mirror of
https://github.com/openvswitch/ovs
synced 2025-08-31 06:15:47 +00:00
Currently, conntrack in the kernel has an undocumented feature referred to as all-zero IP address SNAT. Basically, when a source port collision is detected during the commit, the source port will be translated to an ephemeral port. If there is no collision, no SNAT is performed. This patchset documents this behavior and adds a self-test to verify it's not changing. In addition, a datapath feature flag is added for the all-zero IP SNAT case. This will help applications on top of OVS, like OVN, to determine this feature can be used. Signed-off-by: Eelco Chaudron <echaudro@redhat.com> Acked-by: Aaron Conole <aconole@redhat.com> Acked-by: Dumitru Ceara <dceara@redhat.com> Acked-by: Alin-Gabriel Serdean <aserdean@ovn.org> Acked-by: Paolo Valerio <pvalerio@redhat.com> Signed-off-by: Ilya Maximets <i.maximets@ovn.org>
900 lines
27 KiB
C
900 lines
27 KiB
C
/*
|
||
* Copyright (c) 2015, 2018 Nicira, Inc.
|
||
*
|
||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
* you may not use this file except in compliance with the License.
|
||
* You may obtain a copy of the License at:
|
||
*
|
||
* http://www.apache.org/licenses/LICENSE-2.0
|
||
*
|
||
* Unless required by applicable law or agreed to in writing, software
|
||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
* See the License for the specific language governing permissions and
|
||
* limitations under the License.
|
||
*/
|
||
|
||
#include <config.h>
|
||
#include "dpif-provider.h"
|
||
|
||
#include <errno.h>
|
||
|
||
#include "ct-dpif.h"
|
||
#include "openvswitch/ofp-parse.h"
|
||
#include "openvswitch/vlog.h"
|
||
|
||
VLOG_DEFINE_THIS_MODULE(ct_dpif);
|
||
|
||
/* Declarations for conntrack entry formatting. */
|
||
struct flags {
|
||
uint32_t flag;
|
||
const char *name;
|
||
};
|
||
|
||
static void ct_dpif_format_counters(struct ds *,
|
||
const struct ct_dpif_counters *);
|
||
static void ct_dpif_format_timestamp(struct ds *,
|
||
const struct ct_dpif_timestamp *);
|
||
static void ct_dpif_format_flags(struct ds *, const char *title,
|
||
uint32_t flags, const struct flags *);
|
||
static void ct_dpif_format_protoinfo(struct ds *, const char *title,
|
||
const struct ct_dpif_protoinfo *,
|
||
bool verbose);
|
||
static void ct_dpif_format_helper(struct ds *, const char *title,
|
||
const struct ct_dpif_helper *);
|
||
|
||
static const struct flags ct_dpif_status_flags[] = {
|
||
#define CT_DPIF_STATUS_FLAG(FLAG) { CT_DPIF_STATUS_##FLAG, #FLAG },
|
||
CT_DPIF_STATUS_FLAGS
|
||
#undef CT_DPIF_STATUS_FLAG
|
||
{ 0, NULL } /* End marker. */
|
||
};
|
||
|
||
/* Dumping */
|
||
|
||
/* Start dumping the entries from the connection tracker used by 'dpif'.
|
||
*
|
||
* 'dump' must be the address of a pointer to a struct ct_dpif_dump_state,
|
||
* which should be passed (unaltered) to ct_dpif_dump_{next,done}().
|
||
*
|
||
* If 'zone' is not NULL, it should point to an integer identifing a
|
||
* conntrack zone to which the dump will be limited. If it is NULL,
|
||
* conntrack entries from all zones will be dumped.
|
||
*
|
||
* If there has been a problem the function returns a non-zero value
|
||
* that represents the error. Otherwise it returns zero. */
|
||
int
|
||
ct_dpif_dump_start(struct dpif *dpif, struct ct_dpif_dump_state **dump,
|
||
const uint16_t *zone, int *ptot_bkts)
|
||
{
|
||
int err;
|
||
|
||
err = (dpif->dpif_class->ct_dump_start
|
||
? dpif->dpif_class->ct_dump_start(dpif, dump, zone, ptot_bkts)
|
||
: EOPNOTSUPP);
|
||
|
||
if (!err) {
|
||
(*dump)->dpif = dpif;
|
||
}
|
||
|
||
return err;
|
||
}
|
||
|
||
/* Dump one connection from a tracker, and put it in 'entry'.
|
||
*
|
||
* 'dump' should have been initialized by ct_dpif_dump_start().
|
||
*
|
||
* The function returns 0, if an entry has been dumped succesfully.
|
||
* Otherwise it returns a non-zero value which can be:
|
||
* - EOF: meaning that there are no more entries to dump.
|
||
* - an error value.
