|
@@ -38,6 +38,7 @@
|
|
#include <linux/mutex.h>
|
|
#include <linux/mutex.h>
|
|
|
|
|
|
#include <net/net_namespace.h>
|
|
#include <net/net_namespace.h>
|
|
|
|
+#include <linux/nsproxy.h>
|
|
#include <net/ip.h>
|
|
#include <net/ip.h>
|
|
#ifdef CONFIG_IP_VS_IPV6
|
|
#ifdef CONFIG_IP_VS_IPV6
|
|
#include <net/ipv6.h>
|
|
#include <net/ipv6.h>
|
|
@@ -57,42 +58,7 @@ static DEFINE_MUTEX(__ip_vs_mutex);
|
|
/* lock for service table */
|
|
/* lock for service table */
|
|
static DEFINE_RWLOCK(__ip_vs_svc_lock);
|
|
static DEFINE_RWLOCK(__ip_vs_svc_lock);
|
|
|
|
|
|
-/* lock for table with the real services */
|
|
|
|
-static DEFINE_RWLOCK(__ip_vs_rs_lock);
|
|
|
|
-
|
|
|
|
-/* lock for state and timeout tables */
|
|
|
|
-static DEFINE_SPINLOCK(ip_vs_securetcp_lock);
|
|
|
|
-
|
|
|
|
-/* lock for drop entry handling */
|
|
|
|
-static DEFINE_SPINLOCK(__ip_vs_dropentry_lock);
|
|
|
|
-
|
|
|
|
-/* lock for drop packet handling */
|
|
|
|
-static DEFINE_SPINLOCK(__ip_vs_droppacket_lock);
|
|
|
|
-
|
|
|
|
-/* 1/rate drop and drop-entry variables */
|
|
|
|
-int ip_vs_drop_rate = 0;
|
|
|
|
-int ip_vs_drop_counter = 0;
|
|
|
|
-static atomic_t ip_vs_dropentry = ATOMIC_INIT(0);
|
|
|
|
-
|
|
|
|
-/* number of virtual services */
|
|
|
|
-static int ip_vs_num_services = 0;
|
|
|
|
-
|
|
|
|
/* sysctl variables */
|
|
/* sysctl variables */
|
|
-static int sysctl_ip_vs_drop_entry = 0;
|
|
|
|
-static int sysctl_ip_vs_drop_packet = 0;
|
|
|
|
-static int sysctl_ip_vs_secure_tcp = 0;
|
|
|
|
-static int sysctl_ip_vs_amemthresh = 1024;
|
|
|
|
-static int sysctl_ip_vs_am_droprate = 10;
|
|
|
|
-int sysctl_ip_vs_cache_bypass = 0;
|
|
|
|
-int sysctl_ip_vs_expire_nodest_conn = 0;
|
|
|
|
-int sysctl_ip_vs_expire_quiescent_template = 0;
|
|
|
|
-int sysctl_ip_vs_sync_threshold[2] = { 3, 50 };
|
|
|
|
-int sysctl_ip_vs_nat_icmp_send = 0;
|
|
|
|
-#ifdef CONFIG_IP_VS_NFCT
|
|
|
|
-int sysctl_ip_vs_conntrack;
|
|
|
|
-#endif
|
|
|
|
-int sysctl_ip_vs_snat_reroute = 1;
|
|
|
|
-
|
|
|
|
|
|
|
|
#ifdef CONFIG_IP_VS_DEBUG
|
|
#ifdef CONFIG_IP_VS_DEBUG
|
|
static int sysctl_ip_vs_debug_level = 0;
|
|
static int sysctl_ip_vs_debug_level = 0;
|
|
@@ -105,7 +71,8 @@ int ip_vs_get_debug_level(void)
|
|
|
|
|
|
#ifdef CONFIG_IP_VS_IPV6
|
|
#ifdef CONFIG_IP_VS_IPV6
|
|
/* Taken from rt6_fill_node() in net/ipv6/route.c, is there a better way? */
|
|
/* Taken from rt6_fill_node() in net/ipv6/route.c, is there a better way? */
|
|
-static int __ip_vs_addr_is_local_v6(const struct in6_addr *addr)
|
|
|
|
|
|
+static int __ip_vs_addr_is_local_v6(struct net *net,
|
|
|
|
+ const struct in6_addr *addr)
|
|
{
|
|
{
|
|
struct rt6_info *rt;
|
|
struct rt6_info *rt;
|
|
struct flowi fl = {
|
|
struct flowi fl = {
|
|
@@ -114,7 +81,7 @@ static int __ip_vs_addr_is_local_v6(const struct in6_addr *addr)
|
|
.fl6_src = { .s6_addr32 = {0, 0, 0, 0} },
|
|
.fl6_src = { .s6_addr32 = {0, 0, 0, 0} },
|
|
};
|
|
};
|
|
|
|
|
|
- rt = (struct rt6_info *)ip6_route_output(&init_net, NULL, &fl);
|
|
|
|
|
|
+ rt = (struct rt6_info *)ip6_route_output(net, NULL, &fl);
|
|
if (rt && rt->rt6i_dev && (rt->rt6i_dev->flags & IFF_LOOPBACK))
|
|
if (rt && rt->rt6i_dev && (rt->rt6i_dev->flags & IFF_LOOPBACK))
|
|
return 1;
|
|
return 1;
|
|
|
|
|
|
@@ -125,7 +92,7 @@ static int __ip_vs_addr_is_local_v6(const struct in6_addr *addr)
|
|
* update_defense_level is called from keventd and from sysctl,
|
|
* update_defense_level is called from keventd and from sysctl,
|
|
* so it needs to protect itself from softirqs
|
|
* so it needs to protect itself from softirqs
|
|
*/
|
|
*/
|
|
-static void update_defense_level(void)
|
|
|
|
|
|
+static void update_defense_level(struct netns_ipvs *ipvs)
|
|
{
|
|
{
|
|
struct sysinfo i;
|
|
struct sysinfo i;
|
|
static int old_secure_tcp = 0;
|
|
static int old_secure_tcp = 0;
|
|
@@ -141,73 +108,73 @@ static void update_defense_level(void)
|
|
/* si_swapinfo(&i); */
|
|
/* si_swapinfo(&i); */
|
|
/* availmem = availmem - (i.totalswap - i.freeswap); */
|
|
/* availmem = availmem - (i.totalswap - i.freeswap); */
|
|
|
|
|
|
- nomem = (availmem < sysctl_ip_vs_amemthresh);
|
|
|
|
|
|
+ nomem = (availmem < ipvs->sysctl_amemthresh);
|
|
|
|
|
|
local_bh_disable();
|
|
local_bh_disable();
|
|
|
|
|
|
/* drop_entry */
|
|
/* drop_entry */
|
|
- spin_lock(&__ip_vs_dropentry_lock);
|
|
|
|
- switch (sysctl_ip_vs_drop_entry) {
|
|
|
|
|
|
+ spin_lock(&ipvs->dropentry_lock);
|
|
|
|
+ switch (ipvs->sysctl_drop_entry) {
|
|
case 0:
|
|
case 0:
|
|
- atomic_set(&ip_vs_dropentry, 0);
|
|
|
|
|
|
+ atomic_set(&ipvs->dropentry, 0);
|
|
break;
|
|
break;
|
|
case 1:
|
|
case 1:
|
|
if (nomem) {
|
|
if (nomem) {
|
|
- atomic_set(&ip_vs_dropentry, 1);
|
|
|
|
- sysctl_ip_vs_drop_entry = 2;
|
|
|
|
|
|
+ atomic_set(&ipvs->dropentry, 1);
|
|
|
|
+ ipvs->sysctl_drop_entry = 2;
|
|
} else {
|
|
} else {
|
|
- atomic_set(&ip_vs_dropentry, 0);
|
|
|
|
|
|
+ atomic_set(&ipvs->dropentry, 0);
|
|
}
|
|
}
|
|
break;
|
|
break;
|
|
case 2:
|
|
case 2:
|
|
if (nomem) {
|
|
if (nomem) {
|
|
- atomic_set(&ip_vs_dropentry, 1);
|
|
|
|
|
|
+ atomic_set(&ipvs->dropentry, 1);
|
|
} else {
|
|
} else {
|
|
- atomic_set(&ip_vs_dropentry, 0);
|
|
|
|
- sysctl_ip_vs_drop_entry = 1;
|
|
|
|
|
|
+ atomic_set(&ipvs->dropentry, 0);
|
|
|
|
+ ipvs->sysctl_drop_entry = 1;
|
|
};
|
|
};
|
|
break;
|
|
break;
|
|
case 3:
|
|
case 3:
|
|
- atomic_set(&ip_vs_dropentry, 1);
|
|
|
|
|
|
+ atomic_set(&ipvs->dropentry, 1);
|
|
break;
|
|
break;
|
|
}
|
|
}
|
|
- spin_unlock(&__ip_vs_dropentry_lock);
|
|
|
|
|
|
+ spin_unlock(&ipvs->dropentry_lock);
|
|
|
|
|
|
/* drop_packet */
|
|
/* drop_packet */
|
|
- spin_lock(&__ip_vs_droppacket_lock);
|
|
|
|
- switch (sysctl_ip_vs_drop_packet) {
|
|
|
|
|
|
+ spin_lock(&ipvs->droppacket_lock);
|
|
|
|
+ switch (ipvs->sysctl_drop_packet) {
|
|
case 0:
|
|
case 0:
|
|
- ip_vs_drop_rate = 0;
|
|
|
|
|
|
+ ipvs->drop_rate = 0;
|
|
break;
|
|
break;
|
|
case 1:
|
|
case 1:
|
|
if (nomem) {
|
|
if (nomem) {
|
|
- ip_vs_drop_rate = ip_vs_drop_counter
|
|
|
|
- = sysctl_ip_vs_amemthresh /
|
|
|
|
- (sysctl_ip_vs_amemthresh-availmem);
|
|
|
|
- sysctl_ip_vs_drop_packet = 2;
|
|
|
|
|
|
+ ipvs->drop_rate = ipvs->drop_counter
|
|
|
|
+ = ipvs->sysctl_amemthresh /
|
|
|
|
+ (ipvs->sysctl_amemthresh-availmem);
|
|
|
|
+ ipvs->sysctl_drop_packet = 2;
|
|
} else {
|
|
} else {
|
|
- ip_vs_drop_rate = 0;
|
|
|
|
|
|
+ ipvs->drop_rate = 0;
|
|
}
|
|
}
|
|
break;
|
|
break;
|
|
case 2:
|
|
case 2:
|
|
if (nomem) {
|
|
if (nomem) {
|
|
- ip_vs_drop_rate = ip_vs_drop_counter
|
|
|
|
- = sysctl_ip_vs_amemthresh /
|
|
|
|
- (sysctl_ip_vs_amemthresh-availmem);
|
|
|
|
|
|
+ ipvs->drop_rate = ipvs->drop_counter
|
|
|
|
+ = ipvs->sysctl_amemthresh /
|
|
|
|
+ (ipvs->sysctl_amemthresh-availmem);
|
|
} else {
|
|
} else {
|
|
- ip_vs_drop_rate = 0;
|
|
|
|
- sysctl_ip_vs_drop_packet = 1;
|
|
|
|
|
|
+ ipvs->drop_rate = 0;
|
|
|
|
+ ipvs->sysctl_drop_packet = 1;
|
|
}
|
|
}
|
|
break;
|
|
break;
|
|
case 3:
|
|
case 3:
|
|
- ip_vs_drop_rate = sysctl_ip_vs_am_droprate;
|
|
|
|
|
|
+ ipvs->drop_rate = ipvs->sysctl_am_droprate;
|
|
break;
|
|
break;
|
|
}
|
|
}
|
|
- spin_unlock(&__ip_vs_droppacket_lock);
|
|
|
|
|
|
+ spin_unlock(&ipvs->droppacket_lock);
|
|
|
|
|
|
/* secure_tcp */
|
|
/* secure_tcp */
|
|
- spin_lock(&ip_vs_securetcp_lock);
|
|
|
|
- switch (sysctl_ip_vs_secure_tcp) {
|
|
|
|
|
|
+ spin_lock(&ipvs->securetcp_lock);
|
|
|
|
+ switch (ipvs->sysctl_secure_tcp) {
|
|
case 0:
|
|
case 0:
|
|
if (old_secure_tcp >= 2)
|
|
if (old_secure_tcp >= 2)
|
|
to_change = 0;
|
|
to_change = 0;
|
|
@@ -216,7 +183,7 @@ static void update_defense_level(void)
|
|
if (nomem) {
|
|
if (nomem) {
|
|
if (old_secure_tcp < 2)
|
|
if (old_secure_tcp < 2)
|
|
to_change = 1;
|
|
to_change = 1;
|
|
- sysctl_ip_vs_secure_tcp = 2;
|
|
|
|
|
|
+ ipvs->sysctl_secure_tcp = 2;
|
|
} else {
|
|
} else {
|
|
if (old_secure_tcp >= 2)
|
|
if (old_secure_tcp >= 2)
|
|
to_change = 0;
|
|
to_change = 0;
|
|
@@ -229,7 +196,7 @@ static void update_defense_level(void)
|
|
} else {
|
|
} else {
|
|
if (old_secure_tcp >= 2)
|
|
if (old_secure_tcp >= 2)
|
|
to_change = 0;
|
|
to_change = 0;
|
|
- sysctl_ip_vs_secure_tcp = 1;
|
|
|
|
|
|
+ ipvs->sysctl_secure_tcp = 1;
|
|
}
|
|
}
|
|
break;
|
|
break;
|
|
case 3:
|
|
case 3:
|
|
@@ -237,10 +204,11 @@ static void update_defense_level(void)
|
|
to_change = 1;
|
|
to_change = 1;
|
|
break;
|
|
break;
|
|
}
|
|
}
|
|
- old_secure_tcp = sysctl_ip_vs_secure_tcp;
|
|
|
|
|
|
+ old_secure_tcp = ipvs->sysctl_secure_tcp;
|
|
if (to_change >= 0)
|
|
if (to_change >= 0)
|
|
- ip_vs_protocol_timeout_change(sysctl_ip_vs_secure_tcp>1);
|
|
|
|
- spin_unlock(&ip_vs_securetcp_lock);
|
|
|
|
|
|
+ ip_vs_protocol_timeout_change(ipvs,
|
|
|
|
+ ipvs->sysctl_secure_tcp > 1);
|
|
|
|
+ spin_unlock(&ipvs->securetcp_lock);
|
|
|
|
|
|
local_bh_enable();
|
|
local_bh_enable();
|
|
}
|
|
}
|
|
@@ -250,16 +218,16 @@ static void update_defense_level(void)
|
|
* Timer for checking the defense
|
|
* Timer for checking the defense
|
|
*/
|
|
*/
|
|
#define DEFENSE_TIMER_PERIOD 1*HZ
|
|
#define DEFENSE_TIMER_PERIOD 1*HZ
|
|
-static void defense_work_handler(struct work_struct *work);
|
|
|
|
-static DECLARE_DELAYED_WORK(defense_work, defense_work_handler);
|
|
|
|
|
|
|
|
static void defense_work_handler(struct work_struct *work)
|
|
static void defense_work_handler(struct work_struct *work)
|
|
{
|
|
{
|
|
- update_defense_level();
|
|
|
|
- if (atomic_read(&ip_vs_dropentry))
|
|
|
|
- ip_vs_random_dropentry();
|
|
|
|
|
|
+ struct netns_ipvs *ipvs =
|
|
|
|
+ container_of(work, struct netns_ipvs, defense_work.work);
|
|
|
|
|
|
- schedule_delayed_work(&defense_work, DEFENSE_TIMER_PERIOD);
|
|
|
|
|
|
+ update_defense_level(ipvs);
|
|
|
|
+ if (atomic_read(&ipvs->dropentry))
|
|
|
|
+ ip_vs_random_dropentry(ipvs->net);
|
|
|
|
+ schedule_delayed_work(&ipvs->defense_work, DEFENSE_TIMER_PERIOD);
|
|
}
|
|
}
|
|
|
|
|
|
int
|
|
int
|
|
@@ -287,33 +255,13 @@ static struct list_head ip_vs_svc_table[IP_VS_SVC_TAB_SIZE];
|
|
/* the service table hashed by fwmark */
|
|
/* the service table hashed by fwmark */
|
|
static struct list_head ip_vs_svc_fwm_table[IP_VS_SVC_TAB_SIZE];
|
|
static struct list_head ip_vs_svc_fwm_table[IP_VS_SVC_TAB_SIZE];
|
|
|
|
|
|
-/*
|
|
|
|
- * Hash table: for real service lookups
|
|
|
|
- */
|
|
|
|
-#define IP_VS_RTAB_BITS 4
|
|
|
|
-#define IP_VS_RTAB_SIZE (1 << IP_VS_RTAB_BITS)
|
|
|
|
-#define IP_VS_RTAB_MASK (IP_VS_RTAB_SIZE - 1)
|
|
|
|
-
|
|
|
|
-static struct list_head ip_vs_rtable[IP_VS_RTAB_SIZE];
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- * Trash for destinations
|
|
|
|
- */
|
|
|
|
-static LIST_HEAD(ip_vs_dest_trash);
|
|
|
|
-
|
|
|
|
-/*
|
|
|
|
- * FTP & NULL virtual service counters
|
|
|
|
- */
|
|
|
|
-static atomic_t ip_vs_ftpsvc_counter = ATOMIC_INIT(0);
|
|
|
|
-static atomic_t ip_vs_nullsvc_counter = ATOMIC_INIT(0);
|
|
|
|
-
|
|
|
|
|
|
|
|
/*
|
|
/*
|
|
* Returns hash value for virtual service
|
|
* Returns hash value for virtual service
|
|
*/
|
|
*/
|
|
-static __inline__ unsigned
|
|
|
|
-ip_vs_svc_hashkey(int af, unsigned proto, const union nf_inet_addr *addr,
|
|
|
|
- __be16 port)
|
|
|
|
|
|
+static inline unsigned
|
|
|
|
+ip_vs_svc_hashkey(struct net *net, int af, unsigned proto,
|
|
|
|
+ const union nf_inet_addr *addr, __be16 port)
|
|
{
|
|
{
|
|
register unsigned porth = ntohs(port);
|
|
register unsigned porth = ntohs(port);
|
|
__be32 addr_fold = addr->ip;
|
|
__be32 addr_fold = addr->ip;
|
|
@@ -323,6 +271,7 @@ ip_vs_svc_hashkey(int af, unsigned proto, const union nf_inet_addr *addr,
|
|
addr_fold = addr->ip6[0]^addr->ip6[1]^
|
|
addr_fold = addr->ip6[0]^addr->ip6[1]^
|
|
addr->ip6[2]^addr->ip6[3];
|
|
addr->ip6[2]^addr->ip6[3];
|
|
#endif
|
|
#endif
|
|
|
|
+ addr_fold ^= ((size_t)net>>8);
|
|
|
|
|
|
return (proto^ntohl(addr_fold)^(porth>>IP_VS_SVC_TAB_BITS)^porth)
|
|
return (proto^ntohl(addr_fold)^(porth>>IP_VS_SVC_TAB_BITS)^porth)
|
|
& IP_VS_SVC_TAB_MASK;
|
|
& IP_VS_SVC_TAB_MASK;
|
|
@@ -331,13 +280,13 @@ ip_vs_svc_hashkey(int af, unsigned proto, const union nf_inet_addr *addr,
|
|
/*
|
|
/*
|
|
* Returns hash value of fwmark for virtual service lookup
|
|
* Returns hash value of fwmark for virtual service lookup
|
|
*/
|
|
*/
|
|
-static __inline__ unsigned ip_vs_svc_fwm_hashkey(__u32 fwmark)
|
|
|
|
|
|
+static inline unsigned ip_vs_svc_fwm_hashkey(struct net *net, __u32 fwmark)
|
|
{
|
|
{
|
|
- return fwmark & IP_VS_SVC_TAB_MASK;
|
|
|
|
|
|
+ return (((size_t)net>>8) ^ fwmark) & IP_VS_SVC_TAB_MASK;
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
/*
|
|
- * Hashes a service in the ip_vs_svc_table by <proto,addr,port>
|
|
|
|
|
|
+ * Hashes a service in the ip_vs_svc_table by <netns,proto,addr,port>
|
|
* or in the ip_vs_svc_fwm_table by fwmark.
