Loading...
1#!/usr/bin/env python3
2# SPDX-License-Identifier: GPL-2.0
3
4# Controls the openvswitch module. Part of the kselftest suite, but
5# can be used for some diagnostic purpose as well.
6
7import argparse
8import errno
9import ipaddress
10import logging
11import math
12import multiprocessing
13import re
14import socket
15import struct
16import sys
17import time
18import types
19import uuid
20
21try:
22 from pyroute2 import NDB
23
24 from pyroute2.netlink import NLA_F_NESTED
25 from pyroute2.netlink import NLM_F_ACK
26 from pyroute2.netlink import NLM_F_DUMP
27 from pyroute2.netlink import NLM_F_REQUEST
28 from pyroute2.netlink import genlmsg
29 from pyroute2.netlink import nla
30 from pyroute2.netlink import nlmsg_atoms
31 from pyroute2.netlink.event import EventSocket
32 from pyroute2.netlink.exceptions import NetlinkError
33 from pyroute2.netlink.generic import GenericNetlinkSocket
34 from pyroute2.netlink.nlsocket import Marshal
35 import pyroute2
36 import pyroute2.iproute
37
38except ModuleNotFoundError:
39 print("Need to install the python pyroute2 package >= 0.6.")
40 sys.exit(1)
41
42
43OVS_DATAPATH_FAMILY = "ovs_datapath"
44OVS_VPORT_FAMILY = "ovs_vport"
45OVS_FLOW_FAMILY = "ovs_flow"
46OVS_PACKET_FAMILY = "ovs_packet"
47OVS_METER_FAMILY = "ovs_meter"
48OVS_CT_LIMIT_FAMILY = "ovs_ct_limit"
49
50OVS_DATAPATH_VERSION = 2
51OVS_DP_CMD_NEW = 1
52OVS_DP_CMD_DEL = 2
53OVS_DP_CMD_GET = 3
54OVS_DP_CMD_SET = 4
55
56OVS_VPORT_CMD_NEW = 1
57OVS_VPORT_CMD_DEL = 2
58OVS_VPORT_CMD_GET = 3
59OVS_VPORT_CMD_SET = 4
60
61OVS_FLOW_CMD_NEW = 1
62OVS_FLOW_CMD_DEL = 2
63OVS_FLOW_CMD_GET = 3
64OVS_FLOW_CMD_SET = 4
65
66UINT32_MAX = 0xFFFFFFFF
67
68def macstr(mac):
69 outstr = ":".join(["%02X" % i for i in mac])
70 return outstr
71
72
73def strcspn(str1, str2):
74 tot = 0
75 for char in str1:
76 if str2.find(char) != -1:
77 return tot
78 tot += 1
79 return tot
80
81
82def strspn(str1, str2):
83 tot = 0
84 for char in str1:
85 if str2.find(char) == -1:
86 return tot
87 tot += 1
88 return tot
89
90
91def intparse(statestr, defmask="0xffffffff"):
92 totalparse = strspn(statestr, "0123456789abcdefABCDEFx/")
93 # scan until "/"
94 count = strspn(statestr, "x0123456789abcdefABCDEF")
95
96 firstnum = statestr[:count]
97 if firstnum[-1] == "/":
98 firstnum = firstnum[:-1]
99 k = int(firstnum, 0)
100
101 m = None
102 if defmask is not None:
103 secondnum = defmask
104 if statestr[count] == "/":
105 secondnum = statestr[count + 1 :] # this is wrong...
