clean test dir
[l2tpns.git] / cluster.c
1 // L2TPNS Clustering Stuff
2
3 char const *cvs_id_cluster = "$Id: cluster.c,v 1.15 2004-11-02 04:35:03 bodea Exp $";
4
5 #include <stdio.h>
6 #include <sys/file.h>
7 #include <sys/stat.h>
8 #include <sys/socket.h>
9 #include <netinet/in.h>
10 #include <arpa/inet.h>
11 #include <sys/ioctl.h>
12 #include <net/if.h>
13 #include <string.h>
14 #include <malloc.h>
15 #include <errno.h>
16 #include <stdlib.h>
17 #include <stdarg.h>
18 #include <unistd.h>
19 #include <stdio.h>
20 #include <libcli.h>
21
22 #include "l2tpns.h"
23 #include "cluster.h"
24 #include "util.h"
25 #include "tbf.h"
26
27 #ifdef BGP
28 #include "bgp.h"
29 #endif
30 /*
31 * All cluster packets have the same format.
32 *
33 * One or more instances of
34 * a 32 bit 'type' id.
35 * a 32 bit 'extra' data dependant on the 'type'.
36 * zero or more bytes of structure data, dependant on the type.
37 *
38 */
39
40 // Module variables.
41 int cluster_sockfd = 0; // The filedescriptor for the cluster communications port.
42
43 ipt my_address = 0; // The network address of my ethernet port.
44 static int walk_session_number = 0; // The next session to send when doing the slow table walk.
45 static int walk_tunnel_number = 0; // The next tunnel to send when doing the slow table walk.
46
47 #define MAX_HEART_SIZE (8192) // Maximum size of heartbeat packet. Must be less than max IP packet size :)
48 #define MAX_CHANGES (MAX_HEART_SIZE/(sizeof(sessiont) + sizeof(int) ) - 2) // Assumes a session is the biggest type!
49
50 static struct {
51 int type;
52 int id;
53 } cluster_changes[MAX_CHANGES]; // Queue of changed structures that need to go out when next heartbeat.
54
55 static struct {
56 int seq;
57 int size;
58 char data[MAX_HEART_SIZE];
59 } past_hearts[HB_HISTORY_SIZE]; // Ring buffer of heartbeats that we've recently sent out. Needed so
60 // we can re-transmit if needed.
61
62 static struct {
63 u32 peer;
64 time_t basetime;
65 clockt timestamp;
66 int uptodate;
67 } peers[CLUSTER_MAX_SIZE]; // List of all the peers we've heard from.
68 static int num_peers; // Number of peers in list.
69
70 int rle_decompress(u8 ** src_p, int ssize, u8 *dst, int dsize);
71 int rle_compress(u8 ** src_p, int ssize, u8 *dst, int dsize);
72
73 //
74 // Create a listening socket
75 //
76 // This joins the cluster multi-cast group.
77 //
78 int cluster_init()
79 {
80 struct sockaddr_in addr;
81 struct sockaddr_in interface_addr;
82 struct ip_mreq mreq;
83 struct ifreq ifr;
84 int opt = 0;
85
86 config->cluster_undefined_sessions = MAXSESSION-1;
87 config->cluster_undefined_tunnels = MAXTUNNEL-1;
88
89 if (!config->cluster_address)
90 return 0;
91 if (!*config->cluster_interface)
92 return 0;
93
94 cluster_sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
95
96 memset(&addr, 0, sizeof(addr));
97 addr.sin_family = AF_INET;
98 addr.sin_port = htons(CLUSTERPORT);
99 addr.sin_addr.s_addr = INADDR_ANY;
100 setsockopt(cluster_sockfd, SOL_SOCKET, SO_REUSEADDR, &addr, sizeof(addr));
101
102 if (bind(cluster_sockfd, (void *) &addr, sizeof(addr)) < 0)
103 {
104 log(0, 0, 0, 0, "Failed to bind cluster socket: %s\n", strerror(errno));
105 return -1;
106 }
107
108 strcpy(ifr.ifr_name, config->cluster_interface);
109 if (ioctl(cluster_sockfd, SIOCGIFADDR, &ifr) < 0)
110 {
111 log(0, 0, 0, 0, "Failed to get interface address for (%s): %s\n", config->cluster_interface, strerror(errno));
112 return -1;
113 }
114
115 memcpy(&interface_addr, &ifr.ifr_addr, sizeof(interface_addr));
116 my_address = interface_addr.sin_addr.s_addr;
117
118 // Join multicast group.
119 mreq.imr_multiaddr.s_addr = config->cluster_address;
120 mreq.imr_interface = interface_addr.sin_addr;
121
122
123 opt = 0; // Turn off multicast loopback.
124 setsockopt(cluster_sockfd, IPPROTO_IP, IP_MULTICAST_LOOP, &opt, sizeof(opt));
125
126 if (setsockopt(cluster_sockfd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0)
127 {
128 log(0, 0, 0, 0, "Failed to setsockopt (join mcast group): %s\n", strerror(errno));
129 return -1;
130 }
131
132 if (setsockopt (cluster_sockfd, IPPROTO_IP, IP_MULTICAST_IF, &interface_addr, sizeof(interface_addr)) < 0)
133 {
134 log(0, 0, 0, 0, "Failed to setsockopt (set mcast interface): %s\n", strerror(errno));
135 return -1;
136 }
137
138 config->cluster_last_hb = TIME;
139 config->cluster_seq_number = -1;
140
141 return cluster_sockfd;
142 }
143
144
145 //
146 // Send a chunk of data to the entire cluster (usually via the multicast
147 // address ).
148 //
149
150 int cluster_send_data(void *data, int datalen)
151 {
152 struct sockaddr_in addr = {0};
153
154 if (!cluster_sockfd) return -1;
155 if (!config->cluster_address) return 0;
156
157 addr.sin_addr.s_addr = config->cluster_address;
158 addr.sin_port = htons(CLUSTERPORT);
159 addr.sin_family = AF_INET;
160
161 log(5,0,0,0, "Cluster send data: %d bytes\n", datalen);
162
163 if (sendto(cluster_sockfd, data, datalen, MSG_NOSIGNAL, (void *) &addr, sizeof(addr)) < 0)
164 {
165 log(0, 0, 0, 0, "sendto: %s\n", strerror(errno));
166 return -1;
167 }
168
169 return 0;
170 }
171
172 //
173 // Add a chunk of data to a heartbeat packet.
174 // Maintains the format. Assumes that the caller
175 // has passed in a big enough buffer!
