summaryrefslogtreecommitdiff
path: root/source4/cluster/ctdb/takeover
diff options
context:
space:
mode:
authorStefan Metzmacher <metze@samba.org>2008-12-29 11:02:32 +0100
committerStefan Metzmacher <metze@samba.org>2008-12-29 14:46:09 +0100
commite36d64728f79087610737fa54eee69af3ab99c5b (patch)
tree5fee7f16373c6ca0043dd87345d845253a2c9cc5 /source4/cluster/ctdb/takeover
parentaec16efaf29bc6c5e4973e2f4e218d7fc4b652cb (diff)
downloadsamba-e36d64728f79087610737fa54eee69af3ab99c5b.tar.gz
samba-e36d64728f79087610737fa54eee69af3ab99c5b.tar.bz2
samba-e36d64728f79087610737fa54eee69af3ab99c5b.zip
s4:cluster: remove old/broken ctdb code
We don't need a full copy of ctdb... If we want to readd cluster support, we should just use a ctdb client library. metze
Diffstat (limited to 'source4/cluster/ctdb/takeover')
-rw-r--r--source4/cluster/ctdb/takeover/ctdb_takeover.c583
-rw-r--r--source4/cluster/ctdb/takeover/system.c381
2 files changed, 0 insertions, 964 deletions
diff --git a/source4/cluster/ctdb/takeover/ctdb_takeover.c b/source4/cluster/ctdb/takeover/ctdb_takeover.c
deleted file mode 100644
index ae68725271..0000000000
--- a/source4/cluster/ctdb/takeover/ctdb_takeover.c
+++ /dev/null
@@ -1,583 +0,0 @@
-/*
- ctdb recovery code
-
- Copyright (C) Ronnie Sahlberg 2007
- Copyright (C) Andrew Tridgell 2007
-
- This library is free software; you can redistribute it and/or
- modify it under the terms of the GNU Lesser General Public
- License as published by the Free Software Foundation; either
- version 3 of the License, or (at your option) any later version.
-
- This library is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- Lesser General Public License for more details.
-
- You should have received a copy of the GNU Lesser General Public
- License along with this library; if not, see <http://www.gnu.org/licenses/>.
-*/
-#include "includes.h"
-#include "lib/events/events.h"
-#include "../tdb/include/tdb.h"
-#include "system/network.h"
-#include "system/filesys.h"
-#include "system/wait.h"
-#include "../include/ctdb_private.h"
-
-
-#define TAKEOVER_TIMEOUT() timeval_current_ofs(5,0)
-
-#define CTDB_ARP_INTERVAL 1
-#define CTDB_ARP_REPEAT 3
-
-struct ctdb_takeover_arp {
- struct ctdb_context *ctdb;
- uint32_t count;
- struct sockaddr_in sin;
- struct ctdb_tcp_list *tcp_list;
-};
-
-/*
- lists of tcp endpoints
- */
-struct ctdb_tcp_list {
- struct ctdb_tcp_list *prev, *next;
- uint32_t vnn;
- struct sockaddr_in saddr;
- struct sockaddr_in daddr;
-};
-
-
-
-/*
- send a gratuitous arp
- */
-static void ctdb_control_send_arp(struct event_context *ev, struct timed_event *te,
- struct timeval t, void *private_data)
-{
- struct ctdb_takeover_arp *arp = talloc_get_type(private_data,
- struct ctdb_takeover_arp);
- int ret;
- struct ctdb_tcp_list *tcp;
-
- ret = ctdb_sys_send_arp(&arp->sin, arp->ctdb->takeover.interface);
- if (ret != 0) {
- DEBUG(0,(__location__ "sending of arp failed (%s)\n", strerror(errno)));
- }
-
- for (tcp=arp->tcp_list;tcp;tcp=tcp->next) {
- DEBUG(2,("sending tcp tickle ack for %u->%s:%u\n",
- (unsigned)ntohs(tcp->daddr.sin_port),
- inet_ntoa(tcp->saddr.sin_addr),
- (unsigned)ntohs(tcp->saddr.sin_port)));
- ret = ctdb_sys_send_ack(&tcp->saddr, &tcp->daddr);
- if (ret != 0) {
- DEBUG(0,(__location__ " Failed to send tcp tickle ack for %s\n",
- inet_ntoa(tcp->saddr.sin_addr)));
