multicast disaster mitigation
[l2tpns.git] / cluster.c
1 // L2TPNS Clustering Stuff
2
3 char const *cvs_id_cluster = "$Id: cluster.c,v 1.26.2.6 2005/05/21 13:05:36 bodea Exp $";
4
5 #include <stdio.h>
6 #include <stdlib.h>
7 #include <stdarg.h>
8 #include <unistd.h>
9 #include <inttypes.h>
10 #include <sys/file.h>
11 #include <sys/stat.h>
12 #include <sys/socket.h>
13 #include <netinet/in.h>
14 #include <arpa/inet.h>
15 #include <sys/ioctl.h>
16 #include <net/if.h>
17 #include <string.h>
18 #include <malloc.h>
19 #include <errno.h>
20 #include <libcli.h>
21
22 #include "l2tpns.h"
23 #include "cluster.h"
24 #include "util.h"
25 #include "tbf.h"
26
27 #ifdef BGP
28 #include "bgp.h"
29 #endif
30 /*
31 * All cluster packets have the same format.
32 *
33 * One or more instances of
34 * a 32 bit 'type' id.
35 * a 32 bit 'extra' data dependant on the 'type'.
36 * zero or more bytes of structure data, dependant on the type.
37 *
38 */
39
40 // Module variables.
41 int cluster_sockfd = 0; // The filedescriptor for the cluster communications port.
42
43 in_addr_t my_address = 0; // The network address of my ethernet port.
44 static int walk_session_number = 0; // The next session to send when doing the slow table walk.
45 static int walk_tunnel_number = 0; // The next tunnel to send when doing the slow table walk.
46
47 #define MAX_HEART_SIZE (8192) // Maximum size of heartbeat packet. Must be less than max IP packet size :)
48 #define MAX_CHANGES (MAX_HEART_SIZE/(sizeof(sessiont) + sizeof(int) ) - 2) // Assumes a session is the biggest type!
49
50 static struct {
51 int type;
52 int id;
53 } cluster_changes[MAX_CHANGES]; // Queue of changed structures that need to go out when next heartbeat.
54
55 static struct {
56 int seq;
57 int size;
58 char data[MAX_HEART_SIZE];
59 } past_hearts[HB_HISTORY_SIZE]; // Ring buffer of heartbeats that we've recently sent out. Needed so
60 // we can re-transmit if needed.
61
62 static struct {
63 in_addr_t peer;
64 uint32_t basetime;
65 clockt timestamp;
66 int uptodate;
67 } peers[CLUSTER_MAX_SIZE]; // List of all the peers we've heard from.
68 static int num_peers; // Number of peers in list.
69
70 static int rle_decompress(uint8_t **src_p, int ssize, uint8_t *dst, int dsize);
71 static int rle_compress(uint8_t **src_p, int ssize, uint8_t *dst, int dsize);
72
73 //
74 // Create a listening socket
75 //
76 // This joins the cluster multi-cast group.
77 //
78 int cluster_init()
79 {
80 struct sockaddr_in addr;
81 struct sockaddr_in interface_addr;
82 struct ip_mreq mreq;
83 struct ifreq ifr;
84 int opt;
85
86 config->cluster_undefined_sessions = MAXSESSION-1;
87 config->cluster_undefined_tunnels = MAXTUNNEL-1;
88
89 if (!config->cluster_address)
90 return 0;
91 if (!*config->cluster_interface)
92 return 0;
93
94 cluster_sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
95
96 memset(&addr, 0, sizeof(addr));
97 addr.sin_family = AF_INET;
98 addr.sin_port = htons(CLUSTERPORT);
99 addr.sin_addr.s_addr = INADDR_ANY;
100 setsockopt(cluster_sockfd, SOL_SOCKET, SO_REUSEADDR, &addr, sizeof(addr));
101
102 opt = fcntl(cluster_sockfd, F_GETFL, 0);
103 fcntl(cluster_sockfd, F_SETFL, opt | O_NONBLOCK);
104
105 if (bind(cluster_sockfd, (void *) &addr, sizeof(addr)) < 0)
106 {
107 LOG(0, 0, 0, "Failed to bind cluster socket: %s\n", strerror(errno));
108 return -1;
109 }
110
111 strcpy(ifr.ifr_name, config->cluster_interface);
112 if (ioctl(cluster_sockfd, SIOCGIFADDR, &ifr) < 0)
113 {
114 LOG(0, 0, 0, "Failed to get interface address for (%s): %s\n", config->cluster_interface, strerror(errno));
115 return -1;
116 }
117
118 memcpy(&interface_addr, &ifr.ifr_addr, sizeof(interface_addr));
119 my_address = interface_addr.sin_addr.s_addr;
120
121 // Join multicast group.
122 mreq.imr_multiaddr.s_addr = config->cluster_address;
123 mreq.imr_interface = interface_addr.sin_addr;
124
125
126 opt = 0; // Turn off multicast loopback.
127 setsockopt(cluster_sockfd, IPPROTO_IP, IP_MULTICAST_LOOP, &opt, sizeof(opt));
128
129 if (setsockopt(cluster_sockfd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0)
130 {
131 LOG(0, 0, 0, "Failed to setsockopt (join mcast group): %s\n", strerror(errno));
132 return -1;
133 }
134
135 if (setsockopt(cluster_sockfd, IPPROTO_IP, IP_MULTICAST_IF, &interface_addr, sizeof(interface_addr)) < 0)
136 {
137 LOG(0, 0, 0, "Failed to setsockopt (set mcast interface): %s\n", strerror(errno));
138 return -1;
139 }
140
141 config->cluster_last_hb = TIME;
142 config->cluster_seq_number = -1;
143
144 return cluster_sockfd;
145 }
146
147
148 //
149 // Send a chunk of data to the entire cluster (usually via the multicast
150 // address ).
151 //
152
153 static int cluster_send_data(void *data, int datalen)
154 {
155 struct sockaddr_in addr = {0};
156
157 if (!cluster_sockfd) return -1;
158 if (!config->cluster_address) return 0;
159
160 addr.sin_addr.s_addr = config->cluster_address;
161 addr.sin_port = htons(CLUSTERPORT);
162 addr.sin_family = AF_INET;
163
164 LOG(5, 0, 0, "Cluster send data: %d bytes\n", datalen);
165
166 if (sendto(cluster_sockfd, data, datalen, MSG_NOSIGNAL, (void *) &addr, sizeof(addr)) < 0)
167 {
168 LOG(0, 0, 0, "sendto: %s\n", strerror(errno));
169 return -1;
170 }
171
172 return 0;
173 }
174
175 //
176 // Add a chunk of data to a heartbeat packet.
177 // Maintains the format. Assumes that the caller
178 // has passed in a big enough buffer!
179 //
180 static void add_type(char **p, int type, int more, char *data, int size)
181 {
182 *((uint32_t *) (*p)) = type;
183 *p += sizeof(uint32_t);
184
185 *((uint32_t *)(*p)) = more;
186 *p += sizeof(uint32_t);
187
188 if (data && size > 0) {
189 memcpy(*p, data, size);
190 *p += size;
191 }
192 }
193
194 // advertise our presence via BGP or gratuitous ARP
195 static void advertise(void)
196 {
197 #ifdef BGP
198 if (bgp_configured)
199 bgp_enable_routing(1);
200 else
201 #endif /* BGP */
202 if (config->send_garp)
203 send_garp(config->bind_address); // Start taking traffic.
