On Wed, Nov 1, 2023 at 5:42 PM Ilya Maximets <i.maxim...@ovn.org> wrote:
> On 10/24/23 19:04, Ihar Hrachyshka wrote: > > With --hexified, it will produce a bare hexified payload with no spaces > > or offset indicators inserted, which is useful in tests to produce > > frames to pass to e.g. `receive`. > > Hmm. I though we agreed on just allowing ovs-pcap to read from stdin, > so something like this is possible: > > ovs-ofctl compose-packet --pcap ${flow_expected} | ovs-pcap - > > instead of adding an extra argument to the ovs-ofctl. Or is there a > reason to not do that? > > The primary reason is that it's unclear to me why we have to 1) generate a pcap; 2) initialize a python interpreter* to parse it back into binary ... for something that we could do in-place since we already have the packet and already "print" it (albeit in "hex_dump" format that is hard to machine-read). * - which takes a second of cpu time at times. Let me know what you think though. > > > > With --bad-csum, it will produce a frame that has an invalid IP checksum > > (applicable to IPv4 only because IPv6 doesn't have checksums.) > > This is fine. > > > > > The command is now more useful in tests, where we may need to produce > > hex frame payloads to compare observed frames against. > > > > As an example of the tool use, a single test case is converted to it. > > The test uses both normal --hexified and --bad-csum behaviors of the > > command, confirming they work as advertised. > > > > Signed-off-by: Ihar Hrachyshka <ihrac...@redhat.com> > > --- > > v1: - initial version. > > v2: - convert from appctl to ovstest. > > - add --bad-csum support. > > - drop separate test case and man for the tool. > > v3: - fix build warnings on restricted ovs_be16 ++. > > v4: - migrate to compose-packet. > > --- > > lib/flow.c | 16 ++++++++++-- > > lib/flow.h | 2 +- > > lib/netdev-dummy.c | 4 +-- > > ofproto/ofproto-dpif-trace.c | 2 +- > > ofproto/ofproto-dpif.c | 4 +-- > > tests/dpif-netdev.at | 45 ++++++++++++++++------------------ > > utilities/ovs-ofctl.c | 47 ++++++++++++++++++++++++++++++------ > > 7 files changed, 80 insertions(+), 40 deletions(-) > > > > diff --git a/lib/flow.c b/lib/flow.c > > index fe226cf0f..cd7832710 100644 > > --- a/lib/flow.c > > +++ b/lib/flow.c > > @@ -3306,6 +3306,8 @@ packet_expand(struct dp_packet *p, const struct > flow *flow, size_t size) > > * (This is useful only for testing, obviously, and the packet isn't > really > > * valid. Lots of fields are just zeroed.) > > * > > + * If 'bad_csum' is true, the final IP checksum is invalid. > > + * > > * For packets whose protocols can encapsulate arbitrary L7 payloads, > 'l7' and > > * 'l7_len' determine that payload: > > * > > @@ -3318,7 +3320,7 @@ packet_expand(struct dp_packet *p, const struct > flow *flow, size_t size) > > * from 'l7'. */ > > void > > flow_compose(struct dp_packet *p, const struct flow *flow, > > - const void *l7, size_t l7_len) > > + const void *l7, size_t l7_len, bool bad_csum) > > { > > /* Add code to this function (or its callees) for emitting new > fields or > > * protocols. (This isn't essential, so it can be skipped for > initial > > @@ -3370,7 +3372,17 @@ flow_compose(struct dp_packet *p, const struct > flow *flow, > > /* Checksum has already been zeroed by put_zeros call. */ > > ip->ip_csum = csum(ip, sizeof *ip); > > > > - dp_packet_ol_set_ip_csum_good(p); > > + if (bad_csum) { > > + /* Internet checksum is a sum complement to zero, so any > other > > + * value will result in an invalid checksum. Here, we flip > one > > + * bit. > > + */ > > Nit: I'd suggest to either put both the '/*' and '*/' on the lines with > a text, or put both on their own empty lines. > > > + ip->ip_csum ^= (OVS_FORCE ovs_be16) 0x1; > > + dp_packet_ip_checksum_bad(p); > > + } else { > > + dp_packet_ol_set_ip_csum_good(p); > > + } > > + > > pseudo_hdr_csum = packet_csum_pseudoheader(ip); > > flow_compose_l4_csum(p, flow, pseudo_hdr_csum); > > } else if (flow->dl_type == htons(ETH_TYPE_IPV6)) { > > diff --git a/lib/flow.h b/lib/flow.h > > index a9d026e1c..75a9be3c1 100644 > > --- a/lib/flow.h > > +++ b/lib/flow.h > > @@ -127,7 +127,7 @@ void flow_set_mpls_bos(struct flow *, int idx, > uint8_t stack); > > void flow_set_mpls_lse(struct flow *, int idx, ovs_be32 lse); > > > > void flow_compose(struct dp_packet *, const struct flow *, > > - const void *l7, size_t l7_len); > > + const void *l7, size_t l7_len, bool bad_csum); > > void packet_expand(struct dp_packet *, const struct flow *, size_t > size); > > > > bool parse_ipv6_ext_hdrs(const void **datap, size_t *sizep, uint8_t > *nw_proto, > > diff --git a/lib/netdev-dummy.c b/lib/netdev-dummy.c > > index 1a54add87..9ead449e1 100644 > > --- a/lib/netdev-dummy.c > > +++ b/lib/netdev-dummy.c > > @@ -1758,7 +1758,7 @@ eth_from_flow_str(const char *s, size_t > packet_size, > > > > packet = dp_packet_new(0); > > if (packet_size) { > > - flow_compose(packet, flow, NULL, 0); > > + flow_compose(packet, flow, NULL, 0, false); > > if (dp_packet_size(packet) < packet_size) { > > packet_expand(packet, flow, packet_size); > > } else if (dp_packet_size(packet) > packet_size){ > > @@ -1766,7 +1766,7 @@ eth_from_flow_str(const char *s, size_t > packet_size, > > packet = NULL; > > } > > } else { > > - flow_compose(packet, flow, NULL, 64); > > + flow_compose(packet, flow, NULL, 64, false); > > } > > > > ofpbuf_uninit(&odp_key); > > diff --git a/ofproto/ofproto-dpif-trace.c b/ofproto/ofproto-dpif-trace.c > > index 527e2f17e..b86e7fe07 100644 > > --- a/ofproto/ofproto-dpif-trace.c > > +++ b/ofproto/ofproto-dpif-trace.c > > @@ -440,7 +440,7 @@ parse_flow_and_packet(int argc, const char *argv[], > > if (generate_packet) { > > /* Generate a packet, as requested. */ > > packet = dp_packet_new(0); > > - flow_compose(packet, flow, l7, l7_len); > > + flow_compose(packet, flow, l7, l7_len, false); > > } else if (packet) { > > /* Use the metadata from the flow and the packet argument to > > * reconstruct the flow. */ > > diff --git a/ofproto/ofproto-dpif.c b/ofproto/ofproto-dpif.c > > index ba5706f6a..9e8faf829 100644 > > --- a/ofproto/ofproto-dpif.c > > +++ b/ofproto/ofproto-dpif.c > > @@ -1255,7 +1255,7 @@ check_ct_eventmask(struct dpif_backer *backer) > > > > /* Compose a dummy UDP packet. */ > > dp_packet_init(&packet, 0); > > - flow_compose(&packet, &flow, NULL, 64); > > + flow_compose(&packet, &flow, NULL, 64, false); > > > > /* Execute the actions. On older datapaths this fails with EINVAL, > on > > * newer datapaths it succeeds. */ > > @@ -1348,7 +1348,7 @@ check_ct_timeout_policy(struct dpif_backer *backer) > > > > /* Compose a dummy UDP packet. */ > > dp_packet_init(&packet, 0); > > - flow_compose(&packet, &flow, NULL, 64); > > + flow_compose(&packet, &flow, NULL, 