1005 lines
28 KiB
C
1005 lines
28 KiB
C
#include "toa.h"
|
|
#include <net/genetlink.h>
|
|
#include <net/inet_common.h>
|
|
#include <net/inet_connection_sock.h>
|
|
#include <net/inet_hashtables.h>
|
|
#include <linux/kallsyms.h>
|
|
#include <linux/kprobes.h>
|
|
|
|
#define NIPQUAD_FMT "%u.%u.%u.%u"
|
|
#define NIPQUAD(addr) \
|
|
((unsigned char *)&addr)[0], \
|
|
((unsigned char *)&addr)[1], \
|
|
((unsigned char *)&addr)[2], \
|
|
((unsigned char *)&addr)[3]
|
|
|
|
/*
|
|
* TOA a new Tcp Option as Address,
|
|
* here address including IP and Port.
|
|
* the real {IP,Port} can be added into option field of TCP header,
|
|
* with LVS FULLNAT model, the realservice are still able to receive real {IP,Port} info.
|
|
* So far, this module only supports IPv4 and IPv6 mapped IPv4.
|
|
*
|
|
* Authors:
|
|
* Wen Li <steel.mental@gmail.com>
|
|
* Yan Tian <tianyan.7c00@gmail.com>
|
|
* Jiaming Wu <pukong.wjm@taobao.com>
|
|
* Jiajun Chen <mofan.cjj@taobao.com>
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version
|
|
* 2 of the License, or (at your option) any later version.
|
|
*
|
|
*/
|
|
static int vtoa;
|
|
module_param(vtoa, int, 0600);
|
|
MODULE_PARM_DESC(vtoa, "vtoa module control.value can be 0 or 1 ;default is 0.");
|
|
|
|
#define VTOA_GETPEERNAME_IPV4_DISABLE (0x1 << 0)
|
|
#define VTOA_GETPEERNAME_IPV6_DISABLE (0x1 << 1)
|
|
|
|
static int disable_getpeername;
|
|
module_param(disable_getpeername, int, 0600);
|
|
MODULE_PARM_DESC(disable_getpeername, \
|
|
"vtoa module control support getpeername.disable 1 ipv4, 2 ipv6, 3 ipv4 & ipv6;default is 0.");
|
|
|
|
static int dbg;
|
|
module_param(dbg, int, 0600);
|
|
MODULE_PARM_DESC(dbg, "debug log switch");
|
|
|
|
unsigned long sk_data_ready_addr = 0;
|
|
|
|
static struct kprobe kp_exec;
|
|
|
|
static typeof(kallsyms_lookup_name) *ksyms_lookup_name = NULL;
|
|
|
|
/*
|
|
* Statistics of toa in proc /proc/net/toa_stats
|
|
*/
|
|
|
|
struct toa_stats_entry toa_stats[] = {
|
|
TOA_STAT_ITEM("syn_recv_sock_toa", SYN_RECV_SOCK_TOA_CNT),
|
|
TOA_STAT_ITEM("syn_recv_sock_no_toa", SYN_RECV_SOCK_NO_TOA_CNT),
|
|
TOA_STAT_ITEM("getname_toa_ok", GETNAME_TOA_OK_CNT),
|
|
TOA_STAT_ITEM("getname_toa_mismatch", GETNAME_TOA_MISMATCH_CNT),
|
|
TOA_STAT_ITEM("getname_toa_bypass", GETNAME_TOA_BYPASS_CNT),
|
|
TOA_STAT_ITEM("getname_toa_empty", GETNAME_TOA_EMPTY_CNT),
|
|
TOA_STAT_ITEM("vtoa_get", GETNAME_VTOA_GET_CNT),
|
|
TOA_STAT_ITEM("vtoa_attr_err", GETNAME_VTOA_GET_ATTR_ERR_CNT),
|
|
TOA_STAT_ITEM("vtoa_lookup_err", GETNAME_VTOA_GET_LOCKUP_ERR_CNT),
|
|
TOA_STAT_ITEM("vtoa_netlink_err", GETNAME_VTOA_GET_NETLINK_ERR_CNT),
|
|
TOA_STAT_ITEM("getname_vtoa_ipv4_err", GETNAME_VTOA_GETPEERNAME_IPV4_ERR_CNT),
|
|
TOA_STAT_ITEM("getname_vtoa_ipv6_err", GETNAME_VTOA_GETPEERNAME_IPV6_ERR_CNT),
|
|
TOA_STAT_END
|
|
};
|
|
|
|
DEFINE_TOA_STAT(struct toa_stat_mib, ext_stats);
|
|
|
|
enum {
|
|
VTOA_CMD_UNSPEC,
|
|
VTOA_CMD_GET,
|
|
|
|
__VTOA_CMD_MAX
|
|
};
|
|
#define VTOA_CMD_MAX (__VTOA_CMD_MAX - 1)
|
|
|
|
enum {
|
|
VTOA_ATTR_UNSPEC,
|
|
VTOA_ATTR_REQ,
|
|
|
|
VTOA_ATTR_I_VPCID,
|
|
VTOA_ATTR_I_VMIP,
|
|
VTOA_ATTR_I_SPORT,
|
|
VTOA_ATTR_I_VIP,
|
|
VTOA_ATTR_I_VPORT,
|
|
__VTOA_ATTR_MAX
|
|
};
|
|
#define VTOA_ATTR_MAX (__VTOA_ATTR_MAX - 1)
|
|
|
|
static struct nla_policy vtoa_policy[VTOA_ATTR_MAX + 1] =
|
|
{
|
|
[VTOA_ATTR_REQ] = { .type = NLA_STRING},
|
|
[VTOA_ATTR_I_VPCID] = { .type = NLA_U32},
|
|
[VTOA_ATTR_I_VMIP] = { .type = NLA_U32},
|
|
[VTOA_ATTR_I_SPORT] = { .type = NLA_U16},
|
|
[VTOA_ATTR_I_VIP] = { .type = NLA_U32},
|
|
[VTOA_ATTR_I_VPORT] = { .type = NLA_U16},
|
|
};
|
|
static struct genl_family vtoa_genl_family;
|
|
|
|
struct vtoa_req{
|
|
u32 if_idx;
|
|
__be32 sip;
|
|
__be32 dip;
|
|
__be16 sport;
|
|
__be16 dport;
|
|
};
|
|
|
|
struct vtoa_info{
|
|
u32 i_vpcid;
|
|
__be32 i_vmip;
|
|
__be32 i_vip;
|
|
__be16 i_sport;
|
|
__be16 i_vport;
|
|
};
|
|
|
|
|
|
/*
|
|
* Funcs for vtoa hooks
|
|
*/
|
|
|
|
/* Parse TCP options in skb, try to get client ip, port, vpcid, vmip, vport
|
|
* @param skb [in] received skb, it should be a ack/get-ack packet.