|
|
* or in the ip_vs_svc_fwm_table by fwmark.
|
|
* Should be called with locked tables.
|
|
* Should be called with locked tables.
|
|
*/
|
|
*/
|
|
@@ -353,16 +302,16 @@ static int ip_vs_svc_hash(struct ip_vs_service *svc)
|
|
|
|
|
|
if (svc->fwmark == 0) {
|
|
if (svc->fwmark == 0) {
|
|
/*
|
|
/*
|
|
- * Hash it by <protocol,addr,port> in ip_vs_svc_table
|
|
|
|
|
|
+ * Hash it by <netns,protocol,addr,port> in ip_vs_svc_table
|
|
*/
|
|
*/
|
|
- hash = ip_vs_svc_hashkey(svc->af, svc->protocol, &svc->addr,
|
|
|
|
- svc->port);
|
|
|
|
|
|
+ hash = ip_vs_svc_hashkey(svc->net, svc->af, svc->protocol,
|
|
|
|
+ &svc->addr, svc->port);
|
|
list_add(&svc->s_list, &ip_vs_svc_table[hash]);
|
|
list_add(&svc->s_list, &ip_vs_svc_table[hash]);
|
|
} else {
|
|
} else {
|
|
/*
|
|
/*
|
|
- * Hash it by fwmark in ip_vs_svc_fwm_table
|
|
|
|
|
|
+ * Hash it by fwmark in svc_fwm_table
|
|
*/
|
|
*/
|
|
- hash = ip_vs_svc_fwm_hashkey(svc->fwmark);
|
|
|
|
|
|
+ hash = ip_vs_svc_fwm_hashkey(svc->net, svc->fwmark);
|
|
list_add(&svc->f_list, &ip_vs_svc_fwm_table[hash]);
|
|
list_add(&svc->f_list, &ip_vs_svc_fwm_table[hash]);
|
|
}
|
|
}
|
|
|
|
|
|
@@ -374,7 +323,7 @@ static int ip_vs_svc_hash(struct ip_vs_service *svc)
|
|
|
|
|
|
|
|
|
|
/*
|
|
/*
|
|
- * Unhashes a service from ip_vs_svc_table/ip_vs_svc_fwm_table.
|
|
|
|
|
|
+ * Unhashes a service from svc_table / svc_fwm_table.
|
|
* Should be called with locked tables.
|
|
* Should be called with locked tables.
|
|
*/
|
|
*/
|
|
static int ip_vs_svc_unhash(struct ip_vs_service *svc)
|
|
static int ip_vs_svc_unhash(struct ip_vs_service *svc)
|
|
@@ -386,10 +335,10 @@ static int ip_vs_svc_unhash(struct ip_vs_service *svc)
|
|
}
|
|
}
|
|
|
|
|
|
if (svc->fwmark == 0) {
|
|
if (svc->fwmark == 0) {
|
|
- /* Remove it from the ip_vs_svc_table table */
|
|
|
|
|
|
+ /* Remove it from the svc_table table */
|
|
list_del(&svc->s_list);
|
|
list_del(&svc->s_list);
|
|
} else {
|
|
} else {
|
|
- /* Remove it from the ip_vs_svc_fwm_table table */
|
|
|
|
|
|
+ /* Remove it from the svc_fwm_table table */
|
|
list_del(&svc->f_list);
|
|
list_del(&svc->f_list);
|
|
}
|
|
}
|
|
|
|
|
|
@@ -400,23 +349,24 @@ static int ip_vs_svc_unhash(struct ip_vs_service *svc)
|
|
|
|
|
|
|
|
|
|
/*
|
|
/*
|
|
- * Get service by {proto,addr,port} in the service table.
|
|
|
|
|
|
+ * Get service by {netns, proto,addr,port} in the service table.
|
|
*/
|
|
*/
|
|
static inline struct ip_vs_service *
|
|
static inline struct ip_vs_service *
|
|
-__ip_vs_service_find(int af, __u16 protocol, const union nf_inet_addr *vaddr,
|
|
|
|
- __be16 vport)
|
|
|
|
|
|
+__ip_vs_service_find(struct net *net, int af, __u16 protocol,
|
|
|
|
+ const union nf_inet_addr *vaddr, __be16 vport)
|
|
{
|
|
{
|
|
unsigned hash;
|
|
unsigned hash;
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
|
|
|
|
/* Check for "full" addressed entries */
|
|
/* Check for "full" addressed entries */
|
|
- hash = ip_vs_svc_hashkey(af, protocol, vaddr, vport);
|
|
|
|
|
|
+ hash = ip_vs_svc_hashkey(net, af, protocol, vaddr, vport);
|
|
|
|
|
|
list_for_each_entry(svc, &ip_vs_svc_table[hash], s_list){
|
|
list_for_each_entry(svc, &ip_vs_svc_table[hash], s_list){
|
|
if ((svc->af == af)
|
|
if ((svc->af == af)
|
|
&& ip_vs_addr_equal(af, &svc->addr, vaddr)
|
|
&& ip_vs_addr_equal(af, &svc->addr, vaddr)
|
|
&& (svc->port == vport)
|
|
&& (svc->port == vport)
|
|
- && (svc->protocol == protocol)) {
|
|
|
|
|
|
+ && (svc->protocol == protocol)
|
|
|
|
+ && net_eq(svc->net, net)) {
|
|
/* HIT */
|
|
/* HIT */
|
|
return svc;
|
|
return svc;
|
|
}
|
|
}
|
|
@@ -430,16 +380,17 @@ __ip_vs_service_find(int af, __u16 protocol, const union nf_inet_addr *vaddr,
|
|
* Get service by {fwmark} in the service table.
|
|
* Get service by {fwmark} in the service table.
|
|
*/
|
|
*/
|
|
static inline struct ip_vs_service *
|
|
static inline struct ip_vs_service *
|
|
-__ip_vs_svc_fwm_find(int af, __u32 fwmark)
|
|
|
|
|
|
+__ip_vs_svc_fwm_find(struct net *net, int af, __u32 fwmark)
|
|
{
|
|
{
|
|
unsigned hash;
|
|
unsigned hash;
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
|
|
|
|
/* Check for fwmark addressed entries */
|
|
/* Check for fwmark addressed entries */
|
|
- hash = ip_vs_svc_fwm_hashkey(fwmark);
|
|
|
|
|
|
+ hash = ip_vs_svc_fwm_hashkey(net, fwmark);
|
|
|
|
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[hash], f_list) {
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[hash], f_list) {
|
|
- if (svc->fwmark == fwmark && svc->af == af) {
|
|
|
|
|
|
+ if (svc->fwmark == fwmark && svc->af == af
|
|
|
|
+ && net_eq(svc->net, net)) {
|
|
/* HIT */
|
|
/* HIT */
|
|
return svc;
|
|
return svc;
|
|
}
|
|
}
|
|
@@ -449,42 +400,44 @@ __ip_vs_svc_fwm_find(int af, __u32 fwmark)
|
|
}
|
|
}
|
|
|
|
|
|
struct ip_vs_service *
|
|
struct ip_vs_service *
|
|
-ip_vs_service_get(int af, __u32 fwmark, __u16 protocol,
|
|
|
|
|
|
+ip_vs_service_get(struct net *net, int af, __u32 fwmark, __u16 protocol,
|
|
const union nf_inet_addr *vaddr, __be16 vport)
|
|
const union nf_inet_addr *vaddr, __be16 vport)
|
|
{
|
|
{
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(net);
|
|
|
|
|
|
read_lock(&__ip_vs_svc_lock);
|
|
read_lock(&__ip_vs_svc_lock);
|
|
|
|
|
|
/*
|
|
/*
|
|
* Check the table hashed by fwmark first
|
|
* Check the table hashed by fwmark first
|
|
*/
|
|
*/
|
|
- if (fwmark && (svc = __ip_vs_svc_fwm_find(af, fwmark)))
|
|
|
|
|
|
+ svc = __ip_vs_svc_fwm_find(net, af, fwmark);
|
|
|
|
+ if (fwmark && svc)
|
|
goto out;
|
|
goto out;
|
|
|
|
|
|
/*
|
|
/*
|
|
* Check the table hashed by <protocol,addr,port>
|
|
* Check the table hashed by <protocol,addr,port>
|
|
* for "full" addressed entries
|
|
* for "full" addressed entries
|
|
*/
|
|
*/
|
|
- svc = __ip_vs_service_find(af, protocol, vaddr, vport);
|
|
|
|
|
|
+ svc = __ip_vs_service_find(net, af, protocol, vaddr, vport);
|
|
|
|
|
|
if (svc == NULL
|
|
if (svc == NULL
|
|
&& protocol == IPPROTO_TCP
|
|
&& protocol == IPPROTO_TCP
|
|
- && atomic_read(&ip_vs_ftpsvc_counter)
|
|
|
|
|
|
+ && atomic_read(&ipvs->ftpsvc_counter)
|
|
&& (vport == FTPDATA || ntohs(vport) >= PROT_SOCK)) {
|
|
&& (vport == FTPDATA || ntohs(vport) >= PROT_SOCK)) {
|
|
/*
|
|
/*
|
|
* Check if ftp service entry exists, the packet
|
|
* Check if ftp service entry exists, the packet
|
|
* might belong to FTP data connections.
|
|
* might belong to FTP data connections.
|
|
*/
|
|
*/
|
|
- svc = __ip_vs_service_find(af, protocol, vaddr, FTPPORT);
|
|
|
|
|
|
+ svc = __ip_vs_service_find(net, af, protocol, vaddr, FTPPORT);
|
|
}
|
|
}
|
|
|
|
|
|
if (svc == NULL
|
|
if (svc == NULL
|
|
- && atomic_read(&ip_vs_nullsvc_counter)) {
|
|
|
|
|
|
+ && atomic_read(&ipvs->nullsvc_counter)) {
|
|
/*
|
|
/*
|
|
* Check if the catch-all port (port zero) exists
|
|
* Check if the catch-all port (port zero) exists
|
|
*/
|
|
*/
|
|
- svc = __ip_vs_service_find(af, protocol, vaddr, 0);
|
|
|
|
|
|
+ svc = __ip_vs_service_find(net, af, protocol, vaddr, 0);
|
|
}
|
|
}
|
|
|
|
|
|
out:
|
|
out:
|
|
@@ -519,6 +472,7 @@ __ip_vs_unbind_svc(struct ip_vs_dest *dest)
|
|
svc->fwmark,
|
|
svc->fwmark,
|
|
IP_VS_DBG_ADDR(svc->af, &svc->addr),
|
|
IP_VS_DBG_ADDR(svc->af, &svc->addr),
|
|
ntohs(svc->port), atomic_read(&svc->usecnt));
|
|
ntohs(svc->port), atomic_read(&svc->usecnt));
|
|
|
|
+ free_percpu(svc->stats.cpustats);
|
|
kfree(svc);
|
|
kfree(svc);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
@@ -545,10 +499,10 @@ static inline unsigned ip_vs_rs_hashkey(int af,
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
/*
|
|
- * Hashes ip_vs_dest in ip_vs_rtable by <proto,addr,port>.
|
|
|
|
|
|
+ * Hashes ip_vs_dest in rs_table by <proto,addr,port>.
|
|
* should be called with locked tables.
|
|
* should be called with locked tables.
|
|
*/
|
|
*/
|
|
-static int ip_vs_rs_hash(struct ip_vs_dest *dest)
|
|
|
|
|
|
+static int ip_vs_rs_hash(struct netns_ipvs *ipvs, struct ip_vs_dest *dest)
|
|
{
|
|
{
|
|
unsigned hash;
|
|
unsigned hash;
|
|
|
|
|
|
@@ -562,19 +516,19 @@ static int ip_vs_rs_hash(struct ip_vs_dest *dest)
|
|
*/
|
|
*/
|
|
hash = ip_vs_rs_hashkey(dest->af, &dest->addr, dest->port);
|
|
hash = ip_vs_rs_hashkey(dest->af, &dest->addr, dest->port);
|
|
|
|
|
|
- list_add(&dest->d_list, &ip_vs_rtable[hash]);
|
|
|
|
|
|
+ list_add(&dest->d_list, &ipvs->rs_table[hash]);
|
|
|
|
|
|
return 1;
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
/*
|
|
- * UNhashes ip_vs_dest from ip_vs_rtable.
|
|
|
|
|
|
+ * UNhashes ip_vs_dest from rs_table.
|
|
* should be called with locked tables.
|
|
* should be called with locked tables.
|
|
*/
|
|
*/
|
|
static int ip_vs_rs_unhash(struct ip_vs_dest *dest)
|
|
static int ip_vs_rs_unhash(struct ip_vs_dest *dest)
|
|
{
|
|
{
|
|
/*
|
|
/*
|
|
- * Remove it from the ip_vs_rtable table.
|
|
|
|
|
|
+ * Remove it from the rs_table table.
|
|
*/
|
|
*/
|
|
if (!list_empty(&dest->d_list)) {
|
|
if (!list_empty(&dest->d_list)) {
|
|
list_del(&dest->d_list);
|
|
list_del(&dest->d_list);
|
|
@@ -588,10 +542,11 @@ static int ip_vs_rs_unhash(struct ip_vs_dest *dest)
|
|
* Lookup real service by <proto,addr,port> in the real service table.
|
|
* Lookup real service by <proto,addr,port> in the real service table.
