Re: [ovs-dev] [PATCH] ofproto-dpif-trace: Improve NAT tracing.

2020-01-10 Thread Dumitru Ceara
On Tue, Jan 7, 2020 at 8:25 PM Ben Pfaff  wrote:
>
> On Tue, Jan 07, 2020 at 09:15:26AM +0100, Dumitru Ceara wrote:
> > On Mon, Jan 6, 2020 at 11:11 PM Ben Pfaff  wrote:
> > >
> > > On Fri, Jan 03, 2020 at 05:27:31PM +0100, Dumitru Ceara wrote:
> > > > When ofproto/trace detects a recirc action it resumes execution at the
> > > > specified next table. However, if the ct action performs SNAT/DNAT,
> > > > e.g., ct(commit,nat(src=1.1.1.1:4000),table=42), the src/dst IPs and
> > > > ports in the oftrace_recirc_node->flow field are not updated. This leads
> > > > to misleading outputs from ofproto/trace as real packets would actually
> > > > first get NATed and might match different flows when recirculated.
> > > >
> > > > Assume the first IP/port from the NAT src/dst action will be used by
> > > > conntrack for the translation and update the oftrace_recirc_node->flow
> > > > accordingly. This is not entirely correct as conntrack might choose a
> > > > different IP/port but the result is more realistic than before.
> > > >
> > > > This fix covers new connections. However, for reply traffic that 
> > > > executes
> > > > actions of the form ct(nat, table=42) we still don't update the flow as
> > > > we don't have any information about conntrack state when tracing.
> > > >
> > > > Signed-off-by: Dumitru Ceara 
> > >
> > > This is a great idea.
> > >
> > > I have an idea for further improvement.  Currently this patch is quiet:
> > > it doesn't say what's going on.  It would be better if it said that it
> > > was replacing the source and/or destination addresses, and by what and
> > > why.  I think that would be easiest done in ofproto_trace() itself near
> > > the existing code that does it already for ct_state.  I think we could
> > > just save the ofn pointer in the recirc node and move the replacement
> > > code to ofproto_trace().
> > >
> >
> > Thanks for the review! Sounds better indeed. I'll respin the patch
> > with your enhancement.

Hi Ben,

I sent v2 including your suggestions:
https://patchwork.ozlabs.org/patch/1220907/

> >
> > As follow up work I was thinking it would be nice to be able to cover
> > the other types of nat recirculation too, e.g., ct(nat, table=42), and
> > allow the user to specify the outcome of the nat operation in a
> > similar way as we do for conntrack with --ct-next. However, I'm not
> > sure what the best way is to do that.. I'm open to suggestions.
> >
> > Could we enhance ofproto/trace such that the user can specify a
> > conntrack database in a predefined format? For example, the output of
> > "conntrack -L -o xml". Or would that become confusing?
>
> I have two ideas.
>
> First, OVS is already able to read and dump the actual connection
> tracking database in use (see e.g. the dpctl/dump-conntrack command in
> ovs-vswitchd(8)).  ofproto/trace could consult this.  It would want to
> dump out the entry that was found (or not found) while doing it.

This is nice, thanks for pointing it out. So I guess when
troubleshooting packet forwarding we could insert conntrack entries to
guide ofproto/trace.

>
> Second, I guess we could have an option whose argument is a set of
> actions to execute, which could update the source and destination, etc.
> That's very general purpose!
>

I also like this second option because it decouples tracing from the
underlying datapath conntrack implementation.

I'll give it more thought and follow up when I have something working.

Regards,
Dumitru

___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev


Re: [ovs-dev] [PATCH] ofproto-dpif-trace: Improve NAT tracing.