|
|
* @return 0 if we don't get client ip/port , vpcid and vmip/vport;
|
|
* 1 we get vtoa data;
|
|
* -1 something wrong .
|
|
*/
|
|
static int get_vtoa_data(struct sk_buff *skb, struct sock *sk)
|
|
{
|
|
struct tcphdr *th;
|
|
int length;
|
|
unsigned char *ptr;
|
|
int is_toa = 0;
|
|
|
|
/*TOA_DBG("get_vtoa_data called\n");*/
|
|
|
|
if (NULL != skb) {
|
|
th = tcp_hdr(skb);
|
|
length = (th->doff * 4) - sizeof(struct tcphdr);
|
|
ptr = (unsigned char *) (th + 1);
|
|
|
|
while (length > 0) {
|
|
int opcode = *ptr++;
|
|
int opsize;
|
|
switch (opcode) {
|
|
case TCPOPT_EOL:
|
|
return -1;
|
|
case TCPOPT_NOP:/* Ref: RFC 793 section 3.1 */
|
|
length--;
|
|
continue;
|
|
default:
|
|
opsize = *ptr++;
|
|
if (opsize < 2) /* "silly options" */
|
|
return -1;
|
|
if (opsize > length)
|
|
/* don't parse partial options */
|
|
return -1;
|
|
if (TCPOPT_REAL_CLIENTIP == opcode
|
|
&& TCPOLEN_REAL_CLIENTIP == opsize) {
|
|
sk->sk_tvpc_info.sport =
|
|
*((__u16 *)(ptr));
|
|
sk->sk_tvpc_info.vmip =
|
|
*((__u32 *)(ptr + 2));
|
|
is_toa++;
|
|
} else if (TCPOPT_VM_VPCID == opcode
|
|
&& TCPOLEN_VM_VPCID == opsize) {
|
|
sk->sk_tvpc_info.vpcid =
|
|
*((__u32 *)(ptr));
|
|
is_toa++;
|
|
} else if (TCPOPT_VIP == opcode
|
|
&& TCPOLEN_VIP == opsize) {
|
|
sk->sk_tvpc_info.vport =
|
|
*((__u16 *)(ptr));
|
|
sk->sk_tvpc_info.vip =
|
|
*((__u32 *)(ptr + 2));
|
|
is_toa++;
|
|
}
|
|
ptr += opsize - 2;
|
|
length -= opsize;
|
|
}
|
|
}
|
|
TOA_DBG("%s tcp source:%u dest:%u vpcid:%u vmip:%pI4 sport:%u vip:%pI4 vport:%u\n",
|
|
__func__, ntohs(th->source), ntohs(th->dest), sk->sk_tvpc_info.vpcid,
|
|
&sk->sk_tvpc_info.vmip, ntohs(sk->sk_tvpc_info.sport),
|
|
&sk->sk_tvpc_info.vip, ntohs(sk->sk_tvpc_info.vport));
|
|
}
|
|
return is_toa;
|
|
}
|
|
|
|
/* get client ip from socket
|
|
* @param sock [in] the socket to getpeername() or getsockname()
|
|
* @param uaddr [out] the place to put client ip, port
|
|
* @param uaddr_len [out] lenth of @uaddr
|
|
* @peer [in] if(peer), try to get remote address; if(!peer), try to get local address
|
|
* @return return what the original inet_getname() returns.