106 m = int(secondnum, 0)
107
108 return statestr[totalparse + 1 :], k, m
109
110
111def parse_flags(flag_str, flag_vals):
112 bitResult = 0
113 maskResult = 0
114
115 if len(flag_str) == 0:
116 return flag_str, bitResult, maskResult
117
118 if flag_str[0].isdigit():
119 idx = 0
120 while flag_str[idx].isdigit() or flag_str[idx] == "x":
121 idx += 1
122 digits = flag_str[:idx]
123 flag_str = flag_str[idx:]
124
125 bitResult = int(digits, 0)
126 maskResult = int(digits, 0)
127
128 while len(flag_str) > 0 and (flag_str[0] == "+" or flag_str[0] == "-"):
129 if flag_str[0] == "+":
130 setFlag = True
131 elif flag_str[0] == "-":
132 setFlag = False
133
134 flag_str = flag_str[1:]
135
136 flag_len = 0
137 while (
138 flag_str[flag_len] != "+"
139 and flag_str[flag_len] != "-"
140 and flag_str[flag_len] != ","
141 and flag_str[flag_len] != ")"
142 ):
143 flag_len += 1
144
145 flag = flag_str[0:flag_len]
146
147 if flag in flag_vals:
148 if maskResult & flag_vals[flag]:
149 raise KeyError(
150 "Flag %s set once, cannot be set in multiples" % flag
151 )
152
153 if setFlag:
154 bitResult |= flag_vals[flag]
155
156 maskResult |= flag_vals[flag]
157 else:
158 raise KeyError("Missing flag value: %s" % flag)
159
160 flag_str = flag_str[flag_len:]
161
162 return flag_str, bitResult, maskResult
163
164
165def parse_ct_state(statestr):
166 ct_flags = {
167 "new": 1 << 0,
168 "est": 1 << 1,
169 "rel": 1 << 2,
170 "rpl": 1 << 3,
171 "inv": 1 << 4,
172 "trk": 1 << 5,
173 "snat": 1 << 6,
174 "dnat": 1 << 7,
175 }
176
177 return parse_flags(statestr, ct_flags)
178
179
180def convert_mac(data):
181 def to_bytes(mac):
182 mac_split = mac.split(":")
183 ret = bytearray([int(i, 16) for i in mac_split])
184 return bytes(ret)
185
186 mac_str, _, mask_str = data.partition('/')
187
188 if not mac_str:
189 mac_str = mask_str = "00:00:00:00:00:00"
190 elif not mask_str:
191 mask_str = "FF:FF:FF:FF:FF:FF"
192
193 return to_bytes(mac_str), to_bytes(mask_str)
194
195def convert_ipv4(data):
196 ip, _, mask = data.partition('/')
197
198 if not ip:
199 ip = mask = 0
200 elif not mask:
201 mask = 0xFFFFFFFF
202 elif mask.isdigit():
203 mask = (0xFFFFFFFF << (32 - int(mask))) & 0xFFFFFFFF
204
205 return int(ipaddress.IPv4Address(ip)), int(ipaddress.IPv4Address(mask))
206
207def convert_ipv6(data):
208 ip, _, mask = data.partition('/')
209
210 if not ip:
211 ip = mask = 0
212 elif not mask:
213 mask = 'ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff'
214 elif mask.isdigit():
215 mask = ipaddress.IPv6Network("::/" + mask).hostmask
216
217 return ipaddress.IPv6Address(ip).packed, ipaddress.IPv6Address(mask).packed
218
219def convert_int(size):
220 def convert_int_sized(data):
221 value, _, mask = data.partition('/')
222
223 if not value:
224 return 0, 0
225 elif not mask:
226 return int(value, 0), pow(2, size) - 1
227 else:
228 return int(value, 0), int(mask, 0)
229
230 return convert_int_sized
231
232def parse_starts_block(block_str, scanstr, returnskipped, scanregex=False):
233 if scanregex:
234 m = re.search(scanstr, block_str)
235 if m is None:
236 if returnskipped:
237 return block_str
238 return False
239 if returnskipped:
240 block_str = block_str[len(m.group(0)) :]
241 return block_str
242 return True
243
244 if block_str.startswith(scanstr):
245 if returnskipped:
246 block_str = block_str[len(scanstr) :]
247 else:
248 return True
249
250 if returnskipped:
251 return block_str
252
253 return False
254
255
256def parse_extract_field(
257 block_str, fieldstr, scanfmt, convert, masked=False, defval=None
258):
259 if fieldstr and not block_str.startswith(fieldstr):
260 return block_str, defval
261
262 if fieldstr:
263 str_skiplen = len(fieldstr)
264 str_skipped = block_str[str_skiplen:]
265 if str_skiplen == 0:
266 return str_skipped, defval
267 else:
268 str_skiplen = 0
269 str_skipped = block_str
270
271 m = re.search(scanfmt, str_skipped)
272 if m is None:
273 raise ValueError("Bad fmt string")
274
275 data = m.group(0)
276 if convert:
277 data = convert(m.group(0))
278
279 str_skipped = str_skipped[len(m.group(0)) :]
280 if masked:
281 if str_skipped[0] == "/":
282 raise ValueError("Masking support TBD...")
283
284 str_skipped = str_skipped[strspn(str_skipped, ", ") :]
285 return str_skipped, data
286
287
288def parse_attrs(actstr, attr_desc):
289 """Parses the given action string and returns a list of netlink
290 attributes based on a list of attribute descriptions.