- }
- }
-
- arp->count++;
-
- if (arp->count == CTDB_ARP_REPEAT) {
- talloc_free(arp);
- return;
- }
-
- event_add_timed(arp->ctdb->ev, arp->ctdb->takeover.last_ctx,
- timeval_current_ofs(CTDB_ARP_INTERVAL, 0),
- ctdb_control_send_arp, arp);
-}
-
-
-/*
- take over an ip address
- */
-int32_t ctdb_control_takeover_ip(struct ctdb_context *ctdb, TDB_DATA indata)
-{
- int ret;
- struct sockaddr_in *sin = (struct sockaddr_in *)indata.dptr;
- struct ctdb_takeover_arp *arp;
- char *ip = inet_ntoa(sin->sin_addr);
- struct ctdb_tcp_list *tcp;
-
- if (ctdb_sys_have_ip(ip)) {
- return 0;
- }
-
- DEBUG(0,("Takover of IP %s/%u on interface %s\n",
- ip, ctdb->nodes[ctdb->vnn]->public_netmask_bits,
- ctdb->takeover.interface));
- ret = ctdb_event_script(ctdb, "takeip %s %s %u",
- ctdb->takeover.interface,
- ip,
- ctdb->nodes[ctdb->vnn]->public_netmask_bits);
- if (ret != 0) {
- DEBUG(0,(__location__ " Failed to takeover IP %s on interface %s\n",
- ip, ctdb->takeover.interface));
- return -1;
- }
-
- if (!ctdb->takeover.last_ctx) {
- ctdb->takeover.last_ctx = talloc_new(ctdb);
- CTDB_NO_MEMORY(ctdb, ctdb->takeover.last_ctx);
- }
-
- arp = talloc_zero(ctdb->takeover.last_ctx, struct ctdb_takeover_arp);
- CTDB_NO_MEMORY(ctdb, arp);
-
- arp->ctdb = ctdb;
- arp->sin = *sin;
-
- /* add all of the known tcp connections for this IP to the
- list of tcp connections to send tickle acks for */
- for (tcp=ctdb->tcp_list;tcp;tcp=tcp->next) {
- if (sin->sin_addr.s_addr == tcp->daddr.sin_addr.s_addr) {
- struct ctdb_tcp_list *t2 = talloc(arp, struct ctdb_tcp_list);
- CTDB_NO_MEMORY(ctdb, t2);
- *t2 = *tcp;
- DLIST_ADD(arp->tcp_list, t2);
- }
- }
-
- event_add_timed(arp->ctdb->ev, arp->ctdb->takeover.last_ctx,
- timeval_zero(), ctdb_control_send_arp, arp);
-
- return ret;
-}
-
-/*
- release an ip address
- */
-int32_t ctdb_control_release_ip(struct ctdb_context *ctdb, TDB_DATA indata)
-{
- struct sockaddr_in *sin = (struct sockaddr_in *)indata.dptr;
- TDB_DATA data;
- char *ip = inet_ntoa(sin->sin_addr);
- int ret;
- struct ctdb_tcp_list *tcp;
-
- if (!ctdb_sys_have_ip(ip)) {
- return 0;
- }
-
- DEBUG(0,("Release of IP %s/%u on interface %s\n",
- ip, ctdb->nodes[ctdb->vnn]->public_netmask_bits,
- ctdb->takeover.interface));
-
- /* stop any previous arps */
- talloc_free(ctdb->takeover.last_ctx);
- ctdb->takeover.last_ctx = NULL;
-
- ret = ctdb_event_script(ctdb, "releaseip %s %s %u",
- ctdb->takeover.interface,
- ip,
- ctdb->nodes[ctdb->vnn]->public_netmask_bits);
- if (ret != 0) {
- DEBUG(0,(__location__ " Failed to release IP %s on interface %s\n",
- ip, ctdb->takeover.interface));
- return -1;
- }
-
- /* send a message to all clients of this node telling them
- that the cluster has been reconfigured and they should
- release any sockets on this IP */
- data.dptr = (uint8_t *)ip;
- data.dsize = strlen(ip)+1;
-
- ctdb_daemon_send_message(ctdb, ctdb->vnn, CTDB_SRVID_RELEASE_IP, data);
-
- /* tell other nodes about any tcp connections we were holding with this IP */
- for (tcp=ctdb->tcp_list;tcp;tcp=tcp->next) {
- if (tcp->vnn == ctdb->vnn &&
- sin->sin_addr.s_addr == tcp->daddr.sin_addr.s_addr) {
- struct ctdb_control_tcp_vnn t;
-
- t.vnn = ctdb->vnn;
- t.src = tcp->saddr;
- t.dest = tcp->daddr;
-
- data.dptr = (uint8_t *)&t;
- data.dsize = sizeof(t);
-
- ctdb_daemon_send_control(ctdb, CTDB_BROADCAST_VNNMAP, 0,
