portal_groups.end())
return (nullptr);
return (it->second.get());
}
struct portal_group *
conf::add_transport_group(const char *name)
{
auto pair = conf_transport_groups.try_emplace(name,
nvmf_make_transport_group(this, name));
if (!pair.second) {
log_warnx("duplicated transport-group \"%s\"", name);
return (nullptr);
}
return (pair.first->second.get());
}
struct portal_group *
conf::define_default_transport_group()
{
if (conf_default_tg_defined) {
log_warnx("duplicated transport-group \"default\"");
return (nullptr);
}
conf_default_tg_defined = true;
return (find_transport_group("default"));
}
struct portal_group *
conf::find_transport_group(std::string_view name)
{
auto it = conf_transport_groups.find(std::string(name));
if (it == conf_transport_groups.end())
return (nullptr);
return (it->second.get());
}
bool
portal_group::is_dummy() const
{
if (pg_foreign)
return (true);
if (pg_portals.empty())
return (true);
return (false);
}
freebsd::addrinfo_up
parse_addr_port(const char *address, const char *def_port)
{
struct addrinfo hints, *ai;
int error;
std::string addr(address);
std::string port(def_port);
if (addr[0] == '[') {
addr.erase(0, 1);
size_t pos = addr.find(']');
if (pos == 0 || pos == addr.npos)
return {};
if (pos < addr.length() - 1) {
port = addr.substr(pos + 1);
if (port[0] != ':' || port.length() < 2)
return {};
port.erase(0, 1);
}
addr.resize(pos);
} else {
size_t pos = addr.find(':');
if (pos != addr.npos && addr.find(':', pos + 1) == addr.npos) {
if (pos == addr.length() - 1)
return {};
port = addr.substr(pos + 1);
addr.resize(pos);
}
}
memset(&hints, 0, sizeof(hints));
hints.ai_family = PF_UNSPEC;
hints.ai_socktype = SOCK_STREAM;
hints.ai_flags = AI_PASSIVE;
error = getaddrinfo(addr.c_str(), port.c_str(), &hints, &ai);
if (error != 0)
return {};
return freebsd::addrinfo_up(ai);
}
void
portal_group::add_port(struct portal_group_port *port)
{
pg_ports.emplace(port->target()->name(), port);
}
void
portal_group::remove_port(struct portal_group_port *port)
{
auto it = pg_ports.find(port->target()->name());
pg_ports.erase(it);
}
freebsd::nvlist_up
portal_group::options() const
{
return (freebsd::nvlist_up(nvlist_clone(pg_options.get())));
}
bool
portal_group::add_option(const char *name, const char *value)
{
return (option_new(pg_options.get(), name, value));
}
bool
portal_group::set_discovery_auth_group(const char *ag_name)
{
if (pg_discovery_auth_group != nullptr) {
log_warnx("discovery-auth-group for %s "
"\"%s\" specified more than once", keyword(), name());
return (false);
}
pg_discovery_auth_group = pg_conf->find_auth_group(ag_name);
if (pg_discovery_auth_group == nullptr) {
log_warnx("unknown discovery-auth-group \"%s\" "
"for %s \"%s\"", ag_name, keyword(), name());
return (false);
}
return (true);
}
bool
portal_group::set_dscp(u_int dscp)
{
if (dscp >= 0x40) {
log_warnx("invalid DSCP value %u for %s \"%s\"",
dscp, keyword(), name());
return (false);
}
pg_dscp = dscp;
return (true);
}
void
portal_group::set_foreign()
{
pg_foreign = true;
}
bool
portal_group::set_offload(const char *offload)
{
if (!pg_offload.empty()) {
log_warnx("cannot set offload to \"%s\" for "
"%s \"%s\"; already defined",
offload, keyword(), name());
return (false);
}
pg_offload = offload;
return (true);
}
bool
portal_group::set_pcp(u_int pcp)
{
if (pcp > 7) {
log_warnx("invalid PCP value %u for %s \"%s\"",
pcp, keyword(), name());
return (false);
}
pg_pcp = pcp;
return (true);
}
bool
portal_group::set_redirection(const char *addr)
{
if (!pg_redirection.empty()) {
log_warnx("cannot set redirection to \"%s\" for "
"%s \"%s\"; already defined",
addr, keyword(), name());
return (false);
}
pg_redirection = addr;
return (true);
}
void
portal_group::set_tag(uint16_t tag)
{
pg_tag = tag;
}
void
portal_group::verify(struct conf *conf)
{
if (pg_discovery_auth_group == nullptr) {
pg_discovery_auth_group = conf->find_auth_group("default");
assert(pg_discovery_auth_group != nullptr);
}
if (pg_discovery_filter == discovery_filter::UNKNOWN)
pg_discovery_filter = discovery_filter::NONE;
if (!pg_redirection.empty()) {
if (!pg_ports.empty()) {
log_debugx("%s \"%s\" assigned to target, "
"but configured for redirection", keyword(),
name());
}
pg_assigned = true;
} else if (!pg_ports.empty()) {
pg_assigned = true;
} else {
if (pg_name != "default")
log_warnx("%s \"%s\" not assigned "
"to any target", keyword(), name());
pg_assigned = false;
}
}
bool
portal_group::reuse_socket(struct portal &newp)
{
for (portal_up &portal : pg_portals) {
if (newp.reuse_socket(*portal))
return (true);
}
return (false);
}
int
portal_group::open_sockets(struct conf &oldconf)
{
int cumulated_error = 0;
if (pg_foreign)
return (0);
if (!pg_assigned) {
log_debugx("not listening on %s \"%s\", "
"not assigned to any target", keyword(), name());
return (0);
}
for (portal_up &portal : pg_portals) {
if (!portal->prepare()) {
cumulated_error++;
continue;
}
if (oldconf.reuse_portal_group_socket(*portal))
continue;
if (!portal->init_socket()) {
cumulated_error++;
continue;
}
}
return (cumulated_error);
}
void
portal_group::close_sockets()
{
for (portal_up &portal : pg_portals) {
if (portal->socket() < 0)
continue;
log_debugx("closing socket for %s, %s \"%s\"",
portal->listen(), keyword(), name());
portal->close();
}
}
bool
conf::add_isns(const char *addr)