291
292 Each element in the attribute description list is a tuple such as:
293 (name, attr_name, parse_func)
294 where:
295 name: is the string representing the attribute
296 attr_name: is the name of the attribute as defined in the uAPI.
297 parse_func: is a callable accepting a string and returning either
298 a single object (the parsed attribute value) or a tuple of
299 two values (the parsed attribute value and the remaining string)
300
301 Returns a list of attributes and the remaining string.
302 """
303 def parse_attr(actstr, key, func):
304 actstr = actstr[len(key) :]
305
306 if not func:
307 return None, actstr
308
309 delim = actstr[0]
310 actstr = actstr[1:]
311
312 if delim == "=":
313 pos = strcspn(actstr, ",)")
314 ret = func(actstr[:pos])
315 else:
316 ret = func(actstr)
317
318 if isinstance(ret, tuple):
319 (datum, actstr) = ret
320 else:
321 datum = ret
322 actstr = actstr[strcspn(actstr, ",)"):]
323
324 if delim == "(":
325 if not actstr or actstr[0] != ")":
326 raise ValueError("Action contains unbalanced parentheses")
327
328 actstr = actstr[1:]
329
330 actstr = actstr[strspn(actstr, ", ") :]
331
332 return datum, actstr
333
334 attrs = []
335 attr_desc = list(attr_desc)
336 while actstr and actstr[0] != ")" and attr_desc:
337 found = False
338 for i, (key, attr, func) in enumerate(attr_desc):
339 if actstr.startswith(key):
340 datum, actstr = parse_attr(actstr, key, func)
341 attrs.append([attr, datum])
342 found = True
343 del attr_desc[i]
344
345 if not found:
346 raise ValueError("Unknown attribute: '%s'" % actstr)
347
348 actstr = actstr[strspn(actstr, ", ") :]
349
350 if actstr[0] != ")":
351 raise ValueError("Action string contains extra garbage or has "
352 "unbalanced parenthesis: '%s'" % actstr)
353
354 return attrs, actstr[1:]
355
356
357class ovs_dp_msg(genlmsg):
358 # include the OVS version
359 # We need a custom header rather than just being able to rely on
360 # genlmsg because fields ends up not expressing everything correctly
361 # if we use the canonical example of setting fields = (('customfield',),)
362 fields = genlmsg.fields + (("dpifindex", "I"),)
363
364
365class ovsactions(nla):
366 nla_flags = NLA_F_NESTED
367
368 nla_map = (
369 ("OVS_ACTION_ATTR_UNSPEC", "none"),
370 ("OVS_ACTION_ATTR_OUTPUT", "uint32"),
371 ("OVS_ACTION_ATTR_USERSPACE", "userspace"),
372 ("OVS_ACTION_ATTR_SET", "ovskey"),
373 ("OVS_ACTION_ATTR_PUSH_VLAN", "none"),
374 ("OVS_ACTION_ATTR_POP_VLAN", "flag"),
375 ("OVS_ACTION_ATTR_SAMPLE", "sample"),
376 ("OVS_ACTION_ATTR_RECIRC", "uint32"),
377 ("OVS_ACTION_ATTR_HASH", "none"),
378 ("OVS_ACTION_ATTR_PUSH_MPLS", "none"),
379 ("OVS_ACTION_ATTR_POP_MPLS", "flag"),
380 ("OVS_ACTION_ATTR_SET_MASKED", "ovskey"),
381 ("OVS_ACTION_ATTR_CT", "ctact"),
382 ("OVS_ACTION_ATTR_TRUNC", "uint32"),
383 ("OVS_ACTION_ATTR_PUSH_ETH", "none"),
384 ("OVS_ACTION_ATTR_POP_ETH", "flag"),
385 ("OVS_ACTION_ATTR_CT_CLEAR", "flag"),
386 ("OVS_ACTION_ATTR_PUSH_NSH", "none"),
387 ("OVS_ACTION_ATTR_POP_NSH", "flag"),
