2 * Copyright 2000, International Business Machines Corporation and others.
5 * This software has been released under the terms of the IBM Public
6 * License. For details, see the LICENSE file in the top-level source
7 * directory or online at http://www.openafs.org/dl/license10.html
10 #include <afsconfig.h>
11 #include <afs/param.h>
15 #include <sys/types.h>
20 #include <WINNT/afsevent.h>
24 #include <netinet/in.h>
27 #include <afs/afsint.h>
30 #include <afs/assert.h>
31 #include <afs/prs_fs.h>
35 #include <afs/afssyscalls.h>
36 #include <afs/ihandle.h>
38 #include <afs/ntops.h>
40 #include <afs/vnode.h>
41 #include <afs/volume.h>
42 #include <afs/partition.h>
44 #include <rx/rx_globals.h>
47 #include <afs/cellconfig.h>
53 #include <afs/audit.h>
54 #include <afs/afsutil.h>
56 #define VolserVersion "2.0"
57 #define N_SECURITY_OBJECTS 3
59 extern int (*vol_PollProc)();
60 extern struct volser_trans *TransList();
61 extern int IOMGR_Poll();
62 char *GlobalNameHack = (char *)0;
64 afs_int32 GlobalVolCloneId, GlobalVolParentId;
66 int VolumeChanged; /* XXXX */
67 static char busyFlags[MAXHELPERS];
68 struct volser_trans *QI_GlobalWriteTrans = 0;
69 extern int QI_write();
70 extern int QI_flush();
71 extern int (*VolWriteProc)();
72 extern int (*VolFlushProc)();
73 extern void AFSVolExecuteRequest();
74 extern void RXSTATS_ExecuteRequest();
75 extern struct rx_securityClass *rxnull_NewServerSecurityObject();
76 extern struct rx_service *rx_NewService();
78 struct afsconf_dir *tdir;
79 static afs_int32 runningCalls=0;
83 int udpBufSize = 0; /* UDP buffer size for receive*/
85 int Testing = 0; /* for ListViceInodes */
87 #define VS_EXIT(code) { \
88 osi_audit(VS_ExitEvent, code, AUD_END); \
93 static MyBeforeProc () {
98 static MyAfterProc () {
103 /* Called every GCWAKEUP seconds to try to unlock all our partitions,
104 * if we're idle and there are no active transactions
107 /* if there are no running calls, and there are no active transactions, then
108 it should be safe to release any partition locks we've accumulated */
109 if (runningCalls == 0 && TransList() == (struct volser_trans *) 0) {
110 VPFullUnlock(); /* in volprocs.c */
114 /* background daemon for timing out transactions */
120 tv.tv_sec = GCWAKEUP;
122 (void) IOMGR_Select(0, 0, 0, 0, &tv);
127 { /* reopen log every 5 minutes */
129 ReOpenLog(AFSDIR_SERVER_VOLSERLOG_FILEPATH);
134 /* Background daemon for sleeping so the volserver does not become I/O bound */
135 afs_int32 TTsleep, TTrun;
138 struct volser_trans *tt;
143 for (tt=TransList(); tt; tt=tt->next) {
144 if ( (strcmp(tt->lastProcName,"DeleteVolume") == 0) ||
145 (strcmp(tt->lastProcName,"Clone") == 0) ||
146 (strcmp(tt->lastProcName,"ReClone") == 0) ||
147 (strcmp(tt->lastProcName,"Forward") == 0) ||
148 (strcmp(tt->lastProcName,"Restore") == 0) ||
149 (strcmp(tt->lastProcName,"ForwardMulti") == 0) )
160 int volser_syscall(a3, a4, a5)
167 #ifndef AFS_LINUX20_ENV
168 old = signal(SIGSYS, SIG_IGN);
170 rcode = syscall (AFS_SYSCALL /* AFS_SYSCALL */, 28 /* AFSCALL_CALL */, a3, a4, a5);
171 #ifndef AFS_LINUX20_ENV
180 /* check whether caller is authorized to manage RX statistics */
181 int vol_rxstat_userok(call)
182 struct rx_call *call;
184 return afsconf_SuperUser(tdir, call, (char *)0);
187 #include "AFS_component_version_number.c"
192 register afs_int32 code;
193 struct rx_securityClass *(securityObjects[3]);
194 struct rx_service *service;
195 struct ktc_encryptionKey tkey;
197 char commandLine[150];
199 int rxJumbograms = 1; /* default is to send and receive jumbograms. */
200 int bufSize = 0; /* temp variable to read in udp socket buf size*/
204 * The following signal action for AIX is necessary so that in case of a
205 * crash (i.e. core is generated) we can include the user's data section
206 * in the core dump. Unfortunately, by default, only a partial core is
207 * generated which, in many cases, isn't too useful.