- CTDB_CONTROL_TCP_ADD,
- 0, CTDB_CTRL_FLAG_NOREPLY, data, NULL, NULL);
- }
- }
-
-
- return 0;
-}
-
-
-/*
- setup the event script
-*/
-int ctdb_set_event_script(struct ctdb_context *ctdb, const char *script)
-{
- ctdb->takeover.event_script = talloc_strdup(ctdb, script);
- CTDB_NO_MEMORY(ctdb, ctdb->takeover.event_script);
- return 0;
-}
-
-/*
- setup the public address list from a file
-*/
-int ctdb_set_public_addresses(struct ctdb_context *ctdb, const char *alist)
-{
- char **lines;
- int nlines;
- int i;
-
- lines = file_lines_load(alist, &nlines, ctdb);
- if (lines == NULL) {
- ctdb_set_error(ctdb, "Failed to load public address list '%s'\n", alist);
- return -1;
- }
- while (nlines > 0 && strcmp(lines[nlines-1], "") == 0) {
- nlines--;
- }
-
- if (nlines != ctdb->num_nodes) {
- DEBUG(0,("Number of lines in %s does not match number of nodes!\n", alist));
- talloc_free(lines);
- return -1;
- }
-
- for (i=0;i<nlines;i++) {
- char *p;
- struct in_addr in;
-
- ctdb->nodes[i]->public_address = talloc_strdup(ctdb->nodes[i], lines[i]);
- CTDB_NO_MEMORY(ctdb, ctdb->nodes[i]->public_address);
- ctdb->nodes[i]->takeover_vnn = -1;
-
- /* see if they supplied a netmask length */
- p = strchr(ctdb->nodes[i]->public_address, '/');
- if (!p) {
- DEBUG(0,("You must supply a netmask for public address %s\n",
- ctdb->nodes[i]->public_address));
- return -1;
- }
- *p = 0;
- ctdb->nodes[i]->public_netmask_bits = atoi(p+1);
-
- if (ctdb->nodes[i]->public_netmask_bits > 32) {
- DEBUG(0, ("Illegal netmask for IP %s\n", ctdb->nodes[i]->public_address));
- return -1;
- }
-
- if (inet_aton(ctdb->nodes[i]->public_address, &in) == 0) {
- DEBUG(0,("Badly formed IP '%s' in public address list\n", ctdb->nodes[i]->public_address));
- return -1;
- }
- }
-
- talloc_free(lines);
- return 0;
-}
-
-/*
- see if two IPs are on the same subnet
- */
-static bool ctdb_same_subnet(const char *ip1, const char *ip2, uint8_t netmask_bits)
-{
- struct in_addr in1, in2;
- uint32_t mask;
-
- inet_aton(ip1, &in1);
- inet_aton(ip2, &in2);
-
- mask = ~((1LL<<(32-netmask_bits))-1);
-
- if ((ntohl(in1.s_addr) & mask) != (ntohl(in2.s_addr) & mask)) {
- return false;
- }
-
- return true;
-}
-
-/*
- make any IP alias changes for public addresses that are necessary
- */
-int ctdb_takeover_run(struct ctdb_context *ctdb, struct ctdb_node_map *nodemap)
-{
- int i, j;
- int ret;
-
- /* work out which node will look after each public IP */
- for (i=0;i<nodemap->num;i++) {
- if (nodemap->nodes[i].flags & NODE_FLAGS_CONNECTED) {
- ctdb->nodes[i]->takeover_vnn = nodemap->nodes[i].vnn;
- } else {
- /* assign this dead nodes IP to the next higher node */
- for (j=(i+1)%nodemap->num;
- j != i;
- j=(j+1)%nodemap->num) {
- if ((nodemap->nodes[j].flags & NODE_FLAGS_CONNECTED) &&
- ctdb_same_subnet(ctdb->nodes[j]->public_address,
- ctdb->nodes[i]->public_address,
- ctdb->nodes[j]->public_netmask_bits)) {
- ctdb->nodes[i]->takeover_vnn = nodemap->nodes[j].vnn;
- break;
- }
- }
- if (j == i) {
- DEBUG(0,(__location__ " No node available on same network to take %s\n",
- ctdb->nodes[i]->public_address));
- ctdb->nodes[i]->takeover_vnn = -1;
- }
- }
- }
-
- /* at this point ctdb->nodes[i]->takeover_vnn is the vnn which will own each IP */
-
-
- /* now tell all nodes to delete any alias that they should not
- have. This will be a NOOP on nodes that don't currently
