Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* Cluster IP hashmark target |
2 | * (C) 2003-2004 by Harald Welte <laforge@netfilter.org> | |
3 | * based on ideas of Fabio Olive Leite <olive@unixforge.org> | |
4 | * | |
5 | * Development of this code funded by SuSE Linux AG, http://www.suse.com/ | |
6 | * | |
7 | * This program is free software; you can redistribute it and/or modify | |
8 | * it under the terms of the GNU General Public License version 2 as | |
9 | * published by the Free Software Foundation. | |
10 | * | |
11 | */ | |
12 | #include <linux/module.h> | |
1da177e4 LT |
13 | #include <linux/proc_fs.h> |
14 | #include <linux/jhash.h> | |
136e92bb | 15 | #include <linux/bitops.h> |
1da177e4 LT |
16 | #include <linux/skbuff.h> |
17 | #include <linux/ip.h> | |
18 | #include <linux/tcp.h> | |
19 | #include <linux/udp.h> | |
20 | #include <linux/icmp.h> | |
21 | #include <linux/if_arp.h> | |
22 | #include <linux/proc_fs.h> | |
23 | #include <linux/seq_file.h> | |
24 | ||
25 | #include <net/checksum.h> | |
26 | ||
27 | #include <linux/netfilter_arp.h> | |
28 | ||
29 | #include <linux/netfilter_ipv4/ip_tables.h> | |
30 | #include <linux/netfilter_ipv4/ipt_CLUSTERIP.h> | |
9fb9cbb1 | 31 | #include <net/netfilter/nf_conntrack_compat.h> |
1da177e4 | 32 | |
136e92bb | 33 | #define CLUSTERIP_VERSION "0.8" |
1da177e4 LT |
34 | |
35 | #define DEBUG_CLUSTERIP | |
36 | ||
37 | #ifdef DEBUG_CLUSTERIP | |
38 | #define DEBUGP printk | |
39 | #else | |
40 | #define DEBUGP | |
41 | #endif | |
42 | ||
e45b1be8 PM |
43 | #define ASSERT_READ_LOCK(x) |
44 | ||
1da177e4 LT |
45 | MODULE_LICENSE("GPL"); |
46 | MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>"); | |
47 | MODULE_DESCRIPTION("iptables target for CLUSTERIP"); | |
48 | ||
49 | struct clusterip_config { | |
50 | struct list_head list; /* list of all configs */ | |
51 | atomic_t refcount; /* reference count */ | |
44513624 KK |
52 | atomic_t entries; /* number of entries/rules |
53 | * referencing us */ | |
1da177e4 LT |
54 | |
55 | u_int32_t clusterip; /* the IP address */ | |
56 | u_int8_t clustermac[ETH_ALEN]; /* the MAC address */ | |
57 | struct net_device *dev; /* device */ | |
58 | u_int16_t num_total_nodes; /* total number of nodes */ | |
136e92bb | 59 | unsigned long local_nodes; /* node number array */ |
1da177e4 LT |
60 | |
61 | #ifdef CONFIG_PROC_FS | |
62 | struct proc_dir_entry *pde; /* proc dir entry */ | |
63 | #endif | |
64 | enum clusterip_hashmode hash_mode; /* which hashing mode */ | |
65 | u_int32_t hash_initval; /* hash initialization */ | |
66 | }; | |
67 | ||
68 | static LIST_HEAD(clusterip_configs); | |
69 | ||
136e92bb | 70 | /* clusterip_lock protects the clusterip_configs list */ |
e45b1be8 | 71 | static DEFINE_RWLOCK(clusterip_lock); |
1da177e4 LT |
72 | |
73 | #ifdef CONFIG_PROC_FS | |
74 | static struct file_operations clusterip_proc_fops; | |
75 | static struct proc_dir_entry *clusterip_procdir; | |
76 | #endif | |
77 | ||
78 | static inline void | |
44513624 KK |
79 | clusterip_config_get(struct clusterip_config *c) |
80 | { | |
1da177e4 LT |
81 | atomic_inc(&c->refcount); |
82 | } | |
83 | ||
84 | static inline void | |
44513624 KK |
85 | clusterip_config_put(struct clusterip_config *c) |
86 | { | |
87 | if (atomic_dec_and_test(&c->refcount)) | |
88 | kfree(c); | |
89 | } | |
90 | ||
91 | /* increase the count of entries(rules) using/referencing this config */ | |