64, false); > > > > /* Execute the actions. On older datapaths this fails with EINVAL, > on > > * newer datapaths it succeeds. */ > > diff --git a/tests/dpif-netdev.at b/tests/dpif-netdev.at > > index 85119fb81..2551f3366 100644 > > --- a/tests/dpif-netdev.at > > +++ b/tests/dpif-netdev.at > > @@ -746,19 +746,25 @@ OVS_VSWITCHD_START( > > # Modify the ip_dst addr to force changing the IP csum. > > AT_CHECK([ovs-ofctl add-flow br1 > in_port=p1,actions=mod_nw_dst:192.168.1.1,output:p2]) > > > > +flow_s="\ > > +eth_src=8a:bf:7e:2f:05:84,eth_dst=0a:8f:39:4f:e0:73,dl_type=0x0800,\ > > > +nw_src=192.168.123.2,nw_dst=192.168.123.1,nw_proto=6,nw_ttl=64,nw_frag=no,\ > > +tp_src=54392,tp_dst=5201,tcp_flags=ack" > > OpenFlow parser allows extra spaces, so there is no need to start these > lines right from the beginning of the line. Some small indent may be > useful. > > > + > > +good_frame=$(ovs-ofctl compose-packet --hexified ${flow_s}) > > + > > # Check if no offload remains ok. > > AT_CHECK([ovs-vsctl set Interface p2 options:tx_pcap=p2.pcap]) > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum=false]) > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum_set_good=false]) > > -AT_CHECK([ovs-appctl netdev-dummy/receive p1 \ > > > -0a8f394fe0738abf7e2f058408004500003433e0400040068f8fc0a87b02c0a87b01d4781451a962ad5417ed297b801000e547fd00000101080a2524d2345c7fe1c4 > > -]) > > +AT_CHECK([ovs-appctl netdev-dummy/receive p1 ${good_frame}]) > > > > # Checksum should change to 0x990 with ip_dst changed to 192.168.1.1 > > # by the datapath while processing the packet. > > +flow_expected=$(echo ${flow_s} | sed 's/192.168.123.1/192.168.1.1/g') > > +good_expected=$(ovs-ofctl compose-packet --hexified ${flow_expected}) > > AT_CHECK([ovs-pcap p2.pcap > p2.pcap.txt 2>&1]) > > -AT_CHECK([tail -n 1 p2.pcap.txt], [0], [dnl > > > -0a8f394fe0738abf7e2f058408004500003433e0400040060990c0a87b02c0a80101d4781451a962ad5417ed297b801000e5c1fd00000101080a2524d2345c7fe1c4 > > +AT_CHECK_UNQUOTED([tail -n 1 p2.pcap.txt], [0], [${good_expected} > > ]) > > > > # Check if packets entering the datapath with csum offloading > > @@ -766,12 +772,9 @@ AT_CHECK([tail -n 1 p2.pcap.txt], [0], [dnl > > # in the datapath and not by the netdev. > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum=false]) > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum_set_good=true]) > > -AT_CHECK([ovs-appctl netdev-dummy/receive p1 \ > > > -0a8f394fe0738abf7e2f058408004500003433e0400040068f8fc0a87b02c0a87b01d4781451a962ad5417ed297b801000e547fd00000101080a2524d2345c7fe1c4 > > -]) > > +AT_CHECK([ovs-appctl netdev-dummy/receive p1 ${good_frame}]) > > AT_CHECK([ovs-pcap p2.pcap > p2.pcap.txt 2>&1]) > > -AT_CHECK([tail -n 1 p2.pcap.txt], [0], [dnl > > > -0a8f394fe0738abf7e2f058408004500003433e0400040060990c0a87b02c0a80101d4781451a962ad5417ed297b801000e5c1fd00000101080a2524d2345c7fe1c4 > > +AT_CHECK_UNQUOTED([tail -n 1 p2.pcap.txt], [0], [${good_expected} > > ]) > > > > # Check if packets entering the datapath with csum offloading > > @@ -779,36 +782,30 @@ AT_CHECK([tail -n 1 p2.pcap.txt], [0], [dnl > > # by the datapath. > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum=true]) > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum_set_good=true]) > > -AT_CHECK([ovs-appctl netdev-dummy/receive p1 \ > > > -0a8f394fe0738abf7e2f058408004500003433e0400040068f8fc0a87b02c0a87b01d4781451a962ad5417ed297b801000e547fd00000101080a2524d2345c7fe1c4 > > +AT_CHECK([ovs-appctl netdev-dummy/receive p1 ${good_frame} > > ]) > > AT_CHECK([ovs-pcap p2.pcap > p2.pcap.txt 2>&1]) > > -AT_CHECK([tail -n 1 p2.pcap.txt], [0], [dnl > > > -0a8f394fe0738abf7e2f058408004500003433e0400040060990c0a87b02c0a80101d4781451a962ad5417ed297b801000e5c1fd00000101080a2524d2345c7fe1c4 > > +AT_CHECK_UNQUOTED([tail -n 1 p2.pcap.txt], [0], [${good_expected} > > ]) > > > > # Push a packet with bad csum and offloading disabled to check > > # if the datapath updates the csum, but does not fix the issue. > > +bad_frame=$(ovs-ofctl compose-packet --hexified --bad-csum ${flow_s}) > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum=false]) > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum_set_good=false]) > > -AT_CHECK([ovs-appctl netdev-dummy/receive p1 \ > > > -0a8f394fe0738abf7e2f058408004500003433e0400040068f03c0a87b02c0a87b01d4781451a962ad5417ed297b801000e547fd00000101080a2524d2345c7fe1c4 > > -]) > > +AT_CHECK([ovs-appctl netdev-dummy/receive p1 ${bad_frame}]) > > AT_CHECK([ovs-pcap p2.pcap > p2.pcap.txt 2>&1]) > > -AT_CHECK([tail -n 1 p2.pcap.txt], [0], [dnl > > > -0a8f394fe0738abf7e2f058408004500003433e0400040060904c0a87b02c0a80101d4781451a962ad5417ed297b801000e5c1fd00000101080a2524d2345c7fe1c4 > > +bad_expected=$(ovs-ofctl compose-packet --hexified --bad-csum > ${flow_expected}) > > +AT_CHECK_UNQUOTED([tail -n 1 p2.pcap.txt], [0], [${bad_expected} > > ]) > > > > # Push a packet with bad csum and offloading enabled to check > > # if the driver updates and fixes the csum. > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum=true]) > > AT_CHECK([ovs-vsctl set Interface p1 options:ol_ip_csum_set_good=true]) > > -AT_CHECK([ovs-appctl netdev-dummy/receive p1 \ > > > -0a8f394fe0738abf7e2f058408004500003433e0400040068f03c0a87b02c0a87b01d4781451a962ad5417ed297b801000e547fd00000101080a2524d2345c7fe1c4 > > -]) > > +AT_CHECK([ovs-appctl netdev-dummy/receive p1 ${bad_frame}]) > > AT_CHECK([ovs-pcap p2.pcap > p2.pcap.txt 2>&1]) > > -AT_CHECK([tail -n 1 p2.pcap.txt], [0], [dnl > > > -0a8f394fe0738abf7e2f058408004500003433e0400040060990c0a87b02c0a80101d4781451a962ad5417ed297b801000e5c1fd00000101080a2524d2345c7fe1c4 > > +AT_CHECK_UNQUOTED([tail -n 1 p2.pcap.txt], [0], [${good_expected} > > ]) > > OVS_VSWITCHD_STOP > > AT_CLEANUP > > diff --git a/utilities/ovs-ofctl.c b/utilities/ovs-ofctl.c > > index 24d0941cf..1292beaff 100644 > > --- a/utilities/ovs-ofctl.c > > +++ b/utilities/ovs-ofctl.c > > @@ -154,6 +154,12 @@ static int show_stats = 1; > > /* --pcap: Makes "compose-packet" print a pcap on stdout. */ > > static int print_pcap = 0; > > > > +/* --hexified: Makes "compose-packet" print a bare hexified payload. */ > > +static int print_hexified = 0; > > + > > +/* -bad-csum: Makes "compose-packet" generate an invalid checksum. */ > > +static int bad_csum = 0; > > + > > /* --raw: Makes "ofp-print" read binary data from stdin. */ > > static int raw = 0; > > > > @@ -243,6 +249,8 @@ parse_options(int argc, char *argv[]) > > {"color", optional_argument, NULL, OPT_COLOR}, > > {"may-create", no_argument, NULL, OPT_MAY_CREATE}, > > {"pcap", no_argument, &print_pcap, 1}, > > + {"hexified", no_argument, &print_hexified, 1}, > > + {"bad-csum", no_argument, &bad_csum, 1}, > > {"raw", no_argument, &raw, 