2015-11-03 15:00:03 -08:00
|
|
|
|
/*
|
2019-02-13 15:34:21 -08:00
|
|
|
|
* Copyright (c) 2015, 2018 Nicira, Inc.
|
2015-11-03 15:00:03 -08:00
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at:
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
2016-08-18 14:09:41 -07:00
|
|
|
|
#include "dpif-provider.h"
|
2015-11-03 15:00:03 -08:00
|
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
|
|
|
|
#include "ct-dpif.h"
|
dpctl: Support flush conntrack by conntrack 5-tuple
With this patch, "flush-conntrack" in ovs-dpctl and ovs-appctl accept
a conntrack 5-tuple to delete the conntrack entry specified by the 5-tuple.
For example, user can use the following command to flush a conntrack entry
in zone 5.
$ ovs-dpctl flush-conntrack zone=5 \
'ct_nw_src=10.1.1.2,ct_nw_dst=10.1.1.1,ct_nw_proto=17,ct_tp_src=2,ct_tp_dst=1'
$ ovs-appctl dpctl/flush-conntrack zone=5 \
'ct_nw_src=10.1.1.2,ct_nw_dst=10.1.1.1,ct_nw_proto=17,ct_tp_src=2,ct_tp_dst=1'
VMWare-BZ: #1983178
Signed-off-by: Yi-Hung Wei <yihung.wei@gmail.com>
Signed-off-by: Justin Pettit <jpettit@ovn.org>
2017-12-07 10:40:04 -08:00
|
|
|
|
#include "openvswitch/ofp-parse.h"
|
2016-08-18 14:09:41 -07:00
|
|
|
|
#include "openvswitch/vlog.h"
|
2015-11-03 15:00:03 -08:00
|
|
|
|
|
2016-08-18 14:09:41 -07:00
|
|
|
|
VLOG_DEFINE_THIS_MODULE(ct_dpif);
|
2015-10-28 11:24:25 -07:00
|
|
|
|
|
2015-11-03 15:00:03 -08:00
|
|
|
|
/* Declarations for conntrack entry formatting. */
|
|
|
|
|
struct flags {
|
|
|
|
|
uint32_t flag;
|
|
|
|
|
const char *name;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void ct_dpif_format_counters(struct ds *,
|
|
|
|
|
const struct ct_dpif_counters *);
|
|
|
|
|
static void ct_dpif_format_timestamp(struct ds *,
|
|
|
|
|
const struct ct_dpif_timestamp *);
|
|
|
|
|
static void ct_dpif_format_flags(struct ds *, const char *title,
|
|
|
|
|
uint32_t flags, const struct flags *);
|
|
|
|
|
static void ct_dpif_format_protoinfo(struct ds *, const char *title,
|
|
|
|
|
const struct ct_dpif_protoinfo *,
|
|
|
|
|
bool verbose);
|
|
|
|
|
static void ct_dpif_format_helper(struct ds *, const char *title,
|
|
|
|
|
const struct ct_dpif_helper *);
|
|
|
|
|
|
|
|
|
|
static const struct flags ct_dpif_status_flags[] = {
|
|
|
|
|
#define CT_DPIF_STATUS_FLAG(FLAG) { CT_DPIF_STATUS_##FLAG, #FLAG },
|
|
|
|
|
CT_DPIF_STATUS_FLAGS
|
|
|
|
|
#undef CT_DPIF_STATUS_FLAG
|
|
|
|
|
{ 0, NULL } /* End marker. */
|
|
|
|
|
};
|
|
|
|
|
|
2015-10-28 11:24:25 -07:00
|
|
|
|
/* Dumping */
|
|
|
|
|
|
|
|
|
|
/* Start dumping the entries from the connection tracker used by 'dpif'.
|
|
|
|
|
*
|
|
|
|
|
* 'dump' must be the address of a pointer to a struct ct_dpif_dump_state,
|
|
|
|
|
* which should be passed (unaltered) to ct_dpif_dump_{next,done}().
|
|
|
|
|
*
|
|
|
|
|
* If 'zone' is not NULL, it should point to an integer identifing a
|
|
|
|
|
* conntrack zone to which the dump will be limited. If it is NULL,
|
|
|
|
|
* conntrack entries from all zones will be dumped.
|
|
|
|
|
*
|
|
|
|
|
* If there has been a problem the function returns a non-zero value
|
|
|
|
|
* that represents the error. Otherwise it returns zero. */
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_dump_start(struct dpif *dpif, struct ct_dpif_dump_state **dump,
|
2017-08-01 20:12:03 -07:00
|
|
|
|
const uint16_t *zone, int *ptot_bkts)
|
2015-10-28 11:24:25 -07:00
|
|
|
|
{
|
|
|
|
|
int err;
|
|
|
|
|
|
|
|
|
|
err = (dpif->dpif_class->ct_dump_start
|
2017-08-01 20:12:03 -07:00
|
|
|
|
? dpif->dpif_class->ct_dump_start(dpif, dump, zone, ptot_bkts)
|
2015-10-28 11:24:25 -07:00
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
|
|
|
|
|
if (!err) {
|
|
|
|
|
(*dump)->dpif = dpif;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Dump one connection from a tracker, and put it in 'entry'.