176 //
177 static void add_type(char ** p, int type, int more, char * data, int size)
178 {
179 * ( (u32*)(*p) ) = type;
180 *p += sizeof(u32);
181
182 * ( (u32*)(*p) ) = more;
183 *p += sizeof(u32);
184
185 if (data && size > 0) {
186 memcpy(*p, data, size);
187 (*p) += size;
188 }
189 }
190
191 void cluster_uptodate(void)
192 {
193 if (config->cluster_iam_uptodate)
194 return;
195
196 if (config->cluster_undefined_sessions || config->cluster_undefined_tunnels)
197 return;
198
199 config->cluster_iam_uptodate = 1;
200
201 log(0,0,0,0, "Now uptodate with master.\n");
202
203 #ifdef BGP
204 if (bgp_configured)
205 bgp_enable_routing(1);
206 else
207 #endif /* BGP */
208 if (config->send_garp)
209 send_garp(config->bind_address); // Start taking traffic.
210 }
211
212 //
213 // Send a unicast UDP packet to a peer with 'data' as the
214 // contents.
215 //
216 int peer_send_data(u32 peer, char * data, int size)
217 {
218 struct sockaddr_in addr = {0};
219
220 if (!cluster_sockfd) return -1;
221 if (!config->cluster_address) return 0;
222
223 if (!peer) // Odd??
224 return -1;
225
226 addr.sin_addr.s_addr = peer;
227 addr.sin_port = htons(CLUSTERPORT);
228 addr.sin_family = AF_INET;
229
230 log_hex(5, "Peer send", data, size);
231
232 if (sendto(cluster_sockfd, data, size, MSG_NOSIGNAL, (void *) &addr, sizeof(addr)) < 0)
233 {
234 log(0, 0, 0, 0, "sendto: %s\n", strerror(errno));
235 return -1;
236 }
237
238 return 0;
239 }
240
241 //
242 // Send a structured message to a peer with a single element of type 'type'.
243 //
244 int peer_send_message(u32 peer, int type, int more, char * data, int size)
245 {
246 char buf[65536]; // Vast overkill.
247 char * p = buf;
248
249 log(4,0,0,0, "Sending message to peer (type %d, more %d, size %d)\n", type, more, size);
250 add_type(&p, type, more, data, size);
251
252 return peer_send_data(peer, buf, (p-buf) );
253 }
254
255 //
256 // Forward a state changing packet to the master.
257 //
258 // The master just processes the payload as if it had
259 // received it off the tun device.
260 //
261 int master_forward_packet(char *data, int size, u32 addr, int port)
262 {
263 char buf[65536]; // Vast overkill.
264 char *p = buf;
265
266 if (!config->cluster_master_address) // No election has been held yet. Just skip it.
267 return -1;
268
269 log(4,0,0,0, "Forwarding packet from %s to master (size %d)\n", inet_toa(addr), size);
270
271 STAT(c_forwarded);
272 add_type(&p, C_FORWARD, addr, (char*) &port, sizeof(port) );
273 memcpy(p, data, size);
274 p += size;
275
276 return peer_send_data(config->cluster_master_address, buf, (p-buf) );
277
278 }
279
280 //
281 // Forward a throttled packet to the master for handling.
282 //
283 // The master just drops the packet into the appropriate
284 // token bucket queue, and lets normal processing take care
285 // of it.
286 //
287 int master_throttle_packet(int tbfid, char *data, int size)
288 {
289 char buf[65536]; // Vast overkill.
290 char *p = buf;
291
292 if (!config->cluster_master_address) // No election has been held yet. Just skip it.
293 return -1;
294
295 log(4,0,0,0, "Throttling packet master (size %d, tbfid %d)\n", size, tbfid);
296
297 add_type(&p, C_THROTTLE, tbfid, data, size);
298
299 return peer_send_data(config->cluster_master_address, buf, (p-buf) );
300
301 }
302
303 //
304 // Forward a walled garden packet to the master for handling.
305 //
306 // The master just writes the packet straight to the tun
307 // device (where is will normally loop through the
308 // firewall rules, and come back in on the tun device)
309 //
310 // (Note that this must be called with the tun header
311 // as the start of the data).
312 int master_garden_packet(sessionidt s, char *data, int size)
313 {
314 char buf[65536]; // Vast overkill.
315 char *p = buf;
316
317 if (!config->cluster_master_address) // No election has been held yet. Just skip it.
318 return -1;
319
320 log(4,0,0,0, "Walled garden packet to master (size %d)\n", size);
321
322 add_type(&p, C_GARDEN, s, data, size);
323
324 return peer_send_data(config->cluster_master_address, buf, (p-buf));
325
326 }
327
328 //
329 // Send a chunk of data as a heartbeat..
330 // We save it in the history buffer as we do so.
331 //
332 static void send_heartbeat(int seq, char * data, int size)
333 {
334 int i;
335
336 if (size > sizeof(past_hearts[0].data))
337 {
338 log(0,0,0,0, "Tried to heartbeat something larger than the maximum packet!\n");
339 kill(0, SIGTERM);
340 exit(1);
341 }
342 i = seq % HB_HISTORY_SIZE;
343 past_hearts[i].seq = seq;
344 past_hearts[i].size = size;
345 memcpy(&past_hearts[i].data, data, size); // Save it.
346 cluster_send_data(data, size);
347 }
348
349 //
350 // Send an 'i am alive' message to every machine in the cluster.
351 //
352 void cluster_send_ping(time_t basetime)
353 {
354 char buff[100 + sizeof(pingt)];
355 char *p = buff;
356 pingt x;
357
358 if (config->cluster_iam_master && basetime) // We're heartbeating so no need to ping.
359 return;
360
361 log(5,0,0,0, "Sending cluster ping...\n");
362
363 x.ver = 1;
364 x.addr = config->bind_address;
365 x.undef = config->cluster_undefined_sessions + config->cluster_undefined_tunnels;
366 x.basetime = basetime;
367
368 add_type(&p, C_PING, basetime, (char *) &x, sizeof(x));
369 cluster_send_data(buff, (p-buff) );
370 }
371
372 //
373 // Walk the session counters looking for non-zero ones to send
374 // to the master. We send up to 600 of them at one time.
375 // We examine a maximum of 3000 sessions.
376 // (50k max session should mean that we normally
377 // examine the entire session table every 25 seconds).
378
379 #define MAX_B_RECS (600)
380 void master_update_counts(void)
381 {
382 int i, c;
383 bytest b[MAX_B_RECS+1];
384
385 if (config->cluster_iam_master) // Only happens on the slaves.
386 return;
387
388 if (!config->cluster_master_address) // If we don't have a master, skip it for a while.
389 return;
390
391 i = MAX_B_RECS * 5; // Examine max 2000 sessions;
392 if (config->cluster_highest_sessionid > i)
393 i = config->cluster_highest_sessionid;
394
395 for ( c = 0; i > 0 ; --i) {
396 // Next session to look at.
397 walk_session_number++;
398 if ( walk_session_number > config->cluster_highest_sessionid)
399 walk_session_number = 1;
400
401 if (!sess_count[walk_session_number].cin && !sess_count[walk_session_number].cout)
402 continue; // Unused. Skip it.
403
404 b[c].sid = walk_session_number;
405 b[c].in = sess_count[walk_session_number].cin;
406 b[c].out = sess_count[walk_session_number].cout;
407
408 if (++c > MAX_B_RECS) // Send a max of 400 elements in a packet.