|
||
* In both cases, the user should call ct_dpif_dump_done(). */
|
||
int
|
||
ct_dpif_dump_next(struct ct_dpif_dump_state *dump, struct ct_dpif_entry *entry)
|
||
{
|
||
struct dpif *dpif = dump->dpif;
|
||
|
||
return (dpif->dpif_class->ct_dump_next
|
||
? dpif->dpif_class->ct_dump_next(dpif, dump, entry)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
/* Free resources used by 'dump' */
|
||
int
|
||
ct_dpif_dump_done(struct ct_dpif_dump_state *dump)
|
||
{
|
||
struct dpif *dpif = dump->dpif;
|
||
|
||
return (dpif->dpif_class->ct_dump_done
|
||
? dpif->dpif_class->ct_dump_done(dpif, dump)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
/* Flush the entries in the connection tracker used by 'dpif'. The
|
||
* arguments have the following behavior:
|
||
*
|
||
* - If both 'zone' and 'tuple' are NULL, flush all the conntrack entries.
|
||
* - If 'zone' is not NULL, and 'tuple' is NULL, flush all the conntrack
|
||
* entries in '*zone'.
|
||
* - If 'tuple' is not NULL, flush the conntrack entry specified by 'tuple'
|
||
* in '*zone'. If 'zone' is NULL, use the default zone (zone 0). */
|
||
int
|
||
ct_dpif_flush(struct dpif *dpif, const uint16_t *zone,
|
||
const struct ct_dpif_tuple *tuple)
|
||
{
|
||
if (tuple) {
|
||
struct ds ds = DS_EMPTY_INITIALIZER;
|
||
ct_dpif_format_tuple(&ds, tuple);
|
||
VLOG_DBG("%s: ct_flush: %s in zone %d", dpif_name(dpif), ds_cstr(&ds),
|
||
zone ? *zone : 0);
|
||
ds_destroy(&ds);
|
||
} else if (zone) {
|
||
VLOG_DBG("%s: ct_flush: zone %"PRIu16, dpif_name(dpif), *zone);
|
||
} else {
|
||
VLOG_DBG("%s: ct_flush: <all>", dpif_name(dpif));
|
||
}
|
||
|
||
return (dpif->dpif_class->ct_flush
|
||
? dpif->dpif_class->ct_flush(dpif, zone, tuple)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_set_maxconns(struct dpif *dpif, uint32_t maxconns)
|
||
{
|
||
return (dpif->dpif_class->ct_set_maxconns
|
||
? dpif->dpif_class->ct_set_maxconns(dpif, maxconns)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_get_maxconns(struct dpif *dpif, uint32_t *maxconns)
|
||
{
|
||
return (dpif->dpif_class->ct_get_maxconns
|
||
? dpif->dpif_class->ct_get_maxconns(dpif, maxconns)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_get_nconns(struct dpif *dpif, uint32_t *nconns)
|
||
{
|
||
return (dpif->dpif_class->ct_get_nconns
|
||
? dpif->dpif_class->ct_get_nconns(dpif, nconns)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_set_tcp_seq_chk(struct dpif *dpif, bool enabled)
|
||
{
|
||
return (dpif->dpif_class->ct_set_tcp_seq_chk
|
||
? dpif->dpif_class->ct_set_tcp_seq_chk(dpif, enabled)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_get_tcp_seq_chk(struct dpif *dpif, bool *enabled)
|
||
{
|
||
return (dpif->dpif_class->ct_get_tcp_seq_chk
|
||
? dpif->dpif_class->ct_get_tcp_seq_chk(dpif, enabled)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_set_limits(struct dpif *dpif, const uint32_t *default_limit,
|
||
const struct ovs_list *zone_limits)
|
||
{
|
||
return (dpif->dpif_class->ct_set_limits
|
||
? dpif->dpif_class->ct_set_limits(dpif, default_limit,
|
||
zone_limits)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_get_limits(struct dpif *dpif, uint32_t *default_limit,
|
||
const struct ovs_list *zone_limits_in,
|
||
struct ovs_list *zone_limits_out)
|
||
{
|
||
return (dpif->dpif_class->ct_get_limits
|
||
? dpif->dpif_class->ct_get_limits(dpif, default_limit,
|
||
zone_limits_in,
|
||
zone_limits_out)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_del_limits(struct dpif *dpif, const struct ovs_list *zone_limits)
|
||
{
|
||
return (dpif->dpif_class->ct_del_limits
|
||
? dpif->dpif_class->ct_del_limits(dpif, zone_limits)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_ipf_set_enabled(struct dpif *dpif, bool v6, bool enable)
