xref: /openbmc/qemu/net/colo.c (revision fccffd53719255cafd4bc89f5b0bda1cd37924f4)
1  /*
2   * COarse-grain LOck-stepping Virtual Machines for Non-stop Service (COLO)
3   * (a.k.a. Fault Tolerance or Continuous Replication)
4   *
5   * Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD.
6   * Copyright (c) 2016 FUJITSU LIMITED
7   * Copyright (c) 2016 Intel Corporation
8   *
9   * Author: Zhang Chen <zhangchen.fnst@cn.fujitsu.com>
10   *
11   * This work is licensed under the terms of the GNU GPL, version 2 or
12   * later.  See the COPYING file in the top-level directory.
13   */
14  
15  #include "qemu/osdep.h"
16  #include "trace.h"
17  #include "colo.h"
18  #include "util.h"
19  
connection_key_hash(const void * opaque)20  uint32_t connection_key_hash(const void *opaque)
21  {
22      const ConnectionKey *key = opaque;
23      uint32_t a, b, c;
24  
25      /* Jenkins hash */
26      a = b = c = JHASH_INITVAL + sizeof(*key);
27      a += key->src.s_addr;
28      b += key->dst.s_addr;
29      c += (key->src_port | key->dst_port << 16);
30      __jhash_mix(a, b, c);
31  
32      a += key->ip_proto;
33      __jhash_final(a, b, c);
34  
35      return c;
36  }
37  
connection_key_equal(const void * key1,const void * key2)38  int connection_key_equal(const void *key1, const void *key2)
39  {
40      return memcmp(key1, key2, sizeof(ConnectionKey)) == 0;
41  }
42  
parse_packet_early(Packet * pkt)43  int parse_packet_early(Packet *pkt)
44  {
45      int network_length;
46      static const uint8_t vlan[] = {0x81, 0x00};
47      uint8_t *data = pkt->data;
48      uint16_t l3_proto;
49      ssize_t l2hdr_len;
50  
51      assert(data);
52  
53      /* Check the received vnet_hdr_len then add the offset */
54      if ((pkt->vnet_hdr_len > sizeof(struct virtio_net_hdr_v1_hash)) ||
55          (pkt->size < sizeof(struct eth_header) + sizeof(struct vlan_header) +
56          pkt->vnet_hdr_len)) {
57          /*
58           * The received remote packet maybe misconfiguration here,
59           * Please enable/disable filter module's the vnet_hdr flag at
60           * the same time.
61           */
62          trace_colo_proxy_main_vnet_info("This received packet load wrong ",
63                                          pkt->vnet_hdr_len, pkt->size);
64          return 1;
65      }
66      data += pkt->vnet_hdr_len;
67  
68      l2hdr_len = eth_get_l2_hdr_length(data);
69  
70      /*
71       * TODO: support vlan.
72       */
73      if (!memcmp(&data[12], vlan, sizeof(vlan))) {
74          trace_colo_proxy_main("COLO-proxy don't support vlan");
75          return 1;
76      }
77  
78      pkt->network_header = data + l2hdr_len;
79  
80      const struct iovec l2vec = {
81          .iov_base = (void *) data,
82          .iov_len = l2hdr_len
83      };
84      l3_proto = eth_get_l3_proto(&l2vec, 1, l2hdr_len);
85  
86      if (l3_proto != ETH_P_IP) {
87          return 1;
88      }
89  
90      network_length = pkt->ip->ip_hl * 4;
91      if (pkt->size < l2hdr_len + network_length + pkt->vnet_hdr_len) {
92          trace_colo_proxy_main("pkt->size < network_header + network_length");
93          return 1;
94      }
95      pkt->transport_header = pkt->network_header + network_length;
96  
97      return 0;
98  }
99  
extract_ip_and_port(uint32_t tmp_ports,ConnectionKey * key,Packet * pkt,bool reverse)100  void extract_ip_and_port(uint32_t tmp_ports, ConnectionKey *key,
101                           Packet *pkt, bool reverse)
102  {
103      if (reverse) {
104          key->src = pkt->ip->ip_dst;
105          key->dst = pkt->ip->ip_src;
106          key->src_port = ntohs(tmp_ports & 0xffff);
107          key->dst_port = ntohs(tmp_ports >> 16);
108      } else {
109          key->src = pkt->ip->ip_src;
110          key->dst = pkt->ip->ip_dst;
111          key->src_port = ntohs(tmp_ports >> 16);
112          key->dst_port = ntohs(tmp_ports & 0xffff);
113      }
114  }
115  
fill_connection_key(Packet * pkt,ConnectionKey * key,bool reverse)116  void fill_connection_key(Packet *pkt, ConnectionKey *key, bool reverse)
117  {
118      uint32_t tmp_ports = 0;
119  
120      key->ip_proto = pkt->ip->ip_p;
121  
122      switch (key->ip_proto) {
123      case IPPROTO_TCP:
124      case IPPROTO_UDP:
125      case IPPROTO_DCCP:
126      case IPPROTO_ESP:
127      case IPPROTO_SCTP:
128      case IPPROTO_UDPLITE:
129          tmp_ports = *(uint32_t *)(pkt->transport_header);
130          break;
131      case IPPROTO_AH:
132          tmp_ports = *(uint32_t *)(pkt->transport_header + 4);
133          break;
134      default:
135          break;
136      }
137  
138      extract_ip_and_port(tmp_ports, key, pkt, reverse);
139  }
140  
connection_new(ConnectionKey * key)141  Connection *connection_new(ConnectionKey *key)
142  {
143      Connection *conn = g_slice_new0(Connection);
144  
145      conn->ip_proto = key->ip_proto;
146      conn->processing = false;
147      conn->tcp_state = TCPS_CLOSED;
148      g_queue_init(&conn->primary_list);
149      g_queue_init(&conn->secondary_list);
150  
151      return conn;
152  }
153  
connection_destroy(void * opaque)154  void connection_destroy(void *opaque)
155  {
156      Connection *conn = opaque;
157  
158      g_queue_foreach(&conn->primary_list, packet_destroy, NULL);
159      g_queue_clear(&conn->primary_list);
160      g_queue_foreach(&conn->secondary_list, packet_destroy, NULL);
161      g_queue_clear(&conn->secondary_list);
162      g_slice_free(Connection, conn);
163  }
164  
packet_new(const void * data,int size,int vnet_hdr_len)165  Packet *packet_new(const void *data, int size, int vnet_hdr_len)
166  {
167      Packet *pkt = g_slice_new0(Packet);
168  
169      pkt->data = g_memdup(data, size);
170      pkt->size = size;
171      pkt->creation_ms = qemu_clock_get_ms(QEMU_CLOCK_HOST);
172      pkt->vnet_hdr_len = vnet_hdr_len;
173  
174      return pkt;
175  }
176  
177  /*
178   * packet_new_nocopy will not copy data, so the caller can't release
179   * the data. And it will be released in packet_destroy.
180   */
packet_new_nocopy(void * data,int size,int vnet_hdr_len)181  Packet *packet_new_nocopy(void *data, int size, int vnet_hdr_len)
182  {
183      Packet *pkt = g_slice_new0(Packet);
184  
185      pkt->data = data;
186      pkt->size = size;
187      pkt->creation_ms = qemu_clock_get_ms(QEMU_CLOCK_HOST);
188      pkt->vnet_hdr_len = vnet_hdr_len;
189  
190      return pkt;
191  }
192  
packet_destroy(void * opaque,void * user_data)193  void packet_destroy(void *opaque, void *user_data)
194  {
195      Packet *pkt = opaque;
196  
197      g_free(pkt->data);
198      g_slice_free(Packet, pkt);
199  }
200  
packet_destroy_partial(void * opaque,void * user_data)201  void packet_destroy_partial(void *opaque, void *user_data)
202  {
203      Packet *pkt = opaque;
204  
205      g_slice_free(Packet, pkt);
206  }
207  
208  /*
209   * Clear hashtable, stop this hash growing really huge
210   */
connection_hashtable_reset(GHashTable * connection_track_table)211  void connection_hashtable_reset(GHashTable *connection_track_table)
212  {
213      g_hash_table_remove_all(connection_track_table);
214  }
215  
216  /* if not found, create a new connection and add to hash table */
connection_get(GHashTable * connection_track_table,ConnectionKey * key,GQueue * conn_list)217  Connection *connection_get(GHashTable *connection_track_table,
218                             ConnectionKey *key,
219                             GQueue *conn_list)
220  {
221      Connection *conn = g_hash_table_lookup(connection_track_table, key);
222  
223      if (conn == NULL) {
224          ConnectionKey *new_key = g_memdup(key, sizeof(*key));
225  
226          conn = connection_new(key);
227  
228          if (g_hash_table_size(connection_track_table) > HASHTABLE_MAX_SIZE) {
229              trace_colo_proxy_main("colo proxy connection hashtable full,"
230                                    " clear it");
231              connection_hashtable_reset(connection_track_table);
232              /*
233               * clear the conn_list
234               */
235              while (conn_list && !g_queue_is_empty(conn_list)) {
236                  connection_destroy(g_queue_pop_head(conn_list));
237              }
238          }
239  
240          g_hash_table_insert(connection_track_table, new_key, conn);
241      }
242  
243      return conn;
244  }
245  
connection_has_tracked(GHashTable * connection_track_table,ConnectionKey * key)246  bool connection_has_tracked(GHashTable *connection_track_table,
247                              ConnectionKey *key)
248  {
249      Connection *conn = g_hash_table_lookup(connection_track_table, key);
250  
251      return conn ? true : false;
252  }
253