{
if (conf_isns.count(addr) > 0) {
log_warnx("duplicate iSNS address %s", addr);
return (false);
}
freebsd::addrinfo_up ai = parse_addr_port(addr, "3205");
if (!ai) {
log_warnx("invalid iSNS address %s", addr);
return (false);
}
conf_isns.emplace(addr, isns(addr, std::move(ai)));
return (true);
}
freebsd::fd_up
isns::connect()
{
freebsd::fd_up s;
s = socket(i_ai->ai_family, i_ai->ai_socktype, i_ai->ai_protocol);
if (!s) {
log_warn("socket(2) failed for %s", addr());
return (s);
}
if (::connect(s, i_ai->ai_addr, i_ai->ai_addrlen)) {
log_warn("connect(2) failed for %s", addr());
s.reset();
}
return (s);
}
bool
isns::send_request(int s, struct isns_req req)
{
if (!req.send(s)) {
log_warn("send(2) failed for %s", addr());
return (false);
}
if (!req.receive(s)) {
log_warn("receive(2) failed for %s", addr());
return (false);
}
uint32_t error = req.get_status();
if (error != 0) {
log_warnx("iSNS %s error %u for %s", req.descr(), error,
addr());
return (false);
}
return (true);
}
struct isns_req
conf::isns_register_request(const char *hostname)
{
const struct portal_group *pg;
isns_req req(ISNS_FUNC_DEVATTRREG, ISNS_FLAG_CLIENT, "register");
req.add_str(32, conf_first_target->name());
req.add_delim();
req.add_str(1, hostname);
req.add_32(2, 2);
req.add_32(6, conf_isns_period);
for (const auto &kv : conf_portal_groups) {
pg = kv.second.get();
if (!pg->assigned())
continue;
for (const portal_up &portal : pg->portals()) {
req.add_addr(16, portal->ai());
req.add_port(17, portal->ai());
}
}
for (const auto &kv : conf_targets) {
const struct target *target = kv.second.get();
req.add_str(32, target->name());
req.add_32(33, 1);
if (target->has_alias())
req.add_str(34, target->alias());
for (const port *port : target->ports()) {
pg = port->portal_group();
if (pg == nullptr)
continue;
req.add_32(51, pg->tag());
for (const portal_up &portal : pg->portals()) {
req.add_addr(49, portal->ai());
req.add_port(50, portal->ai());
}
}
}
return (req);
}
struct isns_req
conf::isns_check_request(const char *hostname)
{
isns_req req(ISNS_FUNC_DEVATTRQRY, ISNS_FLAG_CLIENT, "check");
req.add_str(32, conf_first_target->name());
req.add_str(1, hostname);
req.add_delim();
req.add(2, 0, NULL);
return (req);
}
struct isns_req
conf::isns_deregister_request(const char *hostname)
{
isns_req req(ISNS_FUNC_DEVDEREG, ISNS_FLAG_CLIENT, "deregister");
req.add_str(32, conf_first_target->name());
req.add_delim();
req.add_str(1, hostname);
return (req);
}
void
conf::isns_register_targets(struct isns *isns, struct conf *oldconf)
{
int error;
char hostname[256];
if (conf_targets.empty() || conf_portal_groups.empty())
return;
start_timer(conf_isns_timeout);
freebsd::fd_up s = isns->connect();
if (!s) {
stop_timer();
return;
}
error = gethostname(hostname, sizeof(hostname));
if (error != 0)
log_err(1, "gethostname");
if (oldconf == nullptr || oldconf->conf_first_target == nullptr)
oldconf = this;
isns->send_request(s, oldconf->isns_deregister_request(hostname));
isns->send_request(s, isns_register_request(hostname));
s.reset();
stop_timer();
}
void
conf::isns_check(struct isns *isns)
{
int error;
char hostname[256];
if (conf_targets.empty() || conf_portal_groups.empty())
return;
start_timer(conf_isns_timeout);
freebsd::fd_up s = isns->connect();
if (!s) {
stop_timer();
return;
}
error = gethostname(hostname, sizeof(hostname));
if (error != 0)
log_err(1, "gethostname");
if (!isns->send_request(s, isns_check_request(hostname))) {
isns->send_request(s, isns_deregister_request(hostname));
isns->send_request(s, isns_register_request(hostname));
}
s.reset();
stop_timer();
}
void
conf::isns_deregister_targets(struct isns *isns)
{
int error;
char hostname[256];
if (conf_targets.empty() || conf_portal_groups.empty())
return;
start_timer(conf_isns_timeout);
freebsd::fd_up s = isns->connect();
if (!s)
return;
error = gethostname(hostname, sizeof(hostname));
if (error != 0)
log_err(1, "gethostname");
isns->send_request(s, isns_deregister_request(hostname));
s.reset();
stop_timer();
}
void
conf::isns_schedule_update()
{
if (!conf_isns.empty())
start_timer((conf_isns_period + 2) / 3);
}
void
conf::isns_update()
{
stop_timer();
for (auto &kv : conf_isns)
isns_check(&kv.second);
isns_schedule_update();
}
bool
kports::add_port(std::string &name, uint32_t ctl_port)
{
const auto &pair = pports.try_emplace(name, name, ctl_port);
if (!pair.second) {
log_warnx("duplicate kernel port \"%s\" (%u)", name.c_str(),
ctl_port);
return (false);
}
return (true);
}
bool
kports::has_port(std::string_view name)
{
return (pports.count(std::string(name)) > 0);
}
struct pport *
kports::find_port(std::string_view name)
{
auto it = pports.find(std::string(name));
if (it == pports.end())
return (nullptr);
return (&it->second);
}
port::port(struct target *target) :
p_target(target)
{
target->add_port(this);
}
void
port::clear_references()
{
p_target->remove_port(this);
}
portal_group_port::portal_group_port(struct target *target,
struct portal_group *pg, auth_group_sp ag) :
port(target), p_auth_group(ag), p_portal_group(pg)
{
p_portal_group->add_port(this);
}
portal_group_port::portal_group_port(struct target *target,
struct portal_group *pg, uint32_t ctl_port) :
port(target), p_portal_group(pg)
{
p_ctl_port = ctl_port;
p_portal_group->add_port(this);
}
bool
portal_group_port::is_dummy() const