92 | static inline void | |
93 | clusterip_config_entry_get(struct clusterip_config *c) | |
94 | { | |
95 | atomic_inc(&c->entries); | |
96 | } | |
97 | ||
98 | /* decrease the count of entries using/referencing this config. If last | |
99 | * entry(rule) is removed, remove the config from lists, but don't free it | |
100 | * yet, since proc-files could still be holding references */ | |
101 | static inline void | |
102 | clusterip_config_entry_put(struct clusterip_config *c) | |
103 | { | |
104 | if (atomic_dec_and_test(&c->entries)) { | |
e45b1be8 | 105 | write_lock_bh(&clusterip_lock); |
1da177e4 | 106 | list_del(&c->list); |
e45b1be8 | 107 | write_unlock_bh(&clusterip_lock); |
44513624 | 108 | |
1da177e4 LT |
109 | dev_mc_delete(c->dev, c->clustermac, ETH_ALEN, 0); |
110 | dev_put(c->dev); | |
44513624 KK |
111 | |
112 | /* In case anyone still accesses the file, the open/close | |
113 | * functions are also incrementing the refcount on their own, | |
114 | * so it's safe to remove the entry even if it's in use. */ | |
115 | #ifdef CONFIG_PROC_FS | |
116 | remove_proc_entry(c->pde->name, c->pde->parent); | |
117 | #endif | |
1da177e4 LT |
118 | } |
119 | } | |
120 | ||
1da177e4 LT |
121 | static struct clusterip_config * |
122 | __clusterip_config_find(u_int32_t clusterip) | |
123 | { | |
124 | struct list_head *pos; | |
125 | ||
e45b1be8 | 126 | ASSERT_READ_LOCK(&clusterip_lock); |
1da177e4 LT |
127 | list_for_each(pos, &clusterip_configs) { |
128 | struct clusterip_config *c = list_entry(pos, | |
129 | struct clusterip_config, list); | |
130 | if (c->clusterip == clusterip) { | |
131 | return c; | |
132 | } | |
133 | } | |
134 | ||
135 | return NULL; | |
136 | } | |
137 | ||
138 | static inline struct clusterip_config * | |
44513624 | 139 | clusterip_config_find_get(u_int32_t clusterip, int entry) |
1da177e4 LT |
140 | { |
141 | struct clusterip_config *c; | |
142 | ||
e45b1be8 | 143 | read_lock_bh(&clusterip_lock); |
1da177e4 LT |
144 | c = __clusterip_config_find(clusterip); |
145 | if (!c) { | |
e45b1be8 | 146 | read_unlock_bh(&clusterip_lock); |
1da177e4 LT |
147 | return NULL; |
148 | } | |
149 | atomic_inc(&c->refcount); | |
44513624 KK |
150 | if (entry) |
151 | atomic_inc(&c->entries); | |
e45b1be8 | 152 | read_unlock_bh(&clusterip_lock); |
1da177e4 LT |
153 | |
154 | return c; | |
155 | } | |
156 | ||
136e92bb KK |
157 | static void |
158 | clusterip_config_init_nodelist(struct clusterip_config *c, | |
159 | const struct ipt_clusterip_tgt_info *i) | |
160 | { | |
161 | int n; | |
162 | ||
163 | for (n = 0; n < i->num_local_nodes; n++) { | |
164 | set_bit(i->local_nodes[n] - 1, &c->local_nodes); | |
165 | } | |
166 | } | |
167 | ||
1da177e4 LT |
168 | static struct clusterip_config * |
169 | clusterip_config_init(struct ipt_clusterip_tgt_info *i, u_int32_t ip, | |
170 | struct net_device *dev) | |
171 | { | |
172 | struct clusterip_config *c; | |
173 | char buffer[16]; | |
174 | ||
175 | c = kmalloc(sizeof(*c), GFP_ATOMIC); | |
176 | if (!c) | |
177 | return NULL; | |
178 | ||
179 | memset(c, 0, sizeof(*c)); | |
180 | c->dev = dev; | |
181 | c->clusterip = ip; | |
182 | memcpy(&c->clustermac, &i->clustermac, ETH_ALEN); | |
183 | c->num_total_nodes = i->num_total_nodes; | |
136e92bb | 184 | clusterip_config_init_nodelist(c, i); |
1da177e4 LT |
185 | c->hash_mode = i->hash_mode; |
186 | c->hash_initval = i->hash_initval; | |
187 | atomic_set(&c->refcount, 1); | |