|
||
{
|
||
return (dpif->dpif_class->ipf_set_enabled
|
||
? dpif->dpif_class->ipf_set_enabled(dpif, v6, enable)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_ipf_set_min_frag(struct dpif *dpif, bool v6, uint32_t min_frag)
|
||
{
|
||
return (dpif->dpif_class->ipf_set_min_frag
|
||
? dpif->dpif_class->ipf_set_min_frag(dpif, v6, min_frag)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_ipf_set_max_nfrags(struct dpif *dpif, uint32_t max_frags)
|
||
{
|
||
return (dpif->dpif_class->ipf_set_max_nfrags
|
||
? dpif->dpif_class->ipf_set_max_nfrags(dpif, max_frags)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int ct_dpif_ipf_get_status(struct dpif *dpif,
|
||
struct dpif_ipf_status *dpif_ipf_status)
|
||
{
|
||
return (dpif->dpif_class->ipf_get_status
|
||
? dpif->dpif_class->ipf_get_status(dpif, dpif_ipf_status)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_ipf_dump_start(struct dpif *dpif, struct ipf_dump_ctx **dump_ctx)
|
||
{
|
||
return (dpif->dpif_class->ipf_dump_start
|
||
? dpif->dpif_class->ipf_dump_start(dpif, dump_ctx)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_ipf_dump_next(struct dpif *dpif, void *dump_ctx, char **dump)
|
||
{
|
||
return (dpif->dpif_class->ipf_dump_next
|
||
? dpif->dpif_class->ipf_dump_next(dpif, dump_ctx, dump)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_ipf_dump_done(struct dpif *dpif, void *dump_ctx)
|
||
{
|
||
return (dpif->dpif_class->ipf_dump_done
|
||
? dpif->dpif_class->ipf_dump_done(dpif, dump_ctx)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
void
|
||
ct_dpif_entry_uninit(struct ct_dpif_entry *entry)
|
||
{
|
||
if (entry) {
|
||
if (entry->helper.name) {
|
||
free(entry->helper.name);
|
||
}
|
||
}
|
||
}
|
||
|
||
void
|
||
ct_dpif_format_entry(const struct ct_dpif_entry *entry, struct ds *ds,
|
||
bool verbose, bool print_stats)
|
||
{
|
||
ct_dpif_format_ipproto(ds, entry->tuple_orig.ip_proto);
|
||
|
||
ds_put_cstr(ds, ",orig=(");
|
||
ct_dpif_format_tuple(ds, &entry->tuple_orig);
|
||
if (print_stats) {
|
||
ct_dpif_format_counters(ds, &entry->counters_orig);
|
||
}
|
||
ds_put_cstr(ds, ")");
|
||
|
||
ds_put_cstr(ds, ",reply=(");
|
||
ct_dpif_format_tuple(ds, &entry->tuple_reply);
|
||
if (print_stats) {
|
||
ct_dpif_format_counters(ds, &entry->counters_reply);
|
||
}
|
||
ds_put_cstr(ds, ")");
|
||
|
||
if (print_stats) {
|
||
ct_dpif_format_timestamp(ds, &entry->timestamp);
|
||
}
|
||
if (verbose) {
|
||
ds_put_format(ds, ",id=%"PRIu32, entry->id);
|
||
}
|
||
if (entry->zone) {
|
||
ds_put_format(ds, ",zone=%"PRIu16, entry->zone);
|
||
}
|
||
if (verbose) {
|
||
ct_dpif_format_flags(ds, ",status=", entry->status,
|
||
ct_dpif_status_flags);
|
||
}
|
||
if (print_stats) {
|
||
ds_put_format(ds, ",timeout=%"PRIu32, entry->timeout);
|
||
}
|
||
if (entry->mark) {
|
||
ds_put_format(ds, ",mark=%"PRIu32, entry->mark);
|
||
}
|
||
if (!ovs_u128_is_zero(entry->labels)) {
|
||
ovs_be128 value;
|
||
|
||
ds_put_cstr(ds, ",labels=");
|
||
value = hton128(entry->labels);
|
||
ds_put_hex(ds, &value, sizeof value);
|
||
}
|
||
ct_dpif_format_protoinfo(ds, ",protoinfo=", &entry->protoinfo, verbose);
|
||
ct_dpif_format_helper(ds, ",helper=", &entry->helper);
|
||
if (verbose && entry->tuple_parent.l3_type != 0) {
|
||
ds_put_cstr(ds, ",parent=(");
|
||
ct_dpif_format_tuple(ds, &entry->tuple_parent);
|
||
ds_put_cstr(ds, ")");
|
||
}
|
||
}
|
||
|
||
void
|
||
ct_dpif_format_ipproto(struct ds *ds, uint16_t ipproto)
|
||
{
|
||
const char *name;
|
||
|
||
name = (ipproto == IPPROTO_ICMP) ? "icmp"
|
||
: (ipproto == IPPROTO_ICMPV6) ? "icmpv6"
|
||
: (ipproto == IPPROTO_TCP) ? "tcp"