{
return (p_portal_group->is_dummy());
}
void
portal_group_port::clear_references()
{
p_portal_group->remove_port(this);
port::clear_references();
}
bool
conf::add_port(struct target *target, struct portal_group *pg, auth_group_sp ag)
{
std::string name = freebsd::stringf("%s-%s", pg->name(),
target->name());
const auto &pair = conf_ports.try_emplace(name, pg->create_port(target,
ag));
if (!pair.second) {
log_warnx("duplicate port \"%s\"", name.c_str());
return (false);
}
return (true);
}
bool
conf::add_port(struct target *target, struct portal_group *pg,
uint32_t ctl_port)
{
std::string name = freebsd::stringf("%s-%s", pg->name(),
target->name());
const auto &pair = conf_ports.try_emplace(name, pg->create_port(target,
ctl_port));
if (!pair.second) {
log_warnx("duplicate port \"%s\"", name.c_str());
return (false);
}
return (true);
}
bool
conf::add_port(struct target *target, struct pport *pp)
{
std::string name = freebsd::stringf("%s-%s", pp->name(),
target->name());
const auto &pair = conf_ports.try_emplace(name,
std::make_unique<kernel_port>(target, pp));
if (!pair.second) {
log_warnx("duplicate port \"%s\"", name.c_str());
return (false);
}
pp->link();
return (true);
}
bool
conf::add_port(struct kports &kports, struct target *target, int pp, int vp)
{
struct pport *pport;
std::string pname = freebsd::stringf("ioctl/%d/%d", pp, vp);
pport = kports.find_port(pname);
if (pport != NULL)
return (add_port(target, pport));
std::string name = pname + "-" + target->name();
const auto &pair = conf_ports.try_emplace(name,
std::make_unique<ioctl_port>(target, pp, vp));
if (!pair.second) {
log_warnx("duplicate port \"%s\"", name.c_str());
return (false);
}
return (true);
}
const struct port *
portal_group::find_port(std::string_view target) const
{
auto it = pg_ports.find(std::string(target));
if (it == pg_ports.end())
return (nullptr);
return (it->second);
}
struct target *
conf::add_controller(const char *name)
{
if (!nvmf_nqn_valid_strict(name)) {
log_warnx("controller name \"%s\" is invalid for NVMe", name);
return nullptr;
}
std::string t_name(name);
for (char &c : t_name)
c = tolower(c);
auto const &pair = conf_controllers.try_emplace(t_name,
nvmf_make_controller(this, t_name));
if (!pair.second) {
log_warnx("duplicated controller \"%s\"", name);
return nullptr;
}
return pair.first->second.get();
}
struct target *
conf::find_controller(std::string_view name)
{
auto it = conf_controllers.find(std::string(name));
if (it == conf_controllers.end())
return nullptr;
return it->second.get();
}
target::target(struct conf *conf, const char *keyword, std::string_view name) :
t_conf(conf), t_name(name)
{
t_label = freebsd::stringf("%s \"%s\"", keyword, t_name.c_str());
}
struct target *
conf::add_target(const char *name)
{
if (!valid_iscsi_name(name, log_warnx))
return (nullptr);
std::string t_name(name);
for (char &c : t_name)
c = tolower(c);
auto const &pair = conf_targets.try_emplace(t_name,
iscsi_make_target(this, t_name));
if (!pair.second) {
log_warnx("duplicated target \"%s\"", name);
return (NULL);
}
if (conf_first_target == nullptr)
conf_first_target = pair.first->second.get();
return (pair.first->second.get());
}
struct target *
conf::find_target(std::string_view name)
{
auto it = conf_targets.find(std::string(name));
if (it == conf_targets.end())
return (nullptr);
return (it->second.get());
}
bool
target::use_private_auth(const char *keyword)
{
if (t_private_auth)
return (true);
if (t_auth_group != nullptr) {
log_warnx("cannot use both auth-group and %s for %s",
keyword, label());
return (false);
}
t_auth_group = std::make_shared<struct auth_group>(t_label);
t_private_auth = true;
return (true);
}
bool
target::add_chap(const char *user, const char *secret)
{
if (!use_private_auth("chap"))
return (false);
return (t_auth_group->add_chap(user, secret));
}
bool
target::add_chap_mutual(const char *user, const char *secret,
const char *user2, const char *secret2)
{
if (!use_private_auth("chap-mutual"))
return (false);
return (t_auth_group->add_chap_mutual(user, secret, user2, secret2));
}
bool
target::add_lun(u_int id, const char *lun_label, const char *lun_name)
{
struct lun *t_lun;
if (id >= MAX_LUNS) {
log_warnx("%s too big for %s", lun_label, label());
return (false);
}
if (t_luns[id] != NULL) {
log_warnx("duplicate %s for %s", lun_label, label());
return (false);
}
t_lun = t_conf->find_lun(lun_name);
if (t_lun == NULL) {
log_warnx("unknown LUN named %s used for %s", lun_name,
label());
return (false);
}
t_luns[id] = t_lun;
return (true);
}
bool
target::set_alias(std::string_view alias)
{
if (has_alias()) {
log_warnx("alias for %s specified more than once", label());
return (false);
}
t_alias = alias;
return (true);
}
bool
target::set_auth_group(const char *ag_name)
{
if (t_auth_group != nullptr) {
if (t_private_auth)
log_warnx("cannot use both auth-group and explicit "
"authorisations for %s", label());
else
log_warnx("auth-group for %s "
"specified more than once", label());
return (false);
}
t_auth_group = t_conf->find_auth_group(ag_name);
if (t_auth_group == nullptr) {
log_warnx("unknown auth-group \"%s\" for %s",
ag_name, label());
return (false);
}
return (true);
}
bool
target::set_auth_type(const char *type)
{
if (!use_private_auth("auth-type"))
return (false);
return (t_auth_group->set_type(type));