388 ("OVS_ACTION_ATTR_METER", "none"),
389 ("OVS_ACTION_ATTR_CLONE", "recursive"),
390 ("OVS_ACTION_ATTR_CHECK_PKT_LEN", "none"),
391 ("OVS_ACTION_ATTR_ADD_MPLS", "none"),
392 ("OVS_ACTION_ATTR_DEC_TTL", "none"),
393 ("OVS_ACTION_ATTR_DROP", "uint32"),
394 ("OVS_ACTION_ATTR_PSAMPLE", "psample"),
395 )
396
397 class psample(nla):
398 nla_flags = NLA_F_NESTED
399
400 nla_map = (
401 ("OVS_PSAMPLE_ATTR_UNSPEC", "none"),
402 ("OVS_PSAMPLE_ATTR_GROUP", "uint32"),
403 ("OVS_PSAMPLE_ATTR_COOKIE", "array(uint8)"),
404 )
405
406 def dpstr(self, more=False):
407 args = "group=%d" % self.get_attr("OVS_PSAMPLE_ATTR_GROUP")
408
409 cookie = self.get_attr("OVS_PSAMPLE_ATTR_COOKIE")
410 if cookie:
411 args += ",cookie(%s)" % \
412 "".join(format(x, "02x") for x in cookie)
413
414 return "psample(%s)" % args
415
416 def parse(self, actstr):
417 desc = (
418 ("group", "OVS_PSAMPLE_ATTR_GROUP", int),
419 ("cookie", "OVS_PSAMPLE_ATTR_COOKIE",
420 lambda x: list(bytearray.fromhex(x)))
421 )
422
423 attrs, actstr = parse_attrs(actstr, desc)
424
425 for attr in attrs:
426 self["attrs"].append(attr)
427
428 return actstr
429
430 class sample(nla):
431 nla_flags = NLA_F_NESTED
432
433 nla_map = (
434 ("OVS_SAMPLE_ATTR_UNSPEC", "none"),
435 ("OVS_SAMPLE_ATTR_PROBABILITY", "uint32"),
436 ("OVS_SAMPLE_ATTR_ACTIONS", "ovsactions"),
437 )
438
439 def dpstr(self, more=False):
440 args = []
441
442 args.append("sample={:.2f}%".format(
443 100 * self.get_attr("OVS_SAMPLE_ATTR_PROBABILITY") /
444 UINT32_MAX))
445
446 actions = self.get_attr("OVS_SAMPLE_ATTR_ACTIONS")
447 if actions:
448 args.append("actions(%s)" % actions.dpstr(more))
449
450 return "sample(%s)" % ",".join(args)
451
452 def parse(self, actstr):
453 def parse_nested_actions(actstr):
454 subacts = ovsactions()
455 parsed_len = subacts.parse(actstr)
456 return subacts, actstr[parsed_len :]
457
458 def percent_to_rate(percent):
459 percent = float(percent.strip('%'))
460 return int(math.floor(UINT32_MAX * (percent / 100.0) + .5))
461
462 desc = (
463 ("sample", "OVS_SAMPLE_ATTR_PROBABILITY", percent_to_rate),
464 ("actions", "OVS_SAMPLE_ATTR_ACTIONS", parse_nested_actions),
465 )
466 attrs, actstr = parse_attrs(actstr, desc)
467
468 for attr in attrs:
469 self["attrs"].append(attr)
470
471 return actstr
472
473 class ctact(nla):
474 nla_flags = NLA_F_NESTED
475
476 nla_map = (
477 ("OVS_CT_ATTR_NONE", "none"),
478 ("OVS_CT_ATTR_COMMIT", "flag"),
479 ("OVS_CT_ATTR_ZONE", "uint16"),
480 ("OVS_CT_ATTR_MARK", "none"),
481 ("OVS_CT_ATTR_LABELS", "none"),
482 ("OVS_CT_ATTR_HELPER", "asciiz"),
483 ("OVS_CT_ATTR_NAT", "natattr"),
484 ("OVS_CT_ATTR_FORCE_COMMIT", "flag"),
485 ("OVS_CT_ATTR_EVENTMASK", "uint32"),
486 ("OVS_CT_ATTR_TIMEOUT", "asciiz"),
487 )
488
489 class natattr(nla):
490 nla_flags = NLA_F_NESTED
491
492 nla_map = (
493 ("OVS_NAT_ATTR_NONE", "none"),
494 ("OVS_NAT_ATTR_SRC", "flag"),
495 ("OVS_NAT_ATTR_DST", "flag"),
496 ("OVS_NAT_ATTR_IP_MIN", "ipaddr"),
497 ("OVS_NAT_ATTR_IP_MAX", "ipaddr"),
498 ("OVS_NAT_ATTR_PROTO_MIN", "uint16"),