|
|
*/
|
|
static int
|
|
inet_getname_vtoa(struct socket *sock,
|
|
struct sockaddr *uaddr,
|
|
int peer)
|
|
{
|
|
int retval = 0;
|
|
struct sock *sk = sock->sk;
|
|
struct sockaddr_in *sin = (struct sockaddr_in *) uaddr;
|
|
|
|
/* call orginal one */
|
|
retval = inet_getname(sock, uaddr, peer);
|
|
if (disable_getpeername & VTOA_GETPEERNAME_IPV4_DISABLE){
|
|
TOA_INC_STATS(ext_stats,
|
|
GETNAME_VTOA_GETPEERNAME_IPV4_ERR_CNT);
|
|
TOA_DBG("%s called, toa ipv getpeername disable\n", __func__);
|
|
return retval;
|
|
}
|
|
|
|
/* set our value if need */
|
|
if (retval == sizeof(struct sockaddr_in) && peer && sk) {
|
|
if (sk_data_ready_addr == (unsigned long) sk->sk_data_ready) {
|
|
/*syscall accept must go here,
|
|
*so change the client ip/port and vip/vport here
|
|
*/
|
|
if (0 != sk->sk_tvpc_info.vmip
|
|
&& 0 != sk->sk_tvpc_info.sport) {
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_OK_CNT);
|
|
sin->sin_port = sk->sk_tvpc_info.sport;
|
|
sin->sin_addr.s_addr = sk->sk_tvpc_info.vmip;
|
|
} else if (0 == sk->sk_tvpc_info.vmip
|
|
&& 0 == sk->sk_tvpc_info.sport) {
|
|
TOA_INC_STATS(ext_stats,
|
|
SYN_RECV_SOCK_NO_TOA_CNT);
|
|
sk->sk_tvpc_info.sport = sin->sin_port;
|
|
sk->sk_tvpc_info.vmip = sin->sin_addr.s_addr;
|
|
} else
|
|
TOA_INFO("vmip or sport can not 0.\n");
|
|
|
|
/*do not get vip and vport,
|
|
*maybe vpcgw do not pass them,
|
|
*maybe it is a flow just for this host
|
|
*/
|
|
if (0 == sk->sk_tvpc_info.vip
|
|
&& 0 == sk->sk_tvpc_info.vport) {
|
|
struct sockaddr_in addr;
|
|
if (inet_getname(sock, (struct sockaddr *)&addr,
|
|
0) == sizeof(struct sockaddr_in)) {
|
|
sk->sk_tvpc_info.vport = addr.sin_port;
|
|
sk->sk_tvpc_info.vip =
|
|
addr.sin_addr.s_addr;
|
|
}
|
|
}
|
|
} else {
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_BYPASS_CNT);
|
|
}
|
|
} else { /* no need to get client ip */
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_EMPTY_CNT);
|
|
}
|
|
|
|
TOA_DBG("%s called, sk_data_ready:%px retval:%d peer:%d vmip:%08x sport:%u vip:%08x vport:%u\n",
|
|
__func__, sk?sk->sk_data_ready:NULL, retval, peer,
|
|
sk?ntohl(sk->sk_tvpc_info.vmip):0, sk?ntohs(sk->sk_tvpc_info.sport):0,
|
|
sk?ntohl(sk->sk_tvpc_info.vip):0, sk?ntohs(sk->sk_tvpc_info.vport):0);
|
|
|
|
return retval;
|
|
}
|
|
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|
|
static int
|
|
inet6_getname_vtoa(struct socket *sock,
|
|
struct sockaddr *uaddr,
|
|
int peer)
|
|
{
|
|
int retval = 0;
|
|
struct sock *sk = sock->sk;
|
|
struct sockaddr_in6 *sin = (struct sockaddr_in6 *) uaddr;
|
|
|
|
/* call orginal one */
|
|
retval = inet6_getname(sock, uaddr, peer);
|
|
if (disable_getpeername & VTOA_GETPEERNAME_IPV6_DISABLE){
|
|
TOA_INC_STATS(ext_stats,
|
|
GETNAME_VTOA_GETPEERNAME_IPV6_ERR_CNT);
|
|
TOA_DBG("%s called, toa ipv6 getpeername disable\n", __func__);
|
|
return retval;
|
|
}
|
|
|
|
/* set our value if need */
|
|
if (retval == sizeof(struct sockaddr_in6) && peer && sk) {
|
|
if (sk_data_ready_addr == (unsigned long) sk->sk_data_ready) {
|
|
if (0 != sk->sk_tvpc_info.vmip
|
|
&& 0 != sk->sk_tvpc_info.sport) {
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_OK_CNT);
|
|
sin->sin6_port = sk->sk_tvpc_info.sport;
|
|
ipv6_addr_set(&sin->sin6_addr, 0, 0,
|
|
htonl(0x0000FFFF),
|
|
sk->sk_tvpc_info.vmip);
|
|
} else if (0 == sk->sk_tvpc_info.vmip
|
|
&& 0 == sk->sk_tvpc_info.sport) {
|
|
TOA_INC_STATS(ext_stats,
|
|
SYN_RECV_SOCK_NO_TOA_CNT);
|
|
sk->sk_tvpc_info.sport = sin->sin6_port;
|
|
sk->sk_tvpc_info.vmip =
|
|
sin->sin6_addr.s6_addr32[3];
|
|
} else
|
|
TOA_INFO("vmip or sport can not 0.\n");
|
|
|
|
if (0 == sk->sk_tvpc_info.vip
|
|
&& 0 == sk->sk_tvpc_info.vport) {
|
|
struct sockaddr_in6 addr;
|
|
if (inet6_getname(sock,
|
|
(struct sockaddr *)&addr,
|
|
0) == sizeof(struct sockaddr_in6)) {
|
|
sk->sk_tvpc_info.vport =
|
|
addr.sin6_port;
|
|
sk->sk_tvpc_info.vip =
|
|
addr.sin6_addr.s6_addr32[3];
|
|
}
|
|
}
|
|
} else {
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_BYPASS_CNT);
|
|
}
|
|
} else { /* no need to get client ip */
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_EMPTY_CNT);
|
|
}
|
|
|
|
TOA_DBG("%s called, sk_data_ready:%px retval:%d peer:%d vmip:%08x sport:%u vip:%08x vport:%u\n",
|
|
__func__, sk?sk->sk_data_ready:NULL, retval, peer,
|
|
sk?ntohl(sk->sk_tvpc_info.vmip):0, sk?ntohs(sk->sk_tvpc_info.sport):0,
|
|
sk?ntohl(sk->sk_tvpc_info.vip):0, sk?ntohs(sk->sk_tvpc_info.vport):0);
|
|
|
|
return retval;
|
|
}
|
|
#endif
|
|
|
|
/* The three way handshake has completed - we got a valid synack -
|
|
* now create the new socket.
|
|
* We need to save toa data into the new socket.
|
|
* @param sk [out] the socket
|
|
* @param skb [in] the ack/ack-get packet
|
|
* @param req [in] the open request for this connection
|
|
* @param dst [out] route cache entry
|
|
* @return NULL if fail new socket if succeed.
