mirror of
https://github.com/openvswitch/ovs
synced 2025-10-23 14:57:06 +00:00
A netlink notifier ('nln') already supports multiple notifiers. This patch allows each of these notifiers to subscribe to a different multicast group. Sharing a single socket for multiple event types (each on their own multicast group) provides serialization of events when reordering of different event types could be problematic. For example, if a 'create' event and 'delete' event are on different netlink multicast group, we may want to process those events in the order in which kernel issued them, rather than in the order we happen to check for them. Moving the multicast group argument from nln_create() to nln_notifier_create() allows each notifier to specify a different multicast group. The parse callback needs to identify the group the message belonged to by returning the corresponding group number, or 0 when an parse error occurs. Signed-off-by: Jarno Rajahalme <jarno@ovn.org> Acked-by: Thadeu Lima de Souza Cascardo <cascardo@redhat.com>
185 lines
4.6 KiB
C
185 lines
4.6 KiB
C
/*
|
||
* Copyright (c) 2015 Nicira, Inc.
|
||
*
|
||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
* you may not use this file except in compliance with the License.
|
||
* You may obtain a copy of the License at:
|
||
*
|
||
* http://www.apache.org/licenses/LICENSE-2.0
|
||
*
|
||
* Unless required by applicable law or agreed to in writing, software
|
||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
* See the License for the specific language governing permissions and
|
||
* limitations under the License.
|
||
*/
|
||
|
||
#include <config.h>
|
||
|
||
#include <linux/netfilter/nfnetlink.h>
|
||
|
||
#include "ct-dpif.h"
|
||
#include "netlink-conntrack.h"
|
||
#include "netlink-notifier.h"
|
||
#include "ovstest.h"
|
||
#include "poll-loop.h"
|
||
|
||
/* Monitor command */
|
||
struct test_change {
|
||
enum nl_ct_event_type type;
|
||
struct ct_dpif_entry entry;
|
||
};
|
||
|
||
static int
|
||
event_parse(struct ofpbuf *buf, void *change_)
|
||
{
|
||
struct test_change *change = change_;
|
||
|
||
if (nl_ct_parse_entry(buf, &change->entry, &change->type)) {
|
||
switch (change->type) {
|
||
case NL_CT_EVENT_NEW:
|
||
return NFNLGRP_CONNTRACK_NEW;
|
||
case NL_CT_EVENT_UPDATE:
|
||
return NFNLGRP_CONNTRACK_UPDATE;
|
||
case NL_CT_EVENT_DELETE:
|
||
return NFNLGRP_CONNTRACK_DESTROY;
|
||
}
|
||
}
|
||
return 0;
|
||
}
|
||
|
||
static void
|
||
event_print(const void *change_, void *aux OVS_UNUSED)
|
||
{
|
||
const struct test_change *change = change_;
|
||
|
||
if (change) {
|
||
struct ds ds = DS_EMPTY_INITIALIZER;
|
||
|
||
nl_ct_format_event_entry(&change->entry, change->type, &ds, true,
|
||
true);
|
||
printf("%s\n", ds_cstr(&ds));
|
||
ds_destroy(&ds);
|
||
}
|
||
}
|
||
|
||
static void
|
||
test_nl_ct_monitor(struct ovs_cmdl_context *ctx OVS_UNUSED)
|
||
{
|
||
int groups [] = {
|
||
NFNLGRP_CONNTRACK_DESTROY,