204 }
205
206 static void cluster_uptodate(void)
207 {
208 if (config->cluster_iam_uptodate)
209 return;
210
211 if (config->cluster_undefined_sessions || config->cluster_undefined_tunnels)
212 return;
213
214 config->cluster_iam_uptodate = 1;
215
216 LOG(0, 0, 0, "Now uptodate with master.\n");
217 advertise();
218 }
219
220 //
221 // Send a unicast UDP packet to a peer with 'data' as the
222 // contents.
223 //
224 static int peer_send_data(in_addr_t peer, char *data, int size)
225 {
226 struct sockaddr_in addr = {0};
227
228 if (!cluster_sockfd) return -1;
229 if (!config->cluster_address) return 0;
230
231 if (!peer) // Odd??
232 return -1;
233
234 addr.sin_addr.s_addr = peer;
235 addr.sin_port = htons(CLUSTERPORT);
236 addr.sin_family = AF_INET;
237
238 LOG_HEX(5, "Peer send", data, size);
239
240 if (sendto(cluster_sockfd, data, size, MSG_NOSIGNAL, (void *) &addr, sizeof(addr)) < 0)
241 {
242 LOG(0, 0, 0, "sendto: %s\n", strerror(errno));
243 return -1;
244 }
245
246 return 0;
247 }
248
249 //
250 // Send a structured message to a peer with a single element of type 'type'.
251 //
252 static int peer_send_message(in_addr_t peer, int type, int more, char *data, int size)
253 {
254 char buf[65536]; // Vast overkill.
255 char *p = buf;
256
257 LOG(4, 0, 0, "Sending message to peer (type %d, more %d, size %d)\n", type, more, size);
258 add_type(&p, type, more, data, size);
259
260 return peer_send_data(peer, buf, (p-buf) );
261 }
262
263 //
264 // Forward a state changing packet to the master.
265 //
266 // The master just processes the payload as if it had
267 // received it off the tun device.
268 //
269 int master_forward_packet(char *data, int size, in_addr_t addr, int port)
270 {
271 char buf[65536]; // Vast overkill.
272 char *p = buf;
273
274 if (!config->cluster_master_address) // No election has been held yet. Just skip it.
275 return -1;
276
277 LOG(4, 0, 0, "Forwarding packet from %s to master (size %d)\n", fmtaddr(addr, 0), size);
278
279 STAT(c_forwarded);
280 add_type(&p, C_FORWARD, addr, (char *) &port, sizeof(port));
281 memcpy(p, data, size);
282 p += size;
283
284 return peer_send_data(config->cluster_master_address, buf, (p - buf));
285 }
286
287 //
288 // Forward a throttled packet to the master for handling.
289 //
290 // The master just drops the packet into the appropriate
291 // token bucket queue, and lets normal processing take care
292 // of it.
293 //
294 int master_throttle_packet(int tbfid, char *data, int size)
295 {
296 char buf[65536]; // Vast overkill.
297 char *p = buf;
298
299 if (!config->cluster_master_address) // No election has been held yet. Just skip it.
300 return -1;
301
302 LOG(4, 0, 0, "Throttling packet master (size %d, tbfid %d)\n", size, tbfid);
303
304 add_type(&p, C_THROTTLE, tbfid, data, size);
305
306 return peer_send_data(config->cluster_master_address, buf, (p-buf) );
307
308 }
309
310 //
311 // Forward a walled garden packet to the master for handling.
312 //
313 // The master just writes the packet straight to the tun
314 // device (where is will normally loop through the
315 // firewall rules, and come back in on the tun device)
316 //
317 // (Note that this must be called with the tun header
318 // as the start of the data).
319 int master_garden_packet(sessionidt s, char *data, int size)
320 {
321 char buf[65536]; // Vast overkill.
322 char *p = buf;
323
324 if (!config->cluster_master_address) // No election has been held yet. Just skip it.
325 return -1;
326
327 LOG(4, 0, 0, "Walled garden packet to master (size %d)\n", size);
328
329 add_type(&p, C_GARDEN, s, data, size);
330
331 return peer_send_data(config->cluster_master_address, buf, (p-buf));
332
333 }
334
335 //
336 // Send a chunk of data as a heartbeat..
337 // We save it in the history buffer as we do so.
338 //
339 static void send_heartbeat(int seq, char *data, int size)
340 {
341 int i;
342
343 if (size > sizeof(past_hearts[0].data))
344 {
345 LOG(0, 0, 0, "Tried to heartbeat something larger than the maximum packet!\n");
346 kill(0, SIGTERM);
347 exit(1);
348 }
349 i = seq % HB_HISTORY_SIZE;
350 past_hearts[i].seq = seq;
351 past_hearts[i].size = size;
352 memcpy(&past_hearts[i].data, data, size); // Save it.
353 cluster_send_data(data, size);
354 }
355
356 //
357 // Send an 'i am alive' message to every machine in the cluster.
358 //
359 void cluster_send_ping(time_t basetime)
360 {
361 char buff[100 + sizeof(pingt)];
362 char *p = buff;
363 pingt x;
364
365 if (config->cluster_iam_master && basetime) // We're heartbeating so no need to ping.
366 return;
367
368 LOG(5, 0, 0, "Sending cluster ping...\n");
369
370 x.ver = 1;
371 x.addr = config->bind_address;
372 x.undef = config->cluster_undefined_sessions + config->cluster_undefined_tunnels;
373 x.basetime = basetime;
374
375 add_type(&p, C_PING, basetime, (char *) &x, sizeof(x));
376 cluster_send_data(buff, (p-buff) );
377 }
378
379 //
380 // Walk the session counters looking for non-zero ones to send
381 // to the master. We send up to 600 of them at one time.
382 // We examine a maximum of 3000 sessions.
383 // (50k max session should mean that we normally
384 // examine the entire session table every 25 seconds).
385
386 #define MAX_B_RECS (600)
387 void master_update_counts(void)
388 {
389 int i, c;
390 bytest b[MAX_B_RECS+1];
391
392 if (config->cluster_iam_master) // Only happens on the slaves.
393 return;
394
395 if (!config->cluster_master_address) // If we don't have a master, skip it for a while.
396 return;
397
398 i = MAX_B_RECS * 5; // Examine max 2000 sessions;
399 if (config->cluster_highest_sessionid > i)
400 i = config->cluster_highest_sessionid;
401
402 for ( c = 0; i > 0 ; --i) {
403 // Next session to look at.
404 walk_session_number++;
405 if ( walk_session_number > config->cluster_highest_sessionid)
406 walk_session_number = 1;
407
408 if (!sess_local[walk_session_number].cin && !sess_local[walk_session_number].cout)
409 continue; // Unused. Skip it.
410
411 b[c].sid = walk_session_number;
412 b[c].in = sess_local[walk_session_number].cin;
413 b[c].out = sess_local[walk_session_number].cout;
414
415 if (++c > MAX_B_RECS) // Send a max of 400 elements in a packet.
416 break;
417
418 // Reset counters.
419 sess_local[walk_session_number].cin = sess_local[walk_session_number].cout = 0;
420 }
421
422 if (!c) // Didn't find any that changes. Get out of here!
423 return;
424
425
426 // Forward the data to the master.
427 LOG(4, 0, 0, "Sending byte counters to master (%d elements)\n", c);
428 peer_send_message(config->cluster_master_address, C_BYTES, c, (char *) &b, sizeof(b[0]) * c);
429 return;
430 }
431
432 //
433 // On the master, check how our slaves are going. If
434 // one of them's not up-to-date we'll heartbeat faster.
435 // If we don't have any of them, then we need to turn
436 // on our own packet handling!