209 struct sigaction nsa;
211 sigemptyset(&nsa.sa_mask);
212 nsa.sa_handler = SIG_DFL;
213 nsa.sa_flags = SA_FULLDUMP;
214 sigaction(SIGABRT, &nsa, NULL);
215 sigaction(SIGSEGV, &nsa, NULL);
217 osi_audit(VS_StartEvent, 0, AUD_END);
219 /* Initialize dirpaths */
220 if (!(initAFSDirPath() & AFSDIR_SERVER_PATHS_OK)) {
222 ReportErrorEventAlt(AFSEVT_SVR_NO_INSTALL_DIR, 0, argv[0],0);
224 fprintf(stderr,"%s: Unable to obtain AFS server directory.\n", argv[0]);
228 for (commandLine[0] = '\0', i=0; i<argc; i++) {
229 if (i > 0) strcat(commandLine, " ");
230 strcat(commandLine, argv[i]);
236 for(code=1;code<argc;code++) {
237 if (strcmp(argv[code], "-log")==0) {
238 /* set extra logging flag */
241 else if (strcmp(argv[code], "-help")==0) {
244 else if (strcmp(argv[code], "-p") == 0) {
245 lwps = atoi(argv[++code]);
247 printf("Warning: '-p %d' is too big; using %d instead\n",
252 else if (strcmp(argv[code], "-nojumbo")==0) {
255 else if (strcmp(argv[code], "-sleep")==0) {
256 sscanf(argv[++code], "%d/%d", &TTsleep, &TTrun);
257 if ((TTsleep < 0) || (TTrun <= 0)) {
258 printf("Warning: '-sleep %d/%d' is incorrect; ignoring\n",
263 else if ( strcmp(argv[code], "-udpsize")==0) {
264 if ( (code+1) >= argc ) {
265 printf("You have to specify -udpsize <integer value>\n");
268 sscanf(argv[++code], "%d", &bufSize);
269 if ( bufSize < rx_GetMinUdpBufSize() )
270 printf("Warning:udpsize %d is less than minimum %d; ignoring\n",
271 bufSize, rx_GetMinUdpBufSize() );
273 udpBufSize = bufSize;
275 else if (strcmp(argv[code], "-enable_peer_stats")==0) {
276 rx_enablePeerRPCStats();
278 else if (strcmp(argv[code], "-enable_process_stats")==0) {
279 rx_enableProcessRPCStats();
282 else if (strcmp(argv[code], "-syslog")==0) {
283 /* set syslog logging flag */
286 else if (strncmp(argv[code], "-syslog=", 8)==0) {
288 serverLogSyslogFacility = atoi(argv[code]+8);
292 printf("volserver: unrecognized flag '%s'\n", argv[code]);
295 printf("Usage: volserver [-log] [-p <number of processes>] "
296 "[-udpsize <size of socket buffer in bytes>] "
297 "[-syslog[=FACILITY]] "
298 "[-enable_peer_stats] [-enable_process_stats] "
301 printf("Usage: volserver [-log] [-p <number of processes>] "
302 "[-udpsize <size of socket buffer in bytes>] "
303 "[-enable_peer_stats] [-enable_process_stats] "
309 #ifdef AFS_SGI_VNODE_GLUE
310 if (afs_init_kernel_config(-1) <0) {
311 printf("Can't determine NUMA configuration, not starting volserver.\n");
318 if (afs_winsockInit()<0) {
319 ReportErrorEventAlt(AFSEVT_SVR_WINSOCK_INIT_FAILED, 0, argv[0], 0);
320 printf("Volume server unable to start winsock, exiting.\n");
324 VInitVolumePackage(volumeUtility, 0, 0, CONNECT_FS, 0);
326 vol_PollProc = IOMGR_Poll; /* tell vol pkg to poll io system periodically */