409 break;
410
411 // Reset counters.
412 sess_count[walk_session_number].cin = sess_count[walk_session_number].cout = 0;
413 }
414
415 if (!c) // Didn't find any that changes. Get out of here!
416 return;
417
418
419 // Forward the data to the master.
420 log(4,0,0,0, "Sending byte counters to master (%d elements)\n", c);
421 peer_send_message(config->cluster_master_address, C_BYTES, c, (char*) &b, sizeof(b[0]) * c);
422 return;
423 }
424
425 //
426 // On the master, check how our slaves are going. If
427 // one of them's not up-to-date we'll heartbeat faster.
428 // If we don't have any of them, then we need to turn
429 // on our own packet handling!
430 //
431 void cluster_check_slaves(void)
432 {
433 int i;
434 static int have_peers = 0;
435 int had_peers = have_peers;
436 clockt t = TIME;
437
438 if (!config->cluster_iam_master)
439 return; // Only runs on the master...
440
441 config->cluster_iam_uptodate = 1; // cleared in loop below
442
443 for (i = have_peers = 0; i < num_peers; i++)
444 {
445 if ((peers[i].timestamp + config->cluster_hb_timeout) < t)
446 continue; // Stale peer! Skip them.
447
448 if (!peers[i].basetime)
449 continue; // Shutdown peer! Skip them.
450
451 if (peers[i].uptodate)
452 have_peers = 1;
453
454 if (!peers[i].uptodate)
455 config->cluster_iam_uptodate = 0; // Start fast heartbeats
456 }
457
458 #ifdef BGP
459 // master lost all slaves, need to handle traffic ourself
460 if (bgp_configured && had_peers && !have_peers)
461 bgp_enable_routing(1);
462 else if (bgp_configured && !had_peers && have_peers)
463 bgp_enable_routing(0);
464 #endif /* BGP */
465 }
466
467 //
468 // Check that we have a master. If it's been too
469 // long since we heard from a master then hold an election.
470 //
471 void cluster_check_master(void)
472 {
473 int i, count, tcount, high_unique_id = 0;
474 int last_free = 0;
475 clockt t = TIME;
476 static int probed = 0;
477
478 if (config->cluster_iam_master)
479 return; // Only runs on the slaves...
480
481 // If the master is late (missed 2 hearbeats by a second and a
482 // hair) it may be that the switch has dropped us from the
483 // multicast group, try unicasting one probe to the master
484 // which will hopefully respond with a unicast heartbeat that
485 // will allow us to limp along until the querier next runs.
486 if (TIME > (config->cluster_last_hb + 2 * config->cluster_hb_interval + 11))
487 {
488 if (!probed && config->cluster_master_address)
489 {
490 probed = 1;
491 log(1, 0, 0, 0, "Heartbeat from master %.1fs late, probing...\n",
492 0.1 * (TIME - (config->cluster_last_hb + config->cluster_hb_interval)));
493
494 peer_send_message(config->cluster_master_address,
495 C_LASTSEEN, config->cluster_seq_number, NULL, 0);
496 }
497 } else { // We got a recent heartbeat; reset the probe flag.
498 probed = 0;
499 }
500
501 if (TIME < (config->cluster_last_hb + config->cluster_hb_timeout))
502 return; // Everything's ok!
503
504 config->cluster_last_hb = TIME + 1; // Just the one election thanks.
505
506 log(0,0,0,0, "Master timed out! Holding election...\n");
507
508 for (i = 0; i < num_peers; i++)
509 {
510 if ((peers[i].timestamp + config->cluster_hb_timeout) < t)
511 continue; // Stale peer! Skip them.
512
513 if (!peers[i].basetime)
514 continue; // Shutdown peer! Skip them.
515
516 if (peers[i].basetime < basetime) {
517 log(1,0,0,0, "Expecting %s to become master\n", inet_toa(peers[i].peer) );
518 return; // They'll win the election. Get out of here.
519 }
520
521 if (peers[i].basetime == basetime &&
522 peers[i].peer > my_address) {
523 log(1,0,0,0, "Expecting %s to become master\n", inet_toa(peers[i].peer) );
524 return; // They'll win the election. Wait for them to come up.
525 }
526 }
527
528 // Wow. it's been ages since I last heard a heartbeat
529 // and I'm better than an of my peers so it's time
530 // to become a master!!!
531
532 config->cluster_iam_master = 1;
533 config->cluster_master_address = 0;
534
535 log(0,0,0,0, "I am declaring myself the master!\n");
536
537 if (config->cluster_seq_number == -1)
538 config->cluster_seq_number = 0;
539
540 //
541 // Go through and mark all the tunnels as defined.
542 // Count the highest used tunnel number as well.
543 //
544 config->cluster_highest_tunnelid = 0;
545 for (i = 0, tcount = 0; i < MAXTUNNEL; ++i) {
546 if (tunnel[i].state == TUNNELUNDEF)
547 tunnel[i].state = TUNNELFREE;
548
549 if (tunnel[i].state != TUNNELFREE && i > config->cluster_highest_tunnelid)
550 config->cluster_highest_tunnelid = i;
551 }
552
553 //
554 // Go through and mark all the sessions as being defined.
555 // reset the idle timeouts.
556 // add temporary byte counters to permanent ones.
557 // Re-string the free list.
558 // Find the ID of the highest session.
559 last_free = 0;
560 high_unique_id = 0;
561 config->cluster_highest_sessionid = 0;
562 for (i = 0, count = 0; i < MAXSESSION; ++i) {
563 if (session[i].tunnel == T_UNDEF) {
564 session[i].tunnel = T_FREE;
565 ++count;
566 }
567
568 if (session[i].tunnel == T_FREE) { // Unused session. Add to free list.
569 session[last_free].next = i;
570 session[i].next = 0;
571 last_free = i;
572 }
573
574 // Reset all the idle timeouts..
575 session[i].last_packet = time_now;
576
577 // Accumulate un-sent byte counters.
578 session[i].cin += sess_count[i].cin;
579 session[i].cout += sess_count[i].cout;
580 session[i].total_cin += sess_count[i].cin;
581 session[i].total_cout += sess_count[i].cout;
582
583 sess_count[i].cin = sess_count[i].cout = 0;
584
585 session[i].radius = 0; // Reset authentication as the radius blocks aren't up to date.
586
587 if (session[i].unique_id >= high_unique_id) // This is different to the index into the session table!!!
588 high_unique_id = session[i].unique_id+1;
589
590
591 session[i].tbf_in = session[i].tbf_out = 0; // Remove stale pointers from old master.
592 throttle_session(i, session[i].throttle_in, session[i].throttle_out);
593
594 if (session[i].tunnel != T_FREE && i > config->cluster_highest_sessionid)
595 config->cluster_highest_sessionid = i;
596 }
597
598 session[last_free].next = 0; // End of chain.
599 last_id = high_unique_id; // Keep track of the highest used session ID.
600
601 become_master();
602
603 rebuild_address_pool();
604
605 // If we're not the very first master, this is a big issue!