|
|
*/
|
|
static struct sock *
|
|
tcp_v4_syn_recv_sock_vtoa(const struct sock *sk,
|
|
struct sk_buff *skb,
|
|
struct request_sock *req,
|
|
struct dst_entry *dst,
|
|
struct request_sock *req_unhash,
|
|
bool *own_req)
|
|
{
|
|
struct sock *newsock = NULL;
|
|
int ret = 0;
|
|
|
|
TOA_DBG("%s called\n", __func__);
|
|
|
|
/* call orginal one */
|
|
newsock = tcp_v4_syn_recv_sock(sk, skb, req, dst, req_unhash, own_req);
|
|
/* set our value if need */
|
|
if (NULL != newsock) {
|
|
memset(&newsock->sk_tvpc_info, 0,
|
|
sizeof(newsock->sk_tvpc_info));
|
|
ret = get_vtoa_data(skb, newsock);
|
|
if (ret > 0)
|
|
TOA_INC_STATS(ext_stats, SYN_RECV_SOCK_TOA_CNT);
|
|
else
|
|
TOA_INC_STATS(ext_stats,
|
|
SYN_RECV_SOCK_NO_TOA_CNT);
|
|
}
|
|
return newsock;
|
|
}
|
|
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|
|
static struct sock *
|
|
tcp_v6_syn_recv_sock_vtoa(const struct sock *sk,
|
|
struct sk_buff *skb,
|
|
struct request_sock *req,
|
|
struct dst_entry *dst,
|
|
struct request_sock *req_unhash,
|
|
bool *own_req)
|
|
{
|
|
struct sock *newsock = NULL;
|
|
int ret = 0;
|
|
TOA_DBG("%s called\n", __func__);
|
|
|
|
/* call orginal one */
|
|
newsock = tcp_v6_syn_recv_sock(sk, skb, req, dst, req_unhash, own_req);
|
|
|
|
/* set our value if need */
|
|
if (NULL != newsock) {
|
|
memset(&newsock->sk_tvpc_info, 0,
|
|
sizeof(newsock->sk_tvpc_info));
|
|
ret = get_vtoa_data(skb, newsock);
|
|
if (ret > 0)
|
|
TOA_INC_STATS(ext_stats, SYN_RECV_SOCK_TOA_CNT);
|
|
else
|
|
TOA_INC_STATS(ext_stats,
|
|
SYN_RECV_SOCK_NO_TOA_CNT);
|
|
}
|
|
return newsock;
|
|
}
|
|
#endif
|
|
/*
|
|
* Funcs for toa hooks
|
|
*/
|
|
|
|
/* Parse TCP options in skb, try to get client ip, port
|
|
* @param skb [in] received skb, it should be a ack/get-ack packet.
|
|
* @return NULL if we don't get client ip/port;
|
|
* value of toa_data in ret_ptr if we get client ip/port.
|
|
*/
|
|
static void * get_toa_data(struct sk_buff *skb)
|
|
{
|
|
struct tcphdr *th;
|
|
int length;
|
|
unsigned char *ptr;
|
|
|
|
struct toa_data tdata;
|
|
|
|
void *ret_ptr = NULL;
|
|
|
|
//TOA_DBG("get_toa_data called\n");
|
|
|
|
if (NULL != skb) {
|
|
th = tcp_hdr(skb);
|
|
length = (th->doff * 4) - sizeof (struct tcphdr);
|
|
ptr = (unsigned char *) (th + 1);
|
|
|
|
while (length > 0) {
|
|
int opcode = *ptr++;
|
|
int opsize;
|
|
switch (opcode) {
|
|
case TCPOPT_EOL:
|
|
return NULL;
|
|
case TCPOPT_NOP: /* Ref: RFC 793 section 3.1 */
|
|
length--;
|
|
continue;
|
|
default:
|
|
opsize = *ptr++;
|
|
if (opsize < 2) /* "silly options" */
|
|
return NULL;
|
|
if (opsize > length)
|
|
return NULL; /* don't parse partial options */
|
|
if (TCPOPT_REAL_CLIENTIP == opcode && TCPOLEN_REAL_CLIENTIP == opsize) {
|
|
memcpy(&tdata, ptr - 2, sizeof (tdata));
|
|
TOA_DBG("find toa data: ip = %u.%u.%u.%u, port = %u\n", NIPQUAD(tdata.ip),
|
|
ntohs(tdata.port));
|
|
memcpy(&ret_ptr, &tdata, sizeof (ret_ptr));
|
|
TOA_DBG("coded toa data: %px\n", ret_ptr);
|
|
return ret_ptr;
|
|
}
|
|
ptr += opsize - 2;
|
|
length -= opsize;
|
|
}
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* get client ip from socket
|
|
* @param sock [in] the socket to getpeername() or getsockname()
|
|
* @param uaddr [out] the place to put client ip, port
|
|
* @param uaddr_len [out] lenth of @uaddr
|
|
* @peer [in] if(peer), try to get remote address; if(!peer), try to get local address
|
|
* @return return what the original inet_getname() returns.
