2
0
mirror of https://github.com/openvswitch/ovs synced 2025-08-31 22:35:15 +00:00

ofproto/trace: Add support for tracing conntrack recirculation

Previously, a user need to run ofproto/trace multiple times to derive the
final datapath actions if a flow hit conntrack actions that involves
recirculation. To improve the usability of ofproto/trace, in this patch,
we keep track of the conntrack actions, and automatically run the
recirculation process so that a user only need to execute the ofproto/trace
command once. Currently, this patch sets the default ct_state as
trk and new in the automatic recirculation process. A following patch
will provide an option to customize ct_state.

Signed-off-by: Yi-Hung Wei <yihung.wei@gmail.com>
Signed-off-by: Ben Pfaff <blp@ovn.org>
This commit is contained in:
Yi-Hung Wei
2017-06-27 11:11:33 -07:00
committed by Ben Pfaff
parent ef241d1e86
commit e6bc8e7493
7 changed files with 176 additions and 18 deletions

View File

@@ -107,6 +107,19 @@ recirc_id_node_find(uint32_t id)
: NULL;
}
bool
recirc_id_node_find_and_ref(uint32_t id)
{
struct recirc_id_node *rid_node =
CONST_CAST(struct recirc_id_node *, recirc_id_node_find(id));
if (!rid_node) {
return false;
}
return ovs_refcount_try_ref_rcu(&rid_node->refcount);
}
static uint32_t
frozen_state_hash(const struct frozen_state *state)
{

View File

@@ -186,6 +186,7 @@ void recirc_free_id(uint32_t recirc_id);
void recirc_free_ofproto(struct ofproto_dpif *, const char *ofproto_name);
const struct recirc_id_node *recirc_id_node_find(uint32_t recirc_id);
bool recirc_id_node_find_and_ref(uint32_t id);
static inline struct recirc_id_node *
recirc_id_node_from_state(const struct frozen_state *state)