|
||
: (ipproto == IPPROTO_UDP) ? "udp"
|
||
: (ipproto == IPPROTO_SCTP) ? "sctp"
|
||
: (ipproto == IPPROTO_UDPLITE) ? "udplite"
|
||
: (ipproto == IPPROTO_DCCP) ? "dccp"
|
||
: (ipproto == IPPROTO_IGMP) ? "igmp"
|
||
: NULL;
|
||
|
||
if (name) {
|
||
ds_put_cstr(ds, name);
|
||
} else {
|
||
ds_put_format(ds, "%u", ipproto);
|
||
}
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_counters(struct ds *ds, const struct ct_dpif_counters *counters)
|
||
{
|
||
if (counters->packets || counters->bytes) {
|
||
ds_put_format(ds, ",packets=%"PRIu64",bytes=%"PRIu64,
|
||
counters->packets, counters->bytes);
|
||
}
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_timestamp(struct ds *ds,
|
||
const struct ct_dpif_timestamp *timestamp)
|
||
{
|
||
if (timestamp->start || timestamp->stop) {
|
||
ds_put_strftime_msec(ds, ",start=%Y-%m-%dT%H:%M:%S.###",
|
||
timestamp->start / UINT64_C(1000000), false);
|
||
if (timestamp->stop) {
|
||
ds_put_strftime_msec(ds, ",stop=%Y-%m-%dT%H:%M:%S.###",
|
||
timestamp->stop / UINT64_C(1000000), false);
|
||
}
|
||
}
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_tuple_icmp(struct ds *ds, const struct ct_dpif_tuple *tuple)
|
||
{
|
||
ds_put_format(ds, ",id=%u,type=%u,code=%u", ntohs(tuple->icmp_id),
|
||
tuple->icmp_type, tuple->icmp_code);
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_tuple_tp(struct ds *ds, const struct ct_dpif_tuple *tuple)
|
||
{
|
||
ds_put_format(ds, ",sport=%u,dport=%u",
|
||
ntohs(tuple->src_port), ntohs(tuple->dst_port));
|
||
}
|
||
|
||
void
|
||
ct_dpif_format_tuple(struct ds *ds, const struct ct_dpif_tuple *tuple)
|
||
{
|
||
if (tuple->l3_type == AF_INET) {
|
||
ds_put_format(ds, "src="IP_FMT",dst="IP_FMT,
|
||
IP_ARGS(tuple->src.ip), IP_ARGS(tuple->dst.ip));
|
||
} else if (tuple->l3_type == AF_INET6) {
|
||
ds_put_cstr(ds, "src=");
|
||
ipv6_format_addr(&tuple->src.in6, ds);
|
||
ds_put_cstr(ds, ",dst=");
|
||
ipv6_format_addr(&tuple->dst.in6, ds);
|
||
} else {
|
||
ds_put_format(ds, "Unsupported address family: %u. HEX:\n",
|
||
tuple->l3_type);
|
||
ds_put_hex_dump(ds, tuple, sizeof *tuple, 0, false);
|
||
return;
|
||
}
|
||
|
||
if (tuple->ip_proto == IPPROTO_ICMP
|
||
|| tuple->ip_proto == IPPROTO_ICMPV6) {
|
||
ct_dpif_format_tuple_icmp(ds, tuple);
|
||
} else {
|
||
ct_dpif_format_tuple_tp(ds, tuple);
|
||
}
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_flags(struct ds *ds, const char *title, uint32_t flags,
|
||
const struct flags *table)
|
||
{
|
||
if (title) {
|
||
ds_put_cstr(ds, title);
|
||
}
|
||
for (; table->name; table++) {
|
||
if (flags & table->flag) {
|
||
ds_put_format(ds, "%s|", table->name);
|
||
}
|
||
}
|
||
ds_chomp(ds, '|');
|
||
}
|
||
|
||
static const struct flags tcp_flags[] = {
|
||
#define CT_DPIF_TCP_FLAG(FLAG) { CT_DPIF_TCPF_##FLAG, #FLAG },
|
||
CT_DPIF_TCP_FLAGS
|
||
#undef CT_DPIF_TCP_FLAG
|
||
{ 0, NULL } /* End marker. */
|
||
};
|
||
|
||
const char *ct_dpif_tcp_state_string[] = {
|
||
#define CT_DPIF_TCP_STATE(STATE) [CT_DPIF_TCPS_##STATE] = #STATE,
|
||
CT_DPIF_TCP_STATES
|
||
#undef CT_DPIF_TCP_STATE
|
||
};
|
||
|
||
const char *ct_dpif_sctp_state_string[] = {
|
||
#define CT_DPIF_SCTP_STATE(STATE) [CT_DPIF_SCTP_STATE_##STATE] = #STATE,
|
||
CT_DPIF_SCTP_STATES
|
||
#undef CT_DPIF_SCTP_STATE
|
||
};
|
||
|
||
static void
|
||
ct_dpif_format_enum__(struct ds *ds, const char *title, unsigned int state,
|
||
const char *names[], unsigned int max)
|
||
{
|
||
if (title) {
|
||
ds_put_cstr(ds, title);
|
||
}
|
||
if (state < max) {
|
||
ds_put_cstr(ds, names[state]);
|
||
} else {
|
||
ds_put_format(ds, "[%u]", state);
|
||
}
|
||
}
|
||
|
||
#define ct_dpif_format_enum(DS, TITLE, STATE, NAMES) \