|
|
*/
|
|
static int
|
|
inet_getname_toa(struct socket *sock, struct sockaddr *uaddr, int peer)
|
|
{
|
|
int retval = 0;
|
|
struct sock *sk = sock->sk;
|
|
struct sockaddr_in *sin = (struct sockaddr_in *) uaddr;
|
|
struct toa_data tdata;
|
|
|
|
/* call orginal one */
|
|
retval = inet_getname(sock, uaddr, peer);
|
|
|
|
/* set our value if need */
|
|
if (sk && retval == sizeof(struct sockaddr_in) && NULL != sk->sk_user_data && peer) {
|
|
if (sk_data_ready_addr == (unsigned long) sk->sk_data_ready) {
|
|
memcpy(&tdata, &sk->sk_user_data, sizeof (tdata));
|
|
if (TCPOPT_REAL_CLIENTIP == tdata.opcode && TCPOLEN_REAL_CLIENTIP == tdata.opsize) {
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_OK_CNT);
|
|
//TOA_DBG("inet_getname_toa: set new sockaddr, ip %u.%u.%u.%u -> %u.%u.%u.%u, port %u -> %u\n",
|
|
// NIPQUAD(sin->sin_addr.s_addr), NIPQUAD(tdata.ip), ntohs(sin->sin_port),
|
|
// ntohs(tdata.port));
|
|
sin->sin_port = tdata.port;
|
|
sin->sin_addr.s_addr = tdata.ip;
|
|
} else { /* sk_user_data doesn't belong to us */
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_MISMATCH_CNT);
|
|
//TOA_DBG("inet_getname_toa: invalid toa data, ip %u.%u.%u.%u port %u opcode %u opsize %u\n",
|
|
// NIPQUAD(tdata.ip), ntohs(tdata.port), tdata.opcode, tdata.opsize);
|
|
}
|
|
} else {
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_BYPASS_CNT);
|
|
}
|
|
} else { /* no need to get client ip */
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_EMPTY_CNT);
|
|
}
|
|
|
|
TOA_DBG("%s called, sk_user_data:%px sk_data_ready:%px retval:%d peer:%d\n",
|
|
__func__, sk?sk->sk_user_data:NULL, sk?sk->sk_data_ready:NULL, retval, peer);
|
|
|
|
return retval;
|
|
}
|
|
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|
|
static int
|
|
inet6_getname_toa(struct socket *sock, struct sockaddr *uaddr, int peer)
|
|
{
|
|
int retval = 0;
|
|
struct sock *sk = sock->sk;
|
|
struct sockaddr_in6 *sin = (struct sockaddr_in6 *) uaddr;
|
|
struct toa_data tdata;
|
|
|
|
/* call orginal one */
|
|
retval = inet6_getname(sock, uaddr, peer);
|
|
|
|
/* set our value if need */
|
|
if (sk && retval == sizeof(struct sockaddr_in6) && NULL != sk->sk_user_data && peer) {
|
|
if (sk_data_ready_addr == (unsigned long) sk->sk_data_ready) {
|
|
memcpy(&tdata, &sk->sk_user_data, sizeof (tdata));
|
|
if (TCPOPT_REAL_CLIENTIP == tdata.opcode && TCPOLEN_REAL_CLIENTIP == tdata.opsize) {
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_OK_CNT);
|
|
sin->sin6_port = tdata.port;
|
|
ipv6_addr_set(&sin->sin6_addr, 0, 0, htonl(0x0000FFFF), tdata.ip);
|
|
} else { /* sk_user_data doesn't belong to us */
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_MISMATCH_CNT);
|
|
}
|
|
} else {
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_BYPASS_CNT);
|
|
}
|
|
} else { /* no need to get client ip */
|
|
TOA_INC_STATS(ext_stats, GETNAME_TOA_EMPTY_CNT);
|
|
}
|
|
|
|
TOA_DBG("%s called, sk_user_data:%px sk_data_ready:%px retval:%d peer:%d\n",
|
|
__func__, sk?sk->sk_user_data:NULL, sk?sk->sk_data_ready:NULL, retval, peer);
|
|
|
|
return retval;
|
|
}
|
|
#endif
|
|
|
|
/* The three way handshake has completed - we got a valid synack -
|
|
* now create the new socket.
|
|
* We need to save toa data into the new socket.
|
|
* @param sk [out] the socket
|
|
* @param skb [in] the ack/ack-get packet
|
|
* @param req [in] the open request for this connection
|
|
* @param dst [out] route cache entry
|
|
* @return NULL if fail new socket if succeed.
|
|
*/
|
|
static struct sock *
|
|
tcp_v4_syn_recv_sock_toa(const struct sock *sk, struct sk_buff *skb,
|
|
struct request_sock *req,
|
|
struct dst_entry *dst,
|
|
struct request_sock *req_unhash,
|
|
bool *own_req)
|
|
{
|
|
struct sock *newsock = NULL;
|
|
|
|
/* call orginal one */
|
|
newsock = tcp_v4_syn_recv_sock(sk, skb, req, dst, req_unhash, own_req);
|
|
|
|
/* set our value if need */
|
|
if (NULL != newsock && NULL == newsock->sk_user_data) {
|
|
newsock->sk_user_data = get_toa_data(skb);
|
|
if(NULL != newsock->sk_user_data){
|
|
TOA_INC_STATS(ext_stats, SYN_RECV_SOCK_TOA_CNT);
|
|
} else {
|
|
TOA_INC_STATS(ext_stats, SYN_RECV_SOCK_NO_TOA_CNT);
|
|
}
|
|
}
|
|
|
|
TOA_DBG("%s called, newsock:%px sk_user_data:%px\n",
|
|