}
bool
target::set_physical_port(std::string_view pport)
{
if (!t_pport.empty()) {
log_warnx("cannot set multiple physical ports for target "
"\"%s\"", name());
return (false);
}
t_pport = pport;
return (true);
}
bool
target::set_redirection(const char *addr)
{
if (!t_redirection.empty()) {
log_warnx("cannot set redirection to \"%s\" for "
"%s; already defined",
addr, label());
return (false);
}
t_redirection = addr;
return (true);
}
struct lun *
target::start_lun(u_int id, const char *lun_label, const char *lun_name)
{
if (id >= MAX_LUNS) {
log_warnx("%s too big for %s", lun_label, label());
return (nullptr);
}
if (t_luns[id] != NULL) {
log_warnx("duplicate %s for %s", lun_label, label());
return (nullptr);
}
struct lun *new_lun = t_conf->add_lun(lun_name);
if (new_lun == nullptr)
return (nullptr);
new_lun->set_scsiname(lun_name);
t_luns[id] = new_lun;
return (new_lun);
}
void
target::add_port(struct port *port)
{
t_ports.push_back(port);
}
void
target::remove_port(struct port *port)
{
t_ports.remove(port);
}
void
target::remove_lun(struct lun *lun)
{
std::replace(t_luns.begin(), t_luns.end(), lun,
static_cast<struct lun *>(nullptr));
}
void
target::verify()
{
if (t_auth_group == nullptr) {
t_auth_group = t_conf->find_auth_group("default");
assert(t_auth_group != nullptr);
}
if (t_ports.empty()) {
struct portal_group *pg = default_portal_group();
assert(pg != NULL);
t_conf->add_port(this, pg, nullptr);
}
bool found = std::any_of(t_luns.begin(), t_luns.end(),
[](struct lun *lun) { return (lun != nullptr); });
if (!found && t_redirection.empty())
log_warnx("no LUNs defined for %s", label());
if (found && !t_redirection.empty())
log_debugx("%s contains LUNs, but configured "
"for redirection", label());
}
lun::lun(struct conf *conf, std::string_view name)
: l_conf(conf), l_options(nvlist_create(0)), l_name(name)
{
}
struct lun *
conf::add_lun(const char *name)
{
const auto &pair = conf_luns.try_emplace(name,
std::make_unique<lun>(this, name));
if (!pair.second) {
log_warnx("duplicated lun \"%s\"", name);
return (NULL);
}
return (pair.first->second.get());
}
void
conf::delete_target_luns(struct lun *lun)
{
for (const auto &kv : conf_targets)
kv.second->remove_lun(lun);
for (const auto &kv : conf_controllers)
kv.second->remove_lun(lun);
}
struct lun *
conf::find_lun(std::string_view name)
{
auto it = conf_luns.find(std::string(name));
if (it == conf_luns.end())
return (nullptr);
return (it->second.get());
}
static void
nvlist_replace_string(nvlist_t *nvl, const char *name, const char *value)
{
if (nvlist_exists_string(nvl, name))
nvlist_free_string(nvl, name);
nvlist_add_string(nvl, name, value);
}
freebsd::nvlist_up
lun::options() const
{
freebsd::nvlist_up nvl(nvlist_clone(l_options.get()));
if (!l_path.empty())
nvlist_replace_string(nvl.get(), "file", l_path.c_str());
nvlist_replace_string(nvl.get(), "ctld_name", l_name.c_str());
if (!nvlist_exists_string(nvl.get(), "scsiname") &&
!l_scsiname.empty())
nvlist_add_string(nvl.get(), "scsiname", l_scsiname.c_str());
return (nvl);
}
bool
lun::add_option(const char *name, const char *value)
{
return (option_new(l_options.get(), name, value));
}
bool
lun::set_backend(std::string_view value)
{
if (!l_backend.empty()) {
log_warnx("backend for lun \"%s\" specified more than once",
name());
return (false);
}
l_backend = value;
return (true);
}
bool
lun::set_blocksize(size_t value)
{
if (l_blocksize != 0) {
log_warnx("blocksize for lun \"%s\" specified more than once",
name());
return (false);
}
l_blocksize = value;
return (true);
}
bool
lun::set_ctl_lun(uint32_t value)
{
if (l_ctl_lun >= 0) {
log_warnx("ctl_lun for lun \"%s\" specified more than once",
name());
return (false);
}
l_ctl_lun = value;
return (true);
}
bool
lun::set_device_type(uint8_t device_type)
{
if (device_type > 15) {
log_warnx("invalid device-type \"%u\" for lun \"%s\"",
device_type, name());
return (false);
}
l_device_type = device_type;
return (true);
}
bool
lun::set_device_type(const char *value)
{
const char *errstr;
int device_type;
if (strcasecmp(value, "disk") == 0 ||
strcasecmp(value, "direct") == 0)
device_type = T_DIRECT;
else if (strcasecmp(value, "processor") == 0)
device_type = T_PROCESSOR;
else if (strcasecmp(value, "cd") == 0 ||
strcasecmp(value, "cdrom") == 0 ||
strcasecmp(value, "dvd") == 0 ||
strcasecmp(value, "dvdrom") == 0)
device_type = T_CDROM;
else {
device_type = strtonum(value, 0, 15, &errstr);
if (errstr != NULL) {
log_warnx("invalid device-type \"%s\" for lun \"%s\"",
value, name());
return (false);
}
}
l_device_type = device_type;
return (true);
}
bool
lun::set_device_id(std::string_view value)
{
if (!l_device_id.empty()) {
log_warnx("device_id for lun \"%s\" specified more than once",
name());
return (false);
}
l_device_id = value;
return (true);
}
bool
lun::set_path(std::string_view value)
{
if (!l_path.empty()) {
log_warnx("path for lun \"%s\" specified more than once",
name());
return (false);
}
l_path = value;
return (true);
}
void
lun::set_scsiname(std::string_view value)
{
l_scsiname = value;
}
bool
lun::set_serial(std::string_view value)
{
if (!l_serial.empty()) {
log_warnx("serial for lun \"%s\" specified more than once",
name());
return (false);
}
l_serial = value;
return (true);
}
bool
lun::set_size(uint64_t value)
{
if (l_size != 0) {