|
|
|
|
|
*
|
|
|
|
|
* 'dump' should have been initialized by ct_dpif_dump_start().
|
|
|
|
|
*
|
|
|
|
|
* The function returns 0, if an entry has been dumped succesfully.
|
|
|
|
|
* Otherwise it returns a non-zero value which can be:
|
|
|
|
|
* - EOF: meaning that there are no more entries to dump.
|
|
|
|
|
* - an error value.
|
|
|
|
|
* In both cases, the user should call ct_dpif_dump_done(). */
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_dump_next(struct ct_dpif_dump_state *dump, struct ct_dpif_entry *entry)
|
|
|
|
|
{
|
|
|
|
|
struct dpif *dpif = dump->dpif;
|
|
|
|
|
|
|
|
|
|
return (dpif->dpif_class->ct_dump_next
|
|
|
|
|
? dpif->dpif_class->ct_dump_next(dpif, dump, entry)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Free resources used by 'dump' */
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_dump_done(struct ct_dpif_dump_state *dump)
|
|
|
|
|
{
|
|
|
|
|
struct dpif *dpif = dump->dpif;
|
|
|
|
|
|
|
|
|
|
return (dpif->dpif_class->ct_dump_done
|
|
|
|
|
? dpif->dpif_class->ct_dump_done(dpif, dump)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
2017-12-07 10:40:03 -08:00
|
|
|
|
/* Flush the entries in the connection tracker used by 'dpif'. The
|
|
|
|
|
* arguments have the following behavior:
|
2015-10-28 10:32:32 -07:00
|
|
|
|
*
|
2017-12-07 10:40:03 -08:00
|
|
|
|
* - If both 'zone' and 'tuple' are NULL, flush all the conntrack entries.
|
|
|
|
|
* - If 'zone' is not NULL, and 'tuple' is NULL, flush all the conntrack
|
|
|
|
|
* entries in '*zone'.
|
|
|
|
|
* - If 'tuple' is not NULL, flush the conntrack entry specified by 'tuple'
|
|
|
|
|
* in '*zone'. If 'zone' is NULL, use the default zone (zone 0). */
|
2015-10-28 10:32:32 -07:00
|
|
|
|
int
|
2017-12-07 10:40:03 -08:00
|
|
|
|
ct_dpif_flush(struct dpif *dpif, const uint16_t *zone,
|
|
|
|
|
const struct ct_dpif_tuple *tuple)
|
2015-10-28 10:32:32 -07:00
|
|
|
|
{
|
2017-12-07 10:40:03 -08:00
|
|
|
|
if (tuple) {
|
|
|
|
|
struct ds ds = DS_EMPTY_INITIALIZER;
|
|
|
|
|
ct_dpif_format_tuple(&ds, tuple);
|
|
|
|
|
VLOG_DBG("%s: ct_flush: %s in zone %d", dpif_name(dpif), ds_cstr(&ds),
|
|
|
|
|
zone ? *zone : 0);
|
|
|
|
|
ds_destroy(&ds);
|
|
|
|
|
} else if (zone) {
|
|
|
|
|
VLOG_DBG("%s: ct_flush: zone %"PRIu16, dpif_name(dpif), *zone);
|
2016-08-18 14:09:41 -07:00
|
|
|
|
} else {
|
|
|
|
|
VLOG_DBG("%s: ct_flush: <all>", dpif_name(dpif));
|
|
|
|
|
}
|
|
|
|
|
|
2015-10-28 10:32:32 -07:00
|
|
|
|
return (dpif->dpif_class->ct_flush
|
2017-12-07 10:40:03 -08:00
|
|
|
|
? dpif->dpif_class->ct_flush(dpif, zone, tuple)
|
2015-10-28 10:32:32 -07:00
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
2018-01-08 15:18:42 -08:00
|
|
|
|
int
|
|
|
|
|
ct_dpif_set_maxconns(struct dpif *dpif, uint32_t maxconns)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ct_set_maxconns
|
|
|
|
|
? dpif->dpif_class->ct_set_maxconns(dpif, maxconns)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_get_maxconns(struct dpif *dpif, uint32_t *maxconns)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ct_get_maxconns
|
|
|
|
|
? dpif->dpif_class->ct_get_maxconns(dpif, maxconns)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
2018-01-08 15:18:43 -08:00
|
|
|
|
int
|
|
|
|
|
ct_dpif_get_nconns(struct dpif *dpif, uint32_t *nconns)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ct_get_nconns
|
|
|
|
|
? dpif->dpif_class->ct_get_nconns(dpif, nconns)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-25 14:09:41 -07:00
|
|
|
|
int
|
|
|
|
|
ct_dpif_set_tcp_seq_chk(struct dpif *dpif, bool enabled)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ct_set_tcp_seq_chk
|
|
|
|
|