|
||
ct_dpif_format_enum__((DS), (TITLE), (STATE), (NAMES), ARRAY_SIZE(NAMES))
|
||
|
||
static uint8_t
|
||
coalesce_tcp_state(uint8_t state)
|
||
{
|
||
/* The Linux kernel connection tracker and the userspace view the
|
||
* tcp states differently in some situations. If we're formatting
|
||
* the entry without being verbose, it is worth to adjust the
|
||
* differences, to ease writing testcases. */
|
||
switch (state) {
|
||
case CT_DPIF_TCPS_FIN_WAIT_2:
|
||
return CT_DPIF_TCPS_TIME_WAIT;
|
||
case CT_DPIF_TCPS_SYN_RECV:
|
||
return CT_DPIF_TCPS_ESTABLISHED;
|
||
default:
|
||
return state;
|
||
}
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_protoinfo_tcp(struct ds *ds,
|
||
const struct ct_dpif_protoinfo *protoinfo)
|
||
{
|
||
uint8_t tcp_state;
|
||
|
||
/* We keep two separate tcp states, but we print just one. The Linux
|
||
* kernel connection tracker internally keeps only one state, so
|
||
* 'state_orig' and 'state_reply', will be the same. */
|
||
tcp_state = MAX(protoinfo->tcp.state_orig, protoinfo->tcp.state_reply);
|
||
|
||
tcp_state = coalesce_tcp_state(tcp_state);
|
||
ct_dpif_format_enum(ds, "state=", tcp_state, ct_dpif_tcp_state_string);
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_protoinfo_tcp_verbose(struct ds *ds,
|
||
const struct ct_dpif_protoinfo *protoinfo)
|
||
{
|
||
ct_dpif_format_enum(ds, "state_orig=", protoinfo->tcp.state_orig,
|
||
ct_dpif_tcp_state_string);
|
||
ct_dpif_format_enum(ds, ",state_reply=", protoinfo->tcp.state_reply,
|
||
ct_dpif_tcp_state_string);
|
||
|
||
if (protoinfo->tcp.wscale_orig || protoinfo->tcp.wscale_reply) {
|
||
ds_put_format(ds, ",wscale_orig=%u,wscale_reply=%u",
|
||
protoinfo->tcp.wscale_orig,
|
||
protoinfo->tcp.wscale_reply);
|
||
}
|
||
ct_dpif_format_flags(ds, ",flags_orig=", protoinfo->tcp.flags_orig,
|
||
tcp_flags);
|
||
ct_dpif_format_flags(ds, ",flags_reply=", protoinfo->tcp.flags_reply,
|
||
tcp_flags);
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_protoinfo_sctp(struct ds *ds,
|
||
const struct ct_dpif_protoinfo *protoinfo)
|
||
{
|
||
ct_dpif_format_enum(ds, "state=", protoinfo->sctp.state,
|
||
ct_dpif_sctp_state_string);
|
||
ds_put_format(ds, ",vtag_orig=%" PRIu32 ",vtag_reply=%" PRIu32,
|
||
protoinfo->sctp.vtag_orig, protoinfo->sctp.vtag_reply);
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_protoinfo(struct ds *ds, const char *title,
|
||
const struct ct_dpif_protoinfo *protoinfo,
|
||
bool verbose)
|
||
{
|
||
if (protoinfo->proto != 0) {
|
||
if (title) {
|
||
ds_put_format(ds, "%s(", title);
|
||
}
|
||
switch (protoinfo->proto) {
|
||
case IPPROTO_TCP:
|
||
if (verbose) {
|
||
ct_dpif_format_protoinfo_tcp_verbose(ds, protoinfo);
|
||
} else {
|
||
ct_dpif_format_protoinfo_tcp(ds, protoinfo);
|
||
}
|
||
break;
|
||
case IPPROTO_SCTP:
|
||
ct_dpif_format_protoinfo_sctp(ds, protoinfo);
|
||
break;
|
||
}
|
||
if (title) {
|
||
ds_put_cstr(ds, ")");
|
||
}
|
||
}
|
||
}
|
||
|
||
static void
|
||
ct_dpif_format_helper(struct ds *ds, const char *title,
|
||
const struct ct_dpif_helper *helper)
|
||
{
|
||
if (helper->name) {
|
||
if (title) {
|
||
ds_put_cstr(ds, title);
|
||
}
|
||
ds_put_cstr(ds, helper->name);
|
||
}
|
||
}
|
||
|
||
uint8_t
|
||
ct_dpif_coalesce_tcp_state(uint8_t state)
|
||
{
|
||
return coalesce_tcp_state(state);
|
||
}
|
||
|
||
void
|
||
ct_dpif_format_tcp_stat(struct ds * ds, int tcp_state, int conn_per_state)
|
||
{
|
||
ct_dpif_format_enum(ds, "\t [", tcp_state, ct_dpif_tcp_state_string);
|
||
ds_put_cstr(ds, "]");
|
||
ds_put_format(ds, "=%u", conn_per_state);
|
||
}
|
||
|
||
/* Parses a specification of a conntrack 5-tuple from 's' into 'tuple'.