|
|
*/
|
|
*/
|
|
struct ip_vs_dest *
|
|
struct ip_vs_dest *
|
|
-ip_vs_lookup_real_service(int af, __u16 protocol,
|
|
|
|
|
|
+ip_vs_lookup_real_service(struct net *net, int af, __u16 protocol,
|
|
const union nf_inet_addr *daddr,
|
|
const union nf_inet_addr *daddr,
|
|
__be16 dport)
|
|
__be16 dport)
|
|
{
|
|
{
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(net);
|
|
unsigned hash;
|
|
unsigned hash;
|
|
struct ip_vs_dest *dest;
|
|
struct ip_vs_dest *dest;
|
|
|
|
|
|
@@ -601,19 +556,19 @@ ip_vs_lookup_real_service(int af, __u16 protocol,
|
|
*/
|
|
*/
|
|
hash = ip_vs_rs_hashkey(af, daddr, dport);
|
|
hash = ip_vs_rs_hashkey(af, daddr, dport);
|
|
|
|
|
|
- read_lock(&__ip_vs_rs_lock);
|
|
|
|
- list_for_each_entry(dest, &ip_vs_rtable[hash], d_list) {
|
|
|
|
|
|
+ read_lock(&ipvs->rs_lock);
|
|
|
|
+ list_for_each_entry(dest, &ipvs->rs_table[hash], d_list) {
|
|
if ((dest->af == af)
|
|
if ((dest->af == af)
|
|
&& ip_vs_addr_equal(af, &dest->addr, daddr)
|
|
&& ip_vs_addr_equal(af, &dest->addr, daddr)
|
|
&& (dest->port == dport)
|
|
&& (dest->port == dport)
|
|
&& ((dest->protocol == protocol) ||
|
|
&& ((dest->protocol == protocol) ||
|
|
dest->vfwmark)) {
|
|
dest->vfwmark)) {
|
|
/* HIT */
|
|
/* HIT */
|
|
- read_unlock(&__ip_vs_rs_lock);
|
|
|
|
|
|
+ read_unlock(&ipvs->rs_lock);
|
|
return dest;
|
|
return dest;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
- read_unlock(&__ip_vs_rs_lock);
|
|
|
|
|
|
+ read_unlock(&ipvs->rs_lock);
|
|
|
|
|
|
return NULL;
|
|
return NULL;
|
|
}
|
|
}
|
|
@@ -652,15 +607,16 @@ ip_vs_lookup_dest(struct ip_vs_service *svc, const union nf_inet_addr *daddr,
|
|
* ip_vs_lookup_real_service() looked promissing, but
|
|
* ip_vs_lookup_real_service() looked promissing, but
|
|
* seems not working as expected.
|
|
* seems not working as expected.
|
|
*/
|
|
*/
|
|
-struct ip_vs_dest *ip_vs_find_dest(int af, const union nf_inet_addr *daddr,
|
|
|
|
|
|
+struct ip_vs_dest *ip_vs_find_dest(struct net *net, int af,
|
|
|
|
+ const union nf_inet_addr *daddr,
|
|
__be16 dport,
|
|
__be16 dport,
|
|
const union nf_inet_addr *vaddr,
|
|
const union nf_inet_addr *vaddr,
|
|
- __be16 vport, __u16 protocol)
|
|
|
|
|
|
+ __be16 vport, __u16 protocol, __u32 fwmark)
|
|
{
|
|
{
|
|
struct ip_vs_dest *dest;
|
|
struct ip_vs_dest *dest;
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
|
|
|
|
- svc = ip_vs_service_get(af, 0, protocol, vaddr, vport);
|
|
|
|
|
|
+ svc = ip_vs_service_get(net, af, fwmark, protocol, vaddr, vport);
|
|
if (!svc)
|
|
if (!svc)
|
|
return NULL;
|
|
return NULL;
|
|
dest = ip_vs_lookup_dest(svc, daddr, dport);
|
|
dest = ip_vs_lookup_dest(svc, daddr, dport);
|
|
@@ -685,11 +641,12 @@ ip_vs_trash_get_dest(struct ip_vs_service *svc, const union nf_inet_addr *daddr,
|
|
__be16 dport)
|
|
__be16 dport)
|
|
{
|
|
{
|
|
struct ip_vs_dest *dest, *nxt;
|
|
struct ip_vs_dest *dest, *nxt;
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(svc->net);
|
|
|
|
|
|
/*
|
|
/*
|
|
* Find the destination in trash
|
|
* Find the destination in trash
|
|
*/
|
|
*/
|
|
- list_for_each_entry_safe(dest, nxt, &ip_vs_dest_trash, n_list) {
|
|
|
|
|
|
+ list_for_each_entry_safe(dest, nxt, &ipvs->dest_trash, n_list) {
|
|
IP_VS_DBG_BUF(3, "Destination %u/%s:%u still in trash, "
|
|
IP_VS_DBG_BUF(3, "Destination %u/%s:%u still in trash, "
|
|
"dest->refcnt=%d\n",
|
|
"dest->refcnt=%d\n",
|
|
dest->vfwmark,
|
|
dest->vfwmark,
|
|
@@ -720,6 +677,7 @@ ip_vs_trash_get_dest(struct ip_vs_service *svc, const union nf_inet_addr *daddr,
|
|
list_del(&dest->n_list);
|
|
list_del(&dest->n_list);
|
|
ip_vs_dst_reset(dest);
|
|
ip_vs_dst_reset(dest);
|
|
__ip_vs_unbind_svc(dest);
|
|
__ip_vs_unbind_svc(dest);
|
|
|
|
+ free_percpu(dest->stats.cpustats);
|
|
kfree(dest);
|
|
kfree(dest);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
@@ -737,14 +695,16 @@ ip_vs_trash_get_dest(struct ip_vs_service *svc, const union nf_inet_addr *daddr,
|
|
* are expired, and the refcnt of each destination in the trash must
|
|
* are expired, and the refcnt of each destination in the trash must
|
|
* be 1, so we simply release them here.
|
|
* be 1, so we simply release them here.
|
|
*/
|
|
*/
|
|
-static void ip_vs_trash_cleanup(void)
|
|
|
|
|
|
+static void ip_vs_trash_cleanup(struct net *net)
|
|
{
|
|
{
|
|
struct ip_vs_dest *dest, *nxt;
|
|
struct ip_vs_dest *dest, *nxt;
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(net);
|
|
|
|
|
|
- list_for_each_entry_safe(dest, nxt, &ip_vs_dest_trash, n_list) {
|
|
|
|
|
|
+ list_for_each_entry_safe(dest, nxt, &ipvs->dest_trash, n_list) {
|
|
list_del(&dest->n_list);
|
|
list_del(&dest->n_list);
|
|
ip_vs_dst_reset(dest);
|
|
ip_vs_dst_reset(dest);
|
|
__ip_vs_unbind_svc(dest);
|
|
__ip_vs_unbind_svc(dest);
|
|
|
|
+ free_percpu(dest->stats.cpustats);
|
|
kfree(dest);
|
|
kfree(dest);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
@@ -768,6 +728,7 @@ static void
|
|
__ip_vs_update_dest(struct ip_vs_service *svc, struct ip_vs_dest *dest,
|
|
__ip_vs_update_dest(struct ip_vs_service *svc, struct ip_vs_dest *dest,
|
|
struct ip_vs_dest_user_kern *udest, int add)
|
|
struct ip_vs_dest_user_kern *udest, int add)
|
|
{
|
|
{
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(svc->net);
|
|
int conn_flags;
|
|
int conn_flags;
|
|
|
|
|
|
/* set the weight and the flags */
|
|
/* set the weight and the flags */
|
|
@@ -780,12 +741,12 @@ __ip_vs_update_dest(struct ip_vs_service *svc, struct ip_vs_dest *dest,
|
|
conn_flags |= IP_VS_CONN_F_NOOUTPUT;
|
|
conn_flags |= IP_VS_CONN_F_NOOUTPUT;
|
|
} else {
|
|
} else {
|
|
/*
|
|
/*
|
|
- * Put the real service in ip_vs_rtable if not present.
|
|
|
|
|
|
+ * Put the real service in rs_table if not present.
|
|
* For now only for NAT!
|
|
* For now only for NAT!
|
|
*/
|
|
*/
|
|
- write_lock_bh(&__ip_vs_rs_lock);
|
|
|
|
- ip_vs_rs_hash(dest);
|
|
|
|
- write_unlock_bh(&__ip_vs_rs_lock);
|
|
|
|
|
|
+ write_lock_bh(&ipvs->rs_lock);
|
|
|
|
+ ip_vs_rs_hash(ipvs, dest);
|
|
|
|
+ write_unlock_bh(&ipvs->rs_lock);
|
|
}
|
|
}
|
|
atomic_set(&dest->conn_flags, conn_flags);
|
|
atomic_set(&dest->conn_flags, conn_flags);
|
|
|
|
|
|
@@ -813,7 +774,7 @@ __ip_vs_update_dest(struct ip_vs_service *svc, struct ip_vs_dest *dest,
|
|
spin_unlock(&dest->dst_lock);
|
|
spin_unlock(&dest->dst_lock);
|
|
|
|
|
|
if (add)
|
|
if (add)
|
|
- ip_vs_new_estimator(&dest->stats);
|
|
|
|
|
|
+ ip_vs_new_estimator(svc->net, &dest->stats);
|
|
|
|
|
|
write_lock_bh(&__ip_vs_svc_lock);
|
|
write_lock_bh(&__ip_vs_svc_lock);
|
|
|
|
|
|
@@ -850,12 +811,12 @@ ip_vs_new_dest(struct ip_vs_service *svc, struct ip_vs_dest_user_kern *udest,
|
|
atype = ipv6_addr_type(&udest->addr.in6);
|
|
atype = ipv6_addr_type(&udest->addr.in6);
|
|
if ((!(atype & IPV6_ADDR_UNICAST) ||
|
|
if ((!(atype & IPV6_ADDR_UNICAST) ||
|
|
atype & IPV6_ADDR_LINKLOCAL) &&
|
|
atype & IPV6_ADDR_LINKLOCAL) &&
|
|
- !__ip_vs_addr_is_local_v6(&udest->addr.in6))
|
|
|
|
|
|
+ !__ip_vs_addr_is_local_v6(svc->net, &udest->addr.in6))
|
|
return -EINVAL;
|
|
return -EINVAL;
|
|
} else
|
|
} else
|
|
#endif
|
|
#endif
|
|
{
|
|
{
|
|
- atype = inet_addr_type(&init_net, udest->addr.ip);
|
|
|
|
|
|
+ atype = inet_addr_type(svc->net, udest->addr.ip);
|
|
if (atype != RTN_LOCAL && atype != RTN_UNICAST)
|
|
if (atype != RTN_LOCAL && atype != RTN_UNICAST)
|
|
return -EINVAL;
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
@@ -865,6 +826,11 @@ ip_vs_new_dest(struct ip_vs_service *svc, struct ip_vs_dest_user_kern *udest,
|
|
pr_err("%s(): no memory.\n", __func__);
|
|
pr_err("%s(): no memory.\n", __func__);
|
|
return -ENOMEM;
|
|
return -ENOMEM;
|
|
}
|
|
}
|
|
|
|
+ dest->stats.cpustats = alloc_percpu(struct ip_vs_cpu_stats);
|
|
|
|
+ if (!dest->stats.cpustats) {
|
|
|
|
+ pr_err("%s() alloc_percpu failed\n", __func__);
|
|
|
|
+ goto err_alloc;
|
|
|
|
+ }
|
|
|
|
|
|
dest->af = svc->af;
|
|
dest->af = svc->af;
|
|
dest->protocol = svc->protocol;
|
|
dest->protocol = svc->protocol;
|
|
@@ -888,6 +854,10 @@ ip_vs_new_dest(struct ip_vs_service *svc, struct ip_vs_dest_user_kern *udest,
|
|
|
|
|
|
LeaveFunction(2);
|
|
LeaveFunction(2);
|
|
return 0;
|
|
return 0;
|
|
|
|
+
|
|
|
|
+err_alloc:
|
|
|
|
+ kfree(dest);
|
|
|
|
+ return -ENOMEM;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
@@ -1006,16 +976,18 @@ ip_vs_edit_dest(struct ip_vs_service *svc, struct ip_vs_dest_user_kern *udest)
|
|
/*
|
|
/*
|
|
* Delete a destination (must be already unlinked from the service)
|
|
* Delete a destination (must be already unlinked from the service)
|
|
*/
|
|
*/
|
|
-static void __ip_vs_del_dest(struct ip_vs_dest *dest)
|
|
|
|
|
|
+static void __ip_vs_del_dest(struct net *net, struct ip_vs_dest *dest)
|
|
{
|
|
{
|
|
- ip_vs_kill_estimator(&dest->stats);
|
|
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(net);
|
|
|
|
+
|
|
|
|
+ ip_vs_kill_estimator(net, &dest->stats);
|
|
|
|
|
|
/*
|
|
/*
|
|
* Remove it from the d-linked list with the real services.
|
|
* Remove it from the d-linked list with the real services.
|
|
*/
|
|
*/
|
|
- write_lock_bh(&__ip_vs_rs_lock);
|
|
|
|
|
|
+ write_lock_bh(&ipvs->rs_lock);
|
|
ip_vs_rs_unhash(dest);
|
|
ip_vs_rs_unhash(dest);
|
|
- write_unlock_bh(&__ip_vs_rs_lock);
|
|
|
|
|
|
+ write_unlock_bh(&ipvs->rs_lock);
|
|
|
|
|
|
/*
|
|
/*
|
|
* Decrease the refcnt of the dest, and free the dest
|
|
* Decrease the refcnt of the dest, and free the dest
|
|
@@ -1034,6 +1006,7 @@ static void __ip_vs_del_dest(struct ip_vs_dest *dest)
|
|
and only one user context can update virtual service at a
|
|
and only one user context can update virtual service at a
|
|
time, so the operation here is OK */
|
|
time, so the operation here is OK */
|
|
atomic_dec(&dest->svc->refcnt);
|
|
atomic_dec(&dest->svc->refcnt);
|
|
|
|
+ free_percpu(dest->stats.cpustats);
|
|
kfree(dest);
|
|
kfree(dest);
|
|
} else {
|
|
} else {
|
|
IP_VS_DBG_BUF(3, "Moving dest %s:%u into trash, "
|
|
IP_VS_DBG_BUF(3, "Moving dest %s:%u into trash, "
|
|
@@ -1041,7 +1014,7 @@ static void __ip_vs_del_dest(struct ip_vs_dest *dest)
|
|
IP_VS_DBG_ADDR(dest->af, &dest->addr),
|
|
IP_VS_DBG_ADDR(dest->af, &dest->addr),
|
|
ntohs(dest->port),
|
|
ntohs(dest->port),
|
|
atomic_read(&dest->refcnt));
|
|
atomic_read(&dest->refcnt));
|
|
- list_add(&dest->n_list, &ip_vs_dest_trash);
|
|
|
|
|
|
+ list_add(&dest->n_list, &ipvs->dest_trash);
|
|
atomic_inc(&dest->refcnt);
|
|
atomic_inc(&dest->refcnt);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
@@ -1105,7 +1078,7 @@ ip_vs_del_dest(struct ip_vs_service *svc, struct ip_vs_dest_user_kern *udest)
|
|
/*
|
|
/*
|
|
* Delete the destination
|
|
* Delete the destination
|
|
*/
|
|
*/
|
|
- __ip_vs_del_dest(dest);
|
|
|
|
|
|
+ __ip_vs_del_dest(svc->net, dest);
|
|
|
|
|
|
LeaveFunction(2);
|
|
LeaveFunction(2);
|
|
|
|
|
|
@@ -1117,13 +1090,14 @@ ip_vs_del_dest(struct ip_vs_service *svc, struct ip_vs_dest_user_kern *udest)
|
|
* Add a service into the service hash table
|
|
* Add a service into the service hash table
|
|
*/
|
|
*/
|
|
static int
|
|
static int
|
|
-ip_vs_add_service(struct ip_vs_service_user_kern *u,
|
|
|
|
|
|
+ip_vs_add_service(struct net *net, struct ip_vs_service_user_kern *u,
|
|
struct ip_vs_service **svc_p)
|
|
struct ip_vs_service **svc_p)
|
|
{
|
|
{
|
|
int ret = 0;
|
|
int ret = 0;
|
|
struct ip_vs_scheduler *sched = NULL;
|
|
struct ip_vs_scheduler *sched = NULL;
|
|
struct ip_vs_pe *pe = NULL;
|
|
struct ip_vs_pe *pe = NULL;
|
|
struct ip_vs_service *svc = NULL;
|
|
struct ip_vs_service *svc = NULL;
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(net);
|
|
|
|
|
|
/* increase the module use count */
|
|
/* increase the module use count */
|
|
ip_vs_use_count_inc();
|
|
ip_vs_use_count_inc();
|
|
@@ -1137,7 +1111,7 @@ ip_vs_add_service(struct ip_vs_service_user_kern *u,
|
|
}
|
|
}
|
|
|
|
|
|
if (u->pe_name && *u->pe_name) {