2020-01-07 Thread Ben Pfaff
On Tue, Jan 07, 2020 at 09:15:26AM +0100, Dumitru Ceara wrote:
> On Mon, Jan 6, 2020 at 11:11 PM Ben Pfaff  wrote:
> >
> > On Fri, Jan 03, 2020 at 05:27:31PM +0100, Dumitru Ceara wrote:
> > > When ofproto/trace detects a recirc action it resumes execution at the
> > > specified next table. However, if the ct action performs SNAT/DNAT,
> > > e.g., ct(commit,nat(src=1.1.1.1:4000),table=42), the src/dst IPs and
> > > ports in the oftrace_recirc_node->flow field are not updated. This leads
> > > to misleading outputs from ofproto/trace as real packets would actually
> > > first get NATed and might match different flows when recirculated.
> > >
> > > Assume the first IP/port from the NAT src/dst action will be used by
> > > conntrack for the translation and update the oftrace_recirc_node->flow
> > > accordingly. This is not entirely correct as conntrack might choose a
> > > different IP/port but the result is more realistic than before.
> > >
> > > This fix covers new connections. However, for reply traffic that executes
> > > actions of the form ct(nat, table=42) we still don't update the flow as
> > > we don't have any information about conntrack state when tracing.
> > >
> > > Signed-off-by: Dumitru Ceara 
> >
> > This is a great idea.
> >
> > I have an idea for further improvement.  Currently this patch is quiet:
> > it doesn't say what's going on.  It would be better if it said that it
> > was replacing the source and/or destination addresses, and by what and
> > why.  I think that would be easiest done in ofproto_trace() itself near
> > the existing code that does it already for ct_state.  I think we could
> > just save the ofn pointer in the recirc node and move the replacement
> > code to ofproto_trace().
> >
> 
> Thanks for the review! Sounds better indeed. I'll respin the patch
> with your enhancement.
> 
> As follow up work I was thinking it would be nice to be able to cover
> the other types of nat recirculation too, e.g., ct(nat, table=42), and
> allow the user to specify the outcome of the nat operation in a
> similar way as we do for conntrack with --ct-next. However, I'm not
> sure what the best way is to do that.. I'm open to suggestions.
> 
> Could we enhance ofproto/trace such that the user can specify a
> conntrack database in a predefined format? For example, the output of
> "conntrack -L -o xml". Or would that become confusing?

I have two ideas.

First, OVS is already able to read and dump the actual connection
tracking database in use (see e.g. the dpctl/dump-conntrack command in
ovs-vswitchd(8)).  ofproto/trace could consult this.  It would want to
dump out the entry that was found (or not found) while doing it.

Second, I guess we could have an option whose argument is a set of
actions to execute, which could update the source and destination, etc.
That's very general purpose!
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev


Re: [ovs-dev] [PATCH] ofproto-dpif-trace: Improve NAT tracing.

2020-01-07 Thread Dumitru Ceara
On Mon, Jan 6, 2020 at 11:11 PM Ben Pfaff  wrote:
>
> On Fri, Jan 03, 2020 at 05:27:31PM +0100, Dumitru Ceara wrote:
> > When ofproto/trace detects a recirc action it resumes execution at the
> > specified next table. However, if the ct action performs SNAT/DNAT,
> > e.g., ct(commit,nat(src=1.1.1.1:4000),table=42), the src/dst IPs and
> > ports in the oftrace_recirc_node->flow field are not updated. This leads
> > to misleading outputs from ofproto/trace as real packets would actually
> > first get NATed and might match different flows when recirculated.
> >
> > Assume the first IP/port from the NAT src/dst action will be used by
> > conntrack for the translation and update the oftrace_recirc_node->flow
> > accordingly. This is not entirely correct as conntrack might choose a
> > different IP/port but the result is more realistic than before.
> >
> > This fix covers new connections. However, for reply traffic that executes
> > actions of the form ct(nat, table=42) we still don't update the flow as
> > we don't have any information about conntrack state when tracing.
> >
> > Signed-off-by: Dumitru Ceara 
>
> This is a great idea.
>
> I have an idea for further improvement.  Currently this patch is quiet:
> it doesn't say what's going on.  It would be better if it said that it
> was replacing the source and/or destination addresses, and by what and
> why.  I think that would be easiest done in ofproto_trace() itself near
> the existing code that does it already for ct_state.  I think we could
> just save the ofn pointer in the recirc node and move the replacement
> code to ofproto_trace().
>

Thanks for the review! Sounds better indeed. I'll respin the patch
with your enhancement.