View File

@@ -23,7 +23,7 @@
#include "openvswitch/ofp-parse.h"
#include "unixctl.h"
static void ofproto_trace(struct ofproto_dpif *, struct flow *,
static void ofproto_trace(struct ofproto_dpif *, const struct flow *,
const struct dp_packet *packet,
const struct ofpact[], size_t ofpacts_len,
struct ds *);
@@ -86,6 +86,37 @@ oftrace_node_destroy(struct oftrace_node *node)
}
}
bool
oftrace_add_recirc_node(struct ovs_list *recirc_queue,
enum oftrace_recirc_type type, const struct flow *flow,
const struct dp_packet *packet, uint32_t recirc_id)
{
if (!recirc_id_node_find_and_ref(recirc_id)) {
return false;
}
struct oftrace_recirc_node *node = xmalloc(sizeof *node);
ovs_list_push_back(recirc_queue, &node->node);
node->type = type;
node->recirc_id = recirc_id;
node->flow = *flow;
node->flow.recirc_id = recirc_id;
node->packet = packet ? dp_packet_clone(packet) : NULL;
return true;
}
static void
oftrace_recirc_node_destroy(struct oftrace_recirc_node *node)
{
if (node) {
recirc_free_id(node->recirc_id);
dp_packet_delete(node->packet);
free(node);
}
}
static void
oftrace_node_print_details(struct ds *output,
const struct ovs_list *nodes, int level)
@@ -419,20 +450,11 @@ exit:
ofpbuf_uninit(&ofpacts);
}
/* Implements a "trace" through 'ofproto''s flow table, appending a textual
* description of the results to 'output'.
*
* The trace follows a packet with the specified 'flow' through the flow
* table. 'packet' may be nonnull to trace an actual packet, with consequent
* side effects (if it is nonnull then its flow must be 'flow').
*
* If 'ofpacts' is nonnull then its 'ofpacts_len' bytes specify the actions to
* trace, otherwise the actions are determined by a flow table lookup. */
static void
ofproto_trace(struct ofproto_dpif *ofproto, struct flow *flow,
const struct dp_packet *packet,
const struct ofpact ofpacts[], size_t ofpacts_len,
struct ds *output)
ofproto_trace__(struct ofproto_dpif *ofproto, const struct flow *flow,
const struct dp_packet *packet, struct ovs_list *recirc_queue,
const struct ofpact ofpacts[], size_t ofpacts_len,
struct ds *output)
{
struct ofpbuf odp_actions;
ofpbuf_init(&odp_actions, 0);
@@ -447,6 +469,7 @@ ofproto_trace(struct ofproto_dpif *ofproto, struct flow *flow,
xin.ofpacts = ofpacts;
xin.ofpacts_len = ofpacts_len;
xin.trace = &trace;
xin.recirc_queue = recirc_queue;
/* Copy initial flow out of xin.flow. It differs from '*flow' because
* xlate_in_init() initializes actset_output to OFPP_UNSET. */
@@ -503,6 +526,46 @@ ofproto_trace(struct ofproto_dpif *ofproto, struct flow *flow,
oftrace_node_list_destroy(&trace);
}
/* Implements a "trace" through 'ofproto''s flow table, appending a textual
* description of the results to 'output'.
*
* The trace follows a packet with the specified 'flow' through the flow
* table. 'packet' may be nonnull to trace an actual packet, with consequent
* side effects (if it is nonnull then its flow must be 'flow').
*
* If 'ofpacts' is nonnull then its 'ofpacts_len' bytes specify the actions to
* trace, otherwise the actions are determined by a flow table lookup. */
static void
ofproto_trace(struct ofproto_dpif *ofproto, const struct flow *flow,
const struct dp_packet *packet,
const struct ofpact ofpacts[], size_t ofpacts_len,
struct ds *output)
{
struct ovs_list recirc_queue = OVS_LIST_INITIALIZER(&recirc_queue);
ofproto_trace__(ofproto, flow, packet, &recirc_queue,
ofpacts, ofpacts_len, output);
struct oftrace_recirc_node *recirc_node;
LIST_FOR_EACH_POP (recirc_node, node, &recirc_queue) {
ds_put_cstr(output, "\n\n");
ds_put_char_multiple(output, '=', 79);
ds_put_format(output, "\nrecirc(%#"PRIx32")",
recirc_node->recirc_id);
if (recirc_node->type == OFT_RECIRC_CONNTRACK) {
recirc_node->flow.ct_state = CS_TRACKED | CS_NEW;
ds_put_cstr(output, " - resume conntrack processing with "
"default ct_state=trk|new");
}
ds_put_char(output, '\n');
ds_put_char_multiple(output, '=', 79);
ds_put_cstr(output, "\n\n");
ofproto_trace__(ofproto, &recirc_node->flow, recirc_node->packet,
&recirc_queue, ofpacts, ofpacts_len, output);
oftrace_recirc_node_destroy(recirc_node);
}
}
void
ofproto_dpif_trace_init(void)
{

View File

@@ -30,6 +30,7 @@
#include "openvswitch/compiler.h"
#include "openvswitch/list.h"
#include "flow.h"
/* Type of a node within a trace. */
enum oftrace_node_type {
@@ -45,6 +46,13 @@ enum oftrace_node_type {
OFT_ERROR, /* An erroneous situation, worth logging. */
};
/* Reason why a flow is in a recirculation queue. */
enum oftrace_recirc_type {
OFT_RECIRC_CONNTRACK,
OFT_RECIRC_MPLS,
OFT_RECIRC_BOND,
};
/* A node within a trace. */
struct oftrace_node {
struct ovs_list node; /* In parent. */
@@ -54,9 +62,22 @@ struct oftrace_node {
char *text;
};
/* A node within a recirculation queue. */
struct oftrace_recirc_node {
struct ovs_list node; /* In recirc_queue. */
enum oftrace_recirc_type type;
uint32_t recirc_id;
struct flow flow;
struct dp_packet *packet;
};
void ofproto_dpif_trace_init(void);
struct oftrace_node *oftrace_report(struct ovs_list *, enum oftrace_node_type,
const char *text);
bool oftrace_add_recirc_node(struct ovs_list *recirc_queue,
enum oftrace_recirc_type, const struct flow *,
const struct dp_packet *, uint32_t recirc_id);
#endif /* ofproto-dpif-trace.h */