|
|
if (u->pe_name && *u->pe_name) {
|
|
- pe = ip_vs_pe_get(u->pe_name);
|
|
|
|
|
|
+ pe = ip_vs_pe_getbyname(u->pe_name);
|
|
if (pe == NULL) {
|
|
if (pe == NULL) {
|
|
pr_info("persistence engine module ip_vs_pe_%s "
|
|
pr_info("persistence engine module ip_vs_pe_%s "
|
|
"not found\n", u->pe_name);
|
|
"not found\n", u->pe_name);
|
|
@@ -1159,6 +1133,11 @@ ip_vs_add_service(struct ip_vs_service_user_kern *u,
|
|
ret = -ENOMEM;
|
|
ret = -ENOMEM;
|
|
goto out_err;
|
|
goto out_err;
|
|
}
|
|
}
|
|
|
|
+ svc->stats.cpustats = alloc_percpu(struct ip_vs_cpu_stats);
|
|
|
|
+ if (!svc->stats.cpustats) {
|
|
|
|
+ pr_err("%s() alloc_percpu failed\n", __func__);
|
|
|
|
+ goto out_err;
|
|
|
|
+ }
|
|
|
|
|
|
/* I'm the first user of the service */
|
|
/* I'm the first user of the service */
|
|
atomic_set(&svc->usecnt, 0);
|
|
atomic_set(&svc->usecnt, 0);
|
|
@@ -1172,6 +1151,7 @@ ip_vs_add_service(struct ip_vs_service_user_kern *u,
|
|
svc->flags = u->flags;
|
|
svc->flags = u->flags;
|
|
svc->timeout = u->timeout * HZ;
|
|
svc->timeout = u->timeout * HZ;
|
|
svc->netmask = u->netmask;
|
|
svc->netmask = u->netmask;
|
|
|
|
+ svc->net = net;
|
|
|
|
|
|
INIT_LIST_HEAD(&svc->destinations);
|
|
INIT_LIST_HEAD(&svc->destinations);
|
|
rwlock_init(&svc->sched_lock);
|
|
rwlock_init(&svc->sched_lock);
|
|
@@ -1189,15 +1169,15 @@ ip_vs_add_service(struct ip_vs_service_user_kern *u,
|
|
|
|
|
|
/* Update the virtual service counters */
|
|
/* Update the virtual service counters */
|
|
if (svc->port == FTPPORT)
|
|
if (svc->port == FTPPORT)
|
|
- atomic_inc(&ip_vs_ftpsvc_counter);
|
|
|
|
|
|
+ atomic_inc(&ipvs->ftpsvc_counter);
|
|
else if (svc->port == 0)
|
|
else if (svc->port == 0)
|
|
- atomic_inc(&ip_vs_nullsvc_counter);
|
|
|
|
|
|
+ atomic_inc(&ipvs->nullsvc_counter);
|
|
|
|
|
|
- ip_vs_new_estimator(&svc->stats);
|
|
|
|
|
|
+ ip_vs_new_estimator(net, &svc->stats);
|
|
|
|
|
|
/* Count only IPv4 services for old get/setsockopt interface */
|
|
/* Count only IPv4 services for old get/setsockopt interface */
|
|
if (svc->af == AF_INET)
|
|
if (svc->af == AF_INET)
|
|
- ip_vs_num_services++;
|
|
|
|
|
|
+ ipvs->num_services++;
|
|
|
|
|
|
/* Hash the service into the service table */
|
|
/* Hash the service into the service table */
|
|
write_lock_bh(&__ip_vs_svc_lock);
|
|
write_lock_bh(&__ip_vs_svc_lock);
|
|
@@ -1207,6 +1187,7 @@ ip_vs_add_service(struct ip_vs_service_user_kern *u,
|
|
*svc_p = svc;
|
|
*svc_p = svc;
|
|
return 0;
|
|
return 0;
|
|
|
|
|
|
|
|
+
|
|
out_err:
|
|
out_err:
|
|
if (svc != NULL) {
|
|
if (svc != NULL) {
|
|
ip_vs_unbind_scheduler(svc);
|
|
ip_vs_unbind_scheduler(svc);
|
|
@@ -1215,6 +1196,8 @@ ip_vs_add_service(struct ip_vs_service_user_kern *u,
|
|
ip_vs_app_inc_put(svc->inc);
|
|
ip_vs_app_inc_put(svc->inc);
|
|
local_bh_enable();
|
|
local_bh_enable();
|
|
}
|
|
}
|
|
|
|
+ if (svc->stats.cpustats)
|
|
|
|
+ free_percpu(svc->stats.cpustats);
|
|
kfree(svc);
|
|
kfree(svc);
|
|
}
|
|
}
|
|
ip_vs_scheduler_put(sched);
|
|
ip_vs_scheduler_put(sched);
|
|
@@ -1248,7 +1231,7 @@ ip_vs_edit_service(struct ip_vs_service *svc, struct ip_vs_service_user_kern *u)
|
|
old_sched = sched;
|
|
old_sched = sched;
|
|
|
|
|
|
if (u->pe_name && *u->pe_name) {
|
|
if (u->pe_name && *u->pe_name) {
|
|
- pe = ip_vs_pe_get(u->pe_name);
|
|
|
|
|
|
+ pe = ip_vs_pe_getbyname(u->pe_name);
|
|
if (pe == NULL) {
|
|
if (pe == NULL) {
|
|
pr_info("persistence engine module ip_vs_pe_%s "
|
|
pr_info("persistence engine module ip_vs_pe_%s "
|
|
"not found\n", u->pe_name);
|
|
"not found\n", u->pe_name);
|
|
@@ -1334,14 +1317,15 @@ static void __ip_vs_del_service(struct ip_vs_service *svc)
|
|
struct ip_vs_dest *dest, *nxt;
|
|
struct ip_vs_dest *dest, *nxt;
|
|
struct ip_vs_scheduler *old_sched;
|
|
struct ip_vs_scheduler *old_sched;
|
|
struct ip_vs_pe *old_pe;
|
|
struct ip_vs_pe *old_pe;
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(svc->net);
|
|
|
|
|
|
pr_info("%s: enter\n", __func__);
|
|
pr_info("%s: enter\n", __func__);
|
|
|
|
|
|
/* Count only IPv4 services for old get/setsockopt interface */
|
|
/* Count only IPv4 services for old get/setsockopt interface */
|
|
if (svc->af == AF_INET)
|
|
if (svc->af == AF_INET)
|
|
- ip_vs_num_services--;
|
|
|
|
|
|
+ ipvs->num_services--;
|
|
|
|
|
|
- ip_vs_kill_estimator(&svc->stats);
|
|
|
|
|
|
+ ip_vs_kill_estimator(svc->net, &svc->stats);
|
|
|
|
|
|
/* Unbind scheduler */
|
|
/* Unbind scheduler */
|
|
old_sched = svc->scheduler;
|
|
old_sched = svc->scheduler;
|
|
@@ -1364,16 +1348,16 @@ static void __ip_vs_del_service(struct ip_vs_service *svc)
|
|
*/
|
|
*/
|
|
list_for_each_entry_safe(dest, nxt, &svc->destinations, n_list) {
|
|
list_for_each_entry_safe(dest, nxt, &svc->destinations, n_list) {
|
|
__ip_vs_unlink_dest(svc, dest, 0);
|
|
__ip_vs_unlink_dest(svc, dest, 0);
|
|
- __ip_vs_del_dest(dest);
|
|
|
|
|
|
+ __ip_vs_del_dest(svc->net, dest);
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
/*
|
|
* Update the virtual service counters
|
|
* Update the virtual service counters
|
|
*/
|
|
*/
|
|
if (svc->port == FTPPORT)
|
|
if (svc->port == FTPPORT)
|
|
- atomic_dec(&ip_vs_ftpsvc_counter);
|
|
|
|
|
|
+ atomic_dec(&ipvs->ftpsvc_counter);
|
|
else if (svc->port == 0)
|
|
else if (svc->port == 0)
|
|
- atomic_dec(&ip_vs_nullsvc_counter);
|
|
|
|
|
|
+ atomic_dec(&ipvs->nullsvc_counter);
|
|
|
|
|
|
/*
|
|
/*
|
|
* Free the service if nobody refers to it
|
|
* Free the service if nobody refers to it
|
|
@@ -1383,6 +1367,7 @@ static void __ip_vs_del_service(struct ip_vs_service *svc)
|
|
svc->fwmark,
|
|
svc->fwmark,
|
|
IP_VS_DBG_ADDR(svc->af, &svc->addr),
|
|
IP_VS_DBG_ADDR(svc->af, &svc->addr),
|
|
ntohs(svc->port), atomic_read(&svc->usecnt));
|
|
ntohs(svc->port), atomic_read(&svc->usecnt));
|
|
|
|
+ free_percpu(svc->stats.cpustats);
|
|
kfree(svc);
|
|
kfree(svc);
|
|
}
|
|
}
|
|
|
|
|
|
@@ -1428,17 +1413,19 @@ static int ip_vs_del_service(struct ip_vs_service *svc)
|
|
/*
|
|
/*
|
|
* Flush all the virtual services
|
|
* Flush all the virtual services
|
|
*/
|
|
*/
|
|
-static int ip_vs_flush(void)
|
|
|
|
|
|
+static int ip_vs_flush(struct net *net)
|
|
{
|
|
{
|
|
int idx;
|
|
int idx;
|
|
struct ip_vs_service *svc, *nxt;
|
|
struct ip_vs_service *svc, *nxt;
|
|
|
|
|
|
/*
|
|
/*
|
|
- * Flush the service table hashed by <protocol,addr,port>
|
|
|
|
|
|
+ * Flush the service table hashed by <netns,protocol,addr,port>
|
|
*/
|
|
*/
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
- list_for_each_entry_safe(svc, nxt, &ip_vs_svc_table[idx], s_list) {
|
|
|
|
- ip_vs_unlink_service(svc);
|
|
|
|
|
|
+ list_for_each_entry_safe(svc, nxt, &ip_vs_svc_table[idx],
|
|
|
|
+ s_list) {
|
|
|
|
+ if (net_eq(svc->net, net))
|
|
|
|
+ ip_vs_unlink_service(svc);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
@@ -1448,7 +1435,8 @@ static int ip_vs_flush(void)
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
list_for_each_entry_safe(svc, nxt,
|
|
list_for_each_entry_safe(svc, nxt,
|
|
&ip_vs_svc_fwm_table[idx], f_list) {
|
|
&ip_vs_svc_fwm_table[idx], f_list) {
|
|
- ip_vs_unlink_service(svc);
|
|
|
|
|
|
+ if (net_eq(svc->net, net))
|
|
|
|
+ ip_vs_unlink_service(svc);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
@@ -1472,24 +1460,26 @@ static int ip_vs_zero_service(struct ip_vs_service *svc)
|
|
return 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
-static int ip_vs_zero_all(void)
|
|
|
|
|
|
+static int ip_vs_zero_all(struct net *net)
|
|
{
|
|
{
|
|
int idx;
|
|
int idx;
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
|
|
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
list_for_each_entry(svc, &ip_vs_svc_table[idx], s_list) {
|
|
list_for_each_entry(svc, &ip_vs_svc_table[idx], s_list) {
|
|
- ip_vs_zero_service(svc);
|
|
|
|
|
|
+ if (net_eq(svc->net, net))
|
|
|
|
+ ip_vs_zero_service(svc);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[idx], f_list) {
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[idx], f_list) {
|
|
- ip_vs_zero_service(svc);
|
|
|
|
|
|
+ if (net_eq(svc->net, net))
|
|
|
|
+ ip_vs_zero_service(svc);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
- ip_vs_zero_stats(&ip_vs_stats);
|
|
|
|
|
|
+ ip_vs_zero_stats(net_ipvs(net)->tot_stats);
|
|
return 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
@@ -1498,6 +1488,7 @@ static int
|
|
proc_do_defense_mode(ctl_table *table, int write,
|
|
proc_do_defense_mode(ctl_table *table, int write,
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
{
|
|
{
|
|
|
|
+ struct net *net = current->nsproxy->net_ns;
|
|
int *valp = table->data;
|
|
int *valp = table->data;
|
|
int val = *valp;
|
|
int val = *valp;
|
|
int rc;
|
|
int rc;
|
|
@@ -1508,7 +1499,7 @@ proc_do_defense_mode(ctl_table *table, int write,
|
|
/* Restore the correct value */
|
|
/* Restore the correct value */
|
|
*valp = val;
|
|
*valp = val;
|
|
} else {
|
|
} else {
|
|
- update_defense_level();
|
|
|
|
|
|
+ update_defense_level(net_ipvs(net));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return rc;
|
|
return rc;
|
|
@@ -1534,45 +1525,54 @@ proc_do_sync_threshold(ctl_table *table, int write,
|
|
return rc;
|
|
return rc;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+static int
|
|
|
|
+proc_do_sync_mode(ctl_table *table, int write,
|
|
|
|
+ void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
+{
|
|
|
|
+ int *valp = table->data;
|
|
|
|
+ int val = *valp;
|
|
|
|
+ int rc;
|
|
|
|
+
|
|
|
|
+ rc = proc_dointvec(table, write, buffer, lenp, ppos);
|
|
|
|
+ if (write && (*valp != val)) {
|
|
|
|
+ if ((*valp < 0) || (*valp > 1)) {
|
|
|
|
+ /* Restore the correct value */
|
|
|
|
+ *valp = val;
|
|
|
|
+ } else {
|
|
|
|
+ struct net *net = current->nsproxy->net_ns;
|
|
|
|
+ ip_vs_sync_switch_mode(net, val);
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ return rc;
|
|
|
|
+}
|
|
|
|
|
|
/*
|
|
/*
|
|
* IPVS sysctl table (under the /proc/sys/net/ipv4/vs/)
|
|
* IPVS sysctl table (under the /proc/sys/net/ipv4/vs/)
|
|
|
|
+ * Do not change order or insert new entries without
|
|
|
|
+ * align with netns init in __ip_vs_control_init()
|
|
*/
|
|
*/
|
|
|
|
|
|
static struct ctl_table vs_vars[] = {
|
|
static struct ctl_table vs_vars[] = {
|
|
{
|
|
{
|
|
.procname = "amemthresh",
|
|
.procname = "amemthresh",
|
|
- .data = &sysctl_ip_vs_amemthresh,
|
|
|
|
.maxlen = sizeof(int),
|
|
.maxlen = sizeof(int),
|
|
.mode = 0644,
|
|
.mode = 0644,
|
|
.proc_handler = proc_dointvec,
|
|
.proc_handler = proc_dointvec,
|
|
},
|
|
},
|
|
-#ifdef CONFIG_IP_VS_DEBUG
|
|
|
|
- {
|
|
|
|
- .procname = "debug_level",
|
|
|
|
- .data = &sysctl_ip_vs_debug_level,
|
|
|
|
- .maxlen = sizeof(int),
|
|
|
|
- .mode = 0644,
|
|
|
|
- .proc_handler = proc_dointvec,
|
|
|
|
- },
|
|
|
|
-#endif
|
|
|
|
{
|
|
{
|
|
.procname = "am_droprate",
|
|
.procname = "am_droprate",
|
|
- .data = &sysctl_ip_vs_am_droprate,
|
|
|
|
.maxlen = sizeof(int),
|
|
.maxlen = sizeof(int),
|
|
.mode = 0644,
|
|
.mode = 0644,
|
|
.proc_handler = proc_dointvec,
|
|
.proc_handler = proc_dointvec,
|
|
},
|
|
},
|
|
{
|
|
{
|
|
.procname = "drop_entry",
|
|
.procname = "drop_entry",
|
|
- .data = &sysctl_ip_vs_drop_entry,
|
|
|
|
.maxlen = sizeof(int),
|
|
.maxlen = sizeof(int),
|
|
.mode = 0644,
|
|
.mode = 0644,
|
|
.proc_handler = proc_do_defense_mode,
|
|
.proc_handler = proc_do_defense_mode,
|
|
},
|
|
},
|
|
{
|
|
{
|
|
.procname = "drop_packet",
|
|
.procname = "drop_packet",
|
|
- .data = &sysctl_ip_vs_drop_packet,
|
|
|
|
.maxlen = sizeof(int),
|
|
.maxlen = sizeof(int),
|
|
.mode = 0644,
|
|
.mode = 0644,
|
|
.proc_handler = proc_do_defense_mode,
|
|
.proc_handler = proc_do_defense_mode,
|
|
@@ -1580,7 +1580,6 @@ static struct ctl_table vs_vars[] = {
|
|
#ifdef CONFIG_IP_VS_NFCT
|
|
#ifdef CONFIG_IP_VS_NFCT
|
|
{
|
|
{
|
|
.procname = "conntrack",
|
|
.procname = "conntrack",
|
|