328 rxi_syscallp = volser_syscall;
330 rx_nPackets = rxpackets; /* set the max number of packets */
332 rx_SetUdpBufSize(udpBufSize);/* set the UDP buffer size for receive */
333 code = rx_Init((int)htons(AFSCONF_VOLUMEPORT));
335 fprintf(stderr,"rx init failed on socket AFSCONF_VOLUMEPORT %u\n",AFSCONF_VOLUMEPORT);
339 /* Don't allow 3.4 vos clients to send jumbograms and we don't send. */
340 rx_maxReceiveSize = OLD_MAX_PACKET_SIZE;
341 rxi_nSendFrags = rxi_nRecvFrags = 1;
344 rx_SetRxDeadTime(420);
345 memset(busyFlags, 0, sizeof(busyFlags));
347 /* Open FileLog and map stdout, stderr into it */
348 OpenLog(AFSDIR_SERVER_VOLSERLOG_FILEPATH);
351 /* create the lwp to garbage-collect old transactions and sleep periodically */
352 LWP_CreateProcess(BKGLoop, 16*1024, 3, 0, "vol bkg daemon", &pid);
353 LWP_CreateProcess(BKGSleep,16*1024, 3, 0, "vol slp daemon", &pid);
355 /* Create a single security object, in this case the null security object, for unauthenticated connections, which will be used to control security on connections made to this server */
357 tdir = afsconf_Open(AFSDIR_SERVER_ETC_DIRPATH);
359 Abort("volser: could not open conf files in %s\n", AFSDIR_SERVER_ETC_DIRPATH);
362 afsconf_GetKey(tdir, 999, &tkey);
363 securityObjects[0] = (struct rx_securityClass *) rxnull_NewServerSecurityObject();
364 securityObjects[1] = (struct rx_securityClass *) 0; /* don't bother with rxvab */
365 securityObjects[2] = (struct rx_securityClass *) rxkad_NewServerSecurityObject(0, tdir, afsconf_GetKey, (char *) 0);
366 if (securityObjects[0] == (struct rx_securityClass *) 0) Abort("rxnull_NewServerSecurityObject");
367 service = rx_NewService(0, VOLSERVICE_ID, "VOLSER", securityObjects, 3, AFSVolExecuteRequest);
368 if (service == (struct rx_service *) 0) Abort("rx_NewService");
369 rx_SetBeforeProc(service, (char (*)()) MyBeforeProc);
370 rx_SetAfterProc(service, (char (*)()) MyAfterProc);
371 rx_SetIdleDeadTime(service, 0); /* never timeout */
374 rx_SetMaxProcs(service, lwps);
375 rx_SetStackSize(service, 32768);
377 service = rx_NewService(0, RX_STATS_SERVICE_ID, "rpcstats", securityObjects, 3, RXSTATS_ExecuteRequest);
378 if (service == (struct rx_service *) 0) Abort("rx_NewService");
379 rx_SetMinProcs(service, 2);
380 rx_SetMaxProcs(service, 4);
382 Log("Starting AFS Volserver %s (%s)\n", VolserVersion, commandLine);
384 Log("Will sleep %d second%s every %d second%s\n",
385 TTsleep, (TTsleep>1)?"s":"",
386 TTrun+TTsleep, (TTrun+TTsleep>1)?"s":"");
389 /* allow super users to manage RX statistics */
390 rx_SetRxStatUserOk(vol_rxstat_userok);
392 rx_StartServer(1); /* Donate this process to the server process pool */
394 osi_audit(VS_FinishEvent, (-1), AUD_END);
395 Abort("StartServer returned?");