As follow up work I was thinking it would be nice to be able to cover
the other types of nat recirculation too, e.g., ct(nat, table=42), and
allow the user to specify the outcome of the nat operation in a
similar way as we do for conntrack with --ct-next. However, I'm not
sure what the best way is to do that.. I'm open to suggestions.

Could we enhance ofproto/trace such that the user can specify a
conntrack database in a predefined format? For example, the output of
"conntrack -L -o xml". Or would that become confusing?

Thanks,
Dumitru

___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev


Re: [ovs-dev] [PATCH] ofproto-dpif-trace: Improve NAT tracing.

2020-01-06 Thread Ben Pfaff
On Fri, Jan 03, 2020 at 05:27:31PM +0100, Dumitru Ceara wrote:
> When ofproto/trace detects a recirc action it resumes execution at the
> specified next table. However, if the ct action performs SNAT/DNAT,
> e.g., ct(commit,nat(src=1.1.1.1:4000),table=42), the src/dst IPs and
> ports in the oftrace_recirc_node->flow field are not updated. This leads
> to misleading outputs from ofproto/trace as real packets would actually
> first get NATed and might match different flows when recirculated.
> 
> Assume the first IP/port from the NAT src/dst action will be used by
> conntrack for the translation and update the oftrace_recirc_node->flow
> accordingly. This is not entirely correct as conntrack might choose a
> different IP/port but the result is more realistic than before.
> 
> This fix covers new connections. However, for reply traffic that executes
> actions of the form ct(nat, table=42) we still don't update the flow as
> we don't have any information about conntrack state when tracing.
> 
> Signed-off-by: Dumitru Ceara 

This is a great idea.

I have an idea for further improvement.  Currently this patch is quiet:
it doesn't say what's going on.  It would be better if it said that it
was replacing the source and/or destination addresses, and by what and
why.  I think that would be easiest done in ofproto_trace() itself near
the existing code that does it already for ct_state.  I think we could
just save the ofn pointer in the recirc node and move the replacement
code to ofproto_trace().
___
dev mailing list
d...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-dev


[ovs-dev] [PATCH] ofproto-dpif-trace: Improve NAT tracing.

2020-01-03 Thread Dumitru Ceara
When ofproto/trace detects a recirc action it resumes execution at the
specified next table. However, if the ct action performs SNAT/DNAT,
e.g., ct(commit,nat(src=1.1.1.1:4000),table=42), the src/dst IPs and
ports in the oftrace_recirc_node->flow field are not updated. This leads
to misleading outputs from ofproto/trace as real packets would actually
first get NATed and might match different flows when recirculated.

Assume the first IP/port from the NAT src/dst action will be used by
conntrack for the translation and update the oftrace_recirc_node->flow
accordingly. This is not entirely correct as conntrack might choose a
different IP/port but the result is more realistic than before.

This fix covers new connections. However, for reply traffic that executes
actions of the form ct(nat, table=42) we still don't update the flow as
we don't have any information about conntrack state when tracing.

Signed-off-by: Dumitru Ceara 
---
 ofproto/ofproto-dpif-trace.c | 33 +
 ofproto/ofproto-dpif-trace.h |  1 +
 ofproto/ofproto-dpif-xlate.c |  6 --
 tests/ofproto-dpif.at| 36 
 4 files changed, 74 insertions(+), 2 deletions(-)