44513624 | 188 | atomic_set(&c->entries, 1); |
1da177e4 LT |
189 | |
190 | #ifdef CONFIG_PROC_FS | |
191 | /* create proc dir entry */ | |
192 | sprintf(buffer, "%u.%u.%u.%u", NIPQUAD(ip)); | |
193 | c->pde = create_proc_entry(buffer, S_IWUSR|S_IRUSR, clusterip_procdir); | |
194 | if (!c->pde) { | |
195 | kfree(c); | |
196 | return NULL; | |
197 | } | |
198 | c->pde->proc_fops = &clusterip_proc_fops; | |
199 | c->pde->data = c; | |
200 | #endif | |
201 | ||
e45b1be8 | 202 | write_lock_bh(&clusterip_lock); |
1da177e4 | 203 | list_add(&c->list, &clusterip_configs); |
e45b1be8 | 204 | write_unlock_bh(&clusterip_lock); |
1da177e4 LT |
205 | |
206 | return c; | |
207 | } | |
208 | ||
209 | static int | |
210 | clusterip_add_node(struct clusterip_config *c, u_int16_t nodenum) | |
211 | { | |
1da177e4 | 212 | |
136e92bb KK |
213 | if (nodenum == 0 || |
214 | nodenum > c->num_total_nodes) | |
1da177e4 | 215 | return 1; |
1da177e4 | 216 | |
136e92bb KK |
217 | /* check if we already have this number in our bitfield */ |
218 | if (test_and_set_bit(nodenum - 1, &c->local_nodes)) | |
219 | return 1; | |
1da177e4 | 220 | |
1da177e4 LT |
221 | return 0; |
222 | } | |
223 | ||
224 | static int | |
225 | clusterip_del_node(struct clusterip_config *c, u_int16_t nodenum) | |
226 | { | |
136e92bb KK |
227 | if (nodenum == 0 || |
228 | nodenum > c->num_total_nodes) | |
1da177e4 | 229 | return 1; |
1da177e4 | 230 | |
136e92bb KK |
231 | if (test_and_clear_bit(nodenum - 1, &c->local_nodes)) |
232 | return 0; | |
1da177e4 | 233 | |
1da177e4 LT |
234 | return 1; |
235 | } | |
236 | ||
237 | static inline u_int32_t | |
238 | clusterip_hashfn(struct sk_buff *skb, struct clusterip_config *config) | |
239 | { | |
240 | struct iphdr *iph = skb->nh.iph; | |
241 | unsigned long hashval; | |
242 | u_int16_t sport, dport; | |
957dc80a | 243 | u_int16_t *ports; |
1da177e4 LT |
244 | |
245 | switch (iph->protocol) { | |
246 | case IPPROTO_TCP: | |
1da177e4 | 247 | case IPPROTO_UDP: |
957dc80a PM |
248 | case IPPROTO_SCTP: |
249 | case IPPROTO_DCCP: | |
1da177e4 | 250 | case IPPROTO_ICMP: |
957dc80a PM |
251 | ports = (void *)iph+iph->ihl*4; |
252 | sport = ports[0]; | |
253 | dport = ports[1]; | |
1da177e4 LT |
254 | break; |
255 | default: | |
256 | if (net_ratelimit()) { | |
257 | printk(KERN_NOTICE "CLUSTERIP: unknown protocol `%u'\n", | |
258 | iph->protocol); | |
259 | } | |
260 | sport = dport = 0; | |
261 | } | |
262 | ||
263 | switch (config->hash_mode) { | |
264 | case CLUSTERIP_HASHMODE_SIP: | |
265 | hashval = jhash_1word(ntohl(iph->saddr), | |
266 | config->hash_initval); | |
267 | break; | |
268 | case CLUSTERIP_HASHMODE_SIP_SPT: | |
269 | hashval = jhash_2words(ntohl(iph->saddr), sport, | |
270 | config->hash_initval); | |
271 | break; | |
272 | case CLUSTERIP_HASHMODE_SIP_SPT_DPT: | |
273 | hashval = jhash_3words(ntohl(iph->saddr), sport, dport, | |
274 | config->hash_initval); | |
275 | break; | |
276 | default: | |
277 | /* to make gcc happy */ | |
278 | hashval = 0; | |
279 | /* This cannot happen, unless the check function wasn't called | |
280 | * at rule load time */ | |
281 | printk("CLUSTERIP: unknown mode `%u'\n", config->hash_mode); | |
282 | BUG(); | |
283 | break; | |
284 | } | |
285 | ||
286 | /* node numbers are 1..n, not 0..n */ | |
287 | return ((hashval % config->num_total_nodes)+1); | |
288 | } | |
289 | ||
290 | static inline int | |