1}, > > {"read-only", no_argument, NULL, OPT_READ_ONLY}, > > DAEMON_LONG_OPTIONS, > > @@ -4948,20 +4956,33 @@ ofctl_parse_key_value(struct ovs_cmdl_context > *ctx) > > } > > } > > > > -/* "compose-packet [--pcap] FLOW [L7]": Converts the OpenFlow flow > > - * specification FLOW to a packet with flow_compose() and prints the > hex bytes > > - * in the packet on stdout. Also verifies that the flow extracted from > that > > - * packet matches the original FLOW. > > +/* "compose-packet [--pcap] [--hexified] [--bad-csum] FLOW [L7]": > Converts the > > + * OpenFlow flow specification FLOW to a packet with flow_compose() and > prints > > + * the hex bytes of the packet, with offsets, to stdout. > > + * > > + * With --pcap, prints the packet in pcap format, so that you can do > something > > + * like "ovs-ofctl --pcap compose-packet udp | tcpdump -vvvv -r-" to use > > + * another tool to dump the packet contents. > > + * > > + * With --hexified, prints the packet as a single bare hex string with > no > > + * spaces or offsets, so that you can pass the result directly to e.g. > > + * "ovs-appctl netdev-dummy/receive vif $(ovs-ofctl compose-packet > --hexified > > + * FLOW)" > > + * > > + * With --bad-csum, produces a packet with an invalid IP checksum. (For > IPv4.) > > * > > - * With --pcap, prints the packet to stdout instead as a pcap file, so > that you > > - * can do something like "ovs-ofctl --pcap compose-packet udp | tcpdump > -vvvv > > - * -r-" to use another tool to dump the packet contents. > > + * Regardless of the mode, the command also verifies that the flow > extracted > > + * from that packet matches the original FLOW. > > * > > * If L7 is specified, draws the L7 payload data from it, otherwise > defaults to > > * 64 bytes of payload. */ > > static void > > ofctl_compose_packet(struct ovs_cmdl_context *ctx) > > { > > + if (print_pcap && print_hexified) { > > + ovs_fatal(1, "--hexified and --pcap are mutually exclusive"); > > + } > > + > > if (print_pcap && isatty(STDOUT_FILENO)) { > > ovs_fatal(1, "not writing pcap data to stdout; redirect to a > file " > > "or pipe to tcpdump instead"); > > @@ -4989,7 +5010,7 @@ ofctl_compose_packet(struct ovs_cmdl_context *ctx) > > l7_len = dp_packet_size(&payload); > > l7 = dp_packet_steal_data(&payload); > > } > > - flow_compose(&p, &flow1, l7, l7_len); > > + flow_compose(&p, &flow1, l7, l7_len, bad_csum); > > free(l7); > > > > if (print_pcap) { > > @@ -4997,6 +5018,16 @@ ofctl_compose_packet(struct ovs_cmdl_context *ctx) > > ovs_pcap_write_header(p_file); > > ovs_pcap_write(p_file, &p); > > ovs_pcap_close(p_file); > > + } else if (print_hexified) { > > + /* Binary to hex string. */ > > + for (int i = 0; i < dp_packet_size(&p); i++) { > > + uint8_t val = ((uint8_t *) dp_packet_data(&p))[i]; > > + /* Don't use ds_put_hex because it adds 0x prefix as well as > > + * it doesn't guarantee even number of payload characters, > which is > > + * important elsewhere (e.g. in `receive` command. */ > > 'receive' is a little out of context here, because it's not an ofctl > command. > > > + printf("%02" PRIx8, val); > > + } > > + > > } else { > > ovs_hex_dump(stdout, dp_packet_data(&p), dp_packet_size(&p), 0, > false); > > } > > -- > > 2.41.0 > > _______________________________________________ dev mailing list d...@openvswitch.org https://mail.openvswitch.org/mailman/listinfo/ovs-dev