diff --git a/ofproto/ofproto-dpif-trace.c b/ofproto/ofproto-dpif-trace.c
index 8ae8a22..b2ff903 100644
--- a/ofproto/ofproto-dpif-trace.c
+++ b/ofproto/ofproto-dpif-trace.c
@@ -86,6 +86,7 @@ oftrace_node_destroy(struct oftrace_node *node)
 bool
 oftrace_add_recirc_node(struct ovs_list *recirc_queue,
 enum oftrace_recirc_type type, const struct flow *flow,
+const struct ofpact_nat *ofn,
 const struct dp_packet *packet, uint32_t recirc_id,
 const uint16_t zone)
 {
@@ -101,6 +102,38 @@ oftrace_add_recirc_node(struct ovs_list *recirc_queue,
 node->flow = *flow;
 node->flow.recirc_id = recirc_id;
 node->flow.ct_zone = zone;
+
+/* If there's any snat/dnat information assume we always translate to
+ * the first IP/port to make sure we don't match on incorrect flows later
+ * on.
+ */
+if (ofn) {
+if (ofn->flags & NX_NAT_F_SRC) {
+if (ofn->range_af == AF_INET) {
+node->flow.nw_src = ofn->range.addr.ipv4.min;
+} else if (ofn->range_af == AF_INET6) {
+memcpy(>flow.ipv6_src, >range.addr.ipv6.min,
+   sizeof node->flow.ipv6_src);
+}
+
+if (ofn->range_af != AF_UNSPEC && ofn->range.proto.min) {
+node->flow.tp_src = htons(ofn->range.proto.min);
+}
+}
+if (ofn->flags & NX_NAT_F_DST) {
+if (ofn->range_af == AF_INET) {
+node->flow.nw_dst = ofn->range.addr.ipv4.min;
+} else if (ofn->range_af == AF_INET6) {
+memcpy(>flow.ipv6_dst, >range.addr.ipv6.min,
+   sizeof node->flow.ipv6_dst);
+}
+
+if (ofn->range_af != AF_UNSPEC && ofn->range.proto.min) {
+node->flow.tp_dst = htons(ofn->range.proto.min);
+}
+}
+}
+
 node->packet = packet ? dp_packet_clone(packet) : NULL;
 
 return true;
diff --git a/ofproto/ofproto-dpif-trace.h b/ofproto/ofproto-dpif-trace.h
index 63dbb50..e5db9f9 100644
--- a/ofproto/ofproto-dpif-trace.h
+++ b/ofproto/ofproto-dpif-trace.h
@@ -91,6 +91,7 @@ struct oftrace_node *oftrace_report(struct ovs_list *, enum 
oftrace_node_type,
 const char *text);
 bool oftrace_add_recirc_node(struct ovs_list *recirc_queue,
  enum oftrace_recirc_type, const struct flow *,
+ const struct ofpact_nat *,
  const struct dp_packet *, uint32_t recirc_id,
  const uint16_t zone);
 
diff --git a/ofproto/ofproto-dpif-xlate.c b/ofproto/ofproto-dpif-xlate.c
index 1c72693..ac73656 100644
--- a/ofproto/ofproto-dpif-xlate.c
+++ b/ofproto/ofproto-dpif-xlate.c
@@ -4968,7 +4968,8 @@ compose_recirculate_and_fork(struct xlate_ctx *ctx, 
uint8_t table,
 if (OVS_UNLIKELY(ctx->xin->trace) && recirc_id) {
 if (oftrace_add_recirc_node(ctx->xin->recirc_queue,
 OFT_RECIRC_CONNTRACK, >xin->flow,
-ctx->xin->packet, recirc_id, zone)) {
+ctx->ct_nat_action, ctx->xin->packet,
+recirc_id, zone)) {
 xlate_report(ctx, OFT_DETAIL, "A clone of the packet is forked to "
  "recirculate. The forked pipeline will be resumed at "
  "table %u.", table);
@@ -6151,7 +6152,6 @@ compose_conntrack_action(struct xlate_ctx *ctx, struct 
ofpact_conntrack *ofc,
 put_ct_label(>xin->flow, ctx->odp_actions, ctx->wc);
 put_ct_helper(ctx, ctx->odp_actions, ofc);
 put_ct_nat(ctx);
-