|
||
* Returns true on success. Otherwise, returns false and puts the error
|
||
* message in 'ds'. */
|
||
bool
|
||
ct_dpif_parse_tuple(struct ct_dpif_tuple *tuple, const char *s, struct ds *ds)
|
||
{
|
||
char *pos, *key, *value, *copy;
|
||
memset(tuple, 0, sizeof *tuple);
|
||
|
||
pos = copy = xstrdup(s);
|
||
while (ofputil_parse_key_value(&pos, &key, &value)) {
|
||
if (!*value) {
|
||
ds_put_format(ds, "field %s missing value", key);
|
||
goto error;
|
||
}
|
||
|
||
if (!strcmp(key, "ct_nw_src") || !strcmp(key, "ct_nw_dst")) {
|
||
if (tuple->l3_type && tuple->l3_type != AF_INET) {
|
||
ds_put_cstr(ds, "L3 type set multiple times");
|
||
goto error;
|
||
} else {
|
||
tuple->l3_type = AF_INET;
|
||
}
|
||
if (!ip_parse(value, key[6] == 's' ? &tuple->src.ip :
|
||
&tuple->dst.ip)) {
|
||
goto error_with_msg;
|
||
}
|
||
} else if (!strcmp(key, "ct_ipv6_src") ||
|
||
!strcmp(key, "ct_ipv6_dst")) {
|
||
if (tuple->l3_type && tuple->l3_type != AF_INET6) {
|
||
ds_put_cstr(ds, "L3 type set multiple times");
|
||
goto error;
|
||
} else {
|
||
tuple->l3_type = AF_INET6;
|
||
}
|
||
if (!ipv6_parse(value, key[8] == 's' ? &tuple->src.in6 :
|
||
&tuple->dst.in6)) {
|
||
goto error_with_msg;
|
||
}
|
||
} else if (!strcmp(key, "ct_nw_proto")) {
|
||
char *err = str_to_u8(value, key, &tuple->ip_proto);
|
||
if (err) {
|
||
free(err);
|
||
goto error_with_msg;
|
||
}
|
||
} else if (!strcmp(key, "ct_tp_src") || !strcmp(key,"ct_tp_dst")) {
|
||
uint16_t port;
|
||
char *err = str_to_u16(value, key, &port);
|
||
if (err) {
|
||
free(err);
|
||
goto error_with_msg;
|
||
}
|
||
if (key[6] == 's') {
|
||
tuple->src_port = htons(port);
|
||
} else {
|
||
tuple->dst_port = htons(port);
|
||
}
|
||
} else if (!strcmp(key, "icmp_type") || !strcmp(key, "icmp_code") ||
|
||
!strcmp(key, "icmp_id") ) {
|
||
if (tuple->ip_proto != IPPROTO_ICMP &&
|
||
tuple->ip_proto != IPPROTO_ICMPV6) {
|
||
ds_put_cstr(ds, "invalid L4 fields");
|
||
goto error;
|
||
}
|
||
uint16_t icmp_id;
|
||
char *err;
|
||
if (key[5] == 't') {
|
||
err = str_to_u8(value, key, &tuple->icmp_type);
|
||
} else if (key[5] == 'c') {
|
||
err = str_to_u8(value, key, &tuple->icmp_code);
|
||
} else {
|
||
err = str_to_u16(value, key, &icmp_id);
|
||
tuple->icmp_id = htons(icmp_id);
|
||
}
|
||
if (err) {
|
||
free(err);
|
||
goto error_with_msg;
|
||
}
|
||
} else {
|
||
ds_put_format(ds, "invalid conntrack tuple field: %s", key);
|
||
goto error;
|
||
}
|
||
}
|
||
|
||
if (ipv6_is_zero(&tuple->src.in6) || ipv6_is_zero(&tuple->dst.in6) ||
|
||
!tuple->ip_proto) {
|
||
/* icmp_type, icmp_code, and icmp_id can be 0. */
|
||
if (tuple->ip_proto != IPPROTO_ICMP &&
|
||
tuple->ip_proto != IPPROTO_ICMPV6) {
|
||
if (!tuple->src_port || !tuple->dst_port) {
|
||
ds_put_cstr(ds, "at least one of the conntrack 5-tuple fields "
|
||
"is missing.");
|
||
goto error;
|
||
}
|
||
}
|
||
}
|
||
|
||
free(copy);
|
||
return true;
|
||
|
||
error_with_msg:
|
||
ds_put_format(ds, "failed to parse field %s", key);
|
||
error:
|
||
free(copy);
|
||
return false;
|
||
}
|
||
|
||
void
|
||
ct_dpif_push_zone_limit(struct ovs_list *zone_limits, uint16_t zone,
|
||
uint32_t limit, uint32_t count)
|
||
{
|
||
struct ct_dpif_zone_limit *zone_limit = xmalloc(sizeof *zone_limit);
