From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) by passt.top (Postfix) with ESMTPS id 8622E5A0271 for ; Mon, 28 Aug 2023 07:42:12 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gibson.dropbear.id.au; s=201602; t=1693201322; bh=v2WNX7rSCqI2ueRzxRxc2fnQSEEs34LIn+xokv56M5M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cpIk/uqaXKcUgfqbWiDBUjC+o6Izomd2SfCsNH/BwDnM2HyB1I3plAyku5B6t9PnJ T8yLkNIHA+R88s7JMNq6KVr6LIYQPz+fJu5CwLBSvrZltZaP3jalyh7iGfaA2y2Eww aAxtIl1StFfoZ3LasjqtkNeT8G5sqAhwyJNpjR3g= Received: by gandalf.ozlabs.org (Postfix, from userid 1007) id 4RYzvt61r2z4wy6; Mon, 28 Aug 2023 15:42:02 +1000 (AEST) From: David Gibson To: passt-dev@passt.top, Stefano Brivio Subject: [PATCH v2 07/10] tcp, flow: Perform TCP hash calculations based on flowside Date: Mon, 28 Aug 2023 15:41:43 +1000 Message-ID: <20230828054146.48673-8-david@gibson.dropbear.id.au> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20230828054146.48673-1-david@gibson.dropbear.id.au> References: <20230828054146.48673-1-david@gibson.dropbear.id.au> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Message-ID-Hash: 6ZR7IOHOBZVP2YNKTJW6LLYQA7ZGQLZG X-Message-ID-Hash: 6ZR7IOHOBZVP2YNKTJW6LLYQA7ZGQLZG X-MailFrom: dgibson@gandalf.ozlabs.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: David Gibson X-Mailman-Version: 3.3.8 Precedence: list List-Id: Development discussion and patches for passt Archived-At: Archived-At: List-Archive: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: Currently we match TCP packets received on the tap connection to a TCP connection via a hash table based on the forwarding address and both ports. We hope in future to allow for multiple guest side addresses, which means we may need to distinguish based on the endpoint address as well. Extend the hash function to include this information. Since this now exactly matches the contents of the guest flowside, we can base our hash functions on that, rather than a group of individual parameters. We also put some of the helpers in flow.h, because we hope to be able to re-use the hashing logic for other cases in future as well. Signed-off-by: David Gibson --- flow.c | 1 + flow.h | 27 ++++++++++++++++++++++ siphash.c | 1 + tcp.c | 65 +++++++++++++--------------------------------------- tcp_splice.c | 1 + 5 files changed, 46 insertions(+), 49 deletions(-) diff --git a/flow.c b/flow.c index d7264f8..4521a43 100644 --- a/flow.c +++ b/flow.c @@ -12,6 +12,7 @@ #include "util.h" #include "passt.h" #include "inany.h" +#include "siphash.h" #include "flow.h" #include "tcp_conn.h" #include "flow_table.h" diff --git a/flow.h b/flow.h index 9891fcb..b4f042b 100644 --- a/flow.h +++ b/flow.h @@ -63,6 +63,33 @@ static inline bool flowside_complete(const struct flowside *fs) const char *flowside_fmt(const struct flowside *fs, char *buf, size_t size); +/** + * flowside_eq() - Check if two flowsides are equal + * @left, @right: Flowsides to compare + * + * Return: true if equal, false otherwise + */ +static inline bool flowside_eq(const struct flowside *left, + const struct flowside *right) +{ + return memcmp(left, right, sizeof(struct flowside)) == 0; +} + +/** + * flowside_hash() - Calculate hash value for a flowside + * @fs: Flowside + * @k: Hash secret (128-bits as array of 2 64-bit words) + * + * Return: hash value + */ +static inline unsigned int flowside_hash(const struct flowside *fs, + const uint64_t *k) +{ + ASSERT(flowside_complete(fs)); + return siphash_36b((uint8_t *)fs, k); +} + + /** * struct flow_common - Common fields for packet flows * @side[]: Information on the flow for each side. Flow types can have diff --git a/siphash.c b/siphash.c index e266e15..1f424d8 100644 --- a/siphash.c +++ b/siphash.c @@ -163,6 +163,7 @@ uint32_t siphash_12b(const uint8_t *in, const uint64_t *k) */ /* NOLINTNEXTLINE(clang-diagnostic-unknown-attributes) */ __attribute__((optimize("-fno-strict-aliasing"))) /* See siphash_8b() */ +/* cppcheck-suppress unusedFunction */ uint64_t siphash_20b(const uint8_t *in, const uint64_t *k) { uint32_t *in32 = (uint32_t *)in; diff --git a/tcp.c b/tcp.c index 16b930e..27cdd15 100644 --- a/tcp.c +++ b/tcp.c @@ -1133,49 +1133,15 @@ static int tcp_opt_get(const char *opts, size_t len, uint8_t type_find, } /** - * tcp_hash_match() - Check if a connection entry matches address and ports - * @conn: Connection entry to match against - * @faddr: Guest side forwarding address - * @eport: Guest side endpoint port - * @fport: Guest side forwarding port - * - * Return: 1 on match, 0 otherwise - */ -static int tcp_hash_match(const struct tcp_tap_conn *conn, - const union inany_addr *faddr, - in_port_t eport, in_port_t fport) -{ - if (inany_equals(&TAPSIDE(conn)->faddr, faddr) && - TAPSIDE(conn)->eport == eport && TAPSIDE(conn)->fport == fport) - return 1; - - return 0; -} - -/** - * tcp_hash() - Calculate hash value for connection given address and ports + * tcp_hash() - Calculate hash value for a TCP guest flowside * @c: Execution context - * @faddr: Guest side forwarding address - * @eport: Guest side endpoint port - * @fport: Guest side forwarding port + * @fs: Guest flowside * * Return: hash value, already modulo size of the hash table */ -static unsigned int tcp_hash(const struct ctx *c, const union inany_addr *faddr, - in_port_t eport, in_port_t fport) +static unsigned int tcp_hash(const struct ctx *c, const struct flowside *fs) { - struct { - union inany_addr faddr; - in_port_t eport; - in_port_t fport; - } __attribute__((__packed__)) in = { - *faddr, eport, fport - }; - uint64_t b = 0; - - b = siphash_20b((uint8_t *)&in, c->tcp.hash_secret); - - return (unsigned int)(b % TCP_HASH_TABLE_SIZE); + return flowside_hash(fs, c->tcp.hash_secret) % TCP_HASH_TABLE_SIZE; } /** @@ -1188,8 +1154,7 @@ static unsigned int tcp_hash(const struct ctx *c, const union inany_addr *faddr, static unsigned int tcp_conn_hash(const struct ctx *c, const struct tcp_tap_conn *conn) { - return tcp_hash(c, &TAPSIDE(conn)->faddr, - TAPSIDE(conn)->eport, TAPSIDE(conn)->fport); + return tcp_hash(c, TAPSIDE(conn)); } /** @@ -1201,8 +1166,7 @@ static void tcp_hash_insert(const struct ctx *c, struct tcp_tap_conn *conn) { int b; - b = tcp_hash(c, &TAPSIDE(conn)->faddr, - TAPSIDE(conn)->eport, TAPSIDE(conn)->fport); + b = tcp_hash(c, TAPSIDE(conn)); conn->next_index = tc_hash[b] ? FLOW_IDX(tc_hash[b]) : -1U; tc_hash[b] = conn; @@ -1271,24 +1235,26 @@ void tcp_tap_conn_update(struct ctx *c, struct tcp_tap_conn *old, * tcp_hash_lookup() - Look up connection given remote address and ports * @c: Execution context * @af: Address family, AF_INET or AF_INET6 + * @eaddr: Guest side endpoint address (guest local address) * @faddr: Guest side forwarding address (guest remote address) * @eport: Guest side endpoint port (guest local port) * @fport: Guest side forwarding port (guest remote port) * * Return: connection pointer, if found, -ENOENT otherwise */ -static struct tcp_tap_conn *tcp_hash_lookup(const struct ctx *c, - int af, const void *faddr, +static struct tcp_tap_conn *tcp_hash_lookup(const struct ctx *c, int af, + const void *eaddr, const void *faddr, in_port_t eport, in_port_t fport) { - union inany_addr aany; + struct flowside fs; struct tcp_tap_conn *conn; int b; - inany_from_af(&aany, af, faddr); - b = tcp_hash(c, &aany, eport, fport); + flowside_from_af(&fs, af, faddr, fport, eaddr, eport); + + b = tcp_hash(c, &fs); for (conn = tc_hash[b]; conn; conn = conn_at_idx(conn->next_index)) { - if (tcp_hash_match(conn, &aany, eport, fport)) + if (flowside_eq(TAPSIDE(conn), &fs)) return conn; } @@ -2523,7 +2489,8 @@ int tcp_tap_handler(struct ctx *c, int af, const void *saddr, const void *daddr, optlen = MIN(optlen, ((1UL << 4) /* from doff width */ - 6) * 4UL); opts = packet_get(p, 0, sizeof(*th), optlen, NULL); - conn = tcp_hash_lookup(c, af, daddr, htons(th->source), htons(th->dest)); + conn = tcp_hash_lookup(c, af, saddr, daddr, + htons(th->source), htons(th->dest)); /* New connection from tap */ if (!conn) { diff --git a/tcp_splice.c b/tcp_splice.c index 34cb774..676e7e8 100644 --- a/tcp_splice.c +++ b/tcp_splice.c @@ -51,6 +51,7 @@ #include "util.h" #include "passt.h" #include "log.h" +#include "siphash.h" #include "tcp_splice.h" #include "inany.h" #include "flow.h" -- 2.41.0