606 if(count>0)
607 log(0,0,0,0, "Warning: Fixed %d uninitialized sessions in becoming master!\n", count);
608
609 config->cluster_undefined_sessions = 0;
610 config->cluster_undefined_tunnels = 0;
611 config->cluster_iam_uptodate = 1; // assume all peers are up-to-date
612
613 // FIXME. We need to fix up the tunnel control message
614 // queue here! There's a number of other variables we
615 // should also update.
616 }
617
618
619 //
620 // Check that our session table is validly matching what the
621 // master has in mind.
622 //
623 // In particular, if we have too many sessions marked 'undefined'
624 // we fix it up here, and we ensure that the 'first free session'
625 // pointer is valid.
626 //
627 static void cluster_check_sessions(int highsession, int freesession_ptr, int hightunnel)
628 {
629 int i;
630
631 sessionfree = freesession_ptr; // Keep the freesession ptr valid.
632
633 if (config->cluster_iam_uptodate)
634 return;
635
636 if (highsession > config->cluster_undefined_sessions && hightunnel > config->cluster_undefined_tunnels)
637 return;
638
639 // Clear out defined sessions, counting the number of
640 // undefs remaining.
641 config->cluster_undefined_sessions = 0;
642 for (i = 1 ; i < MAXSESSION; ++i) {
643 if (i > highsession) {
644 session[i].tunnel = 0; // Defined.
645 continue;
646 }
647 if (session[i].tunnel != T_UNDEF)
648 continue;
649 ++config->cluster_undefined_sessions;
650 }
651
652 // Clear out defined tunnels, counting the number of
653 // undefs remaining.
654 config->cluster_undefined_tunnels = 0;
655 for (i = 1 ; i < MAXTUNNEL; ++i) {
656 if (i > hightunnel) {
657 tunnel[i].state = TUNNELFREE; // Defined.
658 continue;
659 }
660 if (tunnel[i].state != TUNNELUNDEF)
661 continue;
662 ++config->cluster_undefined_tunnels;
663 }
664
665
666 if (config->cluster_undefined_sessions || config->cluster_undefined_tunnels) {
667 log(2,0,0,0, "Cleared undefined sessions/tunnels. %d sess (high %d), %d tunn (high %d)\n",
668 config->cluster_undefined_sessions, highsession, config->cluster_undefined_tunnels, hightunnel);
669 return;
670 }
671
672 // Are we up to date?
673
674 if (!config->cluster_iam_uptodate)
675 cluster_uptodate();
676 }
677
678 int hb_add_type(char **p, int type, int id)
679 {
680 switch (type) {
681 case C_CSESSION: { // Compressed C_SESSION.
682 u8 c[sizeof(sessiont) * 2]; // Bigger than worst case.
683 u8 *d = (u8 *) &session[id];
684 u8 *orig = d;
685 int size;
686
687 size = rle_compress( &d, sizeof(sessiont), c, sizeof(c) );
688
689 // Did we compress the full structure, and is the size actually
690 // reduced??
691 if ( (d - orig) == sizeof(sessiont) && size < sizeof(sessiont) ) {
692 add_type(p, C_CSESSION, id, (char*) c, size);
693 break;
694 }
695 // Failed to compress : Fall through.
696 }
697 case C_SESSION: add_type(p, C_SESSION, id,
698 (char*) &session[id], sizeof(sessiont));
699 break;
700
701 case C_CTUNNEL: { // Compressed C_TUNNEL
702 u8 c[sizeof(tunnelt) * 2]; // Bigger than worst case.
703 u8 *d = (u8 *) &tunnel[id];
704 u8 *orig = d;
705 int size;
706
707 size = rle_compress( &d, sizeof(tunnelt), c, sizeof(c) );
708
709 // Did we compress the full structure, and is the size actually
710 // reduced??
711 if ( (d - orig) == sizeof(tunnelt) && size < sizeof(tunnelt) ) {
712 add_type(p, C_CTUNNEL, id, c, size);
713 break;
714 }
715 // Failed to compress : Fall through.
716 }
717 case C_TUNNEL: add_type(p, C_TUNNEL, id,
718 (char*) &tunnel[id], sizeof(tunnelt));
719 break;
720 default:
721 log(0,0,0,0, "Found an invalid type in heart queue! (%d)\n", type);
722 kill(0, SIGTERM);
723 exit(1);
724 }
725 return 0;
726 }
727
728 //
729 // Send a heartbeat, incidently sending out any queued changes..
730 //
731 void cluster_heartbeat()
732 {
733 int i, count = 0, tcount = 0;
734 char buff[MAX_HEART_SIZE + sizeof(heartt) + sizeof(int) ];
735 heartt h;
736 char *p = buff;
737
738 if (!config->cluster_iam_master) // Only the master does this.
739 return;
740
741 // Fill out the heartbeat header.
742 memset(&h, 0, sizeof(h));
743
744 h.version = HB_VERSION;
745 h.seq = config->cluster_seq_number;
746 h.basetime = basetime;
747 h.clusterid = config->bind_address; // Will this do??
748 h.basetime = basetime;
749 h.highsession = config->cluster_highest_sessionid;
750 h.freesession = sessionfree;
751 h.hightunnel = config->cluster_highest_tunnelid;
752 h.size_sess = sizeof(sessiont); // Just in case.
753 h.size_tunn = sizeof(tunnelt);
754 h.interval = config->cluster_hb_interval;
755 h.timeout = config->cluster_hb_timeout;
756
757 add_type(&p, C_HEARTBEAT, HB_VERSION, (char*) &h, sizeof(h));
758
759 for (i = 0; i < config->cluster_num_changes; ++i) {
760 hb_add_type(&p, cluster_changes[i].type, cluster_changes[i].id);
761 }
762
763 if (p > (buff + sizeof(buff))) { // Did we somehow manage to overun the buffer?
764 log(0,0,0,0, "FATAL: Overran the heartbeat buffer! This is fatal. Exiting. (size %d)\n", p - buff);
765 kill(0, SIGTERM);
766 exit(1);
767 }
768
769 //
770 // Fill out the packet with sessions from the session table...
771 // (not forgetting to leave space so we can get some tunnels in too )
772 while ( (p + sizeof(u32) * 2 + sizeof(sessiont) * 2 ) < (buff + MAX_HEART_SIZE) ) {
773
774 if (!walk_session_number) // session #0 isn't valid.
775 ++walk_session_number;
776
777 if (count >= config->cluster_highest_sessionid) // If we're a small cluster, don't go wild.
778 break;
779
780 hb_add_type(&p, C_CSESSION, walk_session_number);
781 walk_session_number = (1+walk_session_number)%(config->cluster_highest_sessionid+1); // +1 avoids divide by zero.
782
783 ++count; // Count the number of extra sessions we're sending.
784 }
785
786 //
787 // Fill out the packet with tunnels from the tunnel table...