log_warnx("size for lun \"%s\" specified more than once",
name());
return (false);
}
l_size = value;
return (true);
}
bool
lun::changed(const struct lun &newlun) const
{
if (l_backend != newlun.l_backend) {
log_debugx("backend for lun \"%s\", CTL lun %d changed; "
"removing", name(), l_ctl_lun);
return (true);
}
if (l_blocksize != newlun.l_blocksize) {
log_debugx("blocksize for lun \"%s\", CTL lun %d changed; "
"removing", name(), l_ctl_lun);
return (true);
}
if (l_device_id != newlun.l_device_id) {
log_debugx("device-id for lun \"%s\", CTL lun %d changed; "
"removing", name(), l_ctl_lun);
return (true);
}
if (l_path != newlun.l_path) {
log_debugx("path for lun \"%s\", CTL lun %d, changed; "
"removing", name(), l_ctl_lun);
return (true);
}
if (l_serial != newlun.l_serial) {
log_debugx("serial for lun \"%s\", CTL lun %d changed; "
"removing", name(), l_ctl_lun);
return (true);
}
return (false);
}
bool
option_new(nvlist_t *nvl, const char *name, const char *value)
{
int error;
if (nvlist_exists_string(nvl, name)) {
log_warnx("duplicated option \"%s\"", name);
return (false);
}
nvlist_add_string(nvl, name, value);
error = nvlist_error(nvl);
if (error != 0) {
log_warnc(error, "failed to add option \"%s\"", name);
return (false);
}
return (true);
}
bool
lun::verify()
{
if (l_backend.empty())
l_backend = "block";
if (l_backend == "block") {
if (l_path.empty()) {
log_warnx("missing path for lun \"%s\"",
name());
return (false);
}
} else if (l_backend == "ramdisk") {
if (l_size == 0) {
log_warnx("missing size for ramdisk-backed lun \"%s\"",
name());
return (false);
}
if (!l_path.empty()) {
log_warnx("path must not be specified "
"for ramdisk-backed lun \"%s\"",
name());
return (false);
}
}
if (l_blocksize == 0) {
if (l_device_type == T_CDROM)
l_blocksize = DEFAULT_CD_BLOCKSIZE;
else
l_blocksize = DEFAULT_BLOCKSIZE;
} else if (l_blocksize < 0) {
log_warnx("invalid blocksize %d for lun \"%s\"; "
"must be larger than 0", l_blocksize, name());
return (false);
}
if (l_size != 0 && (l_size % l_blocksize) != 0) {
log_warnx("invalid size for lun \"%s\"; "
"must be multiple of blocksize", name());
return (false);
}
return (true);
}
bool
conf::verify()
{
if (conf_pidfile_path.empty())
conf_pidfile_path = DEFAULT_PIDFILE;
std::unordered_map<std::string, struct lun *> path_map;
for (const auto &kv : conf_luns) {
struct lun *lun = kv.second.get();
if (!lun->verify())
return (false);
const std::string &path = lun->path();
if (path.empty())
continue;
const auto &pair = path_map.try_emplace(path, lun);
if (!pair.second) {
struct lun *lun2 = pair.first->second;
log_debugx("WARNING: path \"%s\" duplicated "
"between lun \"%s\", and "
"lun \"%s\"", path.c_str(),
lun->name(), lun2->name());
}
}
for (auto &kv : conf_targets) {
kv.second->verify();
}
for (auto &kv : conf_controllers) {
kv.second->verify();
}
for (auto &kv : conf_portal_groups) {
kv.second->verify(this);
}
for (auto &kv : conf_transport_groups) {
kv.second->verify(this);
}
for (const auto &kv : conf_auth_groups) {
const std::string &ag_name = kv.first;
if (ag_name == "default" ||
ag_name == "no-authentication" ||
ag_name == "no-access")
continue;
if (kv.second.use_count() == 1) {
log_warnx("auth-group \"%s\" not assigned "
"to any target", ag_name.c_str());
}
}
return (true);
}
bool
portal::reuse_socket(struct portal &oldp)
{
struct kevent kev;
if (p_listen != oldp.p_listen)
return (false);
if (!oldp.p_socket)
return (false);
EV_SET(&kev, oldp.p_socket, EVFILT_READ, EV_ADD, 0, 0, this);
if (kevent(kqfd, &kev, 1, NULL, 0, NULL) == -1)
return (false);
p_socket = std::move(oldp.p_socket);
return (true);
}
bool
portal::init_socket()
{
struct portal_group *pg = portal_group();
struct kevent kev;
freebsd::fd_up s;
int error;
int one = 1;
#ifdef ICL_KERNEL_PROXY
if (proxy_mode) {
int id = pg->conf()->add_proxy_portal(this);
log_debugx("listening on %s, %s \"%s\", "
"portal id %d, using ICL proxy", listen(), pg->keyword(),
pg->name(), id);
kernel_listen(ai(), protocol() == ISER, id);
return (true);
}
#endif
assert(proxy_mode == false);
assert(protocol() != portal_protocol::ISER);
log_debugx("listening on %s, %s \"%s\"", listen(), pg->keyword(),
pg->name());
s = ::socket(p_ai->ai_family, p_ai->ai_socktype, p_ai->ai_protocol);
if (!s) {
log_warn("socket(2) failed for %s", listen());
return (false);
}
if (setsockopt(s, SOL_SOCKET, SO_NO_DDP, &one,
sizeof(one)) == -1)
log_warn("setsockopt(SO_NO_DDP) failed for %s", listen());
error = setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &one,
sizeof(one));
if (error != 0) {
log_warn("setsockopt(SO_REUSEADDR) failed for %s", listen());
return (false);
}
if (pg->dscp() != -1) {
int tos = pg->dscp() << 2;
switch (p_ai->ai_family) {
case AF_INET:
if (setsockopt(s, IPPROTO_IP, IP_TOS,
&tos, sizeof(tos)) == -1)
log_warn("setsockopt(IP_TOS) failed for %s",
listen());
break;
case AF_INET6:
if (setsockopt(s, IPPROTO_IPV6, IPV6_TCLASS,
&tos, sizeof(tos)) == -1)
log_warn("setsockopt(IPV6_TCLASS) failed for %s",
listen());
break;
}
}
if (pg->pcp() != -1) {
int pcp = pg->pcp();
switch (p_ai->ai_family) {
case AF_INET:
if (setsockopt(s, IPPROTO_IP, IP_VLAN_PCP,
&pcp, sizeof(pcp)) == -1)
log_warn("setsockopt(IP_VLAN_PCP) failed for %s",
listen());
break;
case AF_INET6:
if (setsockopt(s, IPPROTO_IPV6, IPV6_VLAN_PCP,
&pcp, sizeof(pcp)) == -1)