291 | clusterip_responsible(struct clusterip_config *config, u_int32_t hash) | |
292 | { | |
136e92bb | 293 | return test_bit(hash - 1, &config->local_nodes); |
1da177e4 LT |
294 | } |
295 | ||
296 | /*********************************************************************** | |
297 | * IPTABLES TARGET | |
298 | ***********************************************************************/ | |
299 | ||
300 | static unsigned int | |
301 | target(struct sk_buff **pskb, | |
302 | const struct net_device *in, | |
303 | const struct net_device *out, | |
304 | unsigned int hooknum, | |
c4986734 | 305 | const struct xt_target *target, |
1da177e4 LT |
306 | const void *targinfo, |
307 | void *userinfo) | |
308 | { | |
309 | const struct ipt_clusterip_tgt_info *cipinfo = targinfo; | |
310 | enum ip_conntrack_info ctinfo; | |
9fb9cbb1 | 311 | u_int32_t *mark, hash; |
1da177e4 LT |
312 | |
313 | /* don't need to clusterip_config_get() here, since refcount | |
314 | * is only decremented by destroy() - and ip_tables guarantees | |
315 | * that the ->target() function isn't called after ->destroy() */ | |
316 | ||
9fb9cbb1 YK |
317 | mark = nf_ct_get_mark((*pskb), &ctinfo); |
318 | if (mark == NULL) { | |
1da177e4 LT |
319 | printk(KERN_ERR "CLUSTERIP: no conntrack!\n"); |
320 | /* FIXME: need to drop invalid ones, since replies | |
321 | * to outgoing connections of other nodes will be | |
322 | * marked as INVALID */ | |
323 | return NF_DROP; | |
324 | } | |
325 | ||
326 | /* special case: ICMP error handling. conntrack distinguishes between | |
327 | * error messages (RELATED) and information requests (see below) */ | |
328 | if ((*pskb)->nh.iph->protocol == IPPROTO_ICMP | |
329 | && (ctinfo == IP_CT_RELATED | |
5d927eb0 | 330 | || ctinfo == IP_CT_RELATED+IP_CT_IS_REPLY)) |
1da177e4 LT |
331 | return IPT_CONTINUE; |
332 | ||
333 | /* ip_conntrack_icmp guarantees us that we only have ICMP_ECHO, | |
334 | * TIMESTAMP, INFO_REQUEST or ADDRESS type icmp packets from here | |
335 | * on, which all have an ID field [relevant for hashing]. */ | |
336 | ||
337 | hash = clusterip_hashfn(*pskb, cipinfo->config); | |
338 | ||
339 | switch (ctinfo) { | |
340 | case IP_CT_NEW: | |
9fb9cbb1 | 341 | *mark = hash; |
1da177e4 LT |
342 | break; |
343 | case IP_CT_RELATED: | |
344 | case IP_CT_RELATED+IP_CT_IS_REPLY: | |
345 | /* FIXME: we don't handle expectations at the | |
346 | * moment. they can arrive on a different node than | |
347 | * the master connection (e.g. FTP passive mode) */ | |
348 | case IP_CT_ESTABLISHED: | |
349 | case IP_CT_ESTABLISHED+IP_CT_IS_REPLY: | |
350 | break; | |
351 | default: | |
352 | break; | |
353 | } | |
354 | ||
355 | #ifdef DEBUG_CLUSTERP | |
356 | DUMP_TUPLE(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple); | |
357 | #endif | |
9fb9cbb1 | 358 | DEBUGP("hash=%u ct_hash=%u ", hash, *mark); |
1da177e4 LT |
359 | if (!clusterip_responsible(cipinfo->config, hash)) { |
360 | DEBUGP("not responsible\n"); | |
361 | return NF_DROP; | |
362 | } | |
363 | DEBUGP("responsible\n"); | |
364 | ||
365 | /* despite being received via linklayer multicast, this is | |
366 | * actually a unicast IP packet. TCP doesn't like PACKET_MULTICAST */ | |
367 | (*pskb)->pkt_type = PACKET_HOST; | |
368 | ||
369 | return IPT_CONTINUE; | |
370 | } | |
371 | ||
372 | static int | |
373 | checkentry(const char *tablename, | |
2e4e6a17 | 374 | const void *e_void, |
c4986734 | 375 | const struct xt_target *target, |