788 // This effectively means we walk the tunnel table more quickly
789 // than the session table. This is good because stuffing up a
790 // tunnel is a much bigger deal than stuffing up a session.
791 //
792 while ( (p + sizeof(u32) * 2 + sizeof(tunnelt) ) < (buff + MAX_HEART_SIZE) ) {
793
794 if (!walk_tunnel_number) // tunnel #0 isn't valid.
795 ++walk_tunnel_number;
796
797 if (tcount >= config->cluster_highest_tunnelid)
798 break;
799
800 hb_add_type(&p, C_CTUNNEL, walk_tunnel_number);
801 walk_tunnel_number = (1+walk_tunnel_number)%(config->cluster_highest_tunnelid+1); // +1 avoids divide by zero.
802
803 ++tcount;
804 }
805
806 //
807 // Did we do something wrong?
808 if (p > (buff + sizeof(buff))) { // Did we somehow manage to overun the buffer?
809 log(0,0,0,0, "Overran the heartbeat buffer now! This is fatal. Exiting. (size %d)\n", p - buff);
810 kill(0, SIGTERM);
811 exit(1);
812 }
813
814 log(3,0,0,0, "Sending heartbeat #%d with %d changes (%d x-sess, %d x-tunnels, %d highsess, %d hightun, size %d)\n",
815 h.seq, config->cluster_num_changes, count, tcount, config->cluster_highest_sessionid,
816 config->cluster_highest_tunnelid, (p-buff));
817
818 config->cluster_num_changes = 0;
819
820 send_heartbeat(h.seq, buff, (p-buff) ); // Send out the heartbeat to the cluster, keeping a copy of it.
821
822 config->cluster_seq_number = (config->cluster_seq_number+1)%HB_MAX_SEQ; // Next seq number to use.
823 }
824
825 //
826 // A structure of type 'type' has changed; Add it to the queue to send.
827 //
828 int type_changed(int type, int id)
829 {
830 int i;
831
832 for (i = 0 ; i < config->cluster_num_changes ; ++i)
833 if ( cluster_changes[i].id == id &&
834 cluster_changes[i].type == type)
835 return 0; // Already marked for change.
836
837 cluster_changes[i].type = type;
838 cluster_changes[i].id = id;
839 ++config->cluster_num_changes;
840
841 if (config->cluster_num_changes > MAX_CHANGES)
842 cluster_heartbeat(); // flush now
843
844 return 1;
845 }
846
847
848 // A particular session has been changed!
849 int cluster_send_session(int sid)
850 {
851 if (!config->cluster_iam_master) {
852 log(0,0,sid,0, "I'm not a master, but I just tried to change a session!\n");
853 return -1;
854 }
855
856 return type_changed(C_CSESSION, sid);
857 }
858
859 // A particular tunnel has been changed!
860 int cluster_send_tunnel(int tid)
861 {
862 if (!config->cluster_iam_master) {
863 log(0,0,0,tid, "I'm not a master, but I just tried to change a tunnel!\n");
864 return -1;
865 }
866
867 return type_changed(C_CTUNNEL, tid);
868 }
869
870
871 //
872 // We're a master, and a slave has just told us that it's
873 // missed a packet. We'll resend it every packet since
874 // the last one it's seen.
875 //
876 int cluster_catchup_slave(int seq, u32 slave)
877 {
878 int s;
879 int diff;
880
881 log(1,0,0,0, "Slave %s sent LASTSEEN with seq %d\n", inet_toa(slave), seq);
882
883 diff = config->cluster_seq_number - seq; // How many packet do we need to send?
884 if (diff < 0)
885 diff += HB_MAX_SEQ;
886
887 if (diff >= HB_HISTORY_SIZE) { // Ouch. We don't have the packet to send it!
888 log(0,0,0,0, "A slaved asked for message %d when our seq number is %d. Killing it.\n",
889 seq, config->cluster_seq_number);
890 return peer_send_message(slave, C_KILL, seq, NULL, 0);// Kill the slave. Nothing else to do.
891 }
892
893 // Now resend every packet that it missed, in order.
894 while (seq != config->cluster_seq_number) {
895 s = seq%HB_HISTORY_SIZE;
896 if (seq != past_hearts[s].seq) {
897 log(0,0,0,0, "Tried to re-send heartbeat for %s but %d doesn't match %d! (%d,%d)\n",
898 inet_toa(slave), seq, past_hearts[s].seq, s, config->cluster_seq_number);
899 return -1; // What to do here!?
900 }
901 peer_send_data(slave, past_hearts[s].data, past_hearts[s].size);
902 seq = (seq+1)%HB_MAX_SEQ; // Increment to next seq number.
903 }
904 return 0; // All good!
905 }
906
907 //
908 // We've heard from another peer! Add it to the list
909 // that we select from at election time.
910 //
911 int cluster_add_peer(u32 peer, time_t basetime, pingt *pp, int size)
912 {
913 int i;
914 u32 clusterid;
915 pingt p;
916
917 // Allow for backward compatability.
918 // Just the ping packet into a new structure to allow
919 // for the possibility that we might have received
920 // more or fewer elements than we were expecting.
921 if (size > sizeof(p))
922 size = sizeof(p);
923
924 memset( (void*) &p, 0, sizeof(p) );
925 memcpy( (void*) &p, (void*) pp, size);
926
927 clusterid = p.addr;
928 if (clusterid != config->bind_address)
929 {
930 // Is this for us?
931 log(4,0,0,0, "Skipping ping from %s (different cluster)\n", inet_toa(peer));
932 return 0;
933 }
934
935 for (i = 0; i < num_peers ; ++i)
936 {
937 if (peers[i].peer != peer)
938 continue;
939
940 // This peer already exists. Just update the timestamp.
941 peers[i].basetime = basetime;
942 peers[i].timestamp = TIME;
943 peers[i].uptodate = !p.undef;
944 break;
945 }
946
947 // Is this the master shutting down??
948 if (peer == config->cluster_master_address && !basetime) {
949 log(3,0,0,0, "Master %s shutting down...\n", inet_toa(config->cluster_master_address));
950 config->cluster_master_address = 0;
951 config->cluster_last_hb = 0; // Force an election.
952 cluster_check_master();
953 return 0;
954 }
955
956 if (i >= num_peers)
957 {
958 log(4,0,0,0, "Adding %s as a peer\n", inet_toa(peer));
959
960 // Not found. Is there a stale slot to re-use?
961 for (i = 0; i < num_peers ; ++i)
962 {
963 if (!peers[i].basetime) // Shutdown
964 break;
965
966 if ((peers[i].timestamp + config->cluster_hb_timeout * 10) < TIME) // Stale.
967 break;
968 }
969
970 if (i >= CLUSTER_MAX_SIZE)
971 {
972 // Too many peers!!