? dpif->dpif_class->ct_set_tcp_seq_chk(dpif, enabled)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_get_tcp_seq_chk(struct dpif *dpif, bool *enabled)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ct_get_tcp_seq_chk
|
|
|
|
|
? dpif->dpif_class->ct_get_tcp_seq_chk(dpif, enabled)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
2018-08-17 02:05:07 -07:00
|
|
|
|
int
|
|
|
|
|
ct_dpif_set_limits(struct dpif *dpif, const uint32_t *default_limit,
|
|
|
|
|
const struct ovs_list *zone_limits)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ct_set_limits
|
|
|
|
|
? dpif->dpif_class->ct_set_limits(dpif, default_limit,
|
|
|
|
|
zone_limits)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_get_limits(struct dpif *dpif, uint32_t *default_limit,
|
|
|
|
|
const struct ovs_list *zone_limits_in,
|
|
|
|
|
struct ovs_list *zone_limits_out)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ct_get_limits
|
|
|
|
|
? dpif->dpif_class->ct_get_limits(dpif, default_limit,
|
|
|
|
|
zone_limits_in,
|
|
|
|
|
zone_limits_out)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_del_limits(struct dpif *dpif, const struct ovs_list *zone_limits)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ct_del_limits
|
|
|
|
|
? dpif->dpif_class->ct_del_limits(dpif, zone_limits)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-13 15:34:21 -08:00
|
|
|
|
int
|
|
|
|
|
ct_dpif_ipf_set_enabled(struct dpif *dpif, bool v6, bool enable)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ipf_set_enabled
|
|
|
|
|
? dpif->dpif_class->ipf_set_enabled(dpif, v6, enable)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_ipf_set_min_frag(struct dpif *dpif, bool v6, uint32_t min_frag)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ipf_set_min_frag
|
|
|
|
|
? dpif->dpif_class->ipf_set_min_frag(dpif, v6, min_frag)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_ipf_set_max_nfrags(struct dpif *dpif, uint32_t max_frags)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ipf_set_max_nfrags
|
|
|
|
|
? dpif->dpif_class->ipf_set_max_nfrags(dpif, max_frags)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int ct_dpif_ipf_get_status(struct dpif *dpif,
|
|
|
|
|
struct dpif_ipf_status *dpif_ipf_status)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ipf_get_status
|
|
|
|
|
? dpif->dpif_class->ipf_get_status(dpif, dpif_ipf_status)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_ipf_dump_start(struct dpif *dpif, struct ipf_dump_ctx **dump_ctx)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ipf_dump_start
|
|
|
|
|
? dpif->dpif_class->ipf_dump_start(dpif, dump_ctx)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_ipf_dump_next(struct dpif *dpif, void *dump_ctx, char **dump)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ipf_dump_next
|
|
|
|
|
? dpif->dpif_class->ipf_dump_next(dpif, dump_ctx, dump)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
ct_dpif_ipf_dump_done(struct dpif *dpif, void *dump_ctx)
|
|
|
|
|
{
|
|
|
|
|
return (dpif->dpif_class->ipf_dump_done
|
|
|
|
|
? dpif->dpif_class->ipf_dump_done(dpif, dump_ctx)
|
|
|
|
|
: EOPNOTSUPP);
|
|
|
|
|
}
|
|
|
|
|
|
2015-11-03 15:00:03 -08:00
|
|
|
|
void
|
|
|
|
|
ct_dpif_entry_uninit(struct ct_dpif_entry *entry)
|
|
|
|
|
{
|
|
|
|
|
if (entry) {
|
|
|
|
|
if (entry->helper.name) {
|
|
|
|
|
free(entry->helper.name);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
ct_dpif_format_entry(const struct ct_dpif_entry *entry, struct ds *ds,
|
|
|
|
|
bool verbose, bool print_stats)
|
|
|
|
|
{
|
|
|
|
|
ct_dpif_format_ipproto(ds, entry->tuple_orig.ip_proto);
|
|
|
|
|
|
|
|
|
|
ds_put_cstr(ds, ",orig=(");
|
2016-05-13 15:04:17 -07:00
|
|
|
|
ct_dpif_format_tuple(ds, &entry->tuple_orig);
|
2015-11-03 15:00:03 -08:00
|
|
|
|
if (print_stats) {
|
|
|
|
|
