qemu with hax to log dma reads & writes jcs.org/2018/11/12/vfio
at master 442 lines 14 kB view raw
1/* 2 * Copyright (c) 2016 HUAWEI TECHNOLOGIES CO., LTD. 3 * Copyright (c) 2016 FUJITSU LIMITED 4 * Copyright (c) 2016 Intel Corporation 5 * 6 * Author: Zhang Chen <zhangchen.fnst@cn.fujitsu.com> 7 * 8 * This work is licensed under the terms of the GNU GPL, version 2 or 9 * later. See the COPYING file in the top-level directory. 10 */ 11 12#include "qemu/osdep.h" 13#include "trace.h" 14#include "colo.h" 15#include "net/filter.h" 16#include "net/net.h" 17#include "qemu/error-report.h" 18#include "qom/object.h" 19#include "qemu/main-loop.h" 20#include "qemu/iov.h" 21#include "net/checksum.h" 22#include "net/colo.h" 23#include "migration/colo.h" 24#include "util.h" 25 26#define FILTER_COLO_REWRITER(obj) \ 27 OBJECT_CHECK(RewriterState, (obj), TYPE_FILTER_REWRITER) 28 29#define TYPE_FILTER_REWRITER "filter-rewriter" 30#define FAILOVER_MODE_ON true 31#define FAILOVER_MODE_OFF false 32 33typedef struct RewriterState { 34 NetFilterState parent_obj; 35 NetQueue *incoming_queue; 36 /* hashtable to save connection */ 37 GHashTable *connection_track_table; 38 bool vnet_hdr; 39 bool failover_mode; 40} RewriterState; 41 42static void filter_rewriter_failover_mode(RewriterState *s) 43{ 44 s->failover_mode = FAILOVER_MODE_ON; 45} 46 47static void filter_rewriter_flush(NetFilterState *nf) 48{ 49 RewriterState *s = FILTER_COLO_REWRITER(nf); 50 51 if (!qemu_net_queue_flush(s->incoming_queue)) { 52 /* Unable to empty the queue, purge remaining packets */ 53 qemu_net_queue_purge(s->incoming_queue, nf->netdev); 54 } 55} 56 57/* 58 * Return 1 on success, if return 0 means the pkt 59 * is not TCP packet 60 */ 61static int is_tcp_packet(Packet *pkt) 62{ 63 if (!parse_packet_early(pkt) && 64 pkt->ip->ip_p == IPPROTO_TCP) { 65 return 1; 66 } else { 67 return 0; 68 } 69} 70 71/* handle tcp packet from primary guest */ 72static int handle_primary_tcp_pkt(RewriterState *rf, 73 Connection *conn, 74 Packet *pkt, ConnectionKey *key) 75{ 76 struct tcp_hdr *tcp_pkt; 77 78 tcp_pkt = (struct tcp_hdr *)pkt->transport_header; 79 if (trace_event_get_state_backends(TRACE_COLO_FILTER_REWRITER_DEBUG)) { 80 trace_colo_filter_rewriter_pkt_info(__func__, 81 inet_ntoa(pkt->ip->ip_src), inet_ntoa(pkt->ip->ip_dst), 82 ntohl(tcp_pkt->th_seq), ntohl(tcp_pkt->th_ack), 83 tcp_pkt->th_flags); 84 trace_colo_filter_rewriter_conn_offset(conn->offset); 85 } 86 87 if (((tcp_pkt->th_flags & (TH_ACK | TH_SYN)) == (TH_ACK | TH_SYN)) && 88 conn->tcp_state == TCPS_SYN_SENT) { 89 conn->tcp_state = TCPS_ESTABLISHED; 90 } 91 92 if (((tcp_pkt->th_flags & (TH_ACK | TH_SYN)) == TH_SYN)) { 93 /* 94 * we use this flag update offset func 95 * run once in independent tcp connection 96 */ 97 conn->tcp_state = TCPS_SYN_RECEIVED; 98 } 99 100 if (((tcp_pkt->th_flags & (TH_ACK | TH_SYN)) == TH_ACK)) { 101 if (conn->tcp_state == TCPS_SYN_RECEIVED) { 102 /* 103 * offset = secondary_seq - primary seq 104 * ack packet sent by guest from primary node, 105 * so we use th_ack - 1 get primary_seq 