- .data = &sysctl_ip_vs_conntrack,
|
|
|
|
.maxlen = sizeof(int),
|
|
.maxlen = sizeof(int),
|
|
.mode = 0644,
|
|
.mode = 0644,
|
|
.proc_handler = &proc_dointvec,
|
|
.proc_handler = &proc_dointvec,
|
|
@@ -1588,18 +1587,62 @@ static struct ctl_table vs_vars[] = {
|
|
#endif
|
|
#endif
|
|
{
|
|
{
|
|
.procname = "secure_tcp",
|
|
.procname = "secure_tcp",
|
|
- .data = &sysctl_ip_vs_secure_tcp,
|
|
|
|
.maxlen = sizeof(int),
|
|
.maxlen = sizeof(int),
|
|
.mode = 0644,
|
|
.mode = 0644,
|
|
.proc_handler = proc_do_defense_mode,
|
|
.proc_handler = proc_do_defense_mode,
|
|
},
|
|
},
|
|
{
|
|
{
|
|
.procname = "snat_reroute",
|
|
.procname = "snat_reroute",
|
|
- .data = &sysctl_ip_vs_snat_reroute,
|
|
|
|
.maxlen = sizeof(int),
|
|
.maxlen = sizeof(int),
|
|
.mode = 0644,
|
|
.mode = 0644,
|
|
.proc_handler = &proc_dointvec,
|
|
.proc_handler = &proc_dointvec,
|
|
},
|
|
},
|
|
|
|
+ {
|
|
|
|
+ .procname = "sync_version",
|
|
|
|
+ .maxlen = sizeof(int),
|
|
|
|
+ .mode = 0644,
|
|
|
|
+ .proc_handler = &proc_do_sync_mode,
|
|
|
|
+ },
|
|
|
|
+ {
|
|
|
|
+ .procname = "cache_bypass",
|
|
|
|
+ .maxlen = sizeof(int),
|
|
|
|
+ .mode = 0644,
|
|
|
|
+ .proc_handler = proc_dointvec,
|
|
|
|
+ },
|
|
|
|
+ {
|
|
|
|
+ .procname = "expire_nodest_conn",
|
|
|
|
+ .maxlen = sizeof(int),
|
|
|
|
+ .mode = 0644,
|
|
|
|
+ .proc_handler = proc_dointvec,
|
|
|
|
+ },
|
|
|
|
+ {
|
|
|
|
+ .procname = "expire_quiescent_template",
|
|
|
|
+ .maxlen = sizeof(int),
|
|
|
|
+ .mode = 0644,
|
|
|
|
+ .proc_handler = proc_dointvec,
|
|
|
|
+ },
|
|
|
|
+ {
|
|
|
|
+ .procname = "sync_threshold",
|
|
|
|
+ .maxlen =
|
|
|
|
+ sizeof(((struct netns_ipvs *)0)->sysctl_sync_threshold),
|
|
|
|
+ .mode = 0644,
|
|
|
|
+ .proc_handler = proc_do_sync_threshold,
|
|
|
|
+ },
|
|
|
|
+ {
|
|
|
|
+ .procname = "nat_icmp_send",
|
|
|
|
+ .maxlen = sizeof(int),
|
|
|
|
+ .mode = 0644,
|
|
|
|
+ .proc_handler = proc_dointvec,
|
|
|
|
+ },
|
|
|
|
+#ifdef CONFIG_IP_VS_DEBUG
|
|
|
|
+ {
|
|
|
|
+ .procname = "debug_level",
|
|
|
|
+ .data = &sysctl_ip_vs_debug_level,
|
|
|
|
+ .maxlen = sizeof(int),
|
|
|
|
+ .mode = 0644,
|
|
|
|
+ .proc_handler = proc_dointvec,
|
|
|
|
+ },
|
|
|
|
+#endif
|
|
#if 0
|
|
#if 0
|
|
{
|
|
{
|
|
.procname = "timeout_established",
|
|
.procname = "timeout_established",
|
|
@@ -1686,41 +1729,6 @@ static struct ctl_table vs_vars[] = {
|
|
.proc_handler = proc_dointvec_jiffies,
|
|
.proc_handler = proc_dointvec_jiffies,
|
|
},
|
|
},
|
|
#endif
|
|
#endif
|
|
- {
|
|
|
|
- .procname = "cache_bypass",
|
|
|
|
- .data = &sysctl_ip_vs_cache_bypass,
|
|
|
|
- .maxlen = sizeof(int),
|
|
|
|
- .mode = 0644,
|
|
|
|
- .proc_handler = proc_dointvec,
|
|
|
|
- },
|
|
|
|
- {
|
|
|
|
- .procname = "expire_nodest_conn",
|
|
|
|
- .data = &sysctl_ip_vs_expire_nodest_conn,
|
|
|
|
- .maxlen = sizeof(int),
|
|
|
|
- .mode = 0644,
|
|
|
|
- .proc_handler = proc_dointvec,
|
|
|
|
- },
|
|
|
|
- {
|
|
|
|
- .procname = "expire_quiescent_template",
|
|
|
|
- .data = &sysctl_ip_vs_expire_quiescent_template,
|
|
|
|
- .maxlen = sizeof(int),
|
|
|
|
- .mode = 0644,
|
|
|
|
- .proc_handler = proc_dointvec,
|
|
|
|
- },
|
|
|
|
- {
|
|
|
|
- .procname = "sync_threshold",
|
|
|
|
- .data = &sysctl_ip_vs_sync_threshold,
|
|
|
|
- .maxlen = sizeof(sysctl_ip_vs_sync_threshold),
|
|
|
|
- .mode = 0644,
|
|
|
|
- .proc_handler = proc_do_sync_threshold,
|
|
|
|
- },
|
|
|
|
- {
|
|
|
|
- .procname = "nat_icmp_send",
|
|
|
|
- .data = &sysctl_ip_vs_nat_icmp_send,
|
|
|
|
- .maxlen = sizeof(int),
|
|
|
|
- .mode = 0644,
|
|
|
|
- .proc_handler = proc_dointvec,
|
|
|
|
- },
|
|
|
|
{ }
|
|
{ }
|
|
};
|
|
};
|
|
|
|
|
|
@@ -1732,11 +1740,10 @@ const struct ctl_path net_vs_ctl_path[] = {
|
|
};
|
|
};
|
|
EXPORT_SYMBOL_GPL(net_vs_ctl_path);
|
|
EXPORT_SYMBOL_GPL(net_vs_ctl_path);
|
|
|
|
|
|
-static struct ctl_table_header * sysctl_header;
|
|
|
|
-
|
|
|
|
#ifdef CONFIG_PROC_FS
|
|
#ifdef CONFIG_PROC_FS
|
|
|
|
|
|
struct ip_vs_iter {
|
|
struct ip_vs_iter {
|
|
|
|
+ struct seq_net_private p; /* Do not move this, netns depends upon it*/
|
|
struct list_head *table;
|
|
struct list_head *table;
|
|
int bucket;
|
|
int bucket;
|
|
};
|
|
};
|
|
@@ -1763,6 +1770,7 @@ static inline const char *ip_vs_fwd_name(unsigned flags)
|
|
/* Get the Nth entry in the two lists */
|
|
/* Get the Nth entry in the two lists */
|
|
static struct ip_vs_service *ip_vs_info_array(struct seq_file *seq, loff_t pos)
|
|
static struct ip_vs_service *ip_vs_info_array(struct seq_file *seq, loff_t pos)
|
|
{
|
|
{
|
|
|
|
+ struct net *net = seq_file_net(seq);
|
|
struct ip_vs_iter *iter = seq->private;
|
|
struct ip_vs_iter *iter = seq->private;
|
|
int idx;
|
|
int idx;
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
@@ -1770,7 +1778,7 @@ static struct ip_vs_service *ip_vs_info_array(struct seq_file *seq, loff_t pos)
|
|
/* look in hash by protocol */
|
|
/* look in hash by protocol */
|
|
for (idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
for (idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
list_for_each_entry(svc, &ip_vs_svc_table[idx], s_list) {
|
|
list_for_each_entry(svc, &ip_vs_svc_table[idx], s_list) {
|
|
- if (pos-- == 0){
|
|
|
|
|
|
+ if (net_eq(svc->net, net) && pos-- == 0) {
|
|
iter->table = ip_vs_svc_table;
|
|
iter->table = ip_vs_svc_table;
|
|
iter->bucket = idx;
|
|
iter->bucket = idx;
|
|
return svc;
|
|
return svc;
|
|
@@ -1781,7 +1789,7 @@ static struct ip_vs_service *ip_vs_info_array(struct seq_file *seq, loff_t pos)
|
|
/* keep looking in fwmark */
|
|
/* keep looking in fwmark */
|
|
for (idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
for (idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[idx], f_list) {
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[idx], f_list) {
|
|
- if (pos-- == 0) {
|
|
|
|
|
|
+ if (net_eq(svc->net, net) && pos-- == 0) {
|
|
iter->table = ip_vs_svc_fwm_table;
|
|
iter->table = ip_vs_svc_fwm_table;
|
|
iter->bucket = idx;
|
|
iter->bucket = idx;
|
|
return svc;
|
|
return svc;
|
|
@@ -1935,7 +1943,7 @@ static const struct seq_operations ip_vs_info_seq_ops = {
|
|
|
|
|
|
static int ip_vs_info_open(struct inode *inode, struct file *file)
|
|
static int ip_vs_info_open(struct inode *inode, struct file *file)
|
|
{
|
|
{
|
|
- return seq_open_private(file, &ip_vs_info_seq_ops,
|
|
|
|
|
|
+ return seq_open_net(inode, file, &ip_vs_info_seq_ops,
|
|
sizeof(struct ip_vs_iter));
|
|
sizeof(struct ip_vs_iter));
|
|
}
|
|
}
|
|
|
|
|
|
@@ -1949,13 +1957,11 @@ static const struct file_operations ip_vs_info_fops = {
|
|
|
|
|
|
#endif
|
|
#endif
|
|
|
|
|
|
-struct ip_vs_stats ip_vs_stats = {
|
|
|
|
- .lock = __SPIN_LOCK_UNLOCKED(ip_vs_stats.lock),
|
|
|
|
-};
|
|
|
|
-
|
|
|
|
#ifdef CONFIG_PROC_FS
|
|
#ifdef CONFIG_PROC_FS
|
|
static int ip_vs_stats_show(struct seq_file *seq, void *v)
|
|
static int ip_vs_stats_show(struct seq_file *seq, void *v)
|
|
{
|
|
{
|
|
|
|
+ struct net *net = seq_file_single_net(seq);
|
|
|
|
+ struct ip_vs_stats *tot_stats = net_ipvs(net)->tot_stats;
|
|
|
|
|
|
/* 01234567 01234567 01234567 0123456701234567 0123456701234567 */
|
|
/* 01234567 01234567 01234567 0123456701234567 0123456701234567 */
|
|
seq_puts(seq,
|
|
seq_puts(seq,
|
|
@@ -1963,29 +1969,29 @@ static int ip_vs_stats_show(struct seq_file *seq, void *v)
|
|
seq_printf(seq,
|
|
seq_printf(seq,
|
|
" Conns Packets Packets Bytes Bytes\n");
|
|
" Conns Packets Packets Bytes Bytes\n");
|
|
|
|
|
|
- spin_lock_bh(&ip_vs_stats.lock);
|
|
|
|
- seq_printf(seq, "%8X %8X %8X %16LX %16LX\n\n", ip_vs_stats.ustats.conns,
|
|
|
|
- ip_vs_stats.ustats.inpkts, ip_vs_stats.ustats.outpkts,
|
|
|
|
- (unsigned long long) ip_vs_stats.ustats.inbytes,
|
|
|
|
- (unsigned long long) ip_vs_stats.ustats.outbytes);
|
|
|
|
|
|
+ spin_lock_bh(&tot_stats->lock);
|
|
|
|
+ seq_printf(seq, "%8X %8X %8X %16LX %16LX\n\n", tot_stats->ustats.conns,
|
|
|
|
+ tot_stats->ustats.inpkts, tot_stats->ustats.outpkts,
|
|
|
|
+ (unsigned long long) tot_stats->ustats.inbytes,
|
|
|
|
+ (unsigned long long) tot_stats->ustats.outbytes);
|
|
|
|
|
|
/* 01234567 01234567 01234567 0123456701234567 0123456701234567 */
|
|
/* 01234567 01234567 01234567 0123456701234567 0123456701234567 */
|
|
seq_puts(seq,
|
|
seq_puts(seq,
|
|
" Conns/s Pkts/s Pkts/s Bytes/s Bytes/s\n");
|
|
" Conns/s Pkts/s Pkts/s Bytes/s Bytes/s\n");
|
|
seq_printf(seq,"%8X %8X %8X %16X %16X\n",
|
|
seq_printf(seq,"%8X %8X %8X %16X %16X\n",
|
|
- ip_vs_stats.ustats.cps,
|
|
|
|
- ip_vs_stats.ustats.inpps,
|
|
|
|
- ip_vs_stats.ustats.outpps,
|
|
|
|
- ip_vs_stats.ustats.inbps,
|
|
|
|
- ip_vs_stats.ustats.outbps);
|
|
|
|
- spin_unlock_bh(&ip_vs_stats.lock);
|
|
|
|
|
|
+ tot_stats->ustats.cps,
|
|
|
|
+ tot_stats->ustats.inpps,
|
|
|
|
+ tot_stats->ustats.outpps,
|
|
|
|
+ tot_stats->ustats.inbps,
|
|
|
|
+ tot_stats->ustats.outbps);
|
|
|
|
+ spin_unlock_bh(&tot_stats->lock);
|
|
|
|
|
|
return 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
static int ip_vs_stats_seq_open(struct inode *inode, struct file *file)
|
|
static int ip_vs_stats_seq_open(struct inode *inode, struct file *file)
|
|
{
|
|
{
|
|
- return single_open(file, ip_vs_stats_show, NULL);
|
|
|
|
|
|
+ return single_open_net(inode, file, ip_vs_stats_show);
|
|
}
|
|
}
|
|
|
|
|
|
static const struct file_operations ip_vs_stats_fops = {
|
|
static const struct file_operations ip_vs_stats_fops = {
|
|
@@ -1996,13 +2002,68 @@ static const struct file_operations ip_vs_stats_fops = {
|
|
.release = single_release,
|
|
.release = single_release,
|
|
};
|
|
};
|
|
|
|
|
|
|
|
+static int ip_vs_stats_percpu_show(struct seq_file *seq, void *v)
|
|
|
|
+{
|
|
|
|
+ struct net *net = seq_file_single_net(seq);
|
|
|
|
+ struct ip_vs_stats *tot_stats = net_ipvs(net)->tot_stats;
|
|
|
|
+ int i;
|
|
|
|
+
|
|
|
|
+/* 01234567 01234567 01234567 0123456701234567 0123456701234567 */
|
|
|
|
+ seq_puts(seq,
|
|
|
|
+ " Total Incoming Outgoing Incoming Outgoing\n");
|
|
|
|
+ seq_printf(seq,
|
|
|
|
+ "CPU Conns Packets Packets Bytes Bytes\n");
|
|
|
|
+
|
|
|
|
+ for_each_possible_cpu(i) {
|
|
|
|
+ struct ip_vs_cpu_stats *u = per_cpu_ptr(net->ipvs->cpustats, i);
|
|
|
|
+ seq_printf(seq, "%3X %8X %8X %8X %16LX %16LX\n",
|
|
|
|
+ i, u->ustats.conns, u->ustats.inpkts,
|
|
|
|
+ u->ustats.outpkts, (__u64)u->ustats.inbytes,
|
|
|
|
+ (__u64)u->ustats.outbytes);
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ spin_lock_bh(&tot_stats->lock);
|
|
|
|
+ seq_printf(seq, " ~ %8X %8X %8X %16LX %16LX\n\n",
|
|
|
|
+ tot_stats->ustats.conns, tot_stats->ustats.inpkts,
|
|
|
|
+ tot_stats->ustats.outpkts,
|
|
|
|
+ (unsigned long long) tot_stats->ustats.inbytes,
|
|
|
|
+ (unsigned long long) tot_stats->ustats.outbytes);
|
|
|
|
+
|
|
|
|
+/* 01234567 01234567 01234567 0123456701234567 0123456701234567 */
|
|
|
|
+ seq_puts(seq,
|
|
|
|
+ " Conns/s Pkts/s Pkts/s Bytes/s Bytes/s\n");
|
|
|
|
+ seq_printf(seq, " %8X %8X %8X %16X %16X\n",
|
|
|
|
+ tot_stats->ustats.cps,
|
|
|
|
+ tot_stats->ustats.inpps,
|
|
|
|
+ tot_stats->ustats.outpps,
|
|
|
|
+ tot_stats->ustats.inbps,
|
|
|
|
+ tot_stats->ustats.outbps);
|
|
|
|
+ spin_unlock_bh(&tot_stats->lock);
|
|
|
|
+
|
|
|
|
+ return 0;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+static int ip_vs_stats_percpu_seq_open(struct inode *inode, struct file *file)
|
|
|
|
+{
|
|
|
|
+ return single_open_net(inode, file, ip_vs_stats_percpu_show);
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+static const struct file_operations ip_vs_stats_percpu_fops = {
|
|
|
|
+ .owner = THIS_MODULE,
|
|
|
|
+ .open = ip_vs_stats_percpu_seq_open,
|
|
|
|
+ .read = seq_read,
|
|
|
|
+ .llseek = seq_lseek,
|
|
|
|
+ .release = single_release,
|
|
|
|
+};
|
|
#endif
|
|
#endif
|
|
|
|
|
|
/*
|
|
/*
|
|
* Set timeout values for tcp tcpfin udp in the timeout_table.
|
|
* Set timeout values for tcp tcpfin udp in the timeout_table.