ct_dpif_format_counters(ds, &entry->counters_orig);
|
|
|
|
|
}
|
|
|
|
|
ds_put_cstr(ds, ")");
|
|
|
|
|
|
|
|
|
|
ds_put_cstr(ds, ",reply=(");
|
2016-05-13 15:04:17 -07:00
|
|
|
|
ct_dpif_format_tuple(ds, &entry->tuple_reply);
|
2015-11-03 15:00:03 -08:00
|
|
|
|
if (print_stats) {
|
|
|
|
|
ct_dpif_format_counters(ds, &entry->counters_reply);
|
|
|
|
|
}
|
|
|
|
|
ds_put_cstr(ds, ")");
|
|
|
|
|
|
|
|
|
|
if (print_stats) {
|
|
|
|
|
ct_dpif_format_timestamp(ds, &entry->timestamp);
|
|
|
|
|
}
|
|
|
|
|
if (verbose) {
|
|
|
|
|
ds_put_format(ds, ",id=%"PRIu32, entry->id);
|
|
|
|
|
}
|
|
|
|
|
if (entry->zone) {
|
|
|
|
|
ds_put_format(ds, ",zone=%"PRIu16, entry->zone);
|
|
|
|
|
}
|
|
|
|
|
if (verbose) {
|
|
|
|
|
ct_dpif_format_flags(ds, ",status=", entry->status,
|
|
|
|
|
ct_dpif_status_flags);
|
|
|
|
|
}
|
|
|
|
|
if (print_stats) {
|
|
|
|
|
ds_put_format(ds, ",timeout=%"PRIu32, entry->timeout);
|
|
|
|
|
}
|
|
|
|
|
if (entry->mark) {
|
|
|
|
|
ds_put_format(ds, ",mark=%"PRIu32, entry->mark);
|
|
|
|
|
}
|
2016-05-03 18:20:51 -07:00
|
|
|
|
if (!ovs_u128_is_zero(entry->labels)) {
|
2015-11-03 15:00:03 -08:00
|
|
|
|
ovs_be128 value;
|
|
|
|
|
|
|
|
|
|
ds_put_cstr(ds, ",labels=");
|
|
|
|
|
value = hton128(entry->labels);
|
|
|
|
|
ds_put_hex(ds, &value, sizeof value);
|
|
|
|
|
}
|
|
|
|
|
ct_dpif_format_protoinfo(ds, ",protoinfo=", &entry->protoinfo, verbose);
|
|
|
|
|
ct_dpif_format_helper(ds, ",helper=", &entry->helper);
|
|
|
|
|
if (verbose && entry->tuple_master.l3_type != 0) {
|
|
|
|
|
ds_put_cstr(ds, ",master=(");
|
2016-05-13 15:04:17 -07:00
|
|
|
|
ct_dpif_format_tuple(ds, &entry->tuple_master);
|
2015-11-03 15:00:03 -08:00
|
|
|
|
ds_put_cstr(ds, ")");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-08-28 15:14:23 -07:00
|
|
|
|
void
|
2015-11-03 15:00:03 -08:00
|
|
|
|
ct_dpif_format_ipproto(struct ds *ds, uint16_t ipproto)
|
|
|
|
|
{
|
|
|
|
|
const char *name;
|
|
|
|
|
|
|
|
|
|
name = (ipproto == IPPROTO_ICMP) ? "icmp"
|
|
|
|
|
: (ipproto == IPPROTO_ICMPV6) ? "icmpv6"
|
|
|
|
|
: (ipproto == IPPROTO_TCP) ? "tcp"
|
|
|
|
|
: (ipproto == IPPROTO_UDP) ? "udp"
|
|
|
|
|
: (ipproto == IPPROTO_SCTP) ? "sctp"
|
2017-03-28 17:17:36 -07:00
|
|
|
|
: (ipproto == IPPROTO_UDPLITE) ? "udplite"
|
|
|
|
|
: (ipproto == IPPROTO_DCCP) ? "dccp"
|
|
|
|
|
: (ipproto == IPPROTO_IGMP) ? "igmp"
|
2015-11-03 15:00:03 -08:00
|
|
|
|
: NULL;
|
|
|
|
|
|
|
|
|
|
if (name) {
|
|
|
|
|
ds_put_cstr(ds, name);
|
|
|
|
|
} else {
|
|
|
|
|
ds_put_format(ds, "%u", ipproto);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_counters(struct ds *ds, const struct ct_dpif_counters *counters)
|
|
|
|
|
{
|
|
|
|
|
if (counters->packets || counters->bytes) {
|
|
|
|
|
ds_put_format(ds, ",packets=%"PRIu64",bytes=%"PRIu64,
|
|
|
|
|
counters->packets, counters->bytes);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_timestamp(struct ds *ds,
|
|
|
|
|
const struct ct_dpif_timestamp *timestamp)
|
|
|
|
|
{
|
|
|
|
|
if (timestamp->start || timestamp->stop) {
|
|
|
|
|
ds_put_strftime_msec(ds, ",start=%Y-%m-%dT%H:%M:%S.###",
|
|
|
|
|
timestamp->start / UINT64_C(1000000), false);
|
|
|
|
|
if (timestamp->stop) {
|
|
|
|
|
ds_put_strftime_msec(ds, ",stop=%Y-%m-%dT%H:%M:%S.###",
|
|
|
|
|
timestamp->stop / UINT64_C(1000000), false);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2016-05-13 15:04:17 -07:00
|
|
|
|
ct_dpif_format_tuple_icmp(struct ds *ds, const struct ct_dpif_tuple *tuple)
|
2015-11-03 15:00:03 -08:00
|
|
|
|
{
|
2016-05-13 15:04:17 -07:00
|
|
|
|
ds_put_format(ds, ",id=%u,type=%u,code=%u", ntohs(tuple->icmp_id),
|
|
|
|
|
tuple->icmp_type, tuple->icmp_code);
|
2015-11-03 15:00:03 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_tuple_tp(struct ds *ds, const struct ct_dpif_tuple *tuple)