437 //
438 void cluster_check_slaves(void)
439 {
440 int i;
441 static int have_peers = 0;
442 int had_peers = have_peers;
443 clockt t = TIME;
444
445 if (!config->cluster_iam_master)
446 return; // Only runs on the master...
447
448 config->cluster_iam_uptodate = 1; // cleared in loop below
449
450 for (i = have_peers = 0; i < num_peers; i++)
451 {
452 if ((peers[i].timestamp + config->cluster_hb_timeout) < t)
453 continue; // Stale peer! Skip them.
454
455 if (!peers[i].basetime)
456 continue; // Shutdown peer! Skip them.
457
458 if (peers[i].uptodate)
459 have_peers = 1;
460
461 if (!peers[i].uptodate)
462 config->cluster_iam_uptodate = 0; // Start fast heartbeats
463 }
464
465 #ifdef BGP
466 // in a cluster, withdraw/add routes when we get a peer/lose all peers
467 if (bgp_configured && have_peers != had_peers)
468 bgp_enable_routing(!have_peers);
469 #endif /* BGP */
470 }
471
472 //
473 // Check that we have a master. If it's been too
474 // long since we heard from a master then hold an election.
475 //
476 void cluster_check_master(void)
477 {
478 int i, count, tcount, high_unique_id = 0;
479 int last_free = 0;
480 clockt t = TIME;
481 static int probed = 0;
482
483 if (config->cluster_iam_master)
484 return; // Only runs on the slaves...
485
486 // If the master is late (missed 2 hearbeats by a second and a
487 // hair) it may be that the switch has dropped us from the
488 // multicast group, try unicasting probes to the master
489 // which will hopefully respond with a unicast heartbeat that
490 // will allow us to limp along until the querier next runs.
491 if (config->cluster_master_address
492 && TIME > (config->cluster_last_hb + 2 * config->cluster_hb_interval + 11))
493 {
494 if (!probed || (TIME > (probed + 2 * config->cluster_hb_interval)))
495 {
496 probed = TIME;
497 LOG(1, 0, 0, "Heartbeat from master %.1fs late, probing...\n",
498 0.1 * (TIME - (config->cluster_last_hb + config->cluster_hb_interval)));
499
500 peer_send_message(config->cluster_master_address,
501 C_LASTSEEN, config->cluster_seq_number, NULL, 0);
502 }
503 } else { // We got a recent heartbeat; reset the probe flag.
504 probed = 0;
505 }
506
507 if (TIME < (config->cluster_last_hb + config->cluster_hb_timeout))
508 return; // Everything's ok!
509
510 config->cluster_last_hb = TIME + 1; // Just the one election thanks.
511
512 LOG(0, 0, 0, "Master timed out! Holding election...\n");
513
514 for (i = 0; i < num_peers; i++)
515 {
516 if ((peers[i].timestamp + config->cluster_hb_timeout) < t)
517 continue; // Stale peer! Skip them.
518
519 if (!peers[i].basetime)
520 continue; // Shutdown peer! Skip them.
521
522 if (peers[i].basetime < basetime) {
523 LOG(1, 0, 0, "Expecting %s to become master\n", fmtaddr(peers[i].peer, 0));
524 return; // They'll win the election. Get out of here.
525 }
526
527 if (peers[i].basetime == basetime &&
528 peers[i].peer > my_address) {
529 LOG(1, 0, 0, "Expecting %s to become master\n", fmtaddr(peers[i].peer, 0));
530 return; // They'll win the election. Wait for them to come up.
531 }
532 }
533
534 // Wow. it's been ages since I last heard a heartbeat
535 // and I'm better than an of my peers so it's time
536 // to become a master!!!
537
538 config->cluster_iam_master = 1;
539 config->cluster_master_address = 0;
540
541 LOG(0, 0, 0, "I am declaring myself the master!\n");
542
543 if (config->cluster_seq_number == -1)
544 config->cluster_seq_number = 0;
545
546 //
547 // Go through and mark all the tunnels as defined.
548 // Count the highest used tunnel number as well.
549 //
550 config->cluster_highest_tunnelid = 0;
551 for (i = 0, tcount = 0; i < MAXTUNNEL; ++i) {
552 if (tunnel[i].state == TUNNELUNDEF)
553 tunnel[i].state = TUNNELFREE;
554
555 if (tunnel[i].state != TUNNELFREE && i > config->cluster_highest_tunnelid)
556 config->cluster_highest_tunnelid = i;
557 }
558
559 //
560 // Go through and mark all the sessions as being defined.
561 // reset the idle timeouts.
562 // add temporary byte counters to permanent ones.
563 // Re-string the free list.
564 // Find the ID of the highest session.
565 last_free = 0;
566 high_unique_id = 0;
567 config->cluster_highest_sessionid = 0;
568 for (i = 0, count = 0; i < MAXSESSION; ++i) {
569 if (session[i].tunnel == T_UNDEF) {
570 session[i].tunnel = T_FREE;
571 ++count;
572 }
573
574 if (!session[i].opened) { // Unused session. Add to free list.
575 memset(&session[i], 0, sizeof(session[i]));
576 session[i].tunnel = T_FREE;
577 session[last_free].next = i;
578 session[i].next = 0;
579 last_free = i;
580 continue;
581 }
582
583 // Reset idle timeouts..
584 session[i].last_packet = time_now;
585
586 // Reset die relative to our uptime rather than the old master's
587 if (session[i].die) session[i].die = TIME;
588
589 // Accumulate un-sent byte counters.
590 session[i].cin += sess_local[i].cin;
591 session[i].cout += sess_local[i].cout;
592 session[i].total_cin += sess_local[i].cin;
593 session[i].total_cout += sess_local[i].cout;
594
595 sess_local[i].cin = sess_local[i].cout = 0;
596
597 session[i].radius = 0; // Reset authentication as the radius blocks aren't up to date.
598
599 if (session[i].unique_id >= high_unique_id) // This is different to the index into the session table!!!
600 high_unique_id = session[i].unique_id+1;
601
602 session[i].tbf_in = session[i].tbf_out = 0; // Remove stale pointers from old master.
603 throttle_session(i, session[i].throttle_in, session[i].throttle_out);
604
605 config->cluster_highest_sessionid = i;
606 }
607
608 session[last_free].next = 0; // End of chain.
609 last_id = high_unique_id; // Keep track of the highest used session ID.
610
611 become_master();
612
613 rebuild_address_pool();
614
615 // If we're not the very first master, this is a big issue!
616 if(count>0)
617 LOG(0, 0, 0, "Warning: Fixed %d uninitialized sessions in becoming master!\n", count);
618
619 config->cluster_undefined_sessions = 0;
620 config->cluster_undefined_tunnels = 0;
621 config->cluster_iam_uptodate = 1; // assume all peers are up-to-date
622
623 if (!num_peers) // lone master
624 advertise();
625 #ifdef BGP
626 else if (bgp_configured)
627 bgp_enable_routing(0);
628 #endif /* BGP */
629
630
631 // FIXME. We need to fix up the tunnel control message
632 // queue here! There's a number of other variables we
633 // should also update.
634 }
635
636
637 //
638 // Check that our session table is validly matching what the
639 // master has in mind.
640 //
641 // In particular, if we have too many sessions marked 'undefined'
642 // we fix it up here, and we ensure that the 'first free session'
643 // pointer is valid.
644 //
645 static void cluster_check_sessions(int highsession, int freesession_ptr, int hightunnel)
646 {
647 int i;
648
649 sessionfree = freesession_ptr; // Keep the freesession ptr valid.
