summaryrefslogtreecommitdiff
path: root/ofproto
diff options
context:
space:
mode:
authorDumitru Ceara <dceara@redhat.com>2020-01-10 10:34:43 +0100
committerBen Pfaff <blp@ovn.org>2020-06-16 15:07:31 -0700
commitd072d2de011b5874e16a0fe81953c2448658746a (patch)
treed2c16ac540c49e40fee5df443b0fa6aa81d3d587 /ofproto
parent29b1dd934f8d0c4cf3d58abc2c10aa9d0ae68277 (diff)
downloadopenvswitch-d072d2de011b5874e16a0fe81953c2448658746a.tar.gz
ofproto-dpif-trace: Improve NAT tracing.
When ofproto/trace detects a recirc action it resumes execution at the specified next table. However, if the ct action performs SNAT/DNAT, e.g., ct(commit,nat(src=1.1.1.1:4000),table=42), the src/dst IPs and ports in the oftrace_recirc_node->flow field are not updated. This leads to misleading outputs from ofproto/trace as real packets would actually first get NATed and might match different flows when recirculated. Assume the first IP/port from the NAT src/dst action will be used by conntrack for the translation and update the oftrace_recirc_node->flow accordingly. This is not entirely correct as conntrack might choose a different IP/port but the result is more realistic than before. This fix covers new connections. However, for reply traffic that executes actions of the form ct(nat, table=42) we still don't update the flow as we don't have any information about conntrack state when tracing. Also move the oftrace_recirc_node processing out of ofproto_trace() and to its own function, ofproto_trace_recirc_node() for better readability/ Signed-off-by: Dumitru Ceara <dceara@redhat.com> Signed-off-by: Ben Pfaff <blp@ovn.org>
Diffstat (limited to 'ofproto')
-rw-r--r--ofproto/ofproto-dpif-trace.c114
-rw-r--r--ofproto/ofproto-dpif-trace.h2
-rw-r--r--ofproto/ofproto-dpif-xlate.c6
3 files changed, 95 insertions, 27 deletions
diff --git a/ofproto/ofproto-dpif-trace.c b/ofproto/ofproto-dpif-trace.c
index 8ae8a221a..78a54c715 100644
--- a/ofproto/ofproto-dpif-trace.c
+++ b/ofproto/ofproto-dpif-trace.c
@@ -86,6 +86,7 @@ oftrace_node_destroy(struct oftrace_node *node)
bool
oftrace_add_recirc_node(struct ovs_list *recirc_queue,
enum oftrace_recirc_type type, const struct flow *flow,
+ const struct ofpact_nat *ofn,
const struct dp_packet *packet, uint32_t recirc_id,
const uint16_t zone)
{
@@ -101,6 +102,7 @@ oftrace_add_recirc_node(struct ovs_list *recirc_queue,
node->flow = *flow;
node->flow.recirc_id = recirc_id;
node->flow.ct_zone = zone;
+ node->nat_act = ofn;
node->packet = packet ? dp_packet_clone(packet) : NULL;
return true;
@@ -179,6 +181,25 @@ oftrace_node_print_details(struct ds *output,
}
}
+static void
+oftrace_print_ip_flow(const struct flow *flow, int af, struct ds *output)
+{
+ if (af == AF_INET) {
+ ds_put_format(output, "nw_src="IP_FMT",tp_src=%"PRIu16","
+ "nw_dst="IP_FMT",tp_dst=%"PRIu16,
+ IP_ARGS(flow->nw_src), ntohs(flow->tp_src),
+ IP_ARGS(flow->nw_dst), ntohs(flow->tp_dst));
+ } else if (af == AF_INET6) {
+ ds_put_cstr(output, "ipv6_src=");
+ ipv6_format_addr_bracket(&flow->ipv6_src, output, true);
