qemu/net/colo.c
<<
>>
Prefs
   1/*
   2 * COarse-grain LOck-stepping Virtual Machines for Non-stop Service (COLO)
   3 * (a.k.a. Fault Tolerance or Continuous Replication)
   4 *
   5 * Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD.
   6 * Copyright (c) 2016 FUJITSU LIMITED
   7 * Copyright (c) 2016 Intel Corporation
   8 *
   9 * Author: Zhang Chen <zhangchen.fnst@cn.fujitsu.com>
  10 *
  11 * This work is licensed under the terms of the GNU GPL, version 2 or
  12 * later.  See the COPYING file in the top-level directory.
  13 */
  14
  15#include "qemu/osdep.h"
  16#include "trace.h"
  17#include "colo.h"
  18#include "util.h"
  19
  20uint32_t connection_key_hash(const void *opaque)
  21{
  22    const ConnectionKey *key = opaque;
  23    uint32_t a, b, c;
  24
  25    /* Jenkins hash */
  26    a = b = c = JHASH_INITVAL + sizeof(*key);
  27    a += key->src.s_addr;
  28    b += key->dst.s_addr;
  29    c += (key->src_port | key->dst_port << 16);
  30    __jhash_mix(a, b, c);
  31
  32    a += key->ip_proto;
  33    __jhash_final(a, b, c);
  34
  35    return c;
  36}
  37
  38int connection_key_equal(const void *key1, const void *key2)
  39{
  40    return memcmp(key1, key2, sizeof(ConnectionKey)) == 0;
  41}
  42
  43int parse_packet_early(Packet *pkt)
  44{
  45    int network_length;
  46    static const uint8_t vlan[] = {0x81, 0x00};
  47    uint8_t *data = pkt->data;
  48    uint16_t l3_proto;
  49    ssize_t l2hdr_len;
  50
  51    assert(data);
  52
  53    /* Check the received vnet_hdr_len then add the offset */
  54    if ((pkt->vnet_hdr_len > sizeof(struct virtio_net_hdr_v1_hash)) ||
  55        (pkt->size < sizeof(struct eth_header) + sizeof(struct vlan_header) +
  56        pkt->vnet_hdr_len)) {
  57        /*
  58         * The received remote packet maybe misconfiguration here,
  59         * Please enable/disable filter module's the vnet_hdr flag at
  60         * the same time.
  61         */
  62        trace_colo_proxy_main_vnet_info("This received packet load wrong ",
  63                                        pkt->vnet_hdr_len, pkt->size);
  64        return 1;
  65    }
  66    data += pkt->vnet_hdr_len;
  67
  68    l2hdr_len = eth_get_l2_hdr_length(data);
  69
  70    /*
  71     * TODO: support vlan.
  72     */
  73    if (!memcmp(&data[12], vlan, sizeof(vlan))) {
  74        trace_colo_proxy_main("COLO-proxy don't support vlan");
  75        return 1;
  76    }
  77
  78    pkt->network_header = data + l2hdr_len;
  79
  80    const struct iovec l2vec = {
  81        .iov_base = (void *) data,
  82        .iov_len = l2hdr_len
  83    };
  84    l3_proto = eth_get_l3_proto(&l2vec, 1, l2hdr_len);
  85
  86    if (l3_proto != ETH_P_IP) {
  87        return 1;
  88    }
  89
  90    network_length = pkt->ip->ip_hl * 4;
  91    if (pkt->size < l2hdr_len + network_length + pkt->vnet_hdr_len) {
  92        trace_colo_proxy_main("pkt->size < network_header + network_length");
  93        return 1;
  94    }
  95    pkt->transport_header = pkt->network_header + network_length;
  96
  97    return 0;
  98}
  99
 100void extract_ip_and_port(uint32_t tmp_ports, ConnectionKey *key,
 101                         Packet *pkt, bool reverse)
 102{
 103    if (reverse) {
 104        key->src = pkt->ip->ip_dst;
 105        key->dst = pkt->ip->ip_src;
 106        key->src_port = ntohs(tmp_ports & 0xffff);
 107        key->dst_port = ntohs(tmp_ports >> 16);
 108    } else {
 109        key->src = pkt->ip->ip_src;
 110        key->dst = pkt->ip->ip_dst;
 111        key->src_port = ntohs(tmp_ports >> 16);
 112        key->dst_port = ntohs(tmp_ports & 0xffff);
 113    }
 114}
 115
 116void fill_connection_key(Packet *pkt, ConnectionKey *key, bool reverse)
 117{
 118    uint32_t tmp_ports = 0;
 119
 120    key->ip_proto = pkt->ip->ip_p;
 121
 122    switch (key->ip_proto) {
 123    case IPPROTO_TCP:
 124    case IPPROTO_UDP:
 125    case IPPROTO_DCCP:
 126    case IPPROTO_ESP:
 127    case IPPROTO_SCTP:
 128    case IPPROTO_UDPLITE:
 129        tmp_ports = *(uint32_t *)(pkt->transport_header);
 130        break;
 131    case IPPROTO_AH:
 132        tmp_ports = *(uint32_t *)(pkt->transport_header + 4);
 133        break;
 134    default:
 135        break;
 136    }
 137
 138    extract_ip_and_port(tmp_ports, key, pkt, reverse);
 139}
 140
 141Connection *connection_new(ConnectionKey *key)
 142{
 143    Connection *conn = g_slice_new0(Connection);
 144
 145    conn->ip_proto = key->ip_proto;
 146    conn->processing = false;
 147    conn->tcp_state = TCPS_CLOSED;
 148    g_queue_init(&conn->primary_list);
 149    g_queue_init(&conn->secondary_list);
 150
 151    return conn;
 152}
 153
 154void connection_destroy(void *opaque)
 155{
 156    Connection *conn = opaque;
 157
 158    g_queue_foreach(&conn->primary_list, packet_destroy, NULL);
 159    g_queue_clear(&conn->primary_list);
 160    g_queue_foreach(&conn->secondary_list, packet_destroy, NULL);
 161    g_queue_clear(&conn->secondary_list);
 162    g_slice_free(Connection, conn);
 163}
 164
 165Packet *packet_new(const void *data, int size, int vnet_hdr_len)
 166{
 167    Packet *pkt = g_slice_new0(Packet);
 168
 169    pkt->data = g_memdup(data, size);
 170    pkt->size = size;
 171    pkt->creation_ms = qemu_clock_get_ms(QEMU_CLOCK_HOST);
 172    pkt->vnet_hdr_len = vnet_hdr_len;
 173
 174    return pkt;
 175}
 176
 177/*
 178 * packet_new_nocopy will not copy data, so the caller can't release
 179 * the data. And it will be released in packet_destroy.
 180 */
 181Packet *packet_new_nocopy(void *data, int size, int vnet_hdr_len)
 182{
 183    Packet *pkt = g_slice_new0(Packet);
 184
 185    pkt->data = data;
 186    pkt->size = size;
 187    pkt->creation_ms = qemu_clock_get_ms(QEMU_CLOCK_HOST);
 188    pkt->vnet_hdr_len = vnet_hdr_len;
 189
 190    return pkt;
 191}
 192
 193void packet_destroy(void *opaque, void *user_data)
 194{
 195    Packet *pkt = opaque;
 196
 197    g_free(pkt->data);
 198    g_slice_free(Packet, pkt);
 199}
 200
 201void packet_destroy_partial(void *opaque, void *user_data)
 202{
 203    Packet *pkt = opaque;
 204
 205    g_slice_free(Packet, pkt);
 206}
 207
 208/*
 209 * Clear hashtable, stop this hash growing really huge
 210 */
 211void connection_hashtable_reset(GHashTable *connection_track_table)
 212{
 213    g_hash_table_remove_all(connection_track_table);
 214}
 215
 216/* if not found, create a new connection and add to hash table */
 217Connection *connection_get(GHashTable *connection_track_table,
 218                           ConnectionKey *key,
 219                           GQueue *conn_list)
 220{
 221    Connection *conn = g_hash_table_lookup(connection_track_table, key);
 222
 223    if (conn == NULL) {
 224        ConnectionKey *new_key = g_memdup(key, sizeof(*key));
 225
 226        conn = connection_new(key);
 227
 228        if (g_hash_table_size(connection_track_table) > HASHTABLE_MAX_SIZE) {
 229            trace_colo_proxy_main("colo proxy connection hashtable full,"
 230                                  " clear it");
 231            connection_hashtable_reset(connection_track_table);
 232            /*
 233             * clear the conn_list
 234             */
 235            while (conn_list && !g_queue_is_empty(conn_list)) {
 236                connection_destroy(g_queue_pop_head(conn_list));
 237            }
 238        }
 239
 240        g_hash_table_insert(connection_track_table, new_key, conn);
 241    }
 242
 243    return conn;
 244}
 245
 246bool connection_has_tracked(GHashTable *connection_track_table,
 247                            ConnectionKey *key)
 248{
 249    Connection *conn = g_hash_table_lookup(connection_track_table, key);
 250
 251    return conn ? true : false;
 252}
 253