|
|
*/
|
|
*/
|
|
-static int ip_vs_set_timeout(struct ip_vs_timeout_user *u)
|
|
|
|
|
|
+static int ip_vs_set_timeout(struct net *net, struct ip_vs_timeout_user *u)
|
|
{
|
|
{
|
|
|
|
+ struct ip_vs_proto_data *pd;
|
|
|
|
+
|
|
IP_VS_DBG(2, "Setting timeout tcp:%d tcpfin:%d udp:%d\n",
|
|
IP_VS_DBG(2, "Setting timeout tcp:%d tcpfin:%d udp:%d\n",
|
|
u->tcp_timeout,
|
|
u->tcp_timeout,
|
|
u->tcp_fin_timeout,
|
|
u->tcp_fin_timeout,
|
|
@@ -2010,19 +2071,22 @@ static int ip_vs_set_timeout(struct ip_vs_timeout_user *u)
|
|
|
|
|
|
#ifdef CONFIG_IP_VS_PROTO_TCP
|
|
#ifdef CONFIG_IP_VS_PROTO_TCP
|
|
if (u->tcp_timeout) {
|
|
if (u->tcp_timeout) {
|
|
- ip_vs_protocol_tcp.timeout_table[IP_VS_TCP_S_ESTABLISHED]
|
|
|
|
|
|
+ pd = ip_vs_proto_data_get(net, IPPROTO_TCP);
|
|
|
|
+ pd->timeout_table[IP_VS_TCP_S_ESTABLISHED]
|
|
= u->tcp_timeout * HZ;
|
|
= u->tcp_timeout * HZ;
|
|
}
|
|
}
|
|
|
|
|
|
if (u->tcp_fin_timeout) {
|
|
if (u->tcp_fin_timeout) {
|
|
- ip_vs_protocol_tcp.timeout_table[IP_VS_TCP_S_FIN_WAIT]
|
|
|
|
|
|
+ pd = ip_vs_proto_data_get(net, IPPROTO_TCP);
|
|
|
|
+ pd->timeout_table[IP_VS_TCP_S_FIN_WAIT]
|
|
= u->tcp_fin_timeout * HZ;
|
|
= u->tcp_fin_timeout * HZ;
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
|
|
|
|
#ifdef CONFIG_IP_VS_PROTO_UDP
|
|
#ifdef CONFIG_IP_VS_PROTO_UDP
|
|
if (u->udp_timeout) {
|
|
if (u->udp_timeout) {
|
|
- ip_vs_protocol_udp.timeout_table[IP_VS_UDP_S_NORMAL]
|
|
|
|
|
|
+ pd = ip_vs_proto_data_get(net, IPPROTO_UDP);
|
|
|
|
+ pd->timeout_table[IP_VS_UDP_S_NORMAL]
|
|
= u->udp_timeout * HZ;
|
|
= u->udp_timeout * HZ;
|
|
}
|
|
}
|
|
#endif
|
|
#endif
|
|
@@ -2087,6 +2151,7 @@ static void ip_vs_copy_udest_compat(struct ip_vs_dest_user_kern *udest,
|
|
static int
|
|
static int
|
|
do_ip_vs_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len)
|
|
do_ip_vs_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len)
|
|
{
|
|
{
|
|
|
|
+ struct net *net = sock_net(sk);
|
|
int ret;
|
|
int ret;
|
|
unsigned char arg[MAX_ARG_LEN];
|
|
unsigned char arg[MAX_ARG_LEN];
|
|
struct ip_vs_service_user *usvc_compat;
|
|
struct ip_vs_service_user *usvc_compat;
|
|
@@ -2121,19 +2186,20 @@ do_ip_vs_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len)
|
|
|
|
|
|
if (cmd == IP_VS_SO_SET_FLUSH) {
|
|
if (cmd == IP_VS_SO_SET_FLUSH) {
|
|
/* Flush the virtual service */
|
|
/* Flush the virtual service */
|
|
- ret = ip_vs_flush();
|
|
|
|
|
|
+ ret = ip_vs_flush(net);
|
|
goto out_unlock;
|
|
goto out_unlock;
|
|
} else if (cmd == IP_VS_SO_SET_TIMEOUT) {
|
|
} else if (cmd == IP_VS_SO_SET_TIMEOUT) {
|
|
/* Set timeout values for (tcp tcpfin udp) */
|
|
/* Set timeout values for (tcp tcpfin udp) */
|
|
- ret = ip_vs_set_timeout((struct ip_vs_timeout_user *)arg);
|
|
|
|
|
|
+ ret = ip_vs_set_timeout(net, (struct ip_vs_timeout_user *)arg);
|
|
goto out_unlock;
|
|
goto out_unlock;
|
|
} else if (cmd == IP_VS_SO_SET_STARTDAEMON) {
|
|
} else if (cmd == IP_VS_SO_SET_STARTDAEMON) {
|
|
struct ip_vs_daemon_user *dm = (struct ip_vs_daemon_user *)arg;
|
|
struct ip_vs_daemon_user *dm = (struct ip_vs_daemon_user *)arg;
|
|
- ret = start_sync_thread(dm->state, dm->mcast_ifn, dm->syncid);
|
|
|
|
|
|
+ ret = start_sync_thread(net, dm->state, dm->mcast_ifn,
|
|
|
|
+ dm->syncid);
|
|
goto out_unlock;
|
|
goto out_unlock;
|
|
} else if (cmd == IP_VS_SO_SET_STOPDAEMON) {
|
|
} else if (cmd == IP_VS_SO_SET_STOPDAEMON) {
|
|
struct ip_vs_daemon_user *dm = (struct ip_vs_daemon_user *)arg;
|
|
struct ip_vs_daemon_user *dm = (struct ip_vs_daemon_user *)arg;
|
|
- ret = stop_sync_thread(dm->state);
|
|
|
|
|
|
+ ret = stop_sync_thread(net, dm->state);
|
|
goto out_unlock;
|
|
goto out_unlock;
|
|
}
|
|
}
|
|
|
|
|
|
@@ -2148,7 +2214,7 @@ do_ip_vs_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len)
|
|
if (cmd == IP_VS_SO_SET_ZERO) {
|
|
if (cmd == IP_VS_SO_SET_ZERO) {
|
|
/* if no service address is set, zero counters in all */
|
|
/* if no service address is set, zero counters in all */
|
|
if (!usvc.fwmark && !usvc.addr.ip && !usvc.port) {
|
|
if (!usvc.fwmark && !usvc.addr.ip && !usvc.port) {
|
|
- ret = ip_vs_zero_all();
|
|
|
|
|
|
+ ret = ip_vs_zero_all(net);
|
|
goto out_unlock;
|
|
goto out_unlock;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
@@ -2165,10 +2231,10 @@ do_ip_vs_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len)
|
|
|
|
|
|
/* Lookup the exact service by <protocol, addr, port> or fwmark */
|
|
/* Lookup the exact service by <protocol, addr, port> or fwmark */
|
|
if (usvc.fwmark == 0)
|
|
if (usvc.fwmark == 0)
|
|
- svc = __ip_vs_service_find(usvc.af, usvc.protocol,
|
|
|
|
|
|
+ svc = __ip_vs_service_find(net, usvc.af, usvc.protocol,
|
|
&usvc.addr, usvc.port);
|
|
&usvc.addr, usvc.port);
|
|
else
|
|
else
|
|
- svc = __ip_vs_svc_fwm_find(usvc.af, usvc.fwmark);
|
|
|
|
|
|
+ svc = __ip_vs_svc_fwm_find(net, usvc.af, usvc.fwmark);
|
|
|
|
|
|
if (cmd != IP_VS_SO_SET_ADD
|
|
if (cmd != IP_VS_SO_SET_ADD
|
|
&& (svc == NULL || svc->protocol != usvc.protocol)) {
|
|
&& (svc == NULL || svc->protocol != usvc.protocol)) {
|
|
@@ -2181,7 +2247,7 @@ do_ip_vs_set_ctl(struct sock *sk, int cmd, void __user *user, unsigned int len)
|
|
if (svc != NULL)
|
|
if (svc != NULL)
|
|
ret = -EEXIST;
|
|
ret = -EEXIST;
|
|
else
|
|
else
|
|
- ret = ip_vs_add_service(&usvc, &svc);
|
|
|
|
|
|
+ ret = ip_vs_add_service(net, &usvc, &svc);
|
|
break;
|
|
break;
|
|
case IP_VS_SO_SET_EDIT:
|
|
case IP_VS_SO_SET_EDIT:
|
|
ret = ip_vs_edit_service(svc, &usvc);
|
|
ret = ip_vs_edit_service(svc, &usvc);
|
|
@@ -2241,7 +2307,8 @@ ip_vs_copy_service(struct ip_vs_service_entry *dst, struct ip_vs_service *src)
|
|
}
|
|
}
|
|
|
|
|
|
static inline int
|
|
static inline int
|
|
-__ip_vs_get_service_entries(const struct ip_vs_get_services *get,
|
|
|
|
|
|
+__ip_vs_get_service_entries(struct net *net,
|
|
|
|
+ const struct ip_vs_get_services *get,
|
|
struct ip_vs_get_services __user *uptr)
|
|
struct ip_vs_get_services __user *uptr)
|
|
{
|
|
{
|
|
int idx, count=0;
|
|
int idx, count=0;
|
|
@@ -2252,7 +2319,7 @@ __ip_vs_get_service_entries(const struct ip_vs_get_services *get,
|
|
for (idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
for (idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
list_for_each_entry(svc, &ip_vs_svc_table[idx], s_list) {
|
|
list_for_each_entry(svc, &ip_vs_svc_table[idx], s_list) {
|
|
/* Only expose IPv4 entries to old interface */
|
|
/* Only expose IPv4 entries to old interface */
|
|
- if (svc->af != AF_INET)
|
|
|
|
|
|
+ if (svc->af != AF_INET || !net_eq(svc->net, net))
|
|
continue;
|
|
continue;
|
|
|
|
|
|
if (count >= get->num_services)
|
|
if (count >= get->num_services)
|
|
@@ -2271,7 +2338,7 @@ __ip_vs_get_service_entries(const struct ip_vs_get_services *get,
|
|
for (idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
for (idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[idx], f_list) {
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[idx], f_list) {
|
|
/* Only expose IPv4 entries to old interface */
|
|
/* Only expose IPv4 entries to old interface */
|
|
- if (svc->af != AF_INET)
|
|
|
|
|
|
+ if (svc->af != AF_INET || !net_eq(svc->net, net))
|
|
continue;
|
|
continue;
|
|
|
|
|
|
if (count >= get->num_services)
|
|
if (count >= get->num_services)
|
|
@@ -2291,7 +2358,7 @@ __ip_vs_get_service_entries(const struct ip_vs_get_services *get,
|
|
}
|
|
}
|
|
|
|
|
|
static inline int
|
|
static inline int
|
|
-__ip_vs_get_dest_entries(const struct ip_vs_get_dests *get,
|
|
|
|
|
|
+__ip_vs_get_dest_entries(struct net *net, const struct ip_vs_get_dests *get,
|
|
struct ip_vs_get_dests __user *uptr)
|
|
struct ip_vs_get_dests __user *uptr)
|
|
{
|
|
{
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
@@ -2299,9 +2366,9 @@ __ip_vs_get_dest_entries(const struct ip_vs_get_dests *get,
|
|
int ret = 0;
|
|
int ret = 0;
|
|
|
|
|
|
if (get->fwmark)
|
|
if (get->fwmark)
|
|
- svc = __ip_vs_svc_fwm_find(AF_INET, get->fwmark);
|
|
|
|
|
|
+ svc = __ip_vs_svc_fwm_find(net, AF_INET, get->fwmark);
|
|
else
|
|
else
|
|
- svc = __ip_vs_service_find(AF_INET, get->protocol, &addr,
|
|
|
|
|
|
+ svc = __ip_vs_service_find(net, AF_INET, get->protocol, &addr,
|
|
get->port);
|
|
get->port);
|
|
|
|
|
|
if (svc) {
|
|
if (svc) {
|
|
@@ -2336,17 +2403,19 @@ __ip_vs_get_dest_entries(const struct ip_vs_get_dests *get,
|
|
}
|
|
}
|
|
|
|
|
|
static inline void
|
|
static inline void
|
|
-__ip_vs_get_timeouts(struct ip_vs_timeout_user *u)
|
|
|
|
|
|
+__ip_vs_get_timeouts(struct net *net, struct ip_vs_timeout_user *u)
|
|
{
|
|
{
|
|
|
|
+ struct ip_vs_proto_data *pd;
|
|
|
|
+
|
|
#ifdef CONFIG_IP_VS_PROTO_TCP
|
|
#ifdef CONFIG_IP_VS_PROTO_TCP
|
|
- u->tcp_timeout =
|
|
|
|
- ip_vs_protocol_tcp.timeout_table[IP_VS_TCP_S_ESTABLISHED] / HZ;
|
|
|
|
- u->tcp_fin_timeout =
|
|
|
|
- ip_vs_protocol_tcp.timeout_table[IP_VS_TCP_S_FIN_WAIT] / HZ;
|
|
|
|
|
|
+ pd = ip_vs_proto_data_get(net, IPPROTO_TCP);
|
|
|
|
+ u->tcp_timeout = pd->timeout_table[IP_VS_TCP_S_ESTABLISHED] / HZ;
|
|
|
|
+ u->tcp_fin_timeout = pd->timeout_table[IP_VS_TCP_S_FIN_WAIT] / HZ;
|
|
#endif
|
|
#endif
|
|
#ifdef CONFIG_IP_VS_PROTO_UDP
|
|
#ifdef CONFIG_IP_VS_PROTO_UDP
|
|
|
|
+ pd = ip_vs_proto_data_get(net, IPPROTO_UDP);
|
|
u->udp_timeout =
|
|
u->udp_timeout =
|
|
- ip_vs_protocol_udp.timeout_table[IP_VS_UDP_S_NORMAL] / HZ;
|
|
|
|
|
|
+ pd->timeout_table[IP_VS_UDP_S_NORMAL] / HZ;
|
|
#endif
|
|
#endif
|
|
}
|
|
}
|
|
|
|
|
|
@@ -2375,7 +2444,10 @@ do_ip_vs_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
|
|
unsigned char arg[128];
|
|
unsigned char arg[128];
|
|
int ret = 0;
|
|
int ret = 0;
|
|
unsigned int copylen;
|
|
unsigned int copylen;
|
|
|
|
+ struct net *net = sock_net(sk);
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(net);
|
|
|
|
|
|
|
|
+ BUG_ON(!net);
|
|
if (!capable(CAP_NET_ADMIN))
|
|
if (!capable(CAP_NET_ADMIN))
|
|
return -EPERM;
|
|
return -EPERM;
|
|
|
|
|
|
@@ -2418,7 +2490,7 @@ do_ip_vs_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
|
|
struct ip_vs_getinfo info;
|
|
struct ip_vs_getinfo info;
|
|
info.version = IP_VS_VERSION_CODE;
|
|
info.version = IP_VS_VERSION_CODE;
|
|
info.size = ip_vs_conn_tab_size;
|
|
info.size = ip_vs_conn_tab_size;
|
|
- info.num_services = ip_vs_num_services;
|
|
|
|
|
|
+ info.num_services = ipvs->num_services;
|
|
if (copy_to_user(user, &info, sizeof(info)) != 0)
|
|
if (copy_to_user(user, &info, sizeof(info)) != 0)
|
|
ret = -EFAULT;
|
|
ret = -EFAULT;
|
|
}
|
|
}
|
|
@@ -2437,7 +2509,7 @@ do_ip_vs_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
|
|
ret = -EINVAL;
|
|
ret = -EINVAL;
|
|
goto out;
|
|
goto out;
|
|
}
|
|
}
|
|
- ret = __ip_vs_get_service_entries(get, user);
|
|
|
|
|
|
+ ret = __ip_vs_get_service_entries(net, get, user);
|
|
}
|
|
}
|
|
break;
|
|
break;
|
|
|
|
|
|
@@ -2450,10 +2522,11 @@ do_ip_vs_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
|
|
entry = (struct ip_vs_service_entry *)arg;
|
|
entry = (struct ip_vs_service_entry *)arg;
|
|
addr.ip = entry->addr;
|
|
addr.ip = entry->addr;
|
|
if (entry->fwmark)
|
|
if (entry->fwmark)
|
|
- svc = __ip_vs_svc_fwm_find(AF_INET, entry->fwmark);
|
|
|
|
|
|
+ svc = __ip_vs_svc_fwm_find(net, AF_INET, entry->fwmark);
|
|
else
|
|
else
|
|
- svc = __ip_vs_service_find(AF_INET, entry->protocol,
|
|
|
|
- &addr, entry->port);
|
|
|
|
|
|
+ svc = __ip_vs_service_find(net, AF_INET,
|
|
|
|
+ entry->protocol, &addr,
|
|
|
|
+ entry->port);
|
|
if (svc) {
|
|
if (svc) {
|
|
ip_vs_copy_service(entry, svc);
|
|