106 */ 107 conn->offset -= (ntohl(tcp_pkt->th_ack) - 1); 108 conn->tcp_state = TCPS_ESTABLISHED; 109 } 110 if (conn->offset) { 111 /* handle packets to the secondary from the primary */ 112 tcp_pkt->th_ack = htonl(ntohl(tcp_pkt->th_ack) + conn->offset); 113 114 net_checksum_calculate((uint8_t *)pkt->data + pkt->vnet_hdr_len, 115 pkt->size - pkt->vnet_hdr_len); 116 } 117 118 /* 119 * Passive close step 3 120 */ 121 if ((conn->tcp_state == TCPS_LAST_ACK) && 122 (ntohl(tcp_pkt->th_ack) == (conn->fin_ack_seq + 1))) { 123 conn->tcp_state = TCPS_CLOSED; 124 g_hash_table_remove(rf->connection_track_table, key); 125 } 126 } 127 128 if ((tcp_pkt->th_flags & TH_FIN) == TH_FIN) { 129 /* 130 * Passive close. 131 * Step 1: 132 * The *server* side of this connect is VM, *client* tries to close 133 * the connection. We will into CLOSE_WAIT status. 134 * 135 * Step 2: 136 * In this step we will into LAST_ACK status. 137 * 138 * We got 'fin=1, ack=1' packet from server side, we need to 139 * record the seq of 'fin=1, ack=1' packet. 140 * 141 * Step 3: 142 * We got 'ack=1' packets from client side, it acks 'fin=1, ack=1' 143 * packet from server side. From this point, we can ensure that there 144 * will be no packets in the connection, except that, some errors 145 * happen between the path of 'filter object' and vNIC, if this rare 146 * case really happen, we can still create a new connection, 147 * So it is safe to remove the connection from connection_track_table. 148 * 149 */ 150 if (conn->tcp_state == TCPS_ESTABLISHED) { 151 conn->tcp_state = TCPS_CLOSE_WAIT; 152 } 153 154 /* 155 * Active close step 2. 156 */ 157 if (conn->tcp_state == TCPS_FIN_WAIT_1) { 158 /* 159 * For simplify implementation, we needn't wait 2MSL time 160 * in filter rewriter. Because guest kernel will track the 161 * TCP status and wait 2MSL time, if client resend the FIN 162 * packet, guest will apply the last ACK too. 163 * So, we skip the TCPS_TIME_WAIT state here and go straight 164 * to TCPS_CLOSED state. 165 */ 166 conn->tcp_state = TCPS_CLOSED; 167 g_hash_table_remove(rf->connection_track_table, key); 168 } 169 } 170 171 return 0; 172} 173 174/* handle tcp packet from secondary guest */ 175static int handle_secondary_tcp_pkt(RewriterState *rf, 176 Connection *conn, 177 Packet *pkt, ConnectionKey *key) 178{ 179 struct tcp_hdr *tcp_pkt; 180 181 tcp_pkt = (struct tcp_hdr *)pkt->transport_header; 182 183 if (trace_event_get_state_backends(TRACE_COLO_FILTER_REWRITER_DEBUG)) { 184 trace_colo_filter_rewriter_pkt_info(__func__, 185 inet_ntoa(pkt->ip->ip_src), inet_ntoa(pkt->ip->ip_dst), 186 ntohl(tcp_pkt->th_seq), ntohl(tcp_pkt->th_ack), 187 tcp_pkt->th_flags); 188 trace_colo_filter_rewriter_conn_offset(conn->offset); 189 } 190 191 if (conn->tcp_state == TCPS_SYN_RECEIVED && 192 ((tcp_pkt->th_flags & (TH_ACK | TH_SYN)) == (TH_ACK | TH_SYN))) { 193 /* 194 * save offset = secondary_seq and then 195 * in handle_primary_tcp_pkt make offset 196 * = secondary_seq - primary_seq 197 */ 198 conn->offset = ntohl(tcp_pkt->th_seq); 199 } 200 201 /* VM active connect */ 202 if (conn->tcp_state == TCPS_CLOSED && 203 ((tcp_pkt->th_flags & (TH_ACK | TH_SYN)) == TH_SYN)) { 204 conn->tcp_state = TCPS_SYN_SENT; 205 } 206 207 if ((tcp_pkt->th_flags & (TH_ACK | TH_SYN)) == TH_ACK) { 208 /* Only need to adjust seq while offset is Non-zero */ 209 if (conn->offset) { 210 /* handle packets to the primary from the secondary*/ 211 tcp_pkt->th_seq = htonl(ntohl(tcp_pkt->th_seq) - conn->offset); 212 213 net_checksum_calculate((uint8_t *)pkt->data + pkt->vnet_hdr_len, 214 pkt->size - pkt->vnet_hdr_len); 215 } 216 } 217 218 /* 219 * Passive close step 2: 220 */ 221 if (conn->tcp_state == TCPS_CLOSE_WAIT && 222 (tcp_pkt->th_flags & (TH_ACK | TH_FIN)) == (TH_ACK | TH_FIN)) { 223 conn->fin_ack_seq = ntohl(tcp_pkt->th_seq); 224 conn->tcp_state = TCPS_LAST_ACK; 225 } 226 227 /* 228 * Active close 229 * 230 * Step 1: 231 * The *server* side of this connect is VM, *server* tries to close 232 * the connection. 233 * 234 * Step 2: 235 * We will into CLOSE_WAIT status. 236 * We simplify the TCPS_FIN_WAIT_2, TCPS_TIME_WAIT and 237 * CLOSING status. 238 */ 239 if (conn->tcp_state == TCPS_ESTABLISHED && 240 (tcp_pkt->th_flags & (TH_ACK | TH_FIN)) == TH_FIN) { 241 conn->tcp_state = TCPS_FIN_WAIT_1; 242 } 243 244 return 0; 245} 246 247static ssize_t colo_rewriter_receive_iov(NetFilterState *nf, 248 NetClientState *sender, 249 unsigned flags, 250 const struct iovec *iov, 251 int iovcnt, 252 NetPacketSent *sent_cb) 253{ 254 RewriterState *s = FILTER_COLO_REWRITER(nf); 255 Connection *conn; 256 ConnectionKey key; 257 Packet *pkt; 258 ssize_t size = iov_size(iov, iovcnt); 259 ssize_t vnet_hdr_len = 0; 260 char *buf = g_malloc0(size); 261 262 iov_to_buf(iov, iovcnt, 0, buf, size); 263 264 if (s->vnet_hdr) { 265 vnet_hdr_len = nf->netdev->vnet_hdr_len; 266 } 267 268 pkt = packet_new(buf, size, vnet_hdr_len); 269 g_free(buf); 270 271 /* 272 * if we get tcp packet 273 * we will rewrite it to make secondary guest's 274 * connection established successfully 275 */ 276 if (pkt && is_tcp_packet(pkt)) { 277 278 fill_connection_key(pkt, &key); 279 280 if (sender == nf->netdev) { 281 /* 282 * We need make tcp TX and RX packet 283 * into one connection. 284 */ 285 reverse_connection_key(&key); 286 } 287 288 /* After failover we needn't change new TCP packet */ 289 if (s->failover_mode && 290 !connection_has_tracked(s->connection_track_table, &key)) { 291 goto out; 292 } 293 294 conn = connection_get(s->connection_track_table, 295 &key, 296 NULL); 297 298 if (sender == nf->netdev) { 299 /* NET_FILTER_DIRECTION_TX */ 300 if (!handle_primary_tcp_pkt(s, conn, pkt, &key)) { 301 qemu_net_queue_send(s->incoming_queue, sender, 0, 302 (const uint8_t *)pkt->data, pkt->size, NULL); 303 packet_destroy(pkt, NULL); 304 pkt = NULL; 305 /* 306 * We block the packet here,after rewrite pkt 307 * and will send it 308 */ 309 return 1; 310 } 311 } else { 312 /* NET_FILTER_DIRECTION_RX */ 313 if (!handle_secondary_tcp_pkt(s, conn, pkt, &key)) { 314 qemu_net_queue_send(s->incoming_queue, sender, 0, 315 (const uint8_t *)pkt->data, pkt->size, NULL); 