650
651 if (config->cluster_iam_uptodate)
652 return;
653
654 if (highsession > config->cluster_undefined_sessions && hightunnel > config->cluster_undefined_tunnels)
655 return;
656
657 // Clear out defined sessions, counting the number of
658 // undefs remaining.
659 config->cluster_undefined_sessions = 0;
660 for (i = 1 ; i < MAXSESSION; ++i) {
661 if (i > highsession) {
662 if (session[i].tunnel == T_UNDEF) session[i].tunnel = T_FREE; // Defined.
663 continue;
664 }
665
666 if (session[i].tunnel == T_UNDEF)
667 ++config->cluster_undefined_sessions;
668 }
669
670 // Clear out defined tunnels, counting the number of
671 // undefs remaining.
672 config->cluster_undefined_tunnels = 0;
673 for (i = 1 ; i < MAXTUNNEL; ++i) {
674 if (i > hightunnel) {
675 if (tunnel[i].state == TUNNELUNDEF) tunnel[i].state = TUNNELFREE; // Defined.
676 continue;
677 }
678
679 if (tunnel[i].state == TUNNELUNDEF)
680 ++config->cluster_undefined_tunnels;
681 }
682
683
684 if (config->cluster_undefined_sessions || config->cluster_undefined_tunnels) {
685 LOG(2, 0, 0, "Cleared undefined sessions/tunnels. %d sess (high %d), %d tunn (high %d)\n",
686 config->cluster_undefined_sessions, highsession, config->cluster_undefined_tunnels, hightunnel);
687 return;
688 }
689
690 // Are we up to date?
691
692 if (!config->cluster_iam_uptodate)
693 cluster_uptodate();
694 }
695
696 static int hb_add_type(char **p, int type, int id)
697 {
698 switch (type) {
699 case C_CSESSION: { // Compressed C_SESSION.
700 uint8_t c[sizeof(sessiont) * 2]; // Bigger than worst case.
701 uint8_t *d = (uint8_t *) &session[id];
702 uint8_t *orig = d;
703 int size;
704
705 size = rle_compress( &d, sizeof(sessiont), c, sizeof(c) );
706
707 // Did we compress the full structure, and is the size actually
708 // reduced??
709 if ( (d - orig) == sizeof(sessiont) && size < sizeof(sessiont) ) {
710 add_type(p, C_CSESSION, id, (char *) c, size);
711 break;
712 }
713 // Failed to compress : Fall through.
714 }
715 case C_SESSION: add_type(p, C_SESSION, id,
716 (char *) &session[id], sizeof(sessiont));
717 break;
718
719 case C_CTUNNEL: { // Compressed C_TUNNEL
720 uint8_t c[sizeof(tunnelt) * 2]; // Bigger than worst case.
721 uint8_t *d = (uint8_t *) &tunnel[id];
722 uint8_t *orig = d;
723 int size;
724
725 size = rle_compress( &d, sizeof(tunnelt), c, sizeof(c) );
726
727 // Did we compress the full structure, and is the size actually
728 // reduced??
729 if ( (d - orig) == sizeof(tunnelt) && size < sizeof(tunnelt) ) {
730 add_type(p, C_CTUNNEL, id, c, size);
731 break;
732 }
733 // Failed to compress : Fall through.
734 }
735 case C_TUNNEL: add_type(p, C_TUNNEL, id,
736 (char *) &tunnel[id], sizeof(tunnelt));
737 break;
738 default:
739 LOG(0, 0, 0, "Found an invalid type in heart queue! (%d)\n", type);
740 kill(0, SIGTERM);
741 exit(1);
742 }
743 return 0;
744 }
745
746 //
747 // Send a heartbeat, incidently sending out any queued changes..
748 //
749 void cluster_heartbeat()
750 {
751 int i, count = 0, tcount = 0;
752 char buff[MAX_HEART_SIZE + sizeof(heartt) + sizeof(int) ];
753 heartt h;
754 char *p = buff;
755
756 if (!config->cluster_iam_master) // Only the master does this.
757 return;
758
759 config->cluster_table_version += config->cluster_num_changes;
760
761 // Fill out the heartbeat header.
762 memset(&h, 0, sizeof(h));
763
764 h.version = HB_VERSION;
765 h.seq = config->cluster_seq_number;
766 h.basetime = basetime;
767 h.clusterid = config->bind_address; // Will this do??
768 h.basetime = basetime;
769 h.highsession = config->cluster_highest_sessionid;
770 h.freesession = sessionfree;
771 h.hightunnel = config->cluster_highest_tunnelid;
772 h.size_sess = sizeof(sessiont); // Just in case.
773 h.size_tunn = sizeof(tunnelt);
774 h.interval = config->cluster_hb_interval;
775 h.timeout = config->cluster_hb_timeout;
776 h.table_version = config->cluster_table_version;
777
778 add_type(&p, C_HEARTBEAT, HB_VERSION, (char *) &h, sizeof(h));
779
780 for (i = 0; i < config->cluster_num_changes; ++i) {
781 hb_add_type(&p, cluster_changes[i].type, cluster_changes[i].id);
782 }
783
784 if (p > (buff + sizeof(buff))) { // Did we somehow manage to overun the buffer?
785 LOG(0, 0, 0, "FATAL: Overran the heartbeat buffer! This is fatal. Exiting. (size %d)\n", (int) (p - buff));
786 kill(0, SIGTERM);
787 exit(1);
788 }
789
790 //
791 // Fill out the packet with sessions from the session table...
792 // (not forgetting to leave space so we can get some tunnels in too )
793 while ( (p + sizeof(uint32_t) * 2 + sizeof(sessiont) * 2 ) < (buff + MAX_HEART_SIZE) ) {
794
795 if (!walk_session_number) // session #0 isn't valid.
796 ++walk_session_number;
797
798 if (count >= config->cluster_highest_sessionid) // If we're a small cluster, don't go wild.
799 break;
800
801 hb_add_type(&p, C_CSESSION, walk_session_number);
802 walk_session_number = (1+walk_session_number)%(config->cluster_highest_sessionid+1); // +1 avoids divide by zero.
803
804 ++count; // Count the number of extra sessions we're sending.
805 }
806
807 //
808 // Fill out the packet with tunnels from the tunnel table...
809 // This effectively means we walk the tunnel table more quickly
810 // than the session table. This is good because stuffing up a
811 // tunnel is a much bigger deal than stuffing up a session.
812 //
813 while ( (p + sizeof(uint32_t) * 2 + sizeof(tunnelt) ) < (buff + MAX_HEART_SIZE) ) {
814
815 if (!walk_tunnel_number) // tunnel #0 isn't valid.
816 ++walk_tunnel_number;
817
818 if (tcount >= config->cluster_highest_tunnelid)
819 break;
820
821 hb_add_type(&p, C_CTUNNEL, walk_tunnel_number);
822 walk_tunnel_number = (1+walk_tunnel_number)%(config->cluster_highest_tunnelid+1); // +1 avoids divide by zero.
823
824 ++tcount;
825 }
826
827 //
828 // Did we do something wrong?
829 if (p > (buff + sizeof(buff))) { // Did we somehow manage to overun the buffer?
830 LOG(0, 0, 0, "Overran the heartbeat buffer now! This is fatal. Exiting. (size %d)\n", (int) (p - buff));
831 kill(0, SIGTERM);
832 exit(1);
833 }
834
835 LOG(3, 0, 0, "Sending v%d heartbeat #%d, change #%" PRIu64 " with %d changes "
836 "(%d x-sess, %d x-tunnels, %d highsess, %d hightun, size %d)\n",
837 HB_VERSION, h.seq, h.table_version, config->cluster_num_changes,
838 count, tcount, config->cluster_highest_sessionid,
839 config->cluster_highest_tunnelid, (int) (p - buff));
840
841 config->cluster_num_changes = 0;
842
843 send_heartbeat(h.seq, buff, (p-buff) ); // Send out the heartbeat to the cluster, keeping a copy of it.