|
|
|
|
|
{
|
|
|
|
|
ds_put_format(ds, ",sport=%u,dport=%u",
|
|
|
|
|
ntohs(tuple->src_port), ntohs(tuple->dst_port));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
2016-05-13 15:04:17 -07:00
|
|
|
|
ct_dpif_format_tuple(struct ds *ds, const struct ct_dpif_tuple *tuple)
|
2015-11-03 15:00:03 -08:00
|
|
|
|
{
|
|
|
|
|
if (tuple->l3_type == AF_INET) {
|
|
|
|
|
ds_put_format(ds, "src="IP_FMT",dst="IP_FMT,
|
|
|
|
|
IP_ARGS(tuple->src.ip), IP_ARGS(tuple->dst.ip));
|
|
|
|
|
} else if (tuple->l3_type == AF_INET6) {
|
|
|
|
|
ds_put_cstr(ds, "src=");
|
|
|
|
|
ipv6_format_addr(&tuple->src.in6, ds);
|
|
|
|
|
ds_put_cstr(ds, ",dst=");
|
|
|
|
|
ipv6_format_addr(&tuple->dst.in6, ds);
|
|
|
|
|
} else {
|
|
|
|
|
ds_put_format(ds, "Unsupported address family: %u. HEX:\n",
|
|
|
|
|
tuple->l3_type);
|
|
|
|
|
ds_put_hex_dump(ds, tuple, sizeof *tuple, 0, false);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (tuple->ip_proto == IPPROTO_ICMP
|
|
|
|
|
|| tuple->ip_proto == IPPROTO_ICMPV6) {
|
2016-05-13 15:04:17 -07:00
|
|
|
|
ct_dpif_format_tuple_icmp(ds, tuple);
|
2015-11-03 15:00:03 -08:00
|
|
|
|
} else {
|
|
|
|
|
ct_dpif_format_tuple_tp(ds, tuple);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_flags(struct ds *ds, const char *title, uint32_t flags,
|
|
|
|
|
const struct flags *table)
|
|
|
|
|
{
|
|
|
|
|
if (title) {
|
|
|
|
|
ds_put_cstr(ds, title);
|
|
|
|
|
}
|
|
|
|
|
for (; table->name; table++) {
|
|
|
|
|
if (flags & table->flag) {
|
|
|
|
|
ds_put_format(ds, "%s|", table->name);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ds_chomp(ds, '|');
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct flags tcp_flags[] = {
|
|
|
|
|
#define CT_DPIF_TCP_FLAG(FLAG) { CT_DPIF_TCPF_##FLAG, #FLAG },
|
|
|
|
|
CT_DPIF_TCP_FLAGS
|
|
|
|
|
#undef CT_DPIF_TCP_FLAG
|
|
|
|
|
{ 0, NULL } /* End marker. */
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
const char *ct_dpif_tcp_state_string[] = {
|
|
|
|
|
#define CT_DPIF_TCP_STATE(STATE) [CT_DPIF_TCPS_##STATE] = #STATE,
|
|
|
|
|
CT_DPIF_TCP_STATES
|
|
|
|
|
#undef CT_DPIF_TCP_STATE
|
|
|
|
|
};
|
|
|
|
|
|
2019-05-21 14:16:31 -04:00
|
|
|
|
const char *ct_dpif_sctp_state_string[] = {
|
|
|
|
|
#define CT_DPIF_SCTP_STATE(STATE) [CT_DPIF_SCTP_STATE_##STATE] = #STATE,
|
|
|
|
|
CT_DPIF_SCTP_STATES
|
|
|
|
|
#undef CT_DPIF_SCTP_STATE
|
|
|
|
|
};
|
|
|
|
|
|
2015-11-03 15:00:03 -08:00
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_enum__(struct ds *ds, const char *title, unsigned int state,
|
|
|
|
|
const char *names[], unsigned int max)
|
|
|
|
|
{
|
|
|
|
|
if (title) {
|
|
|
|
|
ds_put_cstr(ds, title);
|
|
|
|
|
}
|
|
|
|
|
if (state < max) {
|
|
|
|
|
ds_put_cstr(ds, names[state]);
|
|
|
|
|
} else {
|
|
|
|
|
ds_put_format(ds, "[%u]", state);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#define ct_dpif_format_enum(DS, TITLE, STATE, NAMES) \
|
|
|
|
|
ct_dpif_format_enum__((DS), (TITLE), (STATE), (NAMES), ARRAY_SIZE(NAMES))
|
|
|
|
|
|
|
|
|
|
static uint8_t
|
|
|
|
|
coalesce_tcp_state(uint8_t state)
|
|
|
|
|
{
|
|
|
|
|
/* The Linux kernel connection tracker and the userspace view the
|
|
|
|
|
* tcp states differently in some situations. If we're formatting
|
|
|
|
|
* the entry without being verbose, it is worth to adjust the
|
|
|
|
|
* differences, to ease writing testcases. */
|
|
|
|
|
switch (state) {
|
|
|
|
|
case CT_DPIF_TCPS_FIN_WAIT_2:
|
|
|
|
|
return CT_DPIF_TCPS_TIME_WAIT;
|
|
|
|
|
case CT_DPIF_TCPS_SYN_RECV:
|
|
|
|
|
return CT_DPIF_TCPS_ESTABLISHED;
|
|
|
|
|
default:
|
|
|
|
|
return state;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_protoinfo_tcp(struct ds *ds,
|
|
|
|
|
const struct ct_dpif_protoinfo *protoinfo)