- hold the given alias */
- for (i=0;i<nodemap->num;i++) {
- /* don't talk to unconnected nodes */
- if (!(nodemap->nodes[i].flags & NODE_FLAGS_CONNECTED)) continue;
-
- /* tell this node to delete all of the aliases that it should not have */
- for (j=0;j<nodemap->num;j++) {
- if (ctdb->nodes[j]->takeover_vnn != nodemap->nodes[i].vnn) {
- ret = ctdb_ctrl_release_ip(ctdb, TAKEOVER_TIMEOUT(),
- nodemap->nodes[i].vnn,
- ctdb->nodes[j]->public_address);
- if (ret != 0) {
- DEBUG(0,("Failed to tell vnn %u to release IP %s\n",
- nodemap->nodes[i].vnn,
- ctdb->nodes[j]->public_address));
- return -1;
- }
- }
- }
- }
-
- /* tell all nodes to get their own IPs */
- for (i=0;i<nodemap->num;i++) {
- ret = ctdb_ctrl_takeover_ip(ctdb, TAKEOVER_TIMEOUT(),
- ctdb->nodes[i]->takeover_vnn,
- ctdb->nodes[i]->public_address);
- if (ret != 0) {
- DEBUG(0,("Failed asking vnn %u to take over IP %s\n",
- ctdb->nodes[i]->takeover_vnn,
- ctdb->nodes[i]->public_address));
- return -1;
- }
- }
-
- return 0;
-}
-
-
-/*
- called by a client to inform us of a TCP connection that it is managing
- that should tickled with an ACK when IP takeover is done
- */
-int32_t ctdb_control_tcp_client(struct ctdb_context *ctdb, uint32_t client_id, uint32_t vnn,
- TDB_DATA indata)
-{
- struct ctdb_client *client = ctdb_reqid_find(ctdb, client_id, struct ctdb_client);
- struct ctdb_control_tcp *p = (struct ctdb_control_tcp *)indata.dptr;
- struct ctdb_tcp_list *tcp;
- struct ctdb_control_tcp_vnn t;
- int ret;
- TDB_DATA data;
-
- tcp = talloc(client, struct ctdb_tcp_list);
- CTDB_NO_MEMORY(ctdb, tcp);
-
- tcp->vnn = vnn;
- tcp->saddr = p->src;
- tcp->daddr = p->dest;
-
- DLIST_ADD(client->tcp_list, tcp);
-
- t.vnn = vnn;
- t.src = p->src;
- t.dest = p->dest;
-
- data.dptr = (uint8_t *)&t;
- data.dsize = sizeof(t);
-
- /* tell all nodes about this tcp connection */
- ret = ctdb_daemon_send_control(ctdb, CTDB_BROADCAST_VNNMAP, 0,
- CTDB_CONTROL_TCP_ADD,
- 0, CTDB_CTRL_FLAG_NOREPLY, data, NULL, NULL);
- if (ret != 0) {
- DEBUG(0,(__location__ " Failed to send CTDB_CONTROL_TCP_ADD\n"));
- return -1;
- }
-
- return 0;
-}
-
-/*
- see if two sockaddr_in are the same
- */
-static bool same_sockaddr_in(struct sockaddr_in *in1, struct sockaddr_in *in2)
-{
- return in1->sin_family == in2->sin_family &&
- in1->sin_port == in2->sin_port &&
- in1->sin_addr.s_addr == in2->sin_addr.s_addr;
-}
-
-/*
- find a tcp address on a list
- */
-static struct ctdb_tcp_list *ctdb_tcp_find(struct ctdb_tcp_list *list,
- struct ctdb_tcp_list *tcp)
-{
- while (list) {
- if (same_sockaddr_in(&list->saddr, &tcp->saddr) &&
- same_sockaddr_in(&list->daddr, &tcp->daddr)) {
- return list;
- }
- list = list->next;
- }
- return NULL;
-}
-
-/*
- called by a daemon to inform us of a TCP connection that one of its
- clients managing that should tickled with an ACK when IP takeover is
- done
- */
-int32_t ctdb_control_tcp_add(struct ctdb_context *ctdb, TDB_DATA indata)
-{
- struct ctdb_control_tcp_vnn *p = (struct ctdb_control_tcp_vnn *)indata.dptr;
- struct ctdb_tcp_list *tcp;
-
- tcp = talloc(ctdb, struct ctdb_tcp_list);
- CTDB_NO_MEMORY(ctdb, tcp);
-
- tcp->vnn = p->vnn;
- tcp->saddr = p->src;
- tcp->daddr = p->dest;
-
- if (NULL == ctdb_tcp_find(ctdb->tcp_list, tcp)) {
- DLIST_ADD(ctdb->tcp_list, tcp);
- DEBUG(2,("Added tickle info for %s:%u from vnn %u\n",