844
845 config->cluster_seq_number = (config->cluster_seq_number+1)%HB_MAX_SEQ; // Next seq number to use.
846 }
847
848 //
849 // A structure of type 'type' has changed; Add it to the queue to send.
850 //
851 static int type_changed(int type, int id)
852 {
853 int i;
854
855 for (i = 0 ; i < config->cluster_num_changes ; ++i)
856 if ( cluster_changes[i].id == id &&
857 cluster_changes[i].type == type)
858 return 0; // Already marked for change.
859
860 cluster_changes[i].type = type;
861 cluster_changes[i].id = id;
862 ++config->cluster_num_changes;
863
864 if (config->cluster_num_changes > MAX_CHANGES)
865 cluster_heartbeat(); // flush now
866
867 return 1;
868 }
869
870
871 // A particular session has been changed!
872 int cluster_send_session(int sid)
873 {
874 if (!config->cluster_iam_master) {
875 LOG(0, sid, 0, "I'm not a master, but I just tried to change a session!\n");
876 return -1;
877 }
878
879 return type_changed(C_CSESSION, sid);
880 }
881
882 // A particular tunnel has been changed!
883 int cluster_send_tunnel(int tid)
884 {
885 if (!config->cluster_iam_master) {
886 LOG(0, 0, tid, "I'm not a master, but I just tried to change a tunnel!\n");
887 return -1;
888 }
889
890 return type_changed(C_CTUNNEL, tid);
891 }
892
893
894 //
895 // We're a master, and a slave has just told us that it's
896 // missed a packet. We'll resend it every packet since
897 // the last one it's seen.
898 //
899 static int cluster_catchup_slave(int seq, in_addr_t slave)
900 {
901 int s;
902 int diff;
903
904 LOG(1, 0, 0, "Slave %s sent LASTSEEN with seq %d\n", fmtaddr(slave, 0), seq);
905 if (!config->cluster_iam_master) {
906 LOG(1, 0, 0, "Got LASTSEEN but I'm not a master! Sending a null PING.\n");
907 // Send a ping to the stray slave saying that we're a master that's
908 // just shutdown. This should force the slave to listen for the real
909 // master.
910 peer_send_message(slave, C_PING, 0, NULL, 0);
911 return 0;
912 }
913
914 diff = config->cluster_seq_number - seq; // How many packet do we need to send?
915 if (diff < 0)
916 diff += HB_MAX_SEQ;
917
918 if (diff >= HB_HISTORY_SIZE) { // Ouch. We don't have the packet to send it!
919 LOG(0, 0, 0, "A slave asked for message %d when our seq number is %d. Killing it.\n",
920 seq, config->cluster_seq_number);
921 return peer_send_message(slave, C_KILL, seq, NULL, 0);// Kill the slave. Nothing else to do.
922 }
923
924 LOG(1, 0, 0, "Sending %d catchup packets to slave %s\n", diff, fmtaddr(slave, 0) );
925
926 // Now resend every packet that it missed, in order.
927 while (seq != config->cluster_seq_number) {
928 s = seq % HB_HISTORY_SIZE;
929 if (seq != past_hearts[s].seq) {
930 LOG(0, 0, 0, "Tried to re-send heartbeat for %s but %d doesn't match %d! (%d,%d)\n",
931 fmtaddr(slave, 0), seq, past_hearts[s].seq, s, config->cluster_seq_number);
932 return -1; // What to do here!?
933 }
934 peer_send_data(slave, past_hearts[s].data, past_hearts[s].size);
935 seq = (seq+1)%HB_MAX_SEQ; // Increment to next seq number.
936 }
937 return 0; // All good!
938 }
939
940 //
941 // We've heard from another peer! Add it to the list
942 // that we select from at election time.
943 //
944 static int cluster_add_peer(in_addr_t peer, time_t basetime, pingt *pp, int size)
945 {
946 int i;
947 in_addr_t clusterid;
948 pingt p;
949
950 // Allow for backward compatability.
951 // Just the ping packet into a new structure to allow
952 // for the possibility that we might have received
953 // more or fewer elements than we were expecting.
954 if (size > sizeof(p))
955 size = sizeof(p);
956
957 memset( (void *) &p, 0, sizeof(p) );
958 memcpy( (void *) &p, (void *) pp, size);
959
960 clusterid = p.addr;
961 if (clusterid != config->bind_address)
962 {
963 // Is this for us?
964 LOG(4, 0, 0, "Skipping ping from %s (different cluster)\n", fmtaddr(peer, 0));
965 return 0;
966 }
967
968 for (i = 0; i < num_peers ; ++i)
969 {
970 if (peers[i].peer != peer)
971 continue;
972
973 // This peer already exists. Just update the timestamp.
974 peers[i].basetime = basetime;
975 peers[i].timestamp = TIME;
976 peers[i].uptodate = !p.undef;
977 break;
978 }
979
980 // Is this the master shutting down??
981 if (peer == config->cluster_master_address && !basetime) {
982 LOG(3, 0, 0, "Master %s shutting down...\n", fmtaddr(config->cluster_master_address, 0));
983 config->cluster_master_address = 0;
984 config->cluster_last_hb = 0; // Force an election.
985 cluster_check_master();
986 return 0;
987 }
988
989 if (i >= num_peers)
990 {
991 LOG(4, 0, 0, "Adding %s as a peer\n", fmtaddr(peer, 0));
992
993 // Not found. Is there a stale slot to re-use?
994 for (i = 0; i < num_peers ; ++i)
995 {
996 if (!peers[i].basetime) // Shutdown
997 break;
998
999 if ((peers[i].timestamp + config->cluster_hb_timeout * 10) < TIME) // Stale.
1000 break;
1001 }
1002
1003 if (i >= CLUSTER_MAX_SIZE)
1004 {
1005 // Too many peers!!
1006 LOG(0, 0, 0, "Tried to add %s as a peer, but I already have %d of them!\n", fmtaddr(peer, 0), i);
1007 return -1;
1008 }
1009
1010 peers[i].peer = peer;
1011 peers[i].basetime = basetime;
1012 peers[i].timestamp = TIME;
1013 peers[i].uptodate = !p.undef;
1014 if (i == num_peers)
1015 ++num_peers;
1016
1017 LOG(1, 0, 0, "Added %s as a new peer. Now %d peers\n", fmtaddr(peer, 0), num_peers);
1018 }
1019
1020 return 1;
1021 }
1022
1023 /* Handle the slave updating the byte counters for the master. */
1024 //
1025 // Note that we don't mark the session as dirty; We rely on
1026 // the slow table walk to propogate this back out to the slaves.
1027 //
1028 static int cluster_handle_bytes(char *data, int size)
1029 {
1030 bytest *b;
1031
1032 b = (bytest *) data;
1033
1034 LOG(3, 0, 0, "Got byte counter update (size %d)\n", size);
1035
1036 /* Loop around, adding the byte
1037 counts to each of the sessions. */
1038
1039 while (size >= sizeof(*b) ) {
1040 if (b->sid > MAXSESSION) {
1041 LOG(0, 0, 0, "Got C_BYTES with session #%d!\n", b->sid);
1042 return -1; /* Abort processing */
1043 }
1044
1045 session[b->sid].total_cin += b->in;
1046 session[b->sid].total_cout += b->out;
1047
1048 session[b->sid].cin += b->in;
1049 session[b->sid].cout += b->out;
1050
1051 if (b->in)
1052 session[b->sid].last_packet = time_now; // Reset idle timer!