log_warn("setsockopt(IPV6_VLAN_PCP) failed for %s",
listen());
break;
}
}
if (!init_socket_options(s))
return (false);
error = bind(s, p_ai->ai_addr, p_ai->ai_addrlen);
if (error != 0) {
log_warn("bind(2) failed for %s", listen());
return (false);
}
error = ::listen(s, -1);
if (error != 0) {
log_warn("listen(2) failed for %s", listen());
return (false);
}
EV_SET(&kev, s, EVFILT_READ, EV_ADD, 0, 0, this);
error = kevent(kqfd, &kev, 1, NULL, 0, NULL);
if (error == -1) {
log_warn("kevent(2) failed to register for %s", listen());
return (false);
}
p_socket = std::move(s);
return (true);
}
bool
conf::reuse_portal_group_socket(struct portal &newp)
{
for (auto &kv : conf_portal_groups) {
struct portal_group &pg = *kv.second;
if (pg.reuse_socket(newp))
return (true);
}
for (auto &kv : conf_transport_groups) {
struct portal_group &pg = *kv.second;
if (pg.reuse_socket(newp))
return (true);
}
return (false);
}
int
conf::apply(struct conf *oldconf)
{
int cumulated_error = 0;
if (oldconf->conf_debug != conf_debug) {
log_debugx("changing debug level to %d", conf_debug);
log_init(conf_debug);
}
if (!oldconf->conf_pidfile_path.empty() &&
!conf_pidfile_path.empty()) {
if (oldconf->conf_pidfile_path != conf_pidfile_path) {
log_debugx("moving pidfile to %s",
conf_pidfile_path.c_str());
if (rename(oldconf->conf_pidfile_path.c_str(),
conf_pidfile_path.c_str()) != 0) {
log_err(1, "renaming pidfile %s -> %s",
oldconf->conf_pidfile_path.c_str(),
conf_pidfile_path.c_str());
}
}
conf_pidfile = std::move(oldconf->conf_pidfile);
}
for (auto &kv : conf_portal_groups) {
struct portal_group &newpg = *kv.second;
if (newpg.tag() != 0)
continue;
auto it = oldconf->conf_portal_groups.find(kv.first);
if (it != oldconf->conf_portal_groups.end())
newpg.set_tag(it->second->tag());
else
newpg.allocate_tag();
}
for (auto &kv : conf_transport_groups) {
struct portal_group &newpg = *kv.second;
if (newpg.tag() != 0)
continue;
auto it = oldconf->conf_transport_groups.find(kv.first);
if (it != oldconf->conf_transport_groups.end())
newpg.set_tag(it->second->tag());
else
newpg.allocate_tag();
}
for (auto &kv : oldconf->conf_isns) {
if (conf_isns.count(kv.first) == 0)
oldconf->isns_deregister_targets(&kv.second);
}
for (const auto &kv : oldconf->conf_ports) {
const std::string &name = kv.first;
port *oldport = kv.second.get();
if (oldport->is_dummy())
continue;
const auto it = conf_ports.find(name);
if (it != conf_ports.end() && !it->second->is_dummy())
continue;
log_debugx("removing port \"%s\"", name.c_str());
if (!oldport->kernel_remove()) {
log_warnx("failed to remove port %s", name.c_str());
}
}
for (auto it = oldconf->conf_luns.begin();
it != oldconf->conf_luns.end(); ) {
struct lun *oldlun = it->second.get();
auto newit = conf_luns.find(it->first);
if (newit == conf_luns.end()) {
log_debugx("lun \"%s\", CTL lun %d "
"not found in new configuration; "
"removing", oldlun->name(), oldlun->ctl_lun());
if (!oldlun->kernel_remove()) {
log_warnx("failed to remove lun \"%s\", "
"CTL lun %d",
oldlun->name(), oldlun->ctl_lun());
cumulated_error++;
}
it++;
continue;
}
struct lun *newlun = newit->second.get();
if (oldlun->changed(*newlun)) {
if (!oldlun->kernel_remove()) {
log_warnx("failed to remove lun \"%s\", "
"CTL lun %d",
oldlun->name(), oldlun->ctl_lun());
cumulated_error++;
}
it = oldconf->conf_luns.erase(it);
continue;
}
newlun->set_ctl_lun(oldlun->ctl_lun());
it++;
}
for (auto it = conf_luns.begin(); it != conf_luns.end(); ) {
struct lun *newlun = it->second.get();
auto oldit = oldconf->conf_luns.find(it->first);
if (oldit != oldconf->conf_luns.end()) {
log_debugx("modifying lun \"%s\", CTL lun %d",
newlun->name(), newlun->ctl_lun());
if (!newlun->kernel_modify()) {
log_warnx("failed to "
"modify lun \"%s\", CTL lun %d",
newlun->name(), newlun->ctl_lun());
cumulated_error++;
}
it++;
continue;
}
log_debugx("adding lun \"%s\"", newlun->name());
if (!newlun->kernel_add()) {
log_warnx("failed to add lun \"%s\"", newlun->name());
delete_target_luns(newlun);
it = conf_luns.erase(it);
cumulated_error++;
} else
it++;
}
for (auto it = conf_ports.begin(); it != conf_ports.end(); ) {
const std::string &name = it->first;
port *newport = it->second.get();
if (newport->is_dummy()) {
it++;
continue;
}
const auto oldit = oldconf->conf_ports.find(name);
if (oldit == oldconf->conf_ports.end() ||
oldit->second->is_dummy()) {
log_debugx("adding port \"%s\"", name.c_str());
if (!newport->kernel_add()) {
log_warnx("failed to add port %s",
name.c_str());
newport->clear_references();
it = conf_ports.erase(it);
} else
it++;
} else {
log_debugx("updating port \"%s\"", name.c_str());
if (!newport->kernel_update(oldit->second.get()))
log_warnx("failed to update port %s",
name.c_str());
it++;
}
}
for (auto &kv : conf_portal_groups) {
cumulated_error += kv.second->open_sockets(*oldconf);
}
for (auto &kv : conf_transport_groups) {
cumulated_error += kv.second->open_sockets(*oldconf);
}
for (auto &kv : oldconf->conf_portal_groups) {
kv.second->close_sockets();
}
for (auto &kv : oldconf->conf_transport_groups) {
kv.second->close_sockets();
}
for (auto &kv : conf_isns) {
auto it = oldconf->conf_isns.find(kv.first);
if (it == oldconf->conf_isns.end())
isns_register_targets(&kv.second, nullptr);
else
isns_register_targets(&kv.second, oldconf);
}
isns_schedule_update();