- inet_ntoa(tcp->daddr.sin_addr), ntohs(tcp->daddr.sin_port),
- tcp->vnn));
- } else {
- DEBUG(4,("Already had tickle info for %s:%u from vnn %u\n",
- inet_ntoa(tcp->daddr.sin_addr), ntohs(tcp->daddr.sin_port),
- tcp->vnn));
- }
-
- return 0;
-}
-
-/*
- called by a daemon to inform us of a TCP connection that one of its
- clients managing that should tickled with an ACK when IP takeover is
- done
- */
-int32_t ctdb_control_tcp_remove(struct ctdb_context *ctdb, TDB_DATA indata)
-{
- struct ctdb_control_tcp_vnn *p = (struct ctdb_control_tcp_vnn *)indata.dptr;
- struct ctdb_tcp_list t, *tcp;
-
- t.vnn = p->vnn;
- t.saddr = p->src;
- t.daddr = p->dest;
-
- tcp = ctdb_tcp_find(ctdb->tcp_list, &t);
- if (tcp) {
- DEBUG(2,("Removed tickle info for %s:%u from vnn %u\n",
- inet_ntoa(tcp->daddr.sin_addr), ntohs(tcp->daddr.sin_port),
- tcp->vnn));
- DLIST_REMOVE(ctdb->tcp_list, tcp);
- talloc_free(tcp);
- }
-
- return 0;
-}
-
-
-/*
- called when a daemon restarts - wipes all tcp entries from that vnn
- */
-int32_t ctdb_control_startup(struct ctdb_context *ctdb, uint32_t vnn)
-{
- struct ctdb_tcp_list *tcp, *next;
- for (tcp=ctdb->tcp_list;tcp;tcp=next) {
- next = tcp->next;
- if (tcp->vnn == vnn) {
- DLIST_REMOVE(ctdb->tcp_list, tcp);
- talloc_free(tcp);
- }
-
- /* and tell the new guy about any that he should have
- from us */
- if (tcp->vnn == ctdb->vnn) {
- struct ctdb_control_tcp_vnn t;
- TDB_DATA data;
-
- t.vnn = tcp->vnn;
- t.src = tcp->saddr;
- t.dest = tcp->daddr;
-
- data.dptr = (uint8_t *)&t;
- data.dsize = sizeof(t);
-
- ctdb_daemon_send_control(ctdb, vnn, 0,
- CTDB_CONTROL_TCP_ADD,
- 0, CTDB_CTRL_FLAG_NOREPLY, data, NULL, NULL);
- }
- }
- return 0;
-}
-
-
-/*
- called when a client structure goes away - hook to remove
- elements from the tcp_list in all daemons
- */
-void ctdb_takeover_client_destructor_hook(struct ctdb_client *client)
-{
- while (client->tcp_list) {
- TDB_DATA data;
- struct ctdb_control_tcp_vnn p;
- struct ctdb_tcp_list *tcp = client->tcp_list;
- DLIST_REMOVE(client->tcp_list, tcp);
- p.vnn = tcp->vnn;
- p.src = tcp->saddr;
- p.dest = tcp->daddr;
- data.dptr = (uint8_t *)&p;
- data.dsize = sizeof(p);
- ctdb_daemon_send_control(client->ctdb, CTDB_BROADCAST_VNNMAP, 0,
- CTDB_CONTROL_TCP_REMOVE,
- 0, CTDB_CTRL_FLAG_NOREPLY, data, NULL, NULL);
- talloc_free(tcp);
- }
-}
-
-
-/*
- release all IPs on shutdown
- */
-void ctdb_release_all_ips(struct ctdb_context *ctdb)
-{
- int i;
-
- if (!ctdb->takeover.enabled) {
- return;
- }
-
- for (i=0;i<ctdb->num_nodes;i++) {
- struct ctdb_node *node = ctdb->nodes[i];
- if (ctdb_sys_have_ip(node->public_address)) {
- ctdb_event_script(ctdb, "releaseip %s %s %u",
- ctdb->takeover.interface,
- node->public_address,
- node->public_netmask_bits);
- }
- }
-}
diff --git a/source4/cluster/ctdb/takeover/system.c b/source4/cluster/ctdb/takeover/system.c
deleted file mode 100644
index 13f3d1501b..0000000000
--- a/source4/cluster/ctdb/takeover/system.c
+++ /dev/null
@@ -1,381 +0,0 @@
-/*
- ctdb recovery code
-
- Copyright (C) Ronnie Sahlberg 2007
- Copyright (C) Andrew Tridgell 2007
-
- This library is free software; you can redistribute it and/or
- modify it under the terms of the GNU Lesser General Public
- License as published by the Free Software Foundation; either
- version 3 of the License, or (at your option) any later version.