1053
1054 size -= sizeof(*b);
1055 ++b;
1056 }
1057
1058 if (size != 0)
1059 LOG(0, 0, 0, "Got C_BYTES with %d bytes of trailing junk!\n", size);
1060
1061 return size;
1062 }
1063
1064 //
1065 // Handle receiving a session structure in a heartbeat packet.
1066 //
1067 static int cluster_recv_session(int more, uint8_t *p)
1068 {
1069 if (more >= MAXSESSION) {
1070 LOG(0, 0, 0, "DANGER: Received a heartbeat session id > MAXSESSION!\n");
1071 return -1;
1072 }
1073
1074 if (session[more].tunnel == T_UNDEF) {
1075 if (config->cluster_iam_uptodate) { // Sanity.
1076 LOG(0, 0, 0, "I thought I was uptodate but I just found an undefined session!\n");
1077 } else {
1078 --config->cluster_undefined_sessions;
1079 }
1080 }
1081
1082 load_session(more, (sessiont *) p); // Copy session into session table..
1083
1084 LOG(5, more, 0, "Received session update (%d undef)\n", config->cluster_undefined_sessions);
1085
1086 if (!config->cluster_iam_uptodate)
1087 cluster_uptodate(); // Check to see if we're up to date.
1088
1089 return 0;
1090 }
1091
1092 static int cluster_recv_tunnel(int more, uint8_t *p)
1093 {
1094 if (more >= MAXTUNNEL) {
1095 LOG(0, 0, 0, "DANGER: Received a tunnel session id > MAXTUNNEL!\n");
1096 return -1;
1097 }
1098
1099 if (tunnel[more].state == TUNNELUNDEF) {
1100 if (config->cluster_iam_uptodate) { // Sanity.
1101 LOG(0, 0, 0, "I thought I was uptodate but I just found an undefined tunnel!\n");
1102 } else {
1103 --config->cluster_undefined_tunnels;
1104 }
1105 }
1106
1107 memcpy(&tunnel[more], p, sizeof(tunnel[more]) );
1108
1109 //
1110 // Clear tunnel control messages. These are dynamically allocated.
1111 // If we get unlucky, this may cause the tunnel to drop!
1112 //
1113 tunnel[more].controls = tunnel[more].controle = NULL;
1114 tunnel[more].controlc = 0;
1115
1116 LOG(5, 0, more, "Received tunnel update\n");
1117
1118 if (!config->cluster_iam_uptodate)
1119 cluster_uptodate(); // Check to see if we're up to date.
1120
1121 return 0;
1122 }
1123
1124
1125 //
1126 // Process a heartbeat..
1127 //
1128 // v3: added interval, timeout
1129 // v4: added table_version
1130 static int cluster_process_heartbeat(uint8_t *data, int size, int more, uint8_t *p, in_addr_t addr)
1131 {
1132 heartt *h;
1133 int s = size - (p-data);
1134 int i, type;
1135
1136 #if HB_VERSION != 4
1137 # error "need to update cluster_process_heartbeat()"
1138 #endif
1139
1140 // we handle versions 3 through 4
1141 if (more < 3 || more > HB_VERSION) {
1142 LOG(0, 0, 0, "Received a heartbeat version that I don't support (%d)!\n", more);
1143 return -1; // Ignore it??
1144 }
1145
1146 // Ok. It's a heartbeat packet from a cluster master!
1147 if (s < sizeof(*h))
1148 goto shortpacket;
1149
1150 h = (heartt *) p;
1151 p += sizeof(*h);
1152 s -= sizeof(*h);
1153
1154 if (h->clusterid != config->bind_address)
1155 return -1; // It's not part of our cluster.
1156
1157 if (config->cluster_iam_master) { // Sanity...
1158 // Note that this MUST match the election process above!
1159
1160 LOG(0, 0, 0, "I just got a heartbeat from master %s, but _I_ am the master!\n", fmtaddr(addr, 0));
1161 if (!h->basetime) {
1162 LOG(0, 0, 0, "Heartbeat with zero basetime! Ignoring\n");
1163 return -1; // Skip it.
1164 }
1165
1166 if (more >= 4) {
1167 if (h->table_version > config->cluster_table_version) {
1168 LOG(0, 0, 0, "They've seen more state changes (%" PRIu64 " vs my %" PRIu64 ") so I'm gone!\n",
1169 h->table_version, config->cluster_table_version);
1170
1171 kill(0, SIGTERM);
1172 exit(1);
1173 }
1174 if (h->table_version < config->cluster_table_version)
1175 return -1;
1176 }
1177
1178 if (basetime > h->basetime) {
1179 LOG(0, 0, 0, "They're an older master than me so I'm gone!\n");
1180 kill(0, SIGTERM);
1181 exit(1);
1182 }
1183
1184 if (basetime < h->basetime)
1185 return -1;
1186
1187 if (my_address < addr) { // Tie breaker.
1188 LOG(0, 0, 0, "They're a higher IP address than me, so I'm gone!\n");
1189 kill(0, SIGTERM);
1190 exit(1);
1191 }
1192
1193 //
1194 // Send it a unicast heartbeat to see give it a chance to die.
1195 // NOTE: It's actually safe to do seq-number - 1 without checking
1196 // for wrap around.
1197 //
1198 cluster_catchup_slave(config->cluster_seq_number - 1, addr);
1199
1200 return -1; // Skip it.
1201 }
1202
1203 //
1204 // Try and guard against a stray master appearing.
1205 //
1206 // Ignore heartbeats received from another master before the
1207 // timeout (less a smidgen) for the old master has elapsed.
1208 //
1209 // Note that after a clean failover, the cluster_master_address
1210 // is cleared, so this doesn't run.
1211 //
1212 if (config->cluster_master_address && addr != config->cluster_master_address
1213 && (config->cluster_last_hb + config->cluster_hb_timeout - 11) > TIME) {
1214 LOG(0, 0, 0, "Ignoring stray heartbeat from %s, current master %s has not yet timed out (last heartbeat %.1f seconds ago).\n",
1215 fmtaddr(addr, 0), fmtaddr(config->cluster_master_address, 1),
1216 0.1 * (TIME - config->cluster_last_hb));
1217 return -1; // ignore
1218 }
1219
1220 if (config->cluster_seq_number == -1) // Don't have one. Just align to the master...
1221 config->cluster_seq_number = h->seq;
1222
1223 config->cluster_last_hb = TIME; // Reset to ensure that we don't become master!!
1224
1225 if (config->cluster_seq_number != h->seq) { // Out of sequence heartbeat!
1226 static int lastseen_seq = 0;
1227 static time_t lastseen_time = 0;
1228
1229 // limit to once per second for a particular seq#
1230 int ask = (config->cluster_seq_number != lastseen_seq || time_now != lastseen_time);
1231
1232 LOG(1, 0, 0, "HB: Got seq# %d but was expecting %d. %s.\n",
1233 h->seq, config->cluster_seq_number,
1234 ask ? "Asking for resend" : "Ignoring");
1235
1236 if (ask)
1237 {
1238 lastseen_seq = config->cluster_seq_number;
1239 lastseen_time = time_now;
1240 peer_send_message(addr, C_LASTSEEN, config->cluster_seq_number, NULL, 0);
1241 }
1242
1243 config->cluster_last_hb = TIME; // Reset to ensure that we don't become master!!