973 log(0,0,0,0, "Tried to add %s as a peer, but I already have %d of them!\n", inet_toa(peer), i);
974 return -1;
975 }
976
977 peers[i].peer = peer;
978 peers[i].basetime = basetime;
979 peers[i].timestamp = TIME;
980 peers[i].uptodate = !p.undef;
981 if (i == num_peers)
982 ++num_peers;
983
984 log(1,0,0,0, "Added %s as a new peer. Now %d peers\n", inet_toa(peer), num_peers);
985 }
986
987 return 1;
988 }
989
990 /* Handle the slave updating the byte counters for the master. */
991 //
992 // Note that we don't mark the session as dirty; We rely on
993 // the slow table walk to propogate this back out to the slaves.
994 //
995 int cluster_handle_bytes(char * data, int size)
996 {
997 bytest * b;
998
999 b = (bytest*) data;
1000
1001 log(3,0,0,0, "Got byte counter update (size %d)\n", size);
1002
1003 /* Loop around, adding the byte
1004 counts to each of the sessions. */
1005
1006 while (size >= sizeof(*b) ) {
1007 if (b->sid > MAXSESSION) {
1008 log(0,0,0,0, "Got C_BYTES with session #%d!\n", b->sid);
1009 return -1; /* Abort processing */
1010 }
1011
1012 session[b->sid].total_cin += b->in;
1013 session[b->sid].total_cout += b->out;
1014
1015 session[b->sid].cin += b->in;
1016 session[b->sid].cout += b->out;
1017 session[b->sid].last_packet = time_now; // Reset idle timer!
1018
1019 size -= sizeof(*b);
1020 ++b;
1021 }
1022
1023 if (size != 0)
1024 log(0,0,0,0, "Got C_BYTES with %d bytes of trailing junk!\n", size);
1025
1026 return size;
1027 }
1028
1029 //
1030 // Handle receiving a session structure in a heartbeat packet.
1031 //
1032 static int cluster_recv_session(int more , u8 * p)
1033 {
1034 if (more >= MAXSESSION) {
1035 log(0,0,0,0, "DANGER: Received a heartbeat session id > MAXSESSION!\n");
1036 return -1;
1037 }
1038
1039 if (session[more].tunnel == T_UNDEF) {
1040 if (config->cluster_iam_uptodate) { // Sanity.
1041 log(0,0,0,0, "I thought I was uptodate but I just found an undefined session!\n");
1042 } else {
1043 --config->cluster_undefined_sessions;
1044 }
1045 }
1046
1047 load_session(more, (sessiont*) p); // Copy session into session table..
1048
1049 log(5,0,more,0, "Received session update (%d undef)\n", config->cluster_undefined_sessions);
1050
1051 if (!config->cluster_iam_uptodate)
1052 cluster_uptodate(); // Check to see if we're up to date.
1053
1054 return 0;
1055 }
1056
1057 static int cluster_recv_tunnel(int more, u8 *p)
1058 {
1059 if (more >= MAXTUNNEL) {
1060 log(0,0,0,0, "DANGER: Received a tunnel session id > MAXTUNNEL!\n");
1061 return -1;
1062 }
1063
1064 if (tunnel[more].state == TUNNELUNDEF) {
1065 if (config->cluster_iam_uptodate) { // Sanity.
1066 log(0,0,0,0, "I thought I was uptodate but I just found an undefined tunnel!\n");
1067 } else {
1068 --config->cluster_undefined_tunnels;
1069 }
1070 }
1071
1072 memcpy(&tunnel[more], p, sizeof(tunnel[more]) );
1073
1074 //
1075 // Clear tunnel control messages. These are dynamically allocated.
1076 // If we get unlucky, this may cause the tunnel to drop!
1077 //
1078 tunnel[more].controls = tunnel[more].controle = NULL;
1079 tunnel[more].controlc = 0;
1080
1081 log(5,0,0,more, "Received tunnel update\n");
1082
1083 if (!config->cluster_iam_uptodate)
1084 cluster_uptodate(); // Check to see if we're up to date.
1085
1086 return 0;
1087 }
1088
1089
1090 //
1091 // Process a heartbeat..
1092 //
1093 static int cluster_process_heartbeat(u8 * data, int size, int more, u8 * p, u32 addr)
1094 {
1095 heartt * h;
1096 int s = size - (p-data);
1097 int i, type;
1098
1099 #if HB_VERSION != 3
1100 # error "need to update cluster_process_heartbeat()"
1101 #endif
1102
1103 // we handle version 2+
1104 if (more < 2 || more > HB_VERSION) {
1105 log(0,0,0,0, "Received a heartbeat version that I don't support (%d)!\n", more);
1106 return -1; // Ignore it??
1107 }
1108
1109 // Ok. It's a heartbeat packet from a cluster master!
1110 if (s < sizeof(*h))
1111 goto shortpacket;
1112
1113 h = (heartt*) p;
1114 p += sizeof(*h);
1115 s -= sizeof(*h);
1116
1117 if (h->clusterid != config->bind_address)
1118 return -1; // It's not part of our cluster.
1119
1120 if (config->cluster_iam_master) { // Sanity...
1121 // Note that this MUST match the election process above!
1122
1123 log(0,0,0,0, "I just got a packet claiming to be from a master but _I_ am the master!\n");
1124 if (!h->basetime) {
1125 log(0,0,0,0, "Heartbeat from addr %s with zero basetime!\n", inet_toa(addr) );
1126 return -1; // Skip it.
1127 }
1128 if (basetime > h->basetime) {
1129 log(0,0,0,0, "They're (%s) an older master than me so I'm gone!\n", inet_toa(addr));
1130 kill(0, SIGTERM);
1131 exit(1);
1132 }
1133 if (basetime == h->basetime && my_address < addr) { // Tie breaker.
1134 log(0,0,0,0, "They're a higher IP address than me, so I'm gone!\n");
1135 kill(0, SIGTERM);
1136 exit(1);
1137 }
1138 return -1; // Skip it.
1139 }
1140
1141 if (config->cluster_seq_number == -1) // Don't have one. Just align to the master...
1142 config->cluster_seq_number = h->seq;
1143
1144 config->cluster_last_hb = TIME; // Reset to ensure that we don't become master!!
1145
1146 if (config->cluster_seq_number != h->seq) { // Out of sequence heartbeat!
1147 log(1,0,0,0, "HB: Got seq# %d but was expecting %d. asking for resend.\n", h->seq, config->cluster_seq_number);
1148
1149 peer_send_message(addr, C_LASTSEEN, config->cluster_seq_number, NULL, 0);
1150
1151 config->cluster_last_hb = TIME; // Reset to ensure that we don't become master!!
1152
1153 // Just drop the packet. The master will resend it as part of the catchup.
1154
1155 return 0;
1156 }
1157 // Save the packet in our buffer.
1158 // This is needed in case we become the master.
1159 config->cluster_seq_number = (h->seq+1)%HB_MAX_SEQ;
1160 i = h->seq % HB_HISTORY_SIZE;
1161 past_hearts[i].seq = h->seq;
1162 past_hearts[i].size = size;
1163 memcpy(&past_hearts[i].data, data, size); // Save it.
1164
1165
1166 // Check that we don't have too many undefined sessions, and
1167 // that the free session pointer is correct.