|
||
zone_limit->zone = zone;
|
||
zone_limit->limit = limit;
|
||
zone_limit->count = count;
|
||
ovs_list_push_back(zone_limits, &zone_limit->node);
|
||
}
|
||
|
||
void
|
||
ct_dpif_free_zone_limits(struct ovs_list *zone_limits)
|
||
{
|
||
while (!ovs_list_is_empty(zone_limits)) {
|
||
struct ovs_list *entry = ovs_list_pop_front(zone_limits);
|
||
struct ct_dpif_zone_limit *cdzl;
|
||
cdzl = CONTAINER_OF(entry, struct ct_dpif_zone_limit, node);
|
||
free(cdzl);
|
||
}
|
||
}
|
||
|
||
/* Parses a specification of a conntrack zone limit from 's' into '*pzone'
|
||
* and '*plimit'. Returns true on success. Otherwise, returns false and
|
||
* and puts the error message in 'ds'. */
|
||
bool
|
||
ct_dpif_parse_zone_limit_tuple(const char *s, uint16_t *pzone,
|
||
uint32_t *plimit, struct ds *ds)
|
||
{
|
||
char *pos, *key, *value, *copy, *err;
|
||
bool parsed_limit = false, parsed_zone = false;
|
||
|
||
pos = copy = xstrdup(s);
|
||
while (ofputil_parse_key_value(&pos, &key, &value)) {
|
||
if (!*value) {
|
||
ds_put_format(ds, "field %s missing value", key);
|
||
goto error;
|
||
}
|
||
|
||
if (!strcmp(key, "zone")) {
|
||
err = str_to_u16(value, key, pzone);
|
||
if (err) {
|
||
free(err);
|
||
goto error_with_msg;
|
||
}
|
||
parsed_zone = true;
|
||
} else if (!strcmp(key, "limit")) {
|
||
err = str_to_u32(value, plimit);
|
||
if (err) {
|
||
free(err);
|
||
goto error_with_msg;
|
||
}
|
||
parsed_limit = true;
|
||
} else {
|
||
ds_put_format(ds, "invalid zone limit field: %s", key);
|
||
goto error;
|
||
}
|
||
}
|
||
|
||
if (!parsed_zone || !parsed_limit) {
|
||
ds_put_format(ds, "failed to parse zone limit");
|
||
goto error;
|
||
}
|
||
|
||
free(copy);
|
||
return true;
|
||
|
||
error_with_msg:
|
||
ds_put_format(ds, "failed to parse field %s", key);
|
||
error:
|
||
free(copy);
|
||
return false;
|
||
}
|
||
|
||
void
|
||
ct_dpif_format_zone_limits(uint32_t default_limit,
|
||
const struct ovs_list *zone_limits, struct ds *ds)
|
||
{
|
||
struct ct_dpif_zone_limit *zone_limit;
|
||
|
||
ds_put_format(ds, "default limit=%"PRIu32, default_limit);
|
||
|
||
LIST_FOR_EACH (zone_limit, node, zone_limits) {
|
||
ds_put_format(ds, "\nzone=%"PRIu16, zone_limit->zone);
|
||
ds_put_format(ds, ",limit=%"PRIu32, zone_limit->limit);
|
||
ds_put_format(ds, ",count=%"PRIu32, zone_limit->count);
|
||
}
|
||
}
|
||
|
||
static const char *const ct_dpif_tp_attr_string[] = {
|
||
#define CT_DPIF_TP_TCP_ATTR(ATTR) \
|
||
[CT_DPIF_TP_ATTR_TCP_##ATTR] = "TCP_"#ATTR,
|
||
CT_DPIF_TP_TCP_ATTRS
|
||
#undef CT_DPIF_TP_TCP_ATTR
|
||
#define CT_DPIF_TP_UDP_ATTR(ATTR) \
|
||
[CT_DPIF_TP_ATTR_UDP_##ATTR] = "UDP_"#ATTR,
|
||
CT_DPIF_TP_UDP_ATTRS
|
||
#undef CT_DPIF_TP_UDP_ATTR
|
||
#define CT_DPIF_TP_ICMP_ATTR(ATTR) \
|
||
[CT_DPIF_TP_ATTR_ICMP_##ATTR] = "ICMP_"#ATTR,
|
||
CT_DPIF_TP_ICMP_ATTRS
|
||
#undef CT_DPIF_TP_ICMP_ATTR
|
||
};
|
||
|
||
static bool
|
||
ct_dpif_set_timeout_policy_attr(struct ct_dpif_timeout_policy *tp,
|
||
uint32_t attr, uint32_t value)
|
||
{
|
||
if (tp->present & (1 << attr) && tp->attrs[attr] == value) {
|
||
return false;
|
||
}
|
||
tp->attrs[attr] = value;
|
||
tp->present |= 1 << attr;
|
||
return true;
|
||
}
|
||
|
||
/* Sets a timeout value identified by '*name' to 'value'.