return (cumulated_error);
}
bool
timed_out(void)
{
return (sigalrm_received);
}
static void
sigalrm_handler_fatal(int dummy __unused)
{
if (sigalrm_received) {
_exit(2);
}
sigalrm_received = true;
}
static void
sigalrm_handler(int dummy __unused)
{
sigalrm_received = true;
}
void
stop_timer()
{
struct itimerval itv;
int error;
log_debugx("session timeout disabled");
bzero(&itv, sizeof(itv));
error = setitimer(ITIMER_REAL, &itv, NULL);
if (error != 0)
log_err(1, "setitimer");
sigalrm_received = false;
}
void
start_timer(int timeout, bool fatal)
{
struct sigaction sa;
struct itimerval itv;
int error;
if (timeout <= 0) {
stop_timer();
return;
}
sigalrm_received = false;
bzero(&sa, sizeof(sa));
if (fatal)
sa.sa_handler = sigalrm_handler_fatal;
else
sa.sa_handler = sigalrm_handler;
sigfillset(&sa.sa_mask);
error = sigaction(SIGALRM, &sa, NULL);
if (error != 0)
log_err(1, "sigaction");
log_debugx("setting session timeout to %d seconds", timeout);
bzero(&itv, sizeof(itv));
itv.it_interval.tv_sec = 1;
itv.it_value.tv_sec = timeout;
error = setitimer(ITIMER_REAL, &itv, NULL);
if (error != 0)
log_err(1, "setitimer");
}
static int
wait_for_children(bool block)
{
pid_t pid;
int status;
int num = 0;
for (;;) {
if (block && num == 0)
pid = wait4(-1, &status, 0, NULL);
else
pid = wait4(-1, &status, WNOHANG, NULL);
if (pid <= 0)
break;
if (WIFSIGNALED(status)) {
log_warnx("child process %d terminated with signal %d",
pid, WTERMSIG(status));
} else if (WEXITSTATUS(status) != 0) {
log_warnx("child process %d terminated with exit status %d",
pid, WEXITSTATUS(status));
} else {
log_debugx("child process %d terminated gracefully", pid);
}
num++;
}
return (num);
}
static void
handle_connection(struct portal *portal, freebsd::fd_up fd,
const struct sockaddr *client_sa, bool dont_fork)
{
struct portal_group *pg;
int error;
pid_t pid;
char host[NI_MAXHOST + 1];
struct conf *conf;
pg = portal->portal_group();
conf = pg->conf();
if (dont_fork) {
log_debugx("incoming connection; not forking due to -d flag");
} else {
nchildren -= wait_for_children(false);
assert(nchildren >= 0);
while (conf->maxproc() > 0 && nchildren >= conf->maxproc()) {
log_debugx("maxproc limit of %d child processes hit; "
"waiting for child process to exit",
conf->maxproc());
nchildren -= wait_for_children(true);
assert(nchildren >= 0);
}
log_debugx("incoming connection; forking child process #%d",
nchildren);
nchildren++;
pid = fork();
if (pid < 0)
log_err(1, "fork");
if (pid > 0)
return;
conf->close_pidfile();
}
error = getnameinfo(client_sa, client_sa->sa_len,
host, sizeof(host), NULL, 0, NI_NUMERICHOST);
if (error != 0)
log_errx(1, "getnameinfo: %s", gai_strerror(error));
log_debugx("accepted connection from %s; portal group \"%s\"",
host, pg->name());
log_set_peer_addr(host);
setproctitle("%s", host);
portal->handle_connection(std::move(fd), host, client_sa);
log_debugx("nothing more to do; exiting");
exit(0);
}
static void
main_loop(bool dont_fork)
{
struct kevent kev;
struct portal *portal;
struct sockaddr_storage client_sa;
socklen_t client_salen;
#ifdef ICL_KERNEL_PROXY
int connection_id;
int portal_id;
#endif
int error, client_fd;
for (;;) {
if (sighup_received || sigterm_received || timed_out())
return;
#ifdef ICL_KERNEL_PROXY
if (proxy_mode) {
client_salen = sizeof(client_sa);
kernel_accept(&connection_id, &portal_id,
(struct sockaddr *)&client_sa, &client_salen);
assert(client_salen >= client_sa.ss_len);
log_debugx("incoming connection, id %d, portal id %d",
connection_id, portal_id);
portal = conf->proxy_portal(portal_id);
if (portal == nullptr)
log_errx(1,
"kernel returned invalid portal_id %d",
portal_id);
handle_connection(portal, connection_id,
(struct sockaddr *)&client_sa, dont_fork);
} else {
#endif
assert(proxy_mode == false);
error = kevent(kqfd, NULL, 0, &kev, 1, NULL);
if (error == -1) {
if (errno == EINTR)
continue;
log_err(1, "kevent");
}
switch (kev.filter) {
case EVFILT_READ:
portal = reinterpret_cast<struct portal *>(kev.udata);
assert(portal->socket() == (int)kev.ident);
client_salen = sizeof(client_sa);
client_fd = accept(portal->socket(),
(struct sockaddr *)&client_sa,
&client_salen);
if (client_fd < 0) {
if (errno == ECONNABORTED)
continue;
log_err(1, "accept");
}
assert(client_salen >= client_sa.ss_len);
handle_connection(portal, client_fd,
(struct sockaddr *)&client_sa, dont_fork);
break;
default:
__assert_unreachable();
}
#ifdef ICL_KERNEL_PROXY
}
#endif
}
}
static void
sighup_handler(int dummy __unused)
{
sighup_received = true;
}
static void
sigterm_handler(int dummy __unused)
{
sigterm_received = true;
}
static void
sigchld_handler(int dummy __unused)
{
}
static void
register_signals(void)
{
struct sigaction sa;
int error;
bzero(&sa, sizeof(sa));
sa.sa_handler = sighup_handler;
sigfillset(&sa.sa_mask);
error = sigaction(SIGHUP, &sa, NULL);
if (error != 0)
log_err(1, "sigaction");
sa.sa_handler = sigterm_handler;
error = sigaction(SIGTERM, &sa, NULL);
if (error != 0)
log_err(1, "sigaction");
sa.sa_handler = sigterm_handler;
error = sigaction(SIGINT, &sa, NULL);
if (error != 0)
log_err(1, "sigaction");
sa.sa_handler = sigchld_handler;
error = sigaction(SIGCHLD, &sa, NULL);
if (error != 0)
log_err(1, "sigaction");
}
static void
check_perms(const char *path)
{
struct stat sb;
int error;
error = stat(path, &sb);