__func__, newsock, newsock?newsock->sk_user_data:NULL);
|
|
|
|
return newsock;
|
|
}
|
|
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|
|
static struct sock *
|
|
tcp_v6_syn_recv_sock_toa(const struct sock *sk, struct sk_buff *skb,
|
|
struct request_sock *req,
|
|
struct dst_entry *dst,
|
|
struct request_sock *req_unhash,
|
|
bool *own_req)
|
|
{
|
|
struct sock *newsock = NULL;
|
|
|
|
/* call orginal one */
|
|
newsock = tcp_v6_syn_recv_sock(sk, skb, req, dst, req_unhash, own_req);
|
|
|
|
/* set our value if need */
|
|
if (NULL != newsock && NULL == newsock->sk_user_data) {
|
|
newsock->sk_user_data = get_toa_data(skb);
|
|
if(NULL != newsock->sk_user_data){
|
|
TOA_INC_STATS(ext_stats, SYN_RECV_SOCK_TOA_CNT);
|
|
} else {
|
|
TOA_INC_STATS(ext_stats, SYN_RECV_SOCK_NO_TOA_CNT);
|
|
}
|
|
}
|
|
|
|
TOA_DBG("%s called, newsock:%px sk_user_data:%px\n",
|
|
__func__, newsock, newsock?newsock->sk_user_data:NULL);
|
|
|
|
return newsock;
|
|
}
|
|
#endif
|
|
|
|
/*
|
|
* HOOK FUNCS
|
|
*/
|
|
|
|
/* replace the functions with our functions */
|
|
static inline int
|
|
hook_toa_functions(void)
|
|
{
|
|
struct proto_ops *inet_stream_ops_p;
|
|
struct proto_ops *inet6_stream_ops_p;
|
|
struct inet_connection_sock_af_ops *ipv4_specific_p;
|
|
struct inet_connection_sock_af_ops *ipv6_specific_p;
|
|
|
|
/* hook inet_getname for ipv4 */
|
|
inet_stream_ops_p = (struct proto_ops *)&inet_stream_ops;
|
|
if (vtoa)
|
|
inet_stream_ops_p->getname = inet_getname_vtoa;
|
|
else
|
|
inet_stream_ops_p->getname = inet_getname_toa;
|
|
|
|
TOA_INFO("CPU [%u] hooked inet_getname <%px> --> <%px>\n", smp_processor_id(), inet_getname,
|
|
inet_stream_ops_p->getname);
|
|
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|
|
/* hook inet6_getname for ipv6 */
|
|
inet6_stream_ops_p = (struct proto_ops *)&inet6_stream_ops;
|
|
if (vtoa)
|
|
inet6_stream_ops_p->getname = inet6_getname_vtoa;
|
|
else
|
|
inet6_stream_ops_p->getname = inet6_getname_toa;
|
|
|
|
TOA_INFO("CPU [%u] hooked inet6_getname <%px> --> <%px>\n", smp_processor_id(), inet6_getname,
|
|
inet6_stream_ops_p->getname);
|
|
#endif
|
|
|
|
/* hook tcp_v4_syn_recv_sock for ipv4 */
|
|
ipv4_specific_p = (struct inet_connection_sock_af_ops *)&ipv4_specific;
|
|
if (vtoa)
|
|
ipv4_specific_p->syn_recv_sock = tcp_v4_syn_recv_sock_vtoa;
|
|
else
|
|
ipv4_specific_p->syn_recv_sock = tcp_v4_syn_recv_sock_toa;
|
|
|
|
TOA_INFO("CPU [%u] hooked tcp_v4_syn_recv_sock <%px> --> <%px>\n", smp_processor_id(), tcp_v4_syn_recv_sock,
|
|
ipv4_specific_p->syn_recv_sock);
|
|
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|
|
/* hook tcp_v6_syn_recv_sock for ipv6 */
|
|
ipv6_specific_p = (struct inet_connection_sock_af_ops *)&ipv6_specific;
|
|
if (vtoa)
|
|
ipv6_specific_p->syn_recv_sock = tcp_v6_syn_recv_sock_vtoa;
|
|
else
|
|
ipv6_specific_p->syn_recv_sock = tcp_v6_syn_recv_sock_toa;
|
|
|
|
TOA_INFO("CPU [%u] hooked tcp_v6_syn_recv_sock <%px> --> <%px>\n", smp_processor_id(), tcp_v6_syn_recv_sock,
|
|
ipv6_specific_p->syn_recv_sock);
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* replace the functions to original ones */
|
|
static int
|
|
unhook_toa_functions(void)
|
|
{
|
|
struct proto_ops *inet_stream_ops_p;
|
|
struct proto_ops *inet6_stream_ops_p;
|
|
struct inet_connection_sock_af_ops *ipv4_specific_p;
|
|
struct inet_connection_sock_af_ops *ipv6_specific_p;
|
|
|
|
/* unhook inet_getname for ipv4 */
|
|
inet_stream_ops_p = (struct proto_ops *)&inet_stream_ops;
|
|
inet_stream_ops_p->getname = inet_getname;
|
|
TOA_INFO("CPU [%u] unhooked inet_getname\n", smp_processor_id());
|
|
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|
|
/* unhook inet6_getname for ipv6 */
|
|
inet6_stream_ops_p = (struct proto_ops *)&inet6_stream_ops;
|
|
inet6_stream_ops_p->getname = inet6_getname;
|
|
TOA_INFO("CPU [%u] unhooked inet6_getname\n", smp_processor_id());
|
|
#endif
|
|
|
|
/* unhook tcp_v4_syn_recv_sock for ipv4 */
|
|
ipv4_specific_p = (struct inet_connection_sock_af_ops *)&ipv4_specific;
|
|
ipv4_specific_p->syn_recv_sock = tcp_v4_syn_recv_sock;
|
|
TOA_INFO("CPU [%u] unhooked tcp_v4_syn_recv_sock\n", smp_processor_id());
|
|
|
|
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
|
|
/* unhook tcp_v6_syn_recv_sock for ipv6 */