-
- This library is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- Lesser General Public License for more details.
-
- You should have received a copy of the GNU Lesser General Public
- License along with this library; if not, see <http://www.gnu.org/licenses/>.
-*/
-
-#include "includes.h"
-#include "system/network.h"
-#include "system/filesys.h"
-#include "system/wait.h"
-#include "../include/ctdb_private.h"
-#include "lib/events/events.h"
-#include <net/ethernet.h>
-#include <net/if_arp.h>
-
-
-
-/*
- send gratuitous arp reply after we have taken over an ip address
-
- saddr is the address we are trying to claim
- iface is the interface name we will be using to claim the address
- */
-int ctdb_sys_send_arp(const struct sockaddr_in *saddr, const char *iface)
-{
- int s, ret;
- struct sockaddr sa;
- struct ether_header *eh;
- struct arphdr *ah;
- struct ifreq if_hwaddr;
- unsigned char buffer[64]; /*minimum eth frame size */
- char *ptr;
-
- /* for now, we only handle AF_INET addresses */
- if (saddr->sin_family != AF_INET) {
- DEBUG(0,(__location__ " not an ipv4 address\n"));
- return -1;
- }
-
- s = socket(AF_INET, SOCK_PACKET, htons(ETHERTYPE_ARP));
- if (s == -1){
- DEBUG(0,(__location__ " failed to open raw socket\n"));
- return -1;
- }
-
- /* get the mac address */
- strcpy(if_hwaddr.ifr_name, iface);
- ret = ioctl(s, SIOCGIFHWADDR, &if_hwaddr);
- if ( ret < 0 ) {
- close(s);
- DEBUG(0,(__location__ " ioctl failed\n"));
- return -1;
- }
- if (if_hwaddr.ifr_hwaddr.sa_family != AF_LOCAL) {
- close(s);
- DEBUG(0,(__location__ " not an ethernet address\n"));
- return -1;
- }
-
-
- memset(buffer, 0 , 64);
- eh = (struct ether_header *)buffer;
- memset(eh->ether_dhost, 0xff, ETH_ALEN);
- memcpy(eh->ether_shost, if_hwaddr.ifr_hwaddr.sa_data, ETH_ALEN);
- eh->ether_type = htons(ETHERTYPE_ARP);
-
- ah = (struct arphdr *)&buffer[sizeof(struct ether_header)];
- ah->ar_hrd = htons(ARPHRD_ETHER);
- ah->ar_pro = htons(ETH_P_IP);
- ah->ar_hln = ETH_ALEN;
- ah->ar_pln = 4;
-
- /* send a gratious arp */
- ah->ar_op = htons(ARPOP_REQUEST);
- ptr = (char *)&ah[1];
- memcpy(ptr, if_hwaddr.ifr_hwaddr.sa_data, ETH_ALEN);
- ptr+=ETH_ALEN;
- memcpy(ptr, &saddr->sin_addr, 4);
- ptr+=4;
- memset(ptr, 0, ETH_ALEN);
- ptr+=ETH_ALEN;
- memcpy(ptr, &saddr->sin_addr, 4);
- ptr+=4;
-
- strncpy(sa.sa_data, iface, sizeof(sa.sa_data));
- ret = sendto(s, buffer, 64, 0, &sa, sizeof(sa));
- if (ret < 0 ){
- close(s);
- DEBUG(0,(__location__ " failed sendto\n"));
- return -1;
- }
-
- /* send unsolicited arp reply broadcast */
- ah->ar_op = htons(ARPOP_REPLY);
- ptr = (char *)&ah[1];
- memcpy(ptr, if_hwaddr.ifr_hwaddr.sa_data, ETH_ALEN);
- ptr+=ETH_ALEN;
- memcpy(ptr, &saddr->sin_addr, 4);
- ptr+=4;
- memcpy(ptr, if_hwaddr.ifr_hwaddr.sa_data, ETH_ALEN);
- ptr+=ETH_ALEN;
- memcpy(ptr, &saddr->sin_addr, 4);
- ptr+=4;
-
- strncpy(sa.sa_data, iface, sizeof(sa.sa_data));