if (error != 0) {
log_warn("stat");
return;
}
if (sb.st_mode & S_IWOTH) {
log_warnx("%s is world-writable", path);
} else if (sb.st_mode & S_IROTH) {
log_warnx("%s is world-readable", path);
} else if (sb.st_mode & S_IXOTH) {
log_warnx("%s is world-executable", path);
}
}
static conf_up
conf_new_from_file(const char *path, bool ucl)
{
struct auth_group *ag;
struct portal_group *pg;
bool valid;
log_debugx("obtaining configuration from %s", path);
conf_up conf = std::make_unique<struct conf>();
ag = conf->add_auth_group("default");
assert(ag != NULL);
ag = conf->add_auth_group("no-authentication");
assert(ag != NULL);
ag->set_type(auth_type::NO_AUTHENTICATION);
ag = conf->add_auth_group("no-access");
assert(ag != NULL);
ag->set_type(auth_type::DENY);
pg = conf->add_portal_group("default");
assert(pg != NULL);
pg = conf->add_transport_group("default");
assert(pg != NULL);
conf_start(conf.get());
if (ucl)
valid = uclparse_conf(path);
else
valid = parse_conf(path);
conf_finish();
if (!valid) {
conf.reset();
return {};
}
check_perms(path);
if (!conf->default_auth_group_defined()) {
log_debugx("auth-group \"default\" not defined; "
"going with defaults");
ag = conf->find_auth_group("default").get();
assert(ag != NULL);
ag->set_type(auth_type::DENY);
}
if (!conf->default_portal_group_defined()) {
log_debugx("portal-group \"default\" not defined; "
"going with defaults");
pg = conf->find_portal_group("default");
assert(pg != NULL);
pg->add_default_portals();
}
if (!conf->default_portal_group_defined()) {
log_debugx("transport-group \"default\" not defined; "
"going with defaults");
pg = conf->find_transport_group("default");
assert(pg != NULL);
pg->add_default_portals();
}
if (!conf->verify()) {
conf.reset();
return {};
}
return (conf);
}
bool
conf::add_pports(struct kports &kports)
{
struct pport *pp;
int ret, i_pp, i_vp;
for (auto &kv : conf_targets) {
struct target *targ = kv.second.get();
if (!targ->has_pport())
continue;
ret = sscanf(targ->pport(), "ioctl/%d/%d", &i_pp, &i_vp);
if (ret > 0) {
if (!add_port(kports, targ, i_pp, i_vp)) {
log_warnx("can't create new ioctl port "
"for %s", targ->label());
return (false);
}
continue;
}
pp = kports.find_port(targ->pport());
if (pp == NULL) {
log_warnx("unknown port \"%s\" for %s",
targ->pport(), targ->label());
return (false);
}
if (pp->linked()) {
log_warnx("can't link port \"%s\" to %s, "
"port already linked to some target",
targ->pport(), targ->label());
return (false);
}
if (!add_port(targ, pp)) {
log_warnx("can't link port \"%s\" to %s",
targ->pport(), targ->label());
return (false);
}
}
return (true);
}
int
main(int argc, char **argv)
{
struct kports kports;
const char *config_path = DEFAULT_CONFIG_PATH;
int debug = 0, ch, error;
bool daemonize = true;
bool test_config = false;
bool use_ucl = false;
while ((ch = getopt(argc, argv, "dtuf:R")) != -1) {
switch (ch) {
case 'd':
daemonize = false;
debug++;
break;
case 't':
test_config = true;
break;
case 'u':
use_ucl = true;
break;
case 'f':
config_path = optarg;
break;
case 'R':
#ifndef ICL_KERNEL_PROXY
log_errx(1, "ctld(8) compiled without ICL_KERNEL_PROXY "
"does not support iSER protocol");
#endif
proxy_mode = true;
break;
case '?':
default:
usage();
}
}
argc -= optind;
if (argc != 0)
usage();
log_init(debug);
kernel_init();
conf_up newconf = conf_new_from_file(config_path, use_ucl);
if (newconf == NULL)
log_errx(1, "configuration error; exiting");
if (test_config)
return (0);
newconf->open_pidfile();
register_signals();
conf_up oldconf = conf_new_from_kernel(kports);
if (debug > 0) {
oldconf->set_debug(debug);
newconf->set_debug(debug);
}
if (!newconf->add_pports(kports))
log_errx(1, "Error associating physical ports; exiting");
if (daemonize) {
log_debugx("daemonizing");
if (daemon(0, 0) == -1) {
log_warn("cannot daemonize");
return (1);
}
}
kqfd = kqueue();
if (kqfd == -1) {
log_warn("Cannot create kqueue");
return (1);
}
error = newconf->apply(oldconf.get());
if (error != 0)
log_errx(1, "failed to apply configuration; exiting");
oldconf.reset();
newconf->write_pidfile();
newconf->isns_schedule_update();
for (;;) {
main_loop(!daemonize);
if (sighup_received) {
sighup_received = false;
log_debugx("received SIGHUP, reloading configuration");
conf_up tmpconf = conf_new_from_file(config_path,
use_ucl);
if (tmpconf == NULL) {
log_warnx("configuration error, "
"continuing with old configuration");
} else if (!tmpconf->add_pports(kports)) {
log_warnx("Error associating physical ports, "
"continuing with old configuration");
} else {
if (debug > 0)
tmpconf->set_debug(debug);
oldconf = std::move(newconf);
newconf = std::move(tmpconf);
error = newconf->apply(oldconf.get());
if (error != 0)
log_warnx("failed to reload "
"configuration");
oldconf.reset();
}
} else if (sigterm_received) {
log_debugx("exiting on signal; "
"reloading empty configuration");
log_debugx("removing CTL iSCSI ports "
"and terminating all connections");
oldconf = std::move(newconf);
newconf = std::make_unique<conf>();
if (debug > 0)
newconf->set_debug(debug);
error = newconf->apply(oldconf.get());
if (error != 0)
log_warnx("failed to apply configuration");
oldconf.reset();
log_warnx("exiting on signal");
return (0);
} else {
nchildren -= wait_for_children(false);
assert(nchildren >= 0);
if (timed_out()) {
newconf->isns_update();
}
}
}
}