1244
1245 // Just drop the packet. The master will resend it as part of the catchup.
1246
1247 return 0;
1248 }
1249 // Save the packet in our buffer.
1250 // This is needed in case we become the master.
1251 config->cluster_seq_number = (h->seq+1)%HB_MAX_SEQ;
1252 i = h->seq % HB_HISTORY_SIZE;
1253 past_hearts[i].seq = h->seq;
1254 past_hearts[i].size = size;
1255 memcpy(&past_hearts[i].data, data, size); // Save it.
1256
1257
1258 // Check that we don't have too many undefined sessions, and
1259 // that the free session pointer is correct.
1260 cluster_check_sessions(h->highsession, h->freesession, h->hightunnel);
1261
1262 if (h->interval != config->cluster_hb_interval)
1263 {
1264 LOG(2, 0, 0, "Master set ping/heartbeat interval to %u (was %u)\n",
1265 h->interval, config->cluster_hb_interval);
1266
1267 config->cluster_hb_interval = h->interval;
1268 }
1269
1270 if (h->timeout != config->cluster_hb_timeout)
1271 {
1272 LOG(2, 0, 0, "Master set heartbeat timeout to %u (was %u)\n",
1273 h->timeout, config->cluster_hb_timeout);
1274
1275 config->cluster_hb_timeout = h->timeout;
1276 }
1277
1278 // Ok. process the packet...
1279 while ( s > 0) {
1280
1281 type = *((uint32_t *) p);
1282 p += sizeof(uint32_t);
1283 s -= sizeof(uint32_t);
1284
1285 more = *((uint32_t *) p);
1286 p += sizeof(uint32_t);
1287 s -= sizeof(uint32_t);
1288
1289 switch (type) {
1290 case C_CSESSION: { // Compressed session structure.
1291 uint8_t c[ sizeof(sessiont) + 2];
1292 int size;
1293 uint8_t *orig_p = p;
1294
1295 size = rle_decompress((uint8_t **) &p, s, c, sizeof(c) );
1296 s -= (p - orig_p);
1297
1298 if (size != sizeof(sessiont) ) { // Ouch! Very very bad!
1299 LOG(0, 0, 0, "DANGER: Received a CSESSION that didn't decompress correctly!\n");
1300 // Now what? Should exit! No-longer up to date!
1301 break;
1302 }
1303
1304 cluster_recv_session(more, c);
1305 break;
1306 }
1307 case C_SESSION:
1308 if ( s < sizeof(session[more]))
1309 goto shortpacket;
1310
1311 cluster_recv_session(more, p);
1312
1313 p += sizeof(session[more]);
1314 s -= sizeof(session[more]);
1315 break;
1316
1317 case C_CTUNNEL: { // Compressed tunnel structure.
1318 uint8_t c[ sizeof(tunnelt) + 2];
1319 int size;
1320 uint8_t *orig_p = p;
1321
1322 size = rle_decompress((uint8_t **) &p, s, c, sizeof(c));
1323 s -= (p - orig_p);
1324
1325 if (size != sizeof(tunnelt) ) { // Ouch! Very very bad!
1326 LOG(0, 0, 0, "DANGER: Received a CSESSION that didn't decompress correctly!\n");
1327 // Now what? Should exit! No-longer up to date!
1328 break;
1329 }
1330
1331 cluster_recv_tunnel(more, c);
1332 break;
1333
1334 }
1335 case C_TUNNEL:
1336 if ( s < sizeof(tunnel[more]))
1337 goto shortpacket;
1338
1339 cluster_recv_tunnel(more, p);
1340
1341 p += sizeof(tunnel[more]);
1342 s -= sizeof(tunnel[more]);
1343 break;
1344 default:
1345 LOG(0, 0, 0, "DANGER: I received a heartbeat element where I didn't understand the type! (%d)\n", type);
1346 return -1; // can't process any more of the packet!!
1347 }
1348 }
1349
1350 if (config->cluster_master_address != addr)
1351 {
1352 LOG(0, 0, 0, "My master just changed from %s to %s!\n",
1353 fmtaddr(config->cluster_master_address, 0), fmtaddr(addr, 1));
1354
1355 config->cluster_master_address = addr;
1356 }
1357
1358 config->cluster_last_hb = TIME; // Successfully received a heartbeat!
1359 config->cluster_table_version = h->table_version;
1360 return 0;
1361
1362 shortpacket:
1363 LOG(0, 0, 0, "I got an incomplete heartbeat packet! This means I'm probably out of sync!!\n");
1364 return -1;
1365 }
1366
1367 //
1368 // We got a packet on the cluster port!
1369 // Handle pings, lastseens, and heartbeats!
1370 //
1371 int processcluster(char *data, int size, in_addr_t addr)
1372 {
1373 int type, more;
1374 char *p = data;
1375 int s = size;
1376
1377 if (addr == my_address)
1378 return -1; // Ignore it. Something looped back the multicast!
1379
1380 LOG(5, 0, 0, "Process cluster: %d bytes from %s\n", size, fmtaddr(addr, 0));
1381
1382 if (s <= 0) // Any data there??
1383 return -1;
1384
1385 if (s < 8)
1386 goto shortpacket;
1387
1388 type = *((uint32_t *) p);
1389 p += sizeof(uint32_t);
1390 s -= sizeof(uint32_t);
1391
1392 more = *((uint32_t *) p);
1393 p += sizeof(uint32_t);
1394 s -= sizeof(uint32_t);
1395
1396 switch (type) {
1397 case C_PING: // Update the peers table.
1398 return cluster_add_peer(addr, more, (pingt *) p, s);
1399
1400 case C_LASTSEEN: // Catch up a slave (slave missed a packet).
1401 return cluster_catchup_slave(more, addr);
1402
1403 case C_FORWARD: { // Forwarded control packet. pass off to processudp.
1404 struct sockaddr_in a;
1405 a.sin_addr.s_addr = more;
1406
1407 a.sin_port = *(int *) p;
1408 s -= sizeof(int);
1409 p += sizeof(int);
1410
1411 if (!config->cluster_iam_master) { // huh?
1412 LOG(0, 0, 0, "I'm not the master, but I got a C_FORWARD from %s?\n", fmtaddr(addr, 0));
1413 return -1;
1414 }
1415
1416 LOG(4, 0, 0, "Got a forwarded packet... (%s:%d)\n", fmtaddr(more, 0), a.sin_port);
1417 STAT(recv_forward);
1418 processudp(p, s, &a);
1419 return 0;
1420 }
1421 case C_THROTTLE: { // Receive a forwarded packet from a slave.
1422 if (!config->cluster_iam_master) {
1423 LOG(0, 0, 0, "I'm not the master, but I got a C_THROTTLE from %s?\n", fmtaddr(addr, 0));
1424 return -1;
1425 }
1426
1427 tbf_queue_packet(more, p, s); // The TBF id tells wether it goes in or out.
1428 return 0;
1429 }
1430 case C_GARDEN:
1431 // Receive a walled garden packet from a slave.
1432 if (!config->cluster_iam_master) {
1433 LOG(0, 0, 0, "I'm not the master, but I got a C_GARDEN from %s?\n", fmtaddr(addr, 0));
1434 return -1;
1435 }
1436
1437 tun_write(p, s);
1438 return 0;
1439
1440 case C_BYTES:
1441 return cluster_handle_bytes(p, s);
1442
1443 case C_KILL: // The master asked us to die!? (usually because we're too out of date).