|
|
|
|
|
{
|
|
|
|
|
uint8_t tcp_state;
|
|
|
|
|
|
|
|
|
|
/* We keep two separate tcp states, but we print just one. The Linux
|
|
|
|
|
* kernel connection tracker internally keeps only one state, so
|
|
|
|
|
* 'state_orig' and 'state_reply', will be the same. */
|
|
|
|
|
tcp_state = MAX(protoinfo->tcp.state_orig, protoinfo->tcp.state_reply);
|
|
|
|
|
|
|
|
|
|
tcp_state = coalesce_tcp_state(tcp_state);
|
|
|
|
|
ct_dpif_format_enum(ds, "state=", tcp_state, ct_dpif_tcp_state_string);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_protoinfo_tcp_verbose(struct ds *ds,
|
|
|
|
|
const struct ct_dpif_protoinfo *protoinfo)
|
|
|
|
|
{
|
|
|
|
|
ct_dpif_format_enum(ds, "state_orig=", protoinfo->tcp.state_orig,
|
|
|
|
|
ct_dpif_tcp_state_string);
|
|
|
|
|
ct_dpif_format_enum(ds, ",state_reply=", protoinfo->tcp.state_reply,
|
|
|
|
|
ct_dpif_tcp_state_string);
|
|
|
|
|
|
|
|
|
|
if (protoinfo->tcp.wscale_orig || protoinfo->tcp.wscale_reply) {
|
|
|
|
|
ds_put_format(ds, ",wscale_orig=%u,wscale_reply=%u",
|
|
|
|
|
protoinfo->tcp.wscale_orig,
|
|
|
|
|
protoinfo->tcp.wscale_reply);
|
|
|
|
|
}
|
|
|
|
|
ct_dpif_format_flags(ds, ",flags_orig=", protoinfo->tcp.flags_orig,
|
|
|
|
|
tcp_flags);
|
|
|
|
|
ct_dpif_format_flags(ds, ",flags_reply=", protoinfo->tcp.flags_reply,
|
|
|
|
|
tcp_flags);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-21 14:16:31 -04:00
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_protoinfo_sctp(struct ds *ds,
|
|
|
|
|
const struct ct_dpif_protoinfo *protoinfo)
|
|
|
|
|
{
|
|
|
|
|
ct_dpif_format_enum(ds, "state=", protoinfo->sctp.state,
|
|
|
|
|
ct_dpif_sctp_state_string);
|
|
|
|
|
ds_put_format(ds, ",vtag_orig=%" PRIu32 ",vtag_reply=%" PRIu32,
|
|
|
|
|
protoinfo->sctp.vtag_orig, protoinfo->sctp.vtag_reply);
|
|
|
|
|
}
|
|
|
|
|
|
2015-11-03 15:00:03 -08:00
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_protoinfo(struct ds *ds, const char *title,
|
|
|
|
|
const struct ct_dpif_protoinfo *protoinfo,
|
|
|
|
|
bool verbose)
|
|
|
|
|
{
|
|
|
|
|
if (protoinfo->proto != 0) {
|
|
|
|
|
if (title) {
|
|
|
|
|
ds_put_format(ds, "%s(", title);
|
|
|
|
|
}
|
|
|
|
|
switch (protoinfo->proto) {
|
|
|
|
|
case IPPROTO_TCP:
|
|
|
|
|
if (verbose) {
|
|
|
|
|
ct_dpif_format_protoinfo_tcp_verbose(ds, protoinfo);
|
|
|
|
|
} else {
|
|
|
|
|
ct_dpif_format_protoinfo_tcp(ds, protoinfo);
|
|
|
|
|
}
|
|
|
|
|
break;
|
2019-05-21 14:16:31 -04:00
|
|
|
|
case IPPROTO_SCTP:
|
|
|
|
|
ct_dpif_format_protoinfo_sctp(ds, protoinfo);
|
|
|
|
|
break;
|
2015-11-03 15:00:03 -08:00
|
|
|
|
}
|
|
|
|
|
if (title) {
|
|
|
|
|
ds_put_cstr(ds, ")");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ct_dpif_format_helper(struct ds *ds, const char *title,
|
|
|
|
|
const struct ct_dpif_helper *helper)
|
|
|
|
|
{
|
|
|
|
|
if (helper->name) {
|
|
|
|
|
if (title) {
|
|
|
|
|
ds_put_cstr(ds, title);
|
|
|
|
|
}
|
|
|
|
|
ds_put_cstr(ds, helper->name);
|
|
|
|
|
}
|
|
|
|
|
}
|
2017-06-23 13:28:21 +01:00
|
|
|
|
|
|
|
|
|
uint8_t
|
|
|
|
|
ct_dpif_coalesce_tcp_state(uint8_t state)
|
|
|
|
|
{
|
|
|
|
|
return coalesce_tcp_state(state);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
ct_dpif_format_tcp_stat(struct ds * ds, int tcp_state, int conn_per_state)
|
|
|
|
|
{
|
|
|
|
|
ct_dpif_format_enum(ds, "\t [", tcp_state, ct_dpif_tcp_state_string);
|
|
|
|
|
ds_put_cstr(ds, "]");
|
|
|
|
|
ds_put_format(ds, "=%u", conn_per_state);
|
|
|
|
|
}
|
dpctl: Support flush conntrack by conntrack 5-tuple
With this patch, "flush-conntrack" in ovs-dpctl and ovs-appctl accept
a conntrack 5-tuple to delete the conntrack entry specified by the 5-tuple.
For example, user can use the following command to flush a conntrack entry
in zone 5.