|
|
ipv6_specific_p = (struct inet_connection_sock_af_ops *)&ipv6_specific;
|
|
ipv6_specific_p->syn_recv_sock = tcp_v6_syn_recv_sock;
|
|
TOA_INFO("CPU [%u] unhooked tcp_v6_syn_recv_sock\n", smp_processor_id());
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Statistics of toa in proc /proc/net/toa_stats
|
|
*/
|
|
static int toa_stats_show(struct seq_file *seq, void *v){
|
|
int i, j;
|
|
|
|
/* print CPU first */
|
|
seq_printf(seq, " ");
|
|
for_each_online_cpu(i) {
|
|
seq_printf(seq, "CPU%d ", i);
|
|
}
|
|
seq_putc(seq, '\n');
|
|
|
|
i = 0;
|
|
while (NULL != toa_stats[i].name) {
|
|
seq_printf(seq, "%-25s:", toa_stats[i].name);
|
|
for_each_online_cpu(j) {
|
|
seq_printf(seq, "%10lu ",
|
|
*(((unsigned long *) per_cpu_ptr(ext_stats, j)) + toa_stats[i].entry));
|
|
|
|
}
|
|
seq_putc(seq, '\n');
|
|
i++;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int toa_stats_seq_open(struct inode *inode, struct file *file)
|
|
{
|
|
return single_open(file, toa_stats_show, NULL);
|
|
}
|
|
|
|
static const struct proc_ops toa_stats_fops = {
|
|
.proc_open = toa_stats_seq_open,
|
|
.proc_read = seq_read,
|
|
.proc_lseek = seq_lseek,
|
|
.proc_release = single_release,
|
|
};
|
|
|
|
static int vpc_inet_dump_one_sk(struct net *net, struct vtoa_req *req, struct vtoa_info *info)
|
|
{
|
|
struct sock *sk;
|
|
int err = -EINVAL;
|
|
|
|
rcu_read_lock();
|
|
sk = inet_lookup(net, &tcp_hashinfo, NULL, 0, req->sip,
|
|
req->sport, req->dip,
|
|
req->dport, req->if_idx);
|
|
if (!sk){
|
|
TOA_INFO("inet_lookup fail(%d), if_idx %u sip %pI4 dip %pI4 sport %u dport %u.\n",
|
|
err, req->if_idx, &req->sip, &req->dip,
|
|
ntohs(req->sport), ntohs(req->dport));
|
|
TOA_INC_STATS(ext_stats, GETNAME_VTOA_GET_LOCKUP_ERR_CNT);
|
|
goto out_nosk;
|
|
}
|
|
|
|
if (sk->sk_state == TCP_LISTEN){
|
|
TOA_INFO("socket listen fail(%d), if_idx %u sip %pI4 dip %pI4 sport %u dport %u sk_state %u.\n",
|
|
err, req->if_idx, &req->sip, &req->dip,
|
|
ntohs(req->sport), ntohs(req->dport), sk->sk_state);
|
|
TOA_INC_STATS(ext_stats, GETNAME_VTOA_GET_LOCKUP_ERR_CNT);
|
|
goto out_listen;
|
|
}
|
|
|
|
info->i_vpcid = sk->sk_tvpc_info.vpcid;
|
|
info->i_vmip = sk->sk_tvpc_info.vmip;
|
|
info->i_sport = sk->sk_tvpc_info.sport;
|
|
info->i_vip = sk->sk_tvpc_info.vip;
|
|
info->i_vport = sk->sk_tvpc_info.vport;
|
|
err = 0;
|
|
|
|
out_listen:
|
|
if (sk) {
|
|
if (sk->sk_state == TCP_TIME_WAIT)
|
|
inet_twsk_put((struct inet_timewait_sock *)sk);
|
|
else
|
|
sock_put(sk);
|
|
}
|
|
out_nosk:
|
|
rcu_read_unlock();
|
|
return err;
|
|
}
|
|
|
|
|
|
static int vpc_vtoa_netlink_send(struct net *net, struct nlmsghdr *nlh, struct vtoa_info *info)
|
|
{
|
|
struct sk_buff *skb;
|
|
void *hdr;
|
|
int err;
|
|
|
|
skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
|
|
if (!skb) {
|
|
TOA_INFO("nlmsg_new fail, vpcid %d vmip %pI4 sport %u vip %pI4 vport %u.\n",
|
|
info->i_vpcid, &info->i_vmip, ntohs(info->i_sport),
|
|
&info->i_vip, ntohs(info->i_vport));
|
|
TOA_INC_STATS(ext_stats, GETNAME_VTOA_GET_NETLINK_ERR_CNT);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
hdr = genlmsg_put(skb, nlh->nlmsg_pid, 0, &vtoa_genl_family, 0, VTOA_CMD_GET);
|
|
if (!hdr){
|
|
TOA_INFO("genlmsg_put fail, vpcid %d vmip %pI4 sport %u vip %pI4 vport %u.\n",
|
|
info->i_vpcid, &info->i_vmip, ntohs(info->i_sport),
|
|
&info->i_vip, ntohs(info->i_vport));
|
|
TOA_INC_STATS(ext_stats, GETNAME_VTOA_GET_NETLINK_ERR_CNT);
|
|
nlmsg_free(skb);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
nla_put_u32(skb, VTOA_ATTR_I_VPCID, info->i_vpcid);
|
|
nla_put_u32(skb, VTOA_ATTR_I_VMIP, info->i_vmip);
|
|
nla_put_u16(skb, VTOA_ATTR_I_SPORT, info->i_sport);
|
|
nla_put_u32(skb, VTOA_ATTR_I_VIP, info->i_vip);
|
|
nla_put_u16(skb, VTOA_ATTR_I_VPORT, info->i_vport);
|
|
genlmsg_end(skb, hdr);
|
|
|
|
err = genlmsg_unicast(net, skb, nlh->nlmsg_pid);
|
|
if (err < 0){
|
|
TOA_INFO("genlmsg_unicast fail(%d), vpcid %d vmip %pI4 sport %u vip %pI4 vport %u.\n",
|
|
err,
|
|
info->i_vpcid, &info->i_vmip, ntohs(info->i_sport),
|
|
&info->i_vip, ntohs(info->i_vport));
|
|
TOA_INC_STATS(ext_stats, GETNAME_VTOA_GET_NETLINK_ERR_CNT);
|
|
return -EAGAIN;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int vpc_vtoa_get(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct net *net = NULL;