1444 if (config->cluster_iam_master) {
1445 LOG(0, 0, 0, "_I_ am master, but I received a C_KILL from %s! (Seq# %d)\n", fmtaddr(addr, 0), more);
1446 return -1;
1447 }
1448 if (more != config->cluster_seq_number) {
1449 LOG(0, 0, 0, "The master asked us to die but the seq number didn't match!?\n");
1450 return -1;
1451 }
1452
1453 if (addr != config->cluster_master_address) {
1454 LOG(0, 0, 0, "Received a C_KILL from %s which doesn't match config->cluster_master_address (%s)\n",
1455 fmtaddr(addr, 0), fmtaddr(config->cluster_master_address, 1));
1456 // We can only warn about it. The master might really have switched!
1457 }
1458
1459 LOG(0, 0, 0, "Received a valid C_KILL: I'm going to die now.\n");
1460 kill(0, SIGTERM);
1461 exit(0); // Lets be paranoid;
1462 return -1; // Just signalling the compiler.
1463
1464 case C_HEARTBEAT:
1465 LOG(4, 0, 0, "Got a heartbeat from %s\n", fmtaddr(addr, 0));
1466 return cluster_process_heartbeat(data, size, more, p, addr);
1467
1468 default:
1469 LOG(0, 0, 0, "Strange type packet received on cluster socket (%d)\n", type);
1470 return -1;
1471 }
1472 return 0;
1473
1474 shortpacket:
1475 LOG(0, 0, 0, "I got a _short_ cluster heartbeat packet! This means I'm probably out of sync!!\n");
1476 return -1;
1477 }
1478
1479 //====================================================================================================
1480
1481 int cmd_show_cluster(struct cli_def *cli, char *command, char **argv, int argc)
1482 {
1483 int i;
1484
1485 if (CLI_HELP_REQUESTED)
1486 return CLI_HELP_NO_ARGS;
1487
1488 cli_print(cli, "Cluster status : %s", config->cluster_iam_master ? "Master" : "Slave" );
1489 cli_print(cli, "My address : %s", fmtaddr(my_address, 0));
1490 cli_print(cli, "VIP address : %s", fmtaddr(config->bind_address, 0));
1491 cli_print(cli, "Multicast address: %s", fmtaddr(config->cluster_address, 0));
1492 cli_print(cli, "Multicast i'face : %s", config->cluster_interface);
1493
1494 if (!config->cluster_iam_master) {
1495 cli_print(cli, "My master : %s (last heartbeat %.1f seconds old)",
1496 config->cluster_master_address
1497 ? fmtaddr(config->cluster_master_address, 0)
1498 : "Not defined",
1499 0.1 * (TIME - config->cluster_last_hb));
1500 cli_print(cli, "Uptodate : %s", config->cluster_iam_uptodate ? "Yes" : "No");
1501 cli_print(cli, "Table version # : %" PRIu64, config->cluster_table_version);
1502 cli_print(cli, "Next sequence number expected: %d", config->cluster_seq_number);
1503 cli_print(cli, "%d sessions undefined of %d", config->cluster_undefined_sessions, config->cluster_highest_sessionid);
1504 cli_print(cli, "%d tunnels undefined of %d", config->cluster_undefined_tunnels, config->cluster_highest_tunnelid);
1505 } else {
1506 cli_print(cli, "Table version # : %" PRIu64, config->cluster_table_version);
1507 cli_print(cli, "Next heartbeat # : %d", config->cluster_seq_number);
1508 cli_print(cli, "Highest session : %d", config->cluster_highest_sessionid);
1509 cli_print(cli, "Highest tunnel : %d", config->cluster_highest_tunnelid);
1510 cli_print(cli, "%d changes queued for sending", config->cluster_num_changes);
1511 }
1512 cli_print(cli, "%d peers.", num_peers);
1513
1514 if (num_peers)
1515 cli_print(cli, "%20s %10s %8s", "Address", "Basetime", "Age");
1516 for (i = 0; i < num_peers; ++i) {
1517 cli_print(cli, "%20s %10u %8d", fmtaddr(peers[i].peer, 0),
1518 peers[i].basetime, TIME - peers[i].timestamp);
1519 }
1520 return CLI_OK;
1521 }
1522
1523 //
1524 // Simple run-length-encoding compression.
1525 // Format is
1526 // 1 byte < 128 = count of non-zero bytes following. // Not legal to be zero.
1527 // n non-zero bytes;
1528 // or
1529 // 1 byte > 128 = (count - 128) run of zero bytes. //
1530 // repeat.
1531 // count == 0 indicates end of compressed stream.
1532 //
1533 // Compress from 'src' into 'dst'. return number of bytes
1534 // used from 'dst'.
1535 // Updates *src_p to indicate 1 past last bytes used.
1536 //
1537 // We could get an extra byte in the zero runs by storing (count-1)
1538 // but I'm playing it safe.
1539 //
1540 // Worst case is a 50% expansion in space required (trying to
1541 // compress { 0x00, 0x01 } * N )
1542 static int rle_compress(uint8_t **src_p, int ssize, uint8_t *dst, int dsize)
1543 {
1544 int count;
1545 int orig_dsize = dsize;
1546 uint8_t *x, *src;
1547 src = *src_p;
1548
1549 while (ssize > 0 && dsize > 2) {
1550 count = 0;
1551 x = dst++; --dsize; // Reserve space for count byte..
1552
1553 if (*src) { // Copy a run of non-zero bytes.
1554 while (*src && count < 127 && ssize > 0 && dsize > 1) { // Count number of non-zero bytes.
1555 *dst++ = *src++;
1556 --dsize; --ssize;
1557 ++count;
1558 }
1559 *x = count; // Store number of non-zero bytes. Guarenteed to be non-zero!
1560
1561 } else { // Compress a run of zero bytes.
1562 while (*src == 0 && count < 127 && ssize > 0) {
1563 ++src;
1564 --ssize;
1565 ++count;
1566 }
1567 *x = count | 0x80 ;
1568 }
1569 }
1570
1571 *dst++ = 0x0; // Add Stop byte.
1572 --dsize;
1573
1574 *src_p = src;
1575 return (orig_dsize - dsize);
1576 }
1577
1578 //
1579 // Decompress the buffer into **p.
1580 // 'psize' is the size of the decompression buffer available.
1581 //
1582 // Returns the number of bytes decompressed.
1583 //
1584 // Decompresses from '*src_p' into 'dst'.
1585 // Return the number of dst bytes used.
1586 // Updates the 'src_p' pointer to point to the
1587 // first un-used byte.
1588 static int rle_decompress(uint8_t **src_p, int ssize, uint8_t *dst, int dsize)
1589 {
1590 int count;
1591 int orig_dsize = dsize;
1592 char *src = *src_p;
1593
1594 while (ssize >0 && dsize > 0) { // While there's more to decompress, and there's room in the decompress buffer...
1595 count = *src++; --ssize; // get the count byte from the source.
1596 if (count == 0x0) // End marker reached? If so, finish.
1597 break;
1598
1599 if (count & 0x80) { // Decompress a run of zeros
1600 for (count &= 0x7f ; count > 0 && dsize > 0; --count) {
1601 *dst++ = 0x0;
1602 --dsize;
1603 }
1604 } else { // Copy run of non-zero bytes.
1605 for ( ; count > 0 && ssize && dsize; --count) { // Copy non-zero bytes across.
1606 *dst++ = *src++;
1607 --ssize; --dsize;
1608 }
1609 }
1610 }
1611 *src_p = src;
1612 return (orig_dsize - dsize);
1613 }