$ ovs-dpctl flush-conntrack zone=5 \
'ct_nw_src=10.1.1.2,ct_nw_dst=10.1.1.1,ct_nw_proto=17,ct_tp_src=2,ct_tp_dst=1'
$ ovs-appctl dpctl/flush-conntrack zone=5 \
'ct_nw_src=10.1.1.2,ct_nw_dst=10.1.1.1,ct_nw_proto=17,ct_tp_src=2,ct_tp_dst=1'
VMWare-BZ: #1983178
Signed-off-by: Yi-Hung Wei <yihung.wei@gmail.com>
Signed-off-by: Justin Pettit <jpettit@ovn.org>
2017-12-07 10:40:04 -08:00
|
|
|
|
|
|
|
|
|
/* Parses a specification of a conntrack 5-tuple from 's' into 'tuple'.
|
|
|
|
|
* Returns true on success. Otherwise, returns false and puts the error
|
|
|
|
|
* message in 'ds'. */
|
|
|
|
|
bool
|
|
|
|
|
ct_dpif_parse_tuple(struct ct_dpif_tuple *tuple, const char *s, struct ds *ds)
|
|
|
|
|
{
|
|
|
|
|
char *pos, *key, *value, *copy;
|
|
|
|
|
memset(tuple, 0, sizeof *tuple);
|
|
|
|
|
|
|
|
|
|
pos = copy = xstrdup(s);
|
|
|
|
|
while (ofputil_parse_key_value(&pos, &key, &value)) {
|
|
|
|
|
if (!*value) {
|
|
|
|
|
ds_put_format(ds, "field %s missing value", key);
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!strcmp(key, "ct_nw_src") || !strcmp(key, "ct_nw_dst")) {
|
|
|
|
|
if (tuple->l3_type && tuple->l3_type != AF_INET) {
|
|
|
|
|
ds_put_cstr(ds, "L3 type set multiple times");
|
|
|
|
|
goto error;
|
|
|
|
|
} else {
|
|
|
|
|
tuple->l3_type = AF_INET;
|
|
|
|
|
}
|
|
|
|
|
if (!ip_parse(value, key[6] == 's' ? &tuple->src.ip :
|
|
|
|
|
&tuple->dst.ip)) {
|
|
|
|
|
goto error_with_msg;
|
|
|
|
|
}
|
|
|
|
|
} else if (!strcmp(key, "ct_ipv6_src") ||
|
|
|
|
|
!strcmp(key, "ct_ipv6_dst")) {
|
|
|
|
|
if (tuple->l3_type && tuple->l3_type != AF_INET6) {
|
|
|
|
|
ds_put_cstr(ds, "L3 type set multiple times");
|
|
|
|
|
goto error;
|
|
|
|
|
} else {
|
|
|
|
|
tuple->l3_type = AF_INET6;
|
|
|
|
|
}
|
|
|
|
|
if (!ipv6_parse(value, key[8] == 's' ? &tuple->src.in6 :
|
|
|
|
|
&tuple->dst.in6)) {
|
|
|
|
|
goto error_with_msg;
|
|
|
|
|
}
|
|
|
|
|
} else if (!strcmp(key, "ct_nw_proto")) {
|
|
|
|
|
char *err = str_to_u8(value, key, &tuple->ip_proto);
|
|
|
|
|
if (err) {
|
|
|
|
|
free(err);
|
|
|
|
|
goto error_with_msg;
|
|
|
|
|
}
|
|
|
|
|
} else if (!strcmp(key, "ct_tp_src") || !strcmp(key,"ct_tp_dst")) {
|
|
|
|
|
uint16_t port;
|
|
|
|
|
char *err = str_to_u16(value, key, &port);
|
|
|
|
|
if (err) {
|
|
|
|
|
free(err);
|
|
|
|
|
goto error_with_msg;
|
|
|
|
|
}
|
|
|
|
|
if (key[6] == 's') {
|
|
|
|
|
tuple->src_port = htons(port);
|
|
|
|
|
} else {
|
|
|
|
|
tuple->dst_port = htons(port);
|
|
|
|
|
}
|
|
|
|
|
} else if (!strcmp(key, "icmp_type") || !strcmp(key, "icmp_code") ||
|
|
|
|
|
!strcmp(key, "icmp_id") ) {
|
|
|
|
|
if (tuple->ip_proto != IPPROTO_ICMP &&
|
|
|
|
|
tuple->ip_proto != IPPROTO_ICMPV6) {
|
|
|
|
|
ds_put_cstr(ds, "invalid L4 fields");
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
uint16_t icmp_id;
|
|
|
|
|
char *err;
|
|
|
|
|
if (key[5] == 't') {
|
|
|
|
|
err = str_to_u8(value, key, &tuple->icmp_type);
|
|
|
|
|
} else if (key[5] == 'c') {
|
|
|
|
|
err = str_to_u8(value, key, &tuple->icmp_code);
|
|
|
|
|
} else {
|
|
|
|
|
err = str_to_u16(value, key, &icmp_id);
|
|
|
|
|
tuple->icmp_id = htons(icmp_id);
|
|
|
|
|
}
|
|
|
|
|
if (err) {
|
|
|
|
|
free(err);
|
|
|
|
|
goto error_with_msg;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
ds_put_format(ds, "invalid conntrack tuple field: %s", key);
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (ipv6_is_zero(&tuple->src.in6) || ipv6_is_zero(&tuple->dst.in6) ||
|
|
|
|
|
!tuple->ip_proto) {
|
|
|
|
|
/* icmp_type, icmp_code, and icmp_id can be 0. */
|
|
|
|
|
if (tuple->ip_proto != IPPROTO_ICMP &&