1da177e4 LT |
376 | void *targinfo, |
377 | unsigned int targinfosize, | |
378 | unsigned int hook_mask) | |
379 | { | |
380 | struct ipt_clusterip_tgt_info *cipinfo = targinfo; | |
2e4e6a17 | 381 | const struct ipt_entry *e = e_void; |
1da177e4 LT |
382 | |
383 | struct clusterip_config *config; | |
384 | ||
1da177e4 LT |
385 | if (cipinfo->hash_mode != CLUSTERIP_HASHMODE_SIP && |
386 | cipinfo->hash_mode != CLUSTERIP_HASHMODE_SIP_SPT && | |
387 | cipinfo->hash_mode != CLUSTERIP_HASHMODE_SIP_SPT_DPT) { | |
388 | printk(KERN_WARNING "CLUSTERIP: unknown mode `%u'\n", | |
389 | cipinfo->hash_mode); | |
390 | return 0; | |
391 | ||
392 | } | |
393 | if (e->ip.dmsk.s_addr != 0xffffffff | |
394 | || e->ip.dst.s_addr == 0) { | |
395 | printk(KERN_ERR "CLUSTERIP: Please specify destination IP\n"); | |
396 | return 0; | |
397 | } | |
398 | ||
399 | /* FIXME: further sanity checks */ | |
400 | ||
44513624 KK |
401 | config = clusterip_config_find_get(e->ip.dst.s_addr, 1); |
402 | if (config) { | |
403 | if (cipinfo->config != NULL) { | |
404 | /* Case A: This is an entry that gets reloaded, since | |
405 | * it still has a cipinfo->config pointer. Simply | |
406 | * increase the entry refcount and return */ | |
407 | if (cipinfo->config != config) { | |
408 | printk(KERN_ERR "CLUSTERIP: Reloaded entry " | |
409 | "has invalid config pointer!\n"); | |
410 | return 0; | |
411 | } | |
412 | clusterip_config_entry_get(cipinfo->config); | |
413 | } else { | |
414 | /* Case B: This is a new rule referring to an existing | |
415 | * clusterip config. */ | |
416 | cipinfo->config = config; | |
417 | clusterip_config_entry_get(cipinfo->config); | |
418 | } | |
419 | } else { | |
420 | /* Case C: This is a completely new clusterip config */ | |
1da177e4 LT |
421 | if (!(cipinfo->flags & CLUSTERIP_FLAG_NEW)) { |
422 | printk(KERN_WARNING "CLUSTERIP: no config found for %u.%u.%u.%u, need 'new'\n", NIPQUAD(e->ip.dst.s_addr)); | |
423 | return 0; | |
424 | } else { | |
425 | struct net_device *dev; | |
426 | ||
427 | if (e->ip.iniface[0] == '\0') { | |
428 | printk(KERN_WARNING "CLUSTERIP: Please specify an interface name\n"); | |
429 | return 0; | |
430 | } | |
431 | ||
432 | dev = dev_get_by_name(e->ip.iniface); | |
433 | if (!dev) { | |
434 | printk(KERN_WARNING "CLUSTERIP: no such interface %s\n", e->ip.iniface); | |
435 | return 0; | |
436 | } | |
437 | ||
438 | config = clusterip_config_init(cipinfo, | |
439 | e->ip.dst.s_addr, dev); | |
440 | if (!config) { | |
441 | printk(KERN_WARNING "CLUSTERIP: cannot allocate config\n"); | |
442 | dev_put(dev); | |
443 | return 0; | |
444 | } | |
445 | dev_mc_add(config->dev,config->clustermac, ETH_ALEN, 0); | |
446 | } | |
44513624 | 447 | cipinfo->config = config; |
1da177e4 LT |
448 | } |
449 | ||
1da177e4 LT |
450 | return 1; |
451 | } | |
452 | ||
453 | /* drop reference count of cluster config when rule is deleted */ | |
c4986734 PM |
454 | static void destroy(const struct xt_target *target, void *targinfo, |
455 | unsigned int targinfosize) | |
1da177e4 | 456 | { |
c4986734 | 457 | struct ipt_clusterip_tgt_info *cipinfo = targinfo; |
1da177e4 | 458 | |
44513624 KK |
459 | /* if no more entries are referencing the config, remove it |
460 | * from the list and destroy the proc entry */ | |
461 | clusterip_config_entry_put(cipinfo->config); | |
462 | ||
1da177e4 LT |
463 | clusterip_config_put(cipinfo->config); |