|
|
struct nlattr **attrs = info->attrs;
|
|
struct nlmsghdr *nlh = nlmsg_hdr(skb);
|
|
struct vtoa_req *req;
|
|
struct vtoa_info vinfo;
|
|
int err;
|
|
|
|
TOA_INC_STATS(ext_stats, GETNAME_VTOA_GET_CNT);
|
|
|
|
if (!attrs ||
|
|
!attrs[VTOA_ATTR_REQ]) {
|
|
TOA_INFO("attrs null.\n");
|
|
TOA_INC_STATS(ext_stats, GETNAME_VTOA_GET_ATTR_ERR_CNT);
|
|
return -EINVAL;
|
|
}
|
|
if (nla_len(attrs[VTOA_ATTR_REQ]) != sizeof(struct vtoa_req)){
|
|
TOA_INFO("attrs len(%u) err.\n", nla_len(attrs[VTOA_ATTR_REQ]));
|
|
TOA_INC_STATS(ext_stats, GETNAME_VTOA_GET_ATTR_ERR_CNT);
|
|
return -EINVAL;
|
|
}
|
|
|
|
req = nla_data(attrs[VTOA_ATTR_REQ]);
|
|
if (skb->sk){
|
|
net = sock_net(skb->sk);
|
|
}
|
|
if (!net){
|
|
TOA_INFO("get netns %u fail, if_idx:%u sip:%pI4 dip:%pI4 sport:%u dport:%u sk:%px.\n",
|
|
nlh->nlmsg_pid, req->if_idx, &req->sip, &req->dip,
|
|
ntohs(req->sport), ntohs(req->dport), skb->sk);
|
|
return -EINVAL;
|
|
}
|
|
|
|
memset(&vinfo, 0, sizeof(vinfo));
|
|
err = vpc_inet_dump_one_sk(net, req, &vinfo);
|
|
if (err != 0){
|
|
return err;
|
|
}
|
|
|
|
err = vpc_vtoa_netlink_send(net, nlh, &vinfo);
|
|
|
|
TOA_DBG("pid %u req[if_idx:%u sip:%pI4 dip:%pI4 sport:%u dport:%u] info["
|
|
"vpcid:%u vmip:%pI4 sport:%u vip:%pI4 vport:%u] err:%d\n",
|
|
nlh->nlmsg_pid, req->if_idx, &req->sip, &req->dip,
|
|
ntohs(req->sport), ntohs(req->dport), vinfo.i_vpcid, &vinfo.i_vmip,
|
|
ntohs(vinfo.i_sport), &vinfo.i_vip, ntohs(vinfo.i_vport), err);
|
|
|
|
return err;
|
|
}
|
|
|
|
static struct genl_ops vtoa_genl_ops[] =
|
|
{
|
|
{
|
|
.cmd = VTOA_CMD_GET,
|
|
.flags = 0,
|
|
.doit = vpc_vtoa_get,
|
|
.dumpit = NULL,
|
|
},
|
|
};
|
|
|
|
static struct genl_family vtoa_genl_family = {
|
|
.hdrsize = 0,
|
|
.name = "VPC_VTOA",
|
|
.version = 1,
|
|
.maxattr = VTOA_ATTR_MAX,
|
|
.netnsok = 1,
|
|
.policy = vtoa_policy,
|
|
.module = THIS_MODULE,
|
|
.ops = vtoa_genl_ops,
|
|
.n_ops = ARRAY_SIZE(vtoa_genl_ops),
|
|
};
|
|
|
|
static int ksyms_lookup_init(void)
|
|
{
|
|
int ret;
|
|
|
|
kp_exec.symbol_name = "kallsyms_lookup_name";
|
|
|
|
ret = register_kprobe(&kp_exec);
|
|
if(ret < 0)
|
|
{
|
|
TOA_INFO("cannot find kallsyms_lookup_name by kprobe.\n");
|
|
return -1;
|
|
}
|
|
|
|
TOA_INFO("kallsyms_lookup_name at %p\n", (void *)kp_exec.addr);
|
|
|
|
ksyms_lookup_name = (unsigned long (*)(const char *))kp_exec.addr;
|
|
unregister_kprobe(&kp_exec);
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* TOA module init and destory
|
|
*/
|
|
|
|
/* module init */
|
|
static int __init
|
|
toa_init(void)
|
|
{
|
|
|
|
TOA_INFO("TOA " TOA_VERSION " by pukong.wjm\n");
|
|
if (ksyms_lookup_init())
|
|
return 1;
|
|
|
|
/* alloc statistics array for toa */
|
|
if (NULL == (ext_stats = alloc_percpu(struct toa_stat_mib)))
|
|
return 1;
|
|
proc_create("toa_stats", 0, init_net.proc_net, &toa_stats_fops);
|
|
|
|
/* get the address of function sock_def_readable
|
|
* so later we can know whether the sock is for rpc, tux or others
|
|
*/
|
|
sk_data_ready_addr = ksyms_lookup_name("sock_def_readable");
|
|
TOA_INFO("CPU [%u] sk_data_ready_addr = kallsyms_lookup_name(sock_def_readable) = %lu\n",
|
|
smp_processor_id(), sk_data_ready_addr);
|
|
if(0 == sk_data_ready_addr) {
|
|
TOA_INFO("cannot find sock_def_readable.\n");
|
|
goto err;
|
|
}
|
|
|
|
if (genl_register_family(&vtoa_genl_family) != 0){
|
|
TOA_INFO("vtoa_genl_family register fail.\n");
|
|
goto err;
|
|
}
|
|
|
|
/* hook funcs for parse and get toa */
|
|
hook_toa_functions();
|
|
|
|
TOA_INFO("toa loaded\n");
|
|
return 0;
|
|
|
|
err:
|
|
remove_proc_entry("toa_stats", init_net.proc_net);
|
|
if (NULL != ext_stats) {
|
|
free_percpu(ext_stats);
|
|
ext_stats = NULL;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* module cleanup*/
|
|
static void __exit
|
|
toa_exit(void)
|
|
{
|
|
unhook_toa_functions();
|
|
synchronize_net();
|
|
|
|
genl_unregister_family(&vtoa_genl_family);
|
|
remove_proc_entry("toa_stats", init_net.proc_net);
|
|
if (NULL != ext_stats) {
|
|
free_percpu(ext_stats);
|
|
ext_stats = NULL;
|
|
}
|
|
TOA_INFO("toa unloaded\n");
|
|
}
|
|
|
|
module_init(toa_init);
|
|
module_exit(toa_exit);
|
|
MODULE_LICENSE("GPL");
|
|
|