316 packet_destroy(pkt, NULL); 317 pkt = NULL; 318 /* 319 * We block the packet here,after rewrite pkt 320 * and will send it 321 */ 322 return 1; 323 } 324 } 325 } 326 327out: 328 packet_destroy(pkt, NULL); 329 pkt = NULL; 330 return 0; 331} 332 333static void reset_seq_offset(gpointer key, gpointer value, gpointer user_data) 334{ 335 Connection *conn = (Connection *)value; 336 337 conn->offset = 0; 338} 339 340static gboolean offset_is_nonzero(gpointer key, 341 gpointer value, 342 gpointer user_data) 343{ 344 Connection *conn = (Connection *)value; 345 346 return conn->offset ? true : false; 347} 348 349static void colo_rewriter_handle_event(NetFilterState *nf, int event, 350 Error **errp) 351{ 352 RewriterState *rs = FILTER_COLO_REWRITER(nf); 353 354 switch (event) { 355 case COLO_EVENT_CHECKPOINT: 356 g_hash_table_foreach(rs->connection_track_table, 357 reset_seq_offset, NULL); 358 break; 359 case COLO_EVENT_FAILOVER: 360 if (!g_hash_table_find(rs->connection_track_table, 361 offset_is_nonzero, NULL)) { 362 filter_rewriter_failover_mode(rs); 363 } 364 break; 365 default: 366 break; 367 } 368} 369 370static void colo_rewriter_cleanup(NetFilterState *nf) 371{ 372 RewriterState *s = FILTER_COLO_REWRITER(nf); 373 374 /* flush packets */ 375 if (s->incoming_queue) { 376 filter_rewriter_flush(nf); 377 g_free(s->incoming_queue); 378 } 379} 380 381static void colo_rewriter_setup(NetFilterState *nf, Error **errp) 382{ 383 RewriterState *s = FILTER_COLO_REWRITER(nf); 384 385 s->connection_track_table = g_hash_table_new_full(connection_key_hash, 386 connection_key_equal, 387 g_free, 388 connection_destroy); 389 s->incoming_queue = qemu_new_net_queue(qemu_netfilter_pass_to_next, nf); 390} 391 392static bool filter_rewriter_get_vnet_hdr(Object *obj, Error **errp) 393{ 394 RewriterState *s = FILTER_COLO_REWRITER(obj); 395 396 return s->vnet_hdr; 397} 398 399static void filter_rewriter_set_vnet_hdr(Object *obj, 400 bool value, 401 Error **errp) 402{ 403 RewriterState *s = FILTER_COLO_REWRITER(obj); 404 405 s->vnet_hdr = value; 406} 407 408static void filter_rewriter_init(Object *obj) 409{ 410 RewriterState *s = FILTER_COLO_REWRITER(obj); 411 412 s->vnet_hdr = false; 413 s->failover_mode = FAILOVER_MODE_OFF; 414 object_property_add_bool(obj, "vnet_hdr_support", 415 filter_rewriter_get_vnet_hdr, 416 filter_rewriter_set_vnet_hdr); 417} 418 419static void colo_rewriter_class_init(ObjectClass *oc, void *data) 420{ 421 NetFilterClass *nfc = NETFILTER_CLASS(oc); 422 423 nfc->setup = colo_rewriter_setup; 424 nfc->cleanup = colo_rewriter_cleanup; 425 nfc->receive_iov = colo_rewriter_receive_iov; 426 nfc->handle_event = colo_rewriter_handle_event; 427} 428 429static const TypeInfo colo_rewriter_info = { 430 .name = TYPE_FILTER_REWRITER, 431 .parent = TYPE_NETFILTER, 432 .class_init = colo_rewriter_class_init, 433 .instance_init = filter_rewriter_init, 434 .instance_size = sizeof(RewriterState), 435}; 436 437static void register_types(void) 438{ 439 type_register_static(&colo_rewriter_info); 440} 441 442type_init(register_types);