464 | } | |
465 | ||
1d5cd909 PM |
466 | static struct ipt_target clusterip_tgt = { |
467 | .name = "CLUSTERIP", | |
468 | .target = target, | |
469 | .targetsize = sizeof(struct ipt_clusterip_tgt_info), | |
470 | .checkentry = checkentry, | |
471 | .destroy = destroy, | |
472 | .me = THIS_MODULE | |
1da177e4 LT |
473 | }; |
474 | ||
475 | ||
476 | /*********************************************************************** | |
477 | * ARP MANGLING CODE | |
478 | ***********************************************************************/ | |
479 | ||
480 | /* hardcoded for 48bit ethernet and 32bit ipv4 addresses */ | |
481 | struct arp_payload { | |
482 | u_int8_t src_hw[ETH_ALEN]; | |
483 | u_int32_t src_ip; | |
484 | u_int8_t dst_hw[ETH_ALEN]; | |
485 | u_int32_t dst_ip; | |
486 | } __attribute__ ((packed)); | |
487 | ||
488 | #ifdef CLUSTERIP_DEBUG | |
489 | static void arp_print(struct arp_payload *payload) | |
490 | { | |
491 | #define HBUFFERLEN 30 | |
492 | char hbuffer[HBUFFERLEN]; | |
493 | int j,k; | |
494 | const char hexbuf[]= "0123456789abcdef"; | |
495 | ||
496 | for (k=0, j=0; k < HBUFFERLEN-3 && j < ETH_ALEN; j++) { | |
497 | hbuffer[k++]=hexbuf[(payload->src_hw[j]>>4)&15]; | |
498 | hbuffer[k++]=hexbuf[payload->src_hw[j]&15]; | |
499 | hbuffer[k++]=':'; | |
500 | } | |
501 | hbuffer[--k]='\0'; | |
502 | ||
503 | printk("src %u.%u.%u.%u@%s, dst %u.%u.%u.%u\n", | |
504 | NIPQUAD(payload->src_ip), hbuffer, | |
505 | NIPQUAD(payload->dst_ip)); | |
506 | } | |
507 | #endif | |
508 | ||
509 | static unsigned int | |
510 | arp_mangle(unsigned int hook, | |
511 | struct sk_buff **pskb, | |
512 | const struct net_device *in, | |
513 | const struct net_device *out, | |
514 | int (*okfn)(struct sk_buff *)) | |
515 | { | |
516 | struct arphdr *arp = (*pskb)->nh.arph; | |
517 | struct arp_payload *payload; | |
518 | struct clusterip_config *c; | |
519 | ||
520 | /* we don't care about non-ethernet and non-ipv4 ARP */ | |
521 | if (arp->ar_hrd != htons(ARPHRD_ETHER) | |
522 | || arp->ar_pro != htons(ETH_P_IP) | |
523 | || arp->ar_pln != 4 || arp->ar_hln != ETH_ALEN) | |
524 | return NF_ACCEPT; | |
525 | ||
4095ebf1 HW |
526 | /* we only want to mangle arp requests and replies */ |
527 | if (arp->ar_op != htons(ARPOP_REPLY) | |
528 | && arp->ar_op != htons(ARPOP_REQUEST)) | |
1da177e4 LT |
529 | return NF_ACCEPT; |
530 | ||
531 | payload = (void *)(arp+1); | |
532 | ||
533 | /* if there is no clusterip configuration for the arp reply's | |
534 | * source ip, we don't want to mangle it */ | |
44513624 | 535 | c = clusterip_config_find_get(payload->src_ip, 0); |
1da177e4 LT |
536 | if (!c) |
537 | return NF_ACCEPT; | |
538 | ||
539 | /* normally the linux kernel always replies to arp queries of | |
540 | * addresses on different interfacs. However, in the CLUSTERIP case | |
541 | * this wouldn't work, since we didn't subscribe the mcast group on | |
542 | * other interfaces */ | |
543 | if (c->dev != out) { | |
544 | DEBUGP("CLUSTERIP: not mangling arp reply on different " | |
545 | "interface: cip'%s'-skb'%s'\n", c->dev->name, out->name); | |
546 | clusterip_config_put(c); | |
547 | return NF_ACCEPT; | |
548 | } | |
549 | ||
550 | /* mangle reply hardware address */ | |
551 | memcpy(payload->src_hw, c->clustermac, arp->ar_hln); | |
552 | ||
553 | #ifdef CLUSTERIP_DEBUG | |
554 | DEBUGP(KERN_DEBUG "CLUSTERIP mangled arp reply: "); | |
555 | arp_print(payload); | |