+ ds_put_format(output, ",tp_src=%"PRIu16, ntohs(flow->tp_src));
+ ds_put_cstr(output, ",ipv6_dst=");
+ ipv6_format_addr_bracket(&flow->ipv6_dst, output, true);
+ ds_put_format(output, ",tp_dst=%"PRIu16, ntohs(flow->tp_dst));
+ }
+ ds_put_char(output, '\n');
+}
+
/* Parses the 'argc' elements of 'argv', ignoring argv[0]. The following
* forms are supported:
*
@@ -638,6 +659,73 @@ execute_actions_except_outputs(struct dpif *dpif,
}
static void
+ofproto_trace_recirc_node(struct oftrace_recirc_node *node,
+ struct ovs_list *next_ct_states,
+ struct ds *output)
+{
+ ds_put_cstr(output, "\n\n");
+ ds_put_char_multiple(output, '=', 79);
+ ds_put_format(output, "\nrecirc(%#"PRIx32")", node->recirc_id);
+
+ if (next_ct_states && node->type == OFT_RECIRC_CONNTRACK) {
+ uint32_t ct_state;
+ if (ovs_list_is_empty(next_ct_states)) {
+ ct_state = CS_TRACKED | CS_NEW;
+ ds_put_cstr(output, " - resume conntrack with default "
+ "ct_state=trk|new (use --ct-next to customize)");
+ } else {
+ ct_state = oftrace_pop_ct_state(next_ct_states);
+ struct ds s = DS_EMPTY_INITIALIZER;
+ format_flags(&s, ct_state_to_string, ct_state, '|');
+ ds_put_format(output, " - resume conntrack with ct_state=%s",
+ ds_cstr(&s));
+ ds_destroy(&s);
+ }
+ node->flow.ct_state = ct_state;
+ }
+ ds_put_char(output, '\n');
+
+ /* If there's any snat/dnat information assume we always translate to
+ * the first IP/port to make sure we don't match on incorrect flows later
+ * on.
+ */
+ if (node->nat_act) {
+ const struct ofpact_nat *ofn = node->nat_act;
+
+ ds_put_cstr(output, "Replacing src/dst IP/ports to simulate NAT:\n");
+ ds_put_cstr(output, " Initial flow: ");
+ oftrace_print_ip_flow(&node->flow, ofn->range_af, output);
+
+ if (ofn->flags & NX_NAT_F_SRC) {
+ if (ofn->range_af == AF_INET) {
+ node->flow.nw_src = ofn->range.addr.ipv4.min;
+ } else if (ofn->range_af == AF_INET6) {
+ node->flow.ipv6_src = ofn->range.addr.ipv6.min;
+ }
+
+ if (ofn->range_af != AF_UNSPEC && ofn->range.proto.min) {
+ node->flow.tp_src = htons(ofn->range.proto.min);
+ }
+ }
+ if (ofn->flags & NX_NAT_F_DST) {
+ if (ofn->range_af == AF_INET) {
+ node->flow.nw_dst = ofn->range.addr.ipv4.min;
+ } else if (ofn->range_af == AF_INET6) {
+ node->flow.ipv6_dst = ofn->range.addr.ipv6.min;
+ }
+
+ if (ofn->range_af != AF_UNSPEC && ofn->range.proto.min) {
+ node->flow.tp_dst = htons(ofn->range.proto.min);
+ }
+ }
+ ds_put_cstr(output, " Modified flow: ");
+ oftrace_print_ip_flow(&node->flow, ofn->range_af, output);
+ }
+ ds_put_char_multiple(output, '=', 79);
+ ds_put_cstr(output, "\n\n");
+}
+
+static void
ofproto_trace__(struct ofproto_dpif *ofproto, const struct flow *flow,
const struct dp_packet *packet, struct ovs_list *recirc_queue,
const struct ofpact ofpacts[], size_t ofpacts_len,
@@ -729,31 +817,7 @@ ofproto_trace(struct ofproto_dpif *ofproto, const struct flow *flow,
struct oftrace_recirc_node *recirc_node;
LIST_FOR_EACH_POP (recirc_node, node, &recirc_queue) {
- ds_put_cstr(output, "\n\n");