ip_vs_copy_service(entry, svc);
|
|
if (copy_to_user(user, entry, sizeof(*entry)) != 0)
|
|
if (copy_to_user(user, entry, sizeof(*entry)) != 0)
|
|
@@ -2476,7 +2549,7 @@ do_ip_vs_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
|
|
ret = -EINVAL;
|
|
ret = -EINVAL;
|
|
goto out;
|
|
goto out;
|
|
}
|
|
}
|
|
- ret = __ip_vs_get_dest_entries(get, user);
|
|
|
|
|
|
+ ret = __ip_vs_get_dest_entries(net, get, user);
|
|
}
|
|
}
|
|
break;
|
|
break;
|
|
|
|
|
|
@@ -2484,7 +2557,7 @@ do_ip_vs_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
|
|
{
|
|
{
|
|
struct ip_vs_timeout_user t;
|
|
struct ip_vs_timeout_user t;
|
|
|
|
|
|
- __ip_vs_get_timeouts(&t);
|
|
|
|
|
|
+ __ip_vs_get_timeouts(net, &t);
|
|
if (copy_to_user(user, &t, sizeof(t)) != 0)
|
|
if (copy_to_user(user, &t, sizeof(t)) != 0)
|
|
ret = -EFAULT;
|
|
ret = -EFAULT;
|
|
}
|
|
}
|
|
@@ -2495,15 +2568,17 @@ do_ip_vs_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
|
|
struct ip_vs_daemon_user d[2];
|
|
struct ip_vs_daemon_user d[2];
|
|
|
|
|
|
memset(&d, 0, sizeof(d));
|
|
memset(&d, 0, sizeof(d));
|
|
- if (ip_vs_sync_state & IP_VS_STATE_MASTER) {
|
|
|
|
|
|
+ if (ipvs->sync_state & IP_VS_STATE_MASTER) {
|
|
d[0].state = IP_VS_STATE_MASTER;
|
|
d[0].state = IP_VS_STATE_MASTER;
|
|
- strlcpy(d[0].mcast_ifn, ip_vs_master_mcast_ifn, sizeof(d[0].mcast_ifn));
|
|
|
|
- d[0].syncid = ip_vs_master_syncid;
|
|
|
|
|
|
+ strlcpy(d[0].mcast_ifn, ipvs->master_mcast_ifn,
|
|
|
|
+ sizeof(d[0].mcast_ifn));
|
|
|
|
+ d[0].syncid = ipvs->master_syncid;
|
|
}
|
|
}
|
|
- if (ip_vs_sync_state & IP_VS_STATE_BACKUP) {
|
|
|
|
|
|
+ if (ipvs->sync_state & IP_VS_STATE_BACKUP) {
|
|
d[1].state = IP_VS_STATE_BACKUP;
|
|
d[1].state = IP_VS_STATE_BACKUP;
|
|
- strlcpy(d[1].mcast_ifn, ip_vs_backup_mcast_ifn, sizeof(d[1].mcast_ifn));
|
|
|
|
- d[1].syncid = ip_vs_backup_syncid;
|
|
|
|
|
|
+ strlcpy(d[1].mcast_ifn, ipvs->backup_mcast_ifn,
|
|
|
|
+ sizeof(d[1].mcast_ifn));
|
|
|
|
+ d[1].syncid = ipvs->backup_syncid;
|
|
}
|
|
}
|
|
if (copy_to_user(user, &d, sizeof(d)) != 0)
|
|
if (copy_to_user(user, &d, sizeof(d)) != 0)
|
|
ret = -EFAULT;
|
|
ret = -EFAULT;
|
|
@@ -2542,6 +2617,7 @@ static struct genl_family ip_vs_genl_family = {
|
|
.name = IPVS_GENL_NAME,
|
|
.name = IPVS_GENL_NAME,
|
|
.version = IPVS_GENL_VERSION,
|
|
.version = IPVS_GENL_VERSION,
|
|
.maxattr = IPVS_CMD_MAX,
|
|
.maxattr = IPVS_CMD_MAX,
|
|
|
|
+ .netnsok = true, /* Make ipvsadm to work on netns */
|
|
};
|
|
};
|
|
|
|
|
|
/* Policy used for first-level command attributes */
|
|
/* Policy used for first-level command attributes */
|
|
@@ -2696,11 +2772,12 @@ static int ip_vs_genl_dump_services(struct sk_buff *skb,
|
|
int idx = 0, i;
|
|
int idx = 0, i;
|
|
int start = cb->args[0];
|
|
int start = cb->args[0];
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
|
|
+ struct net *net = skb_sknet(skb);
|
|
|
|
|
|
mutex_lock(&__ip_vs_mutex);
|
|
mutex_lock(&__ip_vs_mutex);
|
|
for (i = 0; i < IP_VS_SVC_TAB_SIZE; i++) {
|
|
for (i = 0; i < IP_VS_SVC_TAB_SIZE; i++) {
|
|
list_for_each_entry(svc, &ip_vs_svc_table[i], s_list) {
|
|
list_for_each_entry(svc, &ip_vs_svc_table[i], s_list) {
|
|
- if (++idx <= start)
|
|
|
|
|
|
+ if (++idx <= start || !net_eq(svc->net, net))
|
|
continue;
|
|
continue;
|
|
if (ip_vs_genl_dump_service(skb, svc, cb) < 0) {
|
|
if (ip_vs_genl_dump_service(skb, svc, cb) < 0) {
|
|
idx--;
|
|
idx--;
|
|
@@ -2711,7 +2788,7 @@ static int ip_vs_genl_dump_services(struct sk_buff *skb,
|
|
|
|
|
|
for (i = 0; i < IP_VS_SVC_TAB_SIZE; i++) {
|
|
for (i = 0; i < IP_VS_SVC_TAB_SIZE; i++) {
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[i], f_list) {
|
|
list_for_each_entry(svc, &ip_vs_svc_fwm_table[i], f_list) {
|
|
- if (++idx <= start)
|
|
|
|
|
|
+ if (++idx <= start || !net_eq(svc->net, net))
|
|
continue;
|
|
continue;
|
|
if (ip_vs_genl_dump_service(skb, svc, cb) < 0) {
|
|
if (ip_vs_genl_dump_service(skb, svc, cb) < 0) {
|
|
idx--;
|
|
idx--;
|
|
@@ -2727,7 +2804,8 @@ nla_put_failure:
|
|
return skb->len;
|
|
return skb->len;
|
|
}
|
|
}
|
|
|
|
|
|
-static int ip_vs_genl_parse_service(struct ip_vs_service_user_kern *usvc,
|
|
|
|
|
|
+static int ip_vs_genl_parse_service(struct net *net,
|
|
|
|
+ struct ip_vs_service_user_kern *usvc,
|
|
struct nlattr *nla, int full_entry,
|
|
struct nlattr *nla, int full_entry,
|
|
struct ip_vs_service **ret_svc)
|
|
struct ip_vs_service **ret_svc)
|
|
{
|
|
{
|
|
@@ -2770,9 +2848,9 @@ static int ip_vs_genl_parse_service(struct ip_vs_service_user_kern *usvc,
|
|
}
|
|
}
|
|
|
|
|
|
if (usvc->fwmark)
|
|
if (usvc->fwmark)
|
|
- svc = __ip_vs_svc_fwm_find(usvc->af, usvc->fwmark);
|
|
|
|
|
|
+ svc = __ip_vs_svc_fwm_find(net, usvc->af, usvc->fwmark);
|
|
else
|
|
else
|
|
- svc = __ip_vs_service_find(usvc->af, usvc->protocol,
|
|
|
|
|
|
+ svc = __ip_vs_service_find(net, usvc->af, usvc->protocol,
|
|
&usvc->addr, usvc->port);
|
|
&usvc->addr, usvc->port);
|
|
*ret_svc = svc;
|
|
*ret_svc = svc;
|
|
|
|
|
|
@@ -2809,13 +2887,14 @@ static int ip_vs_genl_parse_service(struct ip_vs_service_user_kern *usvc,
|
|
return 0;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
|
|
-static struct ip_vs_service *ip_vs_genl_find_service(struct nlattr *nla)
|
|
|
|
|
|
+static struct ip_vs_service *ip_vs_genl_find_service(struct net *net,
|
|
|
|
+ struct nlattr *nla)
|
|
{
|
|
{
|
|
struct ip_vs_service_user_kern usvc;
|
|
struct ip_vs_service_user_kern usvc;
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
int ret;
|
|
int ret;
|
|
|
|
|
|
- ret = ip_vs_genl_parse_service(&usvc, nla, 0, &svc);
|
|
|
|
|
|
+ ret = ip_vs_genl_parse_service(net, &usvc, nla, 0, &svc);
|
|
return ret ? ERR_PTR(ret) : svc;
|
|
return ret ? ERR_PTR(ret) : svc;
|
|
}
|
|
}
|
|
|
|
|
|
@@ -2883,6 +2962,7 @@ static int ip_vs_genl_dump_dests(struct sk_buff *skb,
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_dest *dest;
|
|
struct ip_vs_dest *dest;
|
|
struct nlattr *attrs[IPVS_CMD_ATTR_MAX + 1];
|
|
struct nlattr *attrs[IPVS_CMD_ATTR_MAX + 1];
|
|
|
|
+ struct net *net = skb_sknet(skb);
|
|
|
|
|
|
mutex_lock(&__ip_vs_mutex);
|
|
mutex_lock(&__ip_vs_mutex);
|
|
|
|
|
|
@@ -2891,7 +2971,8 @@ static int ip_vs_genl_dump_dests(struct sk_buff *skb,
|
|
IPVS_CMD_ATTR_MAX, ip_vs_cmd_policy))
|
|
IPVS_CMD_ATTR_MAX, ip_vs_cmd_policy))
|
|
goto out_err;
|
|
goto out_err;
|
|
|
|
|
|
- svc = ip_vs_genl_find_service(attrs[IPVS_CMD_ATTR_SERVICE]);
|
|
|
|
|
|
+
|
|
|
|
+ svc = ip_vs_genl_find_service(net, attrs[IPVS_CMD_ATTR_SERVICE]);
|
|
if (IS_ERR(svc) || svc == NULL)
|
|
if (IS_ERR(svc) || svc == NULL)
|
|
goto out_err;
|
|
goto out_err;
|
|
|
|
|
|
@@ -3005,20 +3086,23 @@ nla_put_failure:
|
|
static int ip_vs_genl_dump_daemons(struct sk_buff *skb,
|
|
static int ip_vs_genl_dump_daemons(struct sk_buff *skb,
|
|
struct netlink_callback *cb)
|
|
struct netlink_callback *cb)
|
|
{
|
|
{
|
|
|
|
+ struct net *net = skb_net(skb);
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(net);
|
|
|
|
+
|
|
mutex_lock(&__ip_vs_mutex);
|
|
mutex_lock(&__ip_vs_mutex);
|
|
- if ((ip_vs_sync_state & IP_VS_STATE_MASTER) && !cb->args[0]) {
|
|
|
|
|
|
+ if ((ipvs->sync_state & IP_VS_STATE_MASTER) && !cb->args[0]) {
|
|
if (ip_vs_genl_dump_daemon(skb, IP_VS_STATE_MASTER,
|
|
if (ip_vs_genl_dump_daemon(skb, IP_VS_STATE_MASTER,
|
|
- ip_vs_master_mcast_ifn,
|
|
|
|
- ip_vs_master_syncid, cb) < 0)
|
|
|
|
|
|
+ ipvs->master_mcast_ifn,
|
|
|
|
+ ipvs->master_syncid, cb) < 0)
|
|
goto nla_put_failure;
|
|
goto nla_put_failure;
|
|
|
|
|
|
cb->args[0] = 1;
|
|
cb->args[0] = 1;
|
|
}
|
|
}
|
|
|
|
|
|
- if ((ip_vs_sync_state & IP_VS_STATE_BACKUP) && !cb->args[1]) {
|
|
|
|
|
|
+ if ((ipvs->sync_state & IP_VS_STATE_BACKUP) && !cb->args[1]) {
|
|
if (ip_vs_genl_dump_daemon(skb, IP_VS_STATE_BACKUP,
|
|
if (ip_vs_genl_dump_daemon(skb, IP_VS_STATE_BACKUP,
|
|
- ip_vs_backup_mcast_ifn,
|
|
|
|
- ip_vs_backup_syncid, cb) < 0)
|
|
|
|
|
|
+ ipvs->backup_mcast_ifn,
|
|
|
|
+ ipvs->backup_syncid, cb) < 0)
|
|
goto nla_put_failure;
|
|
goto nla_put_failure;
|
|
|
|
|
|
cb->args[1] = 1;
|
|
cb->args[1] = 1;
|
|
@@ -3030,31 +3114,33 @@ nla_put_failure:
|
|
return skb->len;
|
|
return skb->len;
|
|
}
|
|
}
|
|
|
|
|
|
-static int ip_vs_genl_new_daemon(struct nlattr **attrs)
|
|
|
|
|
|
+static int ip_vs_genl_new_daemon(struct net *net, struct nlattr **attrs)
|
|
{
|
|
{
|
|
if (!(attrs[IPVS_DAEMON_ATTR_STATE] &&
|
|
if (!(attrs[IPVS_DAEMON_ATTR_STATE] &&
|
|
attrs[IPVS_DAEMON_ATTR_MCAST_IFN] &&
|
|
attrs[IPVS_DAEMON_ATTR_MCAST_IFN] &&
|
|
attrs[IPVS_DAEMON_ATTR_SYNC_ID]))
|
|
attrs[IPVS_DAEMON_ATTR_SYNC_ID]))
|
|
return -EINVAL;
|
|
return -EINVAL;
|
|
|
|
|
|
- return start_sync_thread(nla_get_u32(attrs[IPVS_DAEMON_ATTR_STATE]),
|
|
|
|
|
|
+ return start_sync_thread(net,
|
|
|
|
+ nla_get_u32(attrs[IPVS_DAEMON_ATTR_STATE]),
|
|
nla_data(attrs[IPVS_DAEMON_ATTR_MCAST_IFN]),
|
|
nla_data(attrs[IPVS_DAEMON_ATTR_MCAST_IFN]),
|
|
nla_get_u32(attrs[IPVS_DAEMON_ATTR_SYNC_ID]));
|
|
nla_get_u32(attrs[IPVS_DAEMON_ATTR_SYNC_ID]));
|
|
}
|
|
}
|
|
|
|
|
|
-static int ip_vs_genl_del_daemon(struct nlattr **attrs)
|
|
|
|
|
|
+static int ip_vs_genl_del_daemon(struct net *net, struct nlattr **attrs)
|
|
{
|
|
{
|
|
if (!attrs[IPVS_DAEMON_ATTR_STATE])
|
|
if (!attrs[IPVS_DAEMON_ATTR_STATE])
|
|
return -EINVAL;
|
|
return -EINVAL;
|
|
|
|
|
|
- return stop_sync_thread(nla_get_u32(attrs[IPVS_DAEMON_ATTR_STATE]));
|
|
|
|
|
|
+ return stop_sync_thread(net,
|
|
|
|
+ nla_get_u32(attrs[IPVS_DAEMON_ATTR_STATE]));
|
|
}
|
|
}
|
|
|
|
|
|
-static int ip_vs_genl_set_config(struct nlattr **attrs)
|
|
|
|
|
|
+static int ip_vs_genl_set_config(struct net *net, struct nlattr **attrs)
|
|
{
|
|
{
|
|
struct ip_vs_timeout_user t;
|
|
struct ip_vs_timeout_user t;
|
|
|
|
|
|
- __ip_vs_get_timeouts(&t);
|
|
|
|
|
|
+ __ip_vs_get_timeouts(net, &t);
|
|
|
|
|
|
if (attrs[IPVS_CMD_ATTR_TIMEOUT_TCP])
|
|
if (attrs[IPVS_CMD_ATTR_TIMEOUT_TCP])
|
|
t.tcp_timeout = nla_get_u32(attrs[IPVS_CMD_ATTR_TIMEOUT_TCP]);
|
|
t.tcp_timeout = nla_get_u32(attrs[IPVS_CMD_ATTR_TIMEOUT_TCP]);
|
|
@@ -3066,7 +3152,7 @@ static int ip_vs_genl_set_config(struct nlattr **attrs)
|
|
if (attrs[IPVS_CMD_ATTR_TIMEOUT_UDP])
|
|
if (attrs[IPVS_CMD_ATTR_TIMEOUT_UDP])
|
|
t.udp_timeout = nla_get_u32(attrs[IPVS_CMD_ATTR_TIMEOUT_UDP]);
|
|
t.udp_timeout = nla_get_u32(attrs[IPVS_CMD_ATTR_TIMEOUT_UDP]);
|
|
|
|
|
|
- return ip_vs_set_timeout(&t);
|
|
|
|
|
|
+ return ip_vs_set_timeout(net, &t);
|
|
}
|
|
}
|
|
|
|
|
|
static int ip_vs_genl_set_cmd(struct sk_buff *skb, struct genl_info *info)
|
|
static int ip_vs_genl_set_cmd(struct sk_buff *skb, struct genl_info *info)
|
|
@@ -3076,16 +3162,20 @@ static int ip_vs_genl_set_cmd(struct sk_buff *skb, struct genl_info *info)
|
|
struct ip_vs_dest_user_kern udest;
|
|
struct ip_vs_dest_user_kern udest;
|
|
int ret = 0, cmd;
|
|
int ret = 0, cmd;
|
|
int need_full_svc = 0, need_full_dest = 0;
|
|
int need_full_svc = 0, need_full_dest = 0;
|
|
|
|
+ struct net *net;
|
|
|
|
+ struct netns_ipvs *ipvs;
|
|
|
|
|
|
|
|
+ net = skb_sknet(skb);
|
|
|
|
+ ipvs = net_ipvs(net);
|
|
cmd = info->genlhdr->cmd;
|
|
cmd = info->genlhdr->cmd;
|
|
|
|
|
|
mutex_lock(&__ip_vs_mutex);
|
|
mutex_lock(&__ip_vs_mutex);
|
|
|
|
|
|
if (cmd == IPVS_CMD_FLUSH) {
|
|
if (cmd == IPVS_CMD_FLUSH) {
|
|
- ret = ip_vs_flush();
|
|
|
|
|
|
+ ret = ip_vs_flush(net);
|
|
goto out;
|
|
goto out;
|
|
} else if (cmd == IPVS_CMD_SET_CONFIG) {
|
|
} else if (cmd == IPVS_CMD_SET_CONFIG) {
|
|
- ret = ip_vs_genl_set_config(info->attrs);
|
|
|
|
|
|