556 | #endif | |
557 | ||
558 | clusterip_config_put(c); | |
559 | ||
560 | return NF_ACCEPT; | |
561 | } | |
562 | ||
563 | static struct nf_hook_ops cip_arp_ops = { | |
564 | .hook = arp_mangle, | |
565 | .pf = NF_ARP, | |
566 | .hooknum = NF_ARP_OUT, | |
567 | .priority = -1 | |
568 | }; | |
569 | ||
570 | /*********************************************************************** | |
571 | * PROC DIR HANDLING | |
572 | ***********************************************************************/ | |
573 | ||
574 | #ifdef CONFIG_PROC_FS | |
575 | ||
136e92bb KK |
576 | struct clusterip_seq_position { |
577 | unsigned int pos; /* position */ | |
578 | unsigned int weight; /* number of bits set == size */ | |
579 | unsigned int bit; /* current bit */ | |
580 | unsigned long val; /* current value */ | |
581 | }; | |
582 | ||
1da177e4 LT |
583 | static void *clusterip_seq_start(struct seq_file *s, loff_t *pos) |
584 | { | |
585 | struct proc_dir_entry *pde = s->private; | |
586 | struct clusterip_config *c = pde->data; | |
136e92bb KK |
587 | unsigned int weight; |
588 | u_int32_t local_nodes; | |
589 | struct clusterip_seq_position *idx; | |
590 | ||
591 | /* FIXME: possible race */ | |
592 | local_nodes = c->local_nodes; | |
593 | weight = hweight32(local_nodes); | |
594 | if (*pos >= weight) | |
1da177e4 LT |
595 | return NULL; |
596 | ||
136e92bb KK |
597 | idx = kmalloc(sizeof(struct clusterip_seq_position), GFP_KERNEL); |
598 | if (!idx) | |
1da177e4 LT |
599 | return ERR_PTR(-ENOMEM); |
600 | ||
136e92bb KK |
601 | idx->pos = *pos; |
602 | idx->weight = weight; | |
603 | idx->bit = ffs(local_nodes); | |
604 | idx->val = local_nodes; | |
605 | clear_bit(idx->bit - 1, &idx->val); | |
606 | ||
607 | return idx; | |
1da177e4 LT |
608 | } |
609 | ||
610 | static void *clusterip_seq_next(struct seq_file *s, void *v, loff_t *pos) | |
611 | { | |
136e92bb | 612 | struct clusterip_seq_position *idx = (struct clusterip_seq_position *)v; |
1da177e4 | 613 | |
136e92bb KK |
614 | *pos = ++idx->pos; |
615 | if (*pos >= idx->weight) { | |
1da177e4 LT |
616 | kfree(v); |
617 | return NULL; | |
618 | } | |
136e92bb KK |
619 | idx->bit = ffs(idx->val); |
620 | clear_bit(idx->bit - 1, &idx->val); | |
621 | return idx; | |
1da177e4 LT |
622 | } |
623 | ||
624 | static void clusterip_seq_stop(struct seq_file *s, void *v) | |
625 | { | |
626 | kfree(v); | |
1da177e4 LT |
627 | } |
628 | ||
629 | static int clusterip_seq_show(struct seq_file *s, void *v) | |
630 | { | |
136e92bb | 631 | struct clusterip_seq_position *idx = (struct clusterip_seq_position *)v; |
1da177e4 | 632 | |
136e92bb | 633 | if (idx->pos != 0) |
1da177e4 | 634 | seq_putc(s, ','); |
1da177e4 | 635 | |
136e92bb KK |
636 | seq_printf(s, "%u", idx->bit); |
637 | ||
638 | if (idx->pos == idx->weight - 1) | |
1da177e4 LT |
639 | seq_putc(s, '\n'); |
640 | ||
641 | return 0; | |
642 | } | |
643 | ||
644 | static struct seq_operations clusterip_seq_ops = { | |
645 | .start = clusterip_seq_start, | |
646 | .next = clusterip_seq_next, | |
647 | .stop = clusterip_seq_stop, | |
648 | .show = clusterip_seq_show, | |
649 | }; | |
650 | ||
651 | static int clusterip_proc_open(struct inode *inode, struct file *file) | |
652 | { | |
653 | int ret = seq_open(file, &clusterip_seq_ops); | |
654 | ||
655 | if (!ret) { | |
656 | struct seq_file *sf = file->private_data; | |
657 | struct proc_dir_entry *pde = PDE(inode); | |