- ret = sendto(s, buffer, 64, 0, &sa, sizeof(sa));
- if (ret < 0 ){
- DEBUG(0,(__location__ " failed sendto\n"));
- return -1;
- }
-
- close(s);
- return 0;
-}
-
-
-/*
- uint16 checksum for n bytes
- */
-static uint32_t uint16_checksum(uint16_t *data, size_t n)
-{
- uint32_t sum=0;
- while (n>=2) {
- sum += (uint32_t)ntohs(*data);
- data++;
- n -= 2;
- }
- if (n == 1) {
- sum += (uint32_t)ntohs(*(uint8_t *)data);
- }
- return sum;
-}
-
-/*
- simple TCP checksum - assumes data is multiple of 2 bytes long
- */
-static uint16_t tcp_checksum(uint16_t *data, size_t n, struct iphdr *ip)
-{
- uint32_t sum = uint16_checksum(data, n);
- uint16_t sum2;
- sum += uint16_checksum((uint16_t *)&ip->saddr, sizeof(ip->saddr));
- sum += uint16_checksum((uint16_t *)&ip->daddr, sizeof(ip->daddr));
- sum += ip->protocol + n;
- sum = (sum & 0xFFFF) + (sum >> 16);
- sum = (sum & 0xFFFF) + (sum >> 16);
- sum2 = htons(sum);
- sum2 = ~sum2;
- if (sum2 == 0) {
- return 0xFFFF;
- }
- return sum2;
-}
-
-/*
- send tcp ack packet from the specified IP/port to the specified
- destination IP/port.
-
- This is used to trigger the receiving host into sending its own ACK,
- which should trigger early detection of TCP reset by the client
- after IP takeover
- */
-int ctdb_sys_send_ack(const struct sockaddr_in *dest,
- const struct sockaddr_in *src)
-{
- int s, ret;
- uint32_t one = 1;
- struct {
- struct iphdr ip;
- struct tcphdr tcp;
- } pkt;
-
- /* for now, we only handle AF_INET addresses */
- if (src->sin_family != AF_INET || dest->sin_family != AF_INET) {
- DEBUG(0,(__location__ " not an ipv4 address\n"));
- return -1;
- }
-
- s = socket(AF_INET, SOCK_RAW, htons(IPPROTO_RAW));
- if (s == -1) {
- DEBUG(0,(__location__ " failed to open raw socket (%s)\n",
- strerror(errno)));
- return -1;
- }
-
- ret = setsockopt(s, SOL_IP, IP_HDRINCL, &one, sizeof(one));
- if (ret != 0) {
- DEBUG(0,(__location__ " failed to setup IP headers (%s)\n",
- strerror(errno)));
- close(s);
- return -1;
- }
-
- ZERO_STRUCT(pkt);
- pkt.ip.version = 4;
- pkt.ip.ihl = sizeof(pkt.ip)/4;
- pkt.ip.tot_len = htons(sizeof(pkt));
- pkt.ip.ttl = 255;
- pkt.ip.protocol = IPPROTO_TCP;
- pkt.ip.saddr = src->sin_addr.s_addr;
- pkt.ip.daddr = dest->sin_addr.s_addr;
- pkt.ip.check = 0;
-
- pkt.tcp.source = src->sin_port;
- pkt.tcp.dest = dest->sin_port;
- pkt.tcp.ack = 1;
- pkt.tcp.doff = sizeof(pkt.tcp)/4;
- pkt.tcp.window = htons(1234);
- pkt.tcp.check = tcp_checksum((uint16_t *)&pkt.tcp, sizeof(pkt.tcp), &pkt.ip);
-
- ret = sendto(s, &pkt, sizeof(pkt), 0, dest, sizeof(*dest));
- if (ret != sizeof(pkt)) {
- DEBUG(0,(__location__ " failed sendto (%s)\n", strerror(errno)));
- close(s);
- return -1;
- }
-
- close(s);
- return 0;
-}
-
-
-/*
- see if we currently have an interface with the given IP
-
- we try to bind to it, and if that fails then we don't have that IP
- on an interface
- */