+ ret = ip_vs_genl_set_config(net, info->attrs);
|
|
goto out;
|
|
goto out;
|
|
} else if (cmd == IPVS_CMD_NEW_DAEMON ||
|
|
} else if (cmd == IPVS_CMD_NEW_DAEMON ||
|
|
cmd == IPVS_CMD_DEL_DAEMON) {
|
|
cmd == IPVS_CMD_DEL_DAEMON) {
|
|
@@ -3101,13 +3191,13 @@ static int ip_vs_genl_set_cmd(struct sk_buff *skb, struct genl_info *info)
|
|
}
|
|
}
|
|
|
|
|
|
if (cmd == IPVS_CMD_NEW_DAEMON)
|
|
if (cmd == IPVS_CMD_NEW_DAEMON)
|
|
- ret = ip_vs_genl_new_daemon(daemon_attrs);
|
|
|
|
|
|
+ ret = ip_vs_genl_new_daemon(net, daemon_attrs);
|
|
else
|
|
else
|
|
- ret = ip_vs_genl_del_daemon(daemon_attrs);
|
|
|
|
|
|
+ ret = ip_vs_genl_del_daemon(net, daemon_attrs);
|
|
goto out;
|
|
goto out;
|
|
} else if (cmd == IPVS_CMD_ZERO &&
|
|
} else if (cmd == IPVS_CMD_ZERO &&
|
|
!info->attrs[IPVS_CMD_ATTR_SERVICE]) {
|
|
!info->attrs[IPVS_CMD_ATTR_SERVICE]) {
|
|
- ret = ip_vs_zero_all();
|
|
|
|
|
|
+ ret = ip_vs_zero_all(net);
|
|
goto out;
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
|
|
@@ -3117,7 +3207,7 @@ static int ip_vs_genl_set_cmd(struct sk_buff *skb, struct genl_info *info)
|
|
if (cmd == IPVS_CMD_NEW_SERVICE || cmd == IPVS_CMD_SET_SERVICE)
|
|
if (cmd == IPVS_CMD_NEW_SERVICE || cmd == IPVS_CMD_SET_SERVICE)
|
|
need_full_svc = 1;
|
|
need_full_svc = 1;
|
|
|
|
|
|
- ret = ip_vs_genl_parse_service(&usvc,
|
|
|
|
|
|
+ ret = ip_vs_genl_parse_service(net, &usvc,
|
|
info->attrs[IPVS_CMD_ATTR_SERVICE],
|
|
info->attrs[IPVS_CMD_ATTR_SERVICE],
|
|
need_full_svc, &svc);
|
|
need_full_svc, &svc);
|
|
if (ret)
|
|
if (ret)
|
|
@@ -3147,7 +3237,7 @@ static int ip_vs_genl_set_cmd(struct sk_buff *skb, struct genl_info *info)
|
|
switch (cmd) {
|
|
switch (cmd) {
|
|
case IPVS_CMD_NEW_SERVICE:
|
|
case IPVS_CMD_NEW_SERVICE:
|
|
if (svc == NULL)
|
|
if (svc == NULL)
|
|
- ret = ip_vs_add_service(&usvc, &svc);
|
|
|
|
|
|
+ ret = ip_vs_add_service(net, &usvc, &svc);
|
|
else
|
|
else
|
|
ret = -EEXIST;
|
|
ret = -EEXIST;
|
|
break;
|
|
break;
|
|
@@ -3185,7 +3275,11 @@ static int ip_vs_genl_get_cmd(struct sk_buff *skb, struct genl_info *info)
|
|
struct sk_buff *msg;
|
|
struct sk_buff *msg;
|
|
void *reply;
|
|
void *reply;
|
|
int ret, cmd, reply_cmd;
|
|
int ret, cmd, reply_cmd;
|
|
|
|
+ struct net *net;
|
|
|
|
+ struct netns_ipvs *ipvs;
|
|
|
|
|
|
|
|
+ net = skb_sknet(skb);
|
|
|
|
+ ipvs = net_ipvs(net);
|
|
cmd = info->genlhdr->cmd;
|
|
cmd = info->genlhdr->cmd;
|
|
|
|
|
|
if (cmd == IPVS_CMD_GET_SERVICE)
|
|
if (cmd == IPVS_CMD_GET_SERVICE)
|
|
@@ -3214,7 +3308,8 @@ static int ip_vs_genl_get_cmd(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
{
|
|
struct ip_vs_service *svc;
|
|
struct ip_vs_service *svc;
|
|
|
|
|
|
- svc = ip_vs_genl_find_service(info->attrs[IPVS_CMD_ATTR_SERVICE]);
|
|
|
|
|
|
+ svc = ip_vs_genl_find_service(net,
|
|
|
|
+ info->attrs[IPVS_CMD_ATTR_SERVICE]);
|
|
if (IS_ERR(svc)) {
|
|
if (IS_ERR(svc)) {
|
|
ret = PTR_ERR(svc);
|
|
ret = PTR_ERR(svc);
|
|
goto out_err;
|
|
goto out_err;
|
|
@@ -3234,7 +3329,7 @@ static int ip_vs_genl_get_cmd(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
{
|
|
struct ip_vs_timeout_user t;
|
|
struct ip_vs_timeout_user t;
|
|
|
|
|
|
- __ip_vs_get_timeouts(&t);
|
|
|
|
|
|
+ __ip_vs_get_timeouts(net, &t);
|
|
#ifdef CONFIG_IP_VS_PROTO_TCP
|
|
#ifdef CONFIG_IP_VS_PROTO_TCP
|
|
NLA_PUT_U32(msg, IPVS_CMD_ATTR_TIMEOUT_TCP, t.tcp_timeout);
|
|
NLA_PUT_U32(msg, IPVS_CMD_ATTR_TIMEOUT_TCP, t.tcp_timeout);
|
|
NLA_PUT_U32(msg, IPVS_CMD_ATTR_TIMEOUT_TCP_FIN,
|
|
NLA_PUT_U32(msg, IPVS_CMD_ATTR_TIMEOUT_TCP_FIN,
|
|
@@ -3380,62 +3475,172 @@ static void ip_vs_genl_unregister(void)
|
|
|
|
|
|
/* End of Generic Netlink interface definitions */
|
|
/* End of Generic Netlink interface definitions */
|
|
|
|
|
|
|
|
+/*
|
|
|
|
+ * per netns intit/exit func.
|
|
|
|
+ */
|
|
|
|
+int __net_init __ip_vs_control_init(struct net *net)
|
|
|
|
+{
|
|
|
|
+ int idx;
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(net);
|
|
|
|
+ struct ctl_table *tbl;
|
|
|
|
+
|
|
|
|
+ atomic_set(&ipvs->dropentry, 0);
|
|
|
|
+ spin_lock_init(&ipvs->dropentry_lock);
|
|
|
|
+ spin_lock_init(&ipvs->droppacket_lock);
|
|
|
|
+ spin_lock_init(&ipvs->securetcp_lock);
|
|
|
|
+ ipvs->rs_lock = __RW_LOCK_UNLOCKED(ipvs->rs_lock);
|
|
|
|
+
|
|
|
|
+ /* Initialize rs_table */
|
|
|
|
+ for (idx = 0; idx < IP_VS_RTAB_SIZE; idx++)
|
|
|
|
+ INIT_LIST_HEAD(&ipvs->rs_table[idx]);
|
|
|
|
+
|
|
|
|
+ INIT_LIST_HEAD(&ipvs->dest_trash);
|
|
|
|
+ atomic_set(&ipvs->ftpsvc_counter, 0);
|
|
|
|
+ atomic_set(&ipvs->nullsvc_counter, 0);
|
|
|
|
+
|
|
|
|
+ /* procfs stats */
|
|
|
|
+ ipvs->tot_stats = kzalloc(sizeof(struct ip_vs_stats), GFP_KERNEL);
|
|
|
|
+ if (ipvs->tot_stats == NULL) {
|
|
|
|
+ pr_err("%s(): no memory.\n", __func__);
|
|
|
|
+ return -ENOMEM;
|
|
|
|
+ }
|
|
|
|
+ ipvs->cpustats = alloc_percpu(struct ip_vs_cpu_stats);
|
|
|
|
+ if (!ipvs->cpustats) {
|
|
|
|
+ pr_err("%s() alloc_percpu failed\n", __func__);
|
|
|
|
+ goto err_alloc;
|
|
|
|
+ }
|
|
|
|
+ spin_lock_init(&ipvs->tot_stats->lock);
|
|
|
|
+
|
|
|
|
+ for (idx = 0; idx < IP_VS_RTAB_SIZE; idx++)
|
|
|
|
+ INIT_LIST_HEAD(&ipvs->rs_table[idx]);
|
|
|
|
+
|
|
|
|
+ proc_net_fops_create(net, "ip_vs", 0, &ip_vs_info_fops);
|
|
|
|
+ proc_net_fops_create(net, "ip_vs_stats", 0, &ip_vs_stats_fops);
|
|
|
|
+ proc_net_fops_create(net, "ip_vs_stats_percpu", 0,
|
|
|
|
+ &ip_vs_stats_percpu_fops);
|
|
|
|
+
|
|
|
|
+ if (!net_eq(net, &init_net)) {
|
|
|
|
+ tbl = kmemdup(vs_vars, sizeof(vs_vars), GFP_KERNEL);
|
|
|
|
+ if (tbl == NULL)
|
|
|
|
+ goto err_dup;
|
|
|
|
+ } else
|
|
|
|
+ tbl = vs_vars;
|
|
|
|
+ /* Initialize sysctl defaults */
|
|
|
|
+ idx = 0;
|
|
|
|
+ ipvs->sysctl_amemthresh = 1024;
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_amemthresh;
|
|
|
|
+ ipvs->sysctl_am_droprate = 10;
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_am_droprate;
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_drop_entry;
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_drop_packet;
|
|
|
|
+#ifdef CONFIG_IP_VS_NFCT
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_conntrack;
|
|
|
|
+#endif
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_secure_tcp;
|
|
|
|
+ ipvs->sysctl_snat_reroute = 1;
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_snat_reroute;
|
|
|
|
+ ipvs->sysctl_sync_ver = 1;
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_sync_ver;
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_cache_bypass;
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_expire_nodest_conn;
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_expire_quiescent_template;
|
|
|
|
+ ipvs->sysctl_sync_threshold[0] = 3;
|
|
|
|
+ ipvs->sysctl_sync_threshold[1] = 50;
|
|
|
|
+ tbl[idx].data = &ipvs->sysctl_sync_threshold;
|
|
|
|
+ tbl[idx++].maxlen = sizeof(ipvs->sysctl_sync_threshold);
|
|
|
|
+ tbl[idx++].data = &ipvs->sysctl_nat_icmp_send;
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ ipvs->sysctl_hdr = register_net_sysctl_table(net, net_vs_ctl_path,
|
|
|
|
+ vs_vars);
|
|
|
|
+ if (ipvs->sysctl_hdr == NULL)
|
|
|
|
+ goto err_reg;
|
|
|
|
+ ip_vs_new_estimator(net, ipvs->tot_stats);
|
|
|
|
+ ipvs->sysctl_tbl = tbl;
|
|
|
|
+ /* Schedule defense work */
|
|
|
|
+ INIT_DELAYED_WORK(&ipvs->defense_work, defense_work_handler);
|
|
|
|
+ schedule_delayed_work(&ipvs->defense_work, DEFENSE_TIMER_PERIOD);
|
|
|
|
+ return 0;
|
|
|
|
+
|
|
|
|
+err_reg:
|
|
|
|
+ if (!net_eq(net, &init_net))
|
|
|
|
+ kfree(tbl);
|
|
|
|
+err_dup:
|
|
|
|
+ free_percpu(ipvs->cpustats);
|
|
|
|
+err_alloc:
|
|
|
|
+ kfree(ipvs->tot_stats);
|
|
|
|
+ return -ENOMEM;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+static void __net_exit __ip_vs_control_cleanup(struct net *net)
|
|
|
|
+{
|
|
|
|
+ struct netns_ipvs *ipvs = net_ipvs(net);
|
|
|
|
+
|
|
|
|
+ ip_vs_trash_cleanup(net);
|
|
|
|
+ ip_vs_kill_estimator(net, ipvs->tot_stats);
|
|
|
|
+ cancel_delayed_work_sync(&ipvs->defense_work);
|
|
|
|
+ cancel_work_sync(&ipvs->defense_work.work);
|
|
|
|
+ unregister_net_sysctl_table(ipvs->sysctl_hdr);
|
|
|
|
+ proc_net_remove(net, "ip_vs_stats_percpu");
|
|
|
|
+ proc_net_remove(net, "ip_vs_stats");
|
|
|
|
+ proc_net_remove(net, "ip_vs");
|
|
|
|
+ free_percpu(ipvs->cpustats);
|
|
|
|
+ kfree(ipvs->tot_stats);
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+static struct pernet_operations ipvs_control_ops = {
|
|
|
|
+ .init = __ip_vs_control_init,
|
|
|
|
+ .exit = __ip_vs_control_cleanup,
|
|
|
|
+};
|
|
|
|
|
|
int __init ip_vs_control_init(void)
|
|
int __init ip_vs_control_init(void)
|
|
{
|
|
{
|
|
- int ret;
|
|
|
|
int idx;
|
|
int idx;
|
|
|
|
+ int ret;
|
|
|
|
|
|
EnterFunction(2);
|
|
EnterFunction(2);
|
|
|
|
|
|
- /* Initialize ip_vs_svc_table, ip_vs_svc_fwm_table, ip_vs_rtable */
|
|
|
|
|
|
+ /* Initialize svc_table, ip_vs_svc_fwm_table, rs_table */
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
for(idx = 0; idx < IP_VS_SVC_TAB_SIZE; idx++) {
|
|
INIT_LIST_HEAD(&ip_vs_svc_table[idx]);
|
|
INIT_LIST_HEAD(&ip_vs_svc_table[idx]);
|
|
INIT_LIST_HEAD(&ip_vs_svc_fwm_table[idx]);
|
|
INIT_LIST_HEAD(&ip_vs_svc_fwm_table[idx]);
|
|
}
|
|
}
|
|
- for(idx = 0; idx < IP_VS_RTAB_SIZE; idx++) {
|
|
|
|
- INIT_LIST_HEAD(&ip_vs_rtable[idx]);
|
|
|
|
|
|
+
|
|
|
|
+ ret = register_pernet_subsys(&ipvs_control_ops);
|
|
|
|
+ if (ret) {
|
|
|
|
+ pr_err("cannot register namespace.\n");
|
|
|
|
+ goto err;
|
|
}
|
|
}
|
|
- smp_wmb();
|
|
|
|
|
|
+
|
|
|
|
+ smp_wmb(); /* Do we really need it now ? */
|
|
|
|
|
|
ret = nf_register_sockopt(&ip_vs_sockopts);
|
|
ret = nf_register_sockopt(&ip_vs_sockopts);
|
|
if (ret) {
|
|
if (ret) {
|
|
pr_err("cannot register sockopt.\n");
|
|
pr_err("cannot register sockopt.\n");
|
|
- return ret;
|
|
|
|
|
|
+ goto err_net;
|
|
}
|
|
}
|
|
|
|
|
|
ret = ip_vs_genl_register();
|
|
ret = ip_vs_genl_register();
|
|
if (ret) {
|
|
if (ret) {
|
|
pr_err("cannot register Generic Netlink interface.\n");
|
|
pr_err("cannot register Generic Netlink interface.\n");
|
|
nf_unregister_sockopt(&ip_vs_sockopts);
|
|
nf_unregister_sockopt(&ip_vs_sockopts);
|
|
- return ret;
|
|
|
|
|
|
+ goto err_net;
|
|
}
|
|
}
|
|
|
|
|
|
- proc_net_fops_create(&init_net, "ip_vs", 0, &ip_vs_info_fops);
|
|
|
|
- proc_net_fops_create(&init_net, "ip_vs_stats",0, &ip_vs_stats_fops);
|
|
|
|
-
|
|
|
|
- sysctl_header = register_sysctl_paths(net_vs_ctl_path, vs_vars);
|
|
|
|
-
|
|
|
|
- ip_vs_new_estimator(&ip_vs_stats);
|
|
|
|
-
|
|
|
|
- /* Hook the defense timer */
|
|
|
|
- schedule_delayed_work(&defense_work, DEFENSE_TIMER_PERIOD);
|
|
|
|
-
|
|
|
|
LeaveFunction(2);
|
|
LeaveFunction(2);
|
|
return 0;
|
|
return 0;
|
|
|
|
+
|
|
|
|
+err_net:
|
|
|
|
+ unregister_pernet_subsys(&ipvs_control_ops);
|
|
|
|
+err:
|
|
|
|
+ return ret;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
|
|
void ip_vs_control_cleanup(void)
|
|
void ip_vs_control_cleanup(void)
|
|
{
|
|
{
|
|
EnterFunction(2);
|
|
EnterFunction(2);
|
|
- ip_vs_trash_cleanup();
|
|
|
|
- cancel_delayed_work_sync(&defense_work);
|
|
|
|
- cancel_work_sync(&defense_work.work);
|
|
|
|
- ip_vs_kill_estimator(&ip_vs_stats);
|
|
|
|
- unregister_sysctl_table(sysctl_header);
|
|
|
|
- proc_net_remove(&init_net, "ip_vs_stats");
|
|
|
|
- proc_net_remove(&init_net, "ip_vs");
|
|
|
|
|
|
+ unregister_pernet_subsys(&ipvs_control_ops);
|
|
ip_vs_genl_unregister();
|
|
ip_vs_genl_unregister();
|
|
nf_unregister_sockopt(&ip_vs_sockopts);
|
|
nf_unregister_sockopt(&ip_vs_sockopts);
|
|
LeaveFunction(2);
|
|
LeaveFunction(2);
|