|
||
* Returns true if the attribute is changed */
|
||
bool
|
||
ct_dpif_set_timeout_policy_attr_by_name(struct ct_dpif_timeout_policy *tp,
|
||
const char *name, uint32_t value)
|
||
{
|
||
for (uint32_t i = 0; i < CT_DPIF_TP_ATTR_MAX; ++i) {
|
||
if (!strcasecmp(name, ct_dpif_tp_attr_string[i])) {
|
||
return ct_dpif_set_timeout_policy_attr(tp, i, value);
|
||
}
|
||
}
|
||
return false;
|
||
}
|
||
|
||
bool
|
||
ct_dpif_timeout_policy_support_ipproto(uint8_t ipproto)
|
||
{
|
||
if (ipproto == IPPROTO_TCP || ipproto == IPPROTO_UDP ||
|
||
ipproto == IPPROTO_ICMP || ipproto == IPPROTO_ICMPV6) {
|
||
return true;
|
||
}
|
||
return false;
|
||
}
|
||
|
||
int
|
||
ct_dpif_set_timeout_policy(struct dpif *dpif,
|
||
const struct ct_dpif_timeout_policy *tp)
|
||
{
|
||
return (dpif->dpif_class->ct_set_timeout_policy
|
||
? dpif->dpif_class->ct_set_timeout_policy(dpif, tp)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_del_timeout_policy(struct dpif *dpif, uint32_t tp_id)
|
||
{
|
||
return (dpif->dpif_class->ct_del_timeout_policy
|
||
? dpif->dpif_class->ct_del_timeout_policy(dpif, tp_id)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_get_timeout_policy(struct dpif *dpif, uint32_t tp_id,
|
||
struct ct_dpif_timeout_policy *tp)
|
||
{
|
||
return (dpif->dpif_class->ct_get_timeout_policy
|
||
? dpif->dpif_class->ct_get_timeout_policy(
|
||
dpif, tp_id, tp) : EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_timeout_policy_dump_start(struct dpif *dpif, void **statep)
|
||
{
|
||
return (dpif->dpif_class->ct_timeout_policy_dump_start
|
||
? dpif->dpif_class->ct_timeout_policy_dump_start(dpif, statep)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_timeout_policy_dump_next(struct dpif *dpif, void *state,
|
||
struct ct_dpif_timeout_policy *tp)
|
||
{
|
||
return (dpif->dpif_class->ct_timeout_policy_dump_next
|
||
? dpif->dpif_class->ct_timeout_policy_dump_next(dpif, state, tp)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_timeout_policy_dump_done(struct dpif *dpif, void *state)
|
||
{
|
||
return (dpif->dpif_class->ct_timeout_policy_dump_done
|
||
? dpif->dpif_class->ct_timeout_policy_dump_done(dpif, state)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_get_timeout_policy_name(struct dpif *dpif, uint32_t tp_id,
|
||
uint16_t dl_type, uint8_t nw_proto,
|
||
char **tp_name, bool *is_generic)
|
||
{
|
||
return (dpif->dpif_class->ct_get_timeout_policy_name
|
||
? dpif->dpif_class->ct_get_timeout_policy_name(
|
||
dpif, tp_id, dl_type, nw_proto, tp_name, is_generic)
|
||
: EOPNOTSUPP);
|
||
}
|
||
|
||
int
|
||
ct_dpif_get_features(struct dpif *dpif, enum ct_features *features)
|
||
{
|
||
return (dpif->dpif_class->ct_get_features
|
||
? dpif->dpif_class->ct_get_features(dpif, features)
|
||
: EOPNOTSUPP);
|
||
}
|