-bool ctdb_sys_have_ip(const char *ip)
-{
- struct sockaddr_in sin;
- int s;
- int ret;
-
- sin.sin_port = 0;
- inet_aton(ip, &sin.sin_addr);
- sin.sin_family = AF_INET;
- s = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
- if (s == -1) {
- return false;
- }
- ret = bind(s, (struct sockaddr *)&sin, sizeof(sin));
- close(s);
- return ret == 0;
-}
-
-/*
- run the event script - varargs version
- */
-static int ctdb_event_script_v(struct ctdb_context *ctdb, const char *fmt, va_list ap)
-{
- char *options, *cmdstr;
- int ret;
- va_list ap2;
- struct stat st;
-
- if (stat(ctdb->takeover.event_script, &st) != 0 &&
- errno == ENOENT) {
- DEBUG(0,("No event script found at '%s'\n", ctdb->takeover.event_script));
- return 0;
- }
-
- va_copy(ap2, ap);
- options = talloc_vasprintf(ctdb, fmt, ap2);
- va_end(ap2);
- CTDB_NO_MEMORY(ctdb, options);
-
- cmdstr = talloc_asprintf(ctdb, "%s %s", ctdb->takeover.event_script, options);
- CTDB_NO_MEMORY(ctdb, cmdstr);
-
- ret = system(cmdstr);
- if (ret != -1) {
- ret = WEXITSTATUS(ret);
- }
-
- talloc_free(cmdstr);
- talloc_free(options);
-
- return ret;
-}
-
-/*
- run the event script
- */
-int ctdb_event_script(struct ctdb_context *ctdb, const char *fmt, ...)
-{
- va_list ap;
- int ret;
-
- va_start(ap, fmt);
- ret = ctdb_event_script_v(ctdb, fmt, ap);
- va_end(ap);
-
- return ret;
-}
-
-
-struct ctdb_event_script_state {
- struct ctdb_context *ctdb;
- pid_t child;
- void (*callback)(struct ctdb_context *, int);
- int fd[2];
-};
-
-/* called when child is finished */
-static void ctdb_event_script_handler(struct event_context *ev, struct fd_event *fde,
- uint16_t flags, void *p)
-{
- struct ctdb_event_script_state *state =
- talloc_get_type(p, struct ctdb_event_script_state);
- int status = -1;
- waitpid(state->child, &status, 0);
- if (status != -1) {
- status = WEXITSTATUS(status);
- }
- state->callback(state->ctdb, status);
- talloc_free(state);
-}
-
-
-/*
- run the event script in the background, calling the callback when
- finished
- */
-int ctdb_event_script_callback(struct ctdb_context *ctdb,
- void (*callback)(struct ctdb_context *, int),
- const char *fmt, ...)
-{
- struct ctdb_event_script_state *state;
- va_list ap;
- int ret;
-
- state = talloc(ctdb, struct ctdb_event_script_state);
- CTDB_NO_MEMORY(ctdb, state);
-
- state->ctdb = ctdb;
- state->callback = callback;
-
- ret = pipe(state->fd);
- if (ret != 0) {
- talloc_free(state);
- return -1;
- }
-
- state->child = fork();
-
- if (state->child == (pid_t)-1) {
- close(state->fd[0]);
- close(state->fd[1]);
- talloc_free(state);
- return -1;
- }
-
- if (state->child == 0) {
- close(state->fd[0]);
- va_start(ap, fmt);
- ret = ctdb_event_script_v(ctdb, fmt, ap);
- va_end(ap);
- _exit(ret);
- }
-
- close(state->fd[1]);
-
- event_add_fd(ctdb->ev, state, state->fd[0], EVENT_FD_READ|EVENT_FD_AUTOCLOSE,
- ctdb_event_script_handler, state);
-
- return 0;
-}