View File

@@ -4359,9 +4359,14 @@ emit_continuation(struct xlate_ctx *ctx, const struct frozen_state *state)
}
}
static void
/* Creates a frozen state, and allocates a unique recirc id for the given
* state. Returns a non-zero recirc id if it is allocated successfully.
* Returns 0 otherwise.
**/
static uint32_t
finish_freezing__(struct xlate_ctx *ctx, uint8_t table)
{
uint32_t id = 0;
ovs_assert(ctx->freezing);
struct frozen_state state = {
@@ -4388,11 +4393,11 @@ finish_freezing__(struct xlate_ctx *ctx, uint8_t table)
* recirculation context, will be returned if possible.
* The life-cycle of this recirc id is managed by associating it
* with the udpif key ('ukey') created for each new datapath flow. */
uint32_t id = recirc_alloc_id_ctx(&state);
id = recirc_alloc_id_ctx(&state);
if (!id) {
xlate_report_error(ctx, "Failed to allocate recirculation id");
ctx->error = XLATE_NO_RECIRCULATION_CONTEXT;
return;
return 0;
}
recirc_refs_add(&ctx->xout->recircs, id);
@@ -4411,6 +4416,7 @@ finish_freezing__(struct xlate_ctx *ctx, uint8_t table)
/* Undo changes done by freezing. */
ctx_cancel_freeze(ctx);
return id;
}
/* Called only when we're freezing. */
@@ -4428,8 +4434,22 @@ finish_freezing(struct xlate_ctx *ctx)
static void
compose_recirculate_and_fork(struct xlate_ctx *ctx, uint8_t table)
{
uint32_t recirc_id;
ctx->freezing = true;
finish_freezing__(ctx, table);
recirc_id = finish_freezing__(ctx, table);
if (OVS_UNLIKELY(ctx->xin->trace) && recirc_id) {
if (oftrace_add_recirc_node(ctx->xin->recirc_queue,
OFT_RECIRC_CONNTRACK, &ctx->xin->flow,
ctx->xin->packet, recirc_id)) {
xlate_report(ctx, OFT_DETAIL, "A clone of the packet is forked to "
"recirculate. The forked pipeline will be resumed at "
"table %u.", table);
} else {
xlate_report(ctx, OFT_DETAIL, "Failed to trace the conntrack "
"forked pipeline with recirc_id = %d.", recirc_id);
}
}
}
static void
@@ -5974,6 +5994,7 @@ xlate_in_init(struct xlate_in *xin, struct ofproto_dpif *ofproto,
xin->wc = wc;
xin->odp_actions = odp_actions;
xin->in_packet_out = false;
xin->recirc_queue = NULL;
/* Do recirc lookup. */
xin->frozen_state = NULL;

View File

@@ -158,6 +158,10 @@ struct xlate_in {
/* If true, the packet to be translated is from a packet_out msg. */
bool in_packet_out;
/* ofproto/trace maintains this queue to trace flows that require
* recirculation. */
struct ovs_list *recirc_queue;
};
void xlate_ofproto_set(struct ofproto_dpif *, const char *name, struct dpif *,

View File

@@ -9751,6 +9751,41 @@ udp,vlan_tci=0x0000,dl_src=50:54:00:00:00:0a,dl_dst=50:54:00:00:00:09,nw_src=10.
OVS_VSWITCHD_STOP
AT_CLEANUP
AT_SETUP([ofproto-dpif - conntrack - ofproto/trace])
OVS_VSWITCHD_START
add_of_ports br0 1 2
AT_DATA([flows.txt], [dnl
dnl Table 0
dnl
table=0,priority=100,arp,action=normal
table=0,priority=10,udp,action=ct(table=1,zone=0)
table=0,priority=1,action=drop
dnl
dnl Table 1
dnl
table=1,priority=10,in_port=1,ct_state=+trk+new,udp,action=ct(commit,zone=0),2
table=1,priority=10,in_port=1,ct_state=+trk+est,udp,action=2
table=1,priority=10,in_port=2,ct_state=+trk+est,udp,action=1
table=1,priority=1,action=drop
])
AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
AT_CHECK([ovs-appctl ofproto/trace br0 'in_port=2,udp'], [0], [stdout])
AT_CHECK([tail -1 stdout], [0],
[Datapath actions: drop
])
AT_CHECK([ovs-appctl ofproto/trace br0 'in_port=1,udp'], [0], [stdout])
AT_CHECK([tail -1 stdout], [0],
[Datapath actions: ct(commit),2
])
OVS_VSWITCHD_STOP
AT_CLEANUP
AT_SETUP([ofproto - set mtu])
OVS_VSWITCHD_START