658 | struct clusterip_config *c = pde->data; | |
659 | ||
660 | sf->private = pde; | |
661 | ||
662 | clusterip_config_get(c); | |
663 | } | |
664 | ||
665 | return ret; | |
666 | } | |
667 | ||
668 | static int clusterip_proc_release(struct inode *inode, struct file *file) | |
669 | { | |
670 | struct proc_dir_entry *pde = PDE(inode); | |
671 | struct clusterip_config *c = pde->data; | |
672 | int ret; | |
673 | ||
674 | ret = seq_release(inode, file); | |
675 | ||
676 | if (!ret) | |
677 | clusterip_config_put(c); | |
678 | ||
679 | return ret; | |
680 | } | |
681 | ||
682 | static ssize_t clusterip_proc_write(struct file *file, const char __user *input, | |
683 | size_t size, loff_t *ofs) | |
684 | { | |
685 | #define PROC_WRITELEN 10 | |
686 | char buffer[PROC_WRITELEN+1]; | |
687 | struct proc_dir_entry *pde = PDE(file->f_dentry->d_inode); | |
688 | struct clusterip_config *c = pde->data; | |
689 | unsigned long nodenum; | |
690 | ||
691 | if (copy_from_user(buffer, input, PROC_WRITELEN)) | |
692 | return -EFAULT; | |
693 | ||
694 | if (*buffer == '+') { | |
695 | nodenum = simple_strtoul(buffer+1, NULL, 10); | |
696 | if (clusterip_add_node(c, nodenum)) | |
697 | return -ENOMEM; | |
698 | } else if (*buffer == '-') { | |
699 | nodenum = simple_strtoul(buffer+1, NULL,10); | |
700 | if (clusterip_del_node(c, nodenum)) | |
701 | return -ENOENT; | |
702 | } else | |
703 | return -EIO; | |
704 | ||
705 | return size; | |
706 | } | |
707 | ||
708 | static struct file_operations clusterip_proc_fops = { | |
709 | .owner = THIS_MODULE, | |
710 | .open = clusterip_proc_open, | |
711 | .read = seq_read, | |
712 | .write = clusterip_proc_write, | |
713 | .llseek = seq_lseek, | |
714 | .release = clusterip_proc_release, | |
715 | }; | |
716 | ||
717 | #endif /* CONFIG_PROC_FS */ | |
718 | ||
32292a7f | 719 | static int __init ipt_clusterip_init(void) |
1da177e4 LT |
720 | { |
721 | int ret; | |
722 | ||
32292a7f PM |
723 | ret = ipt_register_target(&clusterip_tgt); |
724 | if (ret < 0) | |
725 | return ret; | |
1da177e4 | 726 | |
32292a7f PM |
727 | ret = nf_register_hook(&cip_arp_ops); |
728 | if (ret < 0) | |
1da177e4 | 729 | goto cleanup_target; |
1da177e4 LT |
730 | |
731 | #ifdef CONFIG_PROC_FS | |
732 | clusterip_procdir = proc_mkdir("ipt_CLUSTERIP", proc_net); | |
733 | if (!clusterip_procdir) { | |
734 | printk(KERN_ERR "CLUSTERIP: Unable to proc dir entry\n"); | |
735 | ret = -ENOMEM; | |
736 | goto cleanup_hook; | |
737 | } | |
738 | #endif /* CONFIG_PROC_FS */ | |
739 | ||
740 | printk(KERN_NOTICE "ClusterIP Version %s loaded successfully\n", | |
741 | CLUSTERIP_VERSION); | |
1da177e4 LT |
742 | return 0; |
743 | ||
1da177e4 LT |
744 | cleanup_hook: |
745 | nf_unregister_hook(&cip_arp_ops); | |
746 | cleanup_target: | |
747 | ipt_unregister_target(&clusterip_tgt); | |
32292a7f | 748 | return ret; |
1da177e4 LT |
749 | } |
750 | ||
65b4b4e8 | 751 | static void __exit ipt_clusterip_fini(void) |
1da177e4 | 752 | { |
32292a7f PM |
753 | printk(KERN_NOTICE "ClusterIP Version %s unloading\n", |
754 | CLUSTERIP_VERSION); | |
755 | #ifdef CONFIG_PROC_FS | |
756 | remove_proc_entry(clusterip_procdir->name, clusterip_procdir->parent); | |
757 | #endif | |
758 | nf_unregister_hook(&cip_arp_ops); | |
759 | ipt_unregister_target(&clusterip_tgt); | |
1da177e4 LT |
760 | } |
761 | ||
65b4b4e8 AM |
762 | module_init(ipt_clusterip_init); |
763 | module_exit(ipt_clusterip_fini); |