- ds_put_char_multiple(output, '=', 79);
- ds_put_format(output, "\nrecirc(%#"PRIx32")",
- recirc_node->recirc_id);
-
- if (next_ct_states && recirc_node->type == OFT_RECIRC_CONNTRACK) {
- uint32_t ct_state;
- if (ovs_list_is_empty(next_ct_states)) {
- ct_state = CS_TRACKED | CS_NEW;
- ds_put_cstr(output, " - resume conntrack with default "
- "ct_state=trk|new (use --ct-next to customize)");
- } else {
- ct_state = oftrace_pop_ct_state(next_ct_states);
- struct ds s = DS_EMPTY_INITIALIZER;
- format_flags(&s, ct_state_to_string, ct_state, '|');
- ds_put_format(output, " - resume conntrack with ct_state=%s",
- ds_cstr(&s));
- ds_destroy(&s);
- }
- recirc_node->flow.ct_state = ct_state;
- }
- ds_put_char(output, '\n');
- ds_put_char_multiple(output, '=', 79);
- ds_put_cstr(output, "\n\n");
-
+ ofproto_trace_recirc_node(recirc_node, next_ct_states, output);
ofproto_trace__(ofproto, &recirc_node->flow, recirc_node->packet,
&recirc_queue, ofpacts, ofpacts_len, output);
oftrace_recirc_node_destroy(recirc_node);
diff --git a/ofproto/ofproto-dpif-trace.h b/ofproto/ofproto-dpif-trace.h
index 63dbb50ba..4b04f1756 100644
--- a/ofproto/ofproto-dpif-trace.h
+++ b/ofproto/ofproto-dpif-trace.h
@@ -73,6 +73,7 @@ struct oftrace_recirc_node {
uint32_t recirc_id;
struct flow flow;
struct dp_packet *packet;
+ const struct ofpact_nat *nat_act;
};
/* A node within a next_ct_states list. */
@@ -91,6 +92,7 @@ struct oftrace_node *oftrace_report(struct ovs_list *, enum oftrace_node_type,
const char *text);
bool oftrace_add_recirc_node(struct ovs_list *recirc_queue,
enum oftrace_recirc_type, const struct flow *,
+ const struct ofpact_nat *,
const struct dp_packet *, uint32_t recirc_id,
const uint16_t zone);
diff --git a/ofproto/ofproto-dpif-xlate.c b/ofproto/ofproto-dpif-xlate.c
index 80fba84cb..e64c6d477 100644
--- a/ofproto/ofproto-dpif-xlate.c
+++ b/ofproto/ofproto-dpif-xlate.c
@@ -4999,7 +4999,8 @@ compose_recirculate_and_fork(struct xlate_ctx *ctx, uint8_t table,
if (OVS_UNLIKELY(ctx->xin->trace) && recirc_id) {
if (oftrace_add_recirc_node(ctx->xin->recirc_queue,
OFT_RECIRC_CONNTRACK, &ctx->xin->flow,
- ctx->xin->packet, recirc_id, zone)) {
+ ctx->ct_nat_action, ctx->xin->packet,
+ recirc_id, zone)) {
xlate_report(ctx, OFT_DETAIL, "A clone of the packet is forked to "
"recirculate. The forked pipeline will be resumed at "
"table %u.", table);
@@ -6205,7 +6206,6 @@ compose_conntrack_action(struct xlate_ctx *ctx, struct ofpact_conntrack *ofc,
put_ct_label(&ctx->xin->flow, ctx->odp_actions, ctx->wc);
put_ct_helper(ctx, ctx->odp_actions, ofc);
put_ct_nat(ctx);
- ctx->ct_nat_action = NULL;
nl_msg_end_nested(ctx->odp_actions, ct_offset);
ctx->wc->masks.ct_mark = old_ct_mark_mask;
@@ -6216,6 +6216,8 @@ compose_conntrack_action(struct xlate_ctx *ctx, struct ofpact_conntrack *ofc,
compose_recirculate_and_fork(ctx, ofc->recirc_table, zone);
}
+ ctx->ct_nat_action = NULL;
+
/* The ct_* fields are only available in the scope of the 'recirc_table'
* call chain. */
flow_clear_conntrack(&ctx->xin->flow);