|
|
|
|
|
tuple->ip_proto != IPPROTO_ICMPV6) {
|
|
|
|
|
if (!tuple->src_port || !tuple->dst_port) {
|
|
|
|
|
ds_put_cstr(ds, "at least one of the conntrack 5-tuple fields "
|
|
|
|
|
"is missing.");
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free(copy);
|
|
|
|
|
return true;
|
|
|
|
|
|
|
|
|
|
error_with_msg:
|
|
|
|
|
ds_put_format(ds, "failed to parse field %s", key);
|
|
|
|
|
error:
|
|
|
|
|
free(copy);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2018-08-17 02:05:08 -07:00
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
ct_dpif_push_zone_limit(struct ovs_list *zone_limits, uint16_t zone,
|
|
|
|
|
uint32_t limit, uint32_t count)
|
|
|
|
|
{
|
|
|
|
|
struct ct_dpif_zone_limit *zone_limit = xmalloc(sizeof *zone_limit);
|
|
|
|
|
zone_limit->zone = zone;
|
|
|
|
|
zone_limit->limit = limit;
|
|
|
|
|
zone_limit->count = count;
|
|
|
|
|
ovs_list_push_back(zone_limits, &zone_limit->node);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
ct_dpif_free_zone_limits(struct ovs_list *zone_limits)
|
|
|
|
|
{
|
|
|
|
|
while (!ovs_list_is_empty(zone_limits)) {
|
|
|
|
|
struct ovs_list *entry = ovs_list_pop_front(zone_limits);
|
|
|
|
|
struct ct_dpif_zone_limit *cdzl;
|
|
|
|
|
cdzl = CONTAINER_OF(entry, struct ct_dpif_zone_limit, node);
|
|
|
|
|
free(cdzl);
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-08-17 02:05:11 -07:00
|
|
|
|
|
|
|
|
|
/* Parses a specification of a conntrack zone limit from 's' into '*pzone'
|
|
|
|
|
* and '*plimit'. Returns true on success. Otherwise, returns false and
|
|
|
|
|
* and puts the error message in 'ds'. */
|
|
|
|
|
bool
|
|
|
|
|
ct_dpif_parse_zone_limit_tuple(const char *s, uint16_t *pzone,
|
|
|
|
|
uint32_t *plimit, struct ds *ds)
|
|
|
|
|
{
|
|
|
|
|
char *pos, *key, *value, *copy, *err;
|
|
|
|
|
bool parsed_limit = false, parsed_zone = false;
|
|
|
|
|
|
|
|
|
|
pos = copy = xstrdup(s);
|
|
|
|
|
while (ofputil_parse_key_value(&pos, &key, &value)) {
|
|
|
|
|
if (!*value) {
|
|
|
|
|
ds_put_format(ds, "field %s missing value", key);
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!strcmp(key, "zone")) {
|
|
|
|
|
err = str_to_u16(value, key, pzone);
|
|
|
|
|
if (err) {
|
|
|
|
|
free(err);
|
|
|
|
|
goto error_with_msg;
|
|
|
|
|
}
|
|
|
|
|
parsed_zone = true;
|
|
|
|
|
} else if (!strcmp(key, "limit")) {
|
|
|
|
|
err = str_to_u32(value, plimit);
|
|
|
|
|
if (err) {
|
|
|
|
|
free(err);
|
|
|
|
|
goto error_with_msg;
|
|
|
|
|
}
|
|
|
|
|
parsed_limit = true;
|
|
|
|
|
} else {
|
|
|
|
|
ds_put_format(ds, "invalid zone limit field: %s", key);
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!parsed_zone || !parsed_limit) {
|
|
|
|
|
ds_put_format(ds, "failed to parse zone limit");
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free(copy);
|
|
|
|
|
return true;
|
|
|
|
|
|
|
|
|
|
error_with_msg:
|
|
|
|
|
ds_put_format(ds, "failed to parse field %s", key);
|
|
|
|
|
error:
|
|
|
|
|
free(copy);
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
ct_dpif_format_zone_limits(uint32_t default_limit,
|
|
|
|
|
const struct ovs_list *zone_limits, struct ds *ds)
|
|
|
|
|
{
|
|
|
|
|
struct ct_dpif_zone_limit *zone_limit;
|
|
|
|
|
|
|
|
|
|
ds_put_format(ds, "default limit=%"PRIu32, default_limit);
|
|
|
|
|
|
|
|
|
|
LIST_FOR_EACH (zone_limit, node, zone_limits) {
|
|
|
|
|
ds_put_format(ds, "\nzone=%"PRIu16, zone_limit->zone);
|
|
|
|
|
ds_put_format(ds, ",limit=%"PRIu32, zone_limit->limit);
|
|
|
|
|
ds_put_format(ds, ",count=%"PRIu32, zone_limit->count);
|
|
|
|
|
}
|
|
|
|
|
}
|