1168 cluster_check_sessions(h->highsession, h->freesession, h->hightunnel);
1169
1170 if (more > 2) // reserved section of heartt was not initialized prior to v3
1171 {
1172 if (h->interval != config->cluster_hb_interval)
1173 {
1174 log(2, 0, 0, 0, "Master set ping/heartbeat interval to %u (was %u)\n",
1175 h->interval, config->cluster_hb_interval);
1176
1177 config->cluster_hb_interval = h->interval;
1178 }
1179
1180 if (h->timeout != config->cluster_hb_timeout)
1181 {
1182 log(2, 0, 0, 0, "Master set heartbeat timeout to %u (was %u)\n",
1183 h->timeout, config->cluster_hb_timeout);
1184
1185 config->cluster_hb_timeout = h->timeout;
1186 }
1187 }
1188
1189 // Ok. process the packet...
1190 while ( s > 0) {
1191
1192 type = * ((u32*) p);
1193 p += sizeof(u32);
1194 s -= sizeof(u32);
1195
1196 more = * ((u32*) p);
1197 p += sizeof(u32);
1198 s -= sizeof(u32);
1199
1200 switch (type) {
1201 case C_CSESSION: { // Compressed session structure.
1202 u8 c [ sizeof(sessiont) + 2];
1203 int size;
1204 u8 * orig_p = p;
1205
1206 size = rle_decompress((u8 **) &p, s, c, sizeof(c) );
1207 s -= (p - orig_p);
1208
1209 if (size != sizeof(sessiont) ) { // Ouch! Very very bad!
1210 log(0,0,0,0, "DANGER: Received a CSESSION that didn't decompress correctly!\n");
1211 // Now what? Should exit! No-longer up to date!
1212 break;
1213 }
1214
1215 cluster_recv_session(more, c);
1216 break;
1217 }
1218 case C_SESSION:
1219 if ( s < sizeof(session[more]))
1220 goto shortpacket;
1221
1222 cluster_recv_session(more, p);
1223
1224 p += sizeof(session[more]);
1225 s -= sizeof(session[more]);
1226 break;
1227
1228 case C_CTUNNEL: { // Compressed tunnel structure.
1229 u8 c [ sizeof(tunnelt) + 2];
1230 int size;
1231 u8 * orig_p = p;
1232
1233 size = rle_decompress( (u8 **) &p, s, c, sizeof(c) );
1234 s -= (p - orig_p);
1235
1236 if (size != sizeof(tunnelt) ) { // Ouch! Very very bad!
1237 log(0,0,0,0, "DANGER: Received a CSESSION that didn't decompress correctly!\n");
1238 // Now what? Should exit! No-longer up to date!
1239 break;
1240 }
1241
1242 cluster_recv_tunnel(more, c);
1243 break;
1244
1245 }
1246 case C_TUNNEL:
1247 if ( s < sizeof(tunnel[more]))
1248 goto shortpacket;
1249
1250 cluster_recv_tunnel(more, p);
1251
1252 p += sizeof(tunnel[more]);
1253 s -= sizeof(tunnel[more]);
1254 break;
1255 default:
1256 log(0,0,0,0, "DANGER: I received a heartbeat element where I didn't understand the type! (%d)\n", type);
1257 return -1; // can't process any more of the packet!!
1258 }
1259 }
1260 if (config->cluster_master_address != addr)
1261 {
1262 char *str;
1263 str = strdup(inet_toa(config->cluster_master_address));
1264 log(0,0,0,0, "My master just changed from %s to %s!\n", str, inet_toa(addr));
1265 if (str) free(str);
1266 }
1267
1268 config->cluster_master_address = addr;
1269 config->cluster_last_hb = TIME; // Successfully received a heartbeat!
1270 return 0;
1271
1272 shortpacket:
1273 log(0,0,0,0, "I got an incomplete heartbeat packet! This means I'm probably out of sync!!\n");
1274 return -1;
1275 }
1276
1277 //
1278 // We got a packet on the cluster port!
1279 // Handle pings, lastseens, and heartbeats!
1280 //
1281 int processcluster(char * data, int size, u32 addr)
1282 {
1283 int type, more;
1284 char * p = data;
1285 int s = size;
1286
1287 if (addr == my_address)
1288 return -1; // Ignore it. Something looped back the multicast!
1289
1290 log(5,0,0,0, "Process cluster: %d bytes from %s\n", size, inet_toa(addr));
1291
1292 if (s <= 0) // Any data there??
1293 return -1;
1294
1295 if (s < 8)
1296 goto shortpacket;
1297
1298 type = * ((u32*) p);
1299 p += sizeof(u32);
1300 s -= sizeof(u32);
1301
1302 more = * ((u32*) p);
1303 p += sizeof(u32);
1304 s -= sizeof(u32);
1305
1306 switch (type) {
1307 case C_PING: // Update the peers table.
1308 return cluster_add_peer(addr, more, (pingt*)p, s);
1309
1310 case C_LASTSEEN: // Catch up a slave (slave missed a packet).
1311 return cluster_catchup_slave(more, addr);
1312
1313 case C_FORWARD: { // Forwarded control packet. pass off to processudp.
1314 struct sockaddr_in a;
1315 a.sin_addr.s_addr = more;
1316
1317 a.sin_port = * (int*) p;
1318 s -= sizeof(int);
1319 p += sizeof(int);
1320
1321 if (!config->cluster_iam_master) { // huh?
1322 log(0,0,0,0, "I'm not the master, but I got a C_FORWARD from %s?\n", inet_toa(addr));
1323 return -1;
1324 }
1325
1326 log(4,0,0,0, "Got a forwarded packet... (%s:%d)\n", inet_toa(more), a.sin_port);
1327 STAT(recv_forward);
1328 processudp(p, s, &a);
1329 return 0;
1330 }
1331 case C_THROTTLE: { // Receive a forwarded packet from a slave.
1332 if (!config->cluster_iam_master) {
1333 log(0,0,0,0, "I'm not the master, but I got a C_THROTTLE from %s?\n", inet_toa(addr));
1334 return -1;
1335 }
1336
1337 tbf_queue_packet(more, p, s); // The TBF id tells wether it goes in or out.
1338 return 0;
1339 }
1340 case C_GARDEN:
1341 // Receive a walled garden packet from a slave.
1342 if (!config->cluster_iam_master) {
1343 log(0,0,0,0, "I'm not the master, but I got a C_GARDEN from %s?\n", inet_toa(addr));
1344 return -1;
1345 }
1346
1347 tun_write(p, s);
1348 return 0;
1349
1350 case C_BYTES:
1351 return cluster_handle_bytes(p, s);
1352
1353 case C_KILL: // The master asked us to die!? (usually because we're too out of date).