|
||
NFNLGRP_CONNTRACK_NEW,
|
||
NFNLGRP_CONNTRACK_UPDATE,
|
||
};
|
||
|
||
struct nln *nln;
|
||
struct nln_notifier *notifiers[ARRAY_SIZE(groups)];
|
||
|
||
struct test_change change;
|
||
|
||
unsigned i;
|
||
|
||
nln = nln_create(NETLINK_NETFILTER, event_parse, &change);
|
||
|
||
for (i = 0; i < ARRAY_SIZE(groups); i++) {
|
||
notifiers[i] = nln_notifier_create(nln, groups[i], event_print, NULL);
|
||
}
|
||
|
||
for (;;) {
|
||
nln_run(nln);
|
||
nln_wait(nln);
|
||
poll_block();
|
||
}
|
||
|
||
for (i = 0; i < ARRAY_SIZE(groups); i++) {
|
||
nln_notifier_destroy(notifiers[i]);
|
||
}
|
||
nln_destroy(nln);
|
||
}
|
||
|
||
/* Dump command */
|
||
static void
|
||
test_nl_ct_dump(struct ovs_cmdl_context *ctx)
|
||
{
|
||
struct nl_ct_dump_state *dump;
|
||
uint16_t zone, *pzone = NULL;
|
||
struct ct_dpif_entry entry;
|
||
int err;
|
||
|
||
if (ctx->argc >= 2) {
|
||
if (!ovs_scan(ctx->argv[1], "zone=%"SCNu16, &zone)) {
|
||
ovs_fatal(0, "Error parsing zone= specifier");
|
||
}
|
||
pzone = &zone;
|
||
}
|
||
err = nl_ct_dump_start(&dump, pzone);
|
||
if (err) {
|
||
ovs_fatal(err, "Error creating conntrack netlink dump");
|
||
}
|
||
|
||
do {
|
||
err = nl_ct_dump_next(dump, &entry);
|
||
if (!err) {
|
||
struct ds ds = DS_EMPTY_INITIALIZER;
|
||
|
||
ct_dpif_format_entry(&entry, &ds, true, true);
|
||
printf("%s\n", ds_cstr(&ds));
|
||
ds_destroy(&ds);
|
||
}
|
||
} while (!err);
|
||
|
||
if (err != EOF) {
|
||
ovs_fatal(err, "Error dumping conntrack netlink entry");
|
||
}
|
||
nl_ct_dump_done(dump);
|
||
}
|
||
|
||
/* Flush command */
|
||
static void
|
||
test_nl_ct_flush(struct ovs_cmdl_context *ctx OVS_UNUSED)
|
||
{
|
||
int err;
|
||
|
||
if (ctx->argc >= 2) {
|
||
uint16_t zone;
|
||
|
||
if (ovs_scan(ctx->argv[1], "zone=%"SCNu16, &zone)) {
|
||
err = nl_ct_flush_zone(zone);
|
||
} else {
|
||
ovs_fatal(0, "Error parsing zone= specifier");
|
||
}
|
||
} else {
|
||
err = nl_ct_flush();
|
||
}
|
||
if (err) {
|
||
ovs_fatal(err, "Error flushing conntrack netlink");
|
||
}
|
||
}
|
||
|
||
static const struct ovs_cmdl_command commands[] = {
|
||
/* Linux netlink connection tracker interface test. */
|
||
|
||
/* Prints all the entries in the connection table and exits. */
|
||
{"dump", "[zone=zone]", 0, 1, test_nl_ct_dump},
|
||
/* Listens to all the connection tracking events and prints them to
|
||
* standard output until killed. */
|
||
{"monitor", "", 0, 0, test_nl_ct_monitor},
|
||
/* Flushes all the entries from all the tables.. */
|
||
{"flush", "[zone=zone]", 0, 1, test_nl_ct_flush},
|
||
|
||
{NULL, NULL, 0, 0, NULL},
|
||
};
|
||
|
||
static void
|
||
test_netlink_conntrack(int argc, char *argv[])
|
||
{
|
||
struct ovs_cmdl_context ctx = {
|
||
.argc = argc - 1,
|
||
.argv = argv + 1,
|
||
};
|
||
set_program_name(argv[0]);
|
||
ovs_cmdl_run_command(&ctx, commands);
|
||
}
|
||
|
||
OVSTEST_REGISTER("test-netlink-conntrack", test_netlink_conntrack);
|