1354 if (config->cluster_iam_master) {
1355 log(0,0,0,0, "_I_ am master, but I received a C_KILL from %s! (Seq# %d)\n", inet_toa(addr), more);
1356 return -1;
1357 }
1358 if (more != config->cluster_seq_number) {
1359 log(0,0,0,0, "The master asked us to die but the seq number didn't match!?\n");
1360 return -1;
1361 }
1362
1363 if (addr != config->cluster_master_address) {
1364 log(0,0,0,0, "Received a C_KILL from %s which doesn't match config->cluster_master_address (%x)\n",
1365 inet_toa(addr), config->cluster_master_address);
1366 // We can only warn about it. The master might really have switched!
1367 }
1368
1369 log(0,0,0,0, "Received a valid C_KILL: I'm going to die now.\n");
1370 kill(0, SIGTERM);
1371 exit(0); // Lets be paranoid;
1372 return -1; // Just signalling the compiler.
1373
1374 case C_HEARTBEAT:
1375 log(4,0,0,0, "Got a heartbeat from %s\n", inet_toa(addr));
1376 return cluster_process_heartbeat(data, size, more, p, addr);
1377
1378 default:
1379 log(0,0,0,0, "Strange type packet received on cluster socket (%d)\n", type);
1380 return -1;
1381 }
1382 return 0;
1383
1384 shortpacket:
1385 log(0,0,0,0, "I got a _short_ cluster heartbeat packet! This means I'm probably out of sync!!\n");
1386 return -1;
1387 }
1388
1389 //====================================================================================================
1390
1391 int cmd_show_cluster(struct cli_def *cli, char *command, char **argv, int argc)
1392 {
1393 int i;
1394
1395 if (CLI_HELP_REQUESTED)
1396 return CLI_HELP_NO_ARGS;
1397
1398 cli_print(cli, "Cluster status : %s", config->cluster_iam_master ? "Master" : "Slave" );
1399 cli_print(cli, "My address : %s", inet_toa(my_address));
1400 cli_print(cli, "VIP address : %s", inet_toa(config->bind_address));
1401 cli_print(cli, "Multicast address: %s", inet_toa(config->cluster_address));
1402 cli_print(cli, "Multicast i'face : %s", config->cluster_interface);
1403
1404 if (!config->cluster_iam_master) {
1405 cli_print(cli, "My master : %s (last heartbeat %.1f seconds old)",
1406 config->cluster_master_address ? inet_toa(config->cluster_master_address) : "Not defined",
1407 0.1 * (TIME - config->cluster_last_hb));
1408 cli_print(cli, "Uptodate : %s", config->cluster_iam_uptodate ? "Yes" : "No");
1409 cli_print(cli, "Next sequence number expected: %d", config->cluster_seq_number);
1410 cli_print(cli, "%d sessions undefined of %d", config->cluster_undefined_sessions, config->cluster_highest_sessionid);
1411 cli_print(cli, "%d tunnels undefined of %d", config->cluster_undefined_tunnels, config->cluster_highest_tunnelid);
1412 } else {
1413 cli_print(cli, "Next heartbeat # : %d", config->cluster_seq_number);
1414 cli_print(cli, "Highest session : %d", config->cluster_highest_sessionid);
1415 cli_print(cli, "Highest tunnel : %d", config->cluster_highest_tunnelid);
1416 cli_print(cli, "%d changes queued for sending", config->cluster_num_changes);
1417 }
1418 cli_print(cli, "%d peers.", num_peers);
1419
1420 if (num_peers)
1421 cli_print(cli, "%20s %10s %8s", "Address", "Basetime", "Age");
1422 for (i = 0; i < num_peers; ++i) {
1423 cli_print(cli, "%20s %10d %8d", inet_toa(peers[i].peer),
1424 peers[i].basetime, TIME - peers[i].timestamp);
1425 }
1426 return CLI_OK;
1427 }
1428
1429 //
1430 // Simple run-length-encoding compression.
1431 // Format is
1432 // 1 byte < 128 = count of non-zero bytes following. // Not legal to be zero.
1433 // n non-zero bytes;
1434 // or
1435 // 1 byte > 128 = (count - 128) run of zero bytes. //
1436 // repeat.
1437 // count == 0 indicates end of compressed stream.
1438 //
1439 // Compress from 'src' into 'dst'. return number of bytes
1440 // used from 'dst'.
1441 // Updates *src_p to indicate 1 past last bytes used.
1442 //
1443 // We could get an extra byte in the zero runs by storing (count-1)
1444 // but I'm playing it safe.
1445 //
1446 // Worst case is a 50% expansion in space required (trying to
1447 // compress { 0x00, 0x01 } * N )
1448 int rle_compress(u8 ** src_p, int ssize, u8 *dst, int dsize)
1449 {
1450 int count;
1451 int orig_dsize = dsize;
1452 u8 * x,*src;
1453 src = *src_p;
1454
1455 while (ssize > 0 && dsize > 2) {
1456 count = 0;
1457 x = dst++; --dsize; // Reserve space for count byte..
1458
1459 if (*src) { // Copy a run of non-zero bytes.
1460 while (*src && count < 127 && ssize > 0 && dsize > 1) { // Count number of non-zero bytes.
1461 *dst++ = *src++;
1462 --dsize; --ssize;
1463 ++count;
1464 }
1465 *x = count; // Store number of non-zero bytes. Guarenteed to be non-zero!
1466
1467 } else { // Compress a run of zero bytes.
1468 while (*src == 0 && count < 127 && ssize > 0) {
1469 ++src;
1470 --ssize;
1471 ++count;
1472 }
1473 *x = count | 0x80 ;
1474 }
1475 }
1476
1477 *dst++ = 0x0; // Add Stop byte.
1478 --dsize;
1479
1480 *src_p = src;
1481 return (orig_dsize - dsize);
1482 }
1483
1484 //
1485 // Decompress the buffer into **p.
1486 // 'psize' is the size of the decompression buffer available.
1487 //
1488 // Returns the number of bytes decompressed.
1489 //
1490 // Decompresses from '*src_p' into 'dst'.
1491 // Return the number of dst bytes used.
1492 // Updates the 'src_p' pointer to point to the
1493 // first un-used byte.
1494 int rle_decompress(u8 ** src_p, int ssize, u8 *dst, int dsize)
1495 {
1496 int count;
1497 int orig_dsize = dsize;
1498 char * src = *src_p;
1499
1500 while (ssize >0 && dsize > 0) { // While there's more to decompress, and there's room in the decompress buffer...
1501 count = *src++; --ssize; // get the count byte from the source.
1502 if (count == 0x0) // End marker reached? If so, finish.
1503 break;
1504
1505 if (count & 0x80) { // Decompress a run of zeros
1506 for (count &= 0x7f ; count > 0 && dsize > 0; --count) {
1507 *dst++ = 0x0;
1508 --dsize;
1509 }
1510 } else { // Copy run of non-zero bytes.
1511 for ( ; count > 0 && ssize && dsize; --count) { // Copy non-zero bytes across.
1512 *dst++ = *src++;
1513 --ssize; --dsize;
1514 }
1515 }
1516 }
1517 *src_p = src;
1518 return (orig_dsize - dsize);
1519 }