499 ("OVS_NAT_ATTR_PROTO_MAX", "uint16"),
500 ("OVS_NAT_ATTR_PERSISTENT", "flag"),
501 ("OVS_NAT_ATTR_PROTO_HASH", "flag"),
502 ("OVS_NAT_ATTR_PROTO_RANDOM", "flag"),
503 )
504
505 def dpstr(self, more=False):
506 print_str = "nat("
507
508 if self.get_attr("OVS_NAT_ATTR_SRC"):
509 print_str += "src"
510 elif self.get_attr("OVS_NAT_ATTR_DST"):
511 print_str += "dst"
512 else:
513 print_str += "XXX-unknown-nat"
514
515 if self.get_attr("OVS_NAT_ATTR_IP_MIN") or self.get_attr(
516 "OVS_NAT_ATTR_IP_MAX"
517 ):
518 if self.get_attr("OVS_NAT_ATTR_IP_MIN"):
519 print_str += "=%s," % str(
520 self.get_attr("OVS_NAT_ATTR_IP_MIN")
521 )
522
523 if self.get_attr("OVS_NAT_ATTR_IP_MAX"):
524 print_str += "-%s," % str(
525 self.get_attr("OVS_NAT_ATTR_IP_MAX")
526 )
527 else:
528 print_str += ","
529
530 if self.get_attr("OVS_NAT_ATTR_PROTO_MIN"):
531 print_str += "proto_min=%d," % self.get_attr(
532 "OVS_NAT_ATTR_PROTO_MIN"
533 )
534
535 if self.get_attr("OVS_NAT_ATTR_PROTO_MAX"):
536 print_str += "proto_max=%d," % self.get_attr(
537 "OVS_NAT_ATTR_PROTO_MAX"
538 )
539
540 if self.get_attr("OVS_NAT_ATTR_PERSISTENT"):
541 print_str += "persistent,"
542 if self.get_attr("OVS_NAT_ATTR_HASH"):
543 print_str += "hash,"
544 if self.get_attr("OVS_NAT_ATTR_RANDOM"):
545 print_str += "random"
546 print_str += ")"
547 return print_str
548
549 def dpstr(self, more=False):
550 print_str = "ct("
551
552 if self.get_attr("OVS_CT_ATTR_COMMIT") is not None:
553 print_str += "commit,"
554 if self.get_attr("OVS_CT_ATTR_ZONE") is not None:
555 print_str += "zone=%d," % self.get_attr("OVS_CT_ATTR_ZONE")
556 if self.get_attr("OVS_CT_ATTR_HELPER") is not None:
557 print_str += "helper=%s," % self.get_attr("OVS_CT_ATTR_HELPER")
558 if self.get_attr("OVS_CT_ATTR_NAT") is not None:
559 print_str += self.get_attr("OVS_CT_ATTR_NAT").dpstr(more)
560 print_str += ","
561 if self.get_attr("OVS_CT_ATTR_FORCE_COMMIT") is not None:
562 print_str += "force,"
563 if self.get_attr("OVS_CT_ATTR_EVENTMASK") is not None:
564 print_str += "emask=0x%X," % self.get_attr(
565 "OVS_CT_ATTR_EVENTMASK"
566 )
567 if self.get_attr("OVS_CT_ATTR_TIMEOUT") is not None:
568 print_str += "timeout=%s" % self.get_attr(
569 "OVS_CT_ATTR_TIMEOUT"
570 )
571 print_str += ")"
572 return print_str
573
574 class userspace(nla):
575 nla_flags = NLA_F_NESTED
576
577 nla_map = (
578 ("OVS_USERSPACE_ATTR_UNUSED", "none"),
579 ("OVS_USERSPACE_ATTR_PID", "uint32"),
580 ("OVS_USERSPACE_ATTR_USERDATA", "array(uint8)"),
581 ("OVS_USERSPACE_ATTR_EGRESS_TUN_PORT", "uint32"),
582 )
583
584 def dpstr(self, more=False):
585 print_str = "userspace("
586 if self.get_attr("OVS_USERSPACE_ATTR_PID") is not None:
587 print_str += "pid=%d," % self.get_attr(
588 "OVS_USERSPACE_ATTR_PID"
589 )
590 if self.get_attr("OVS_USERSPACE_ATTR_USERDATA") is not None:
591 print_str += "userdata="
592 for f in self.get_attr("OVS_USERSPACE_ATTR_USERDATA"):
593 print_str += "%x." % f
594 if self.get_attr("OVS_USERSPACE_ATTR_EGRESS_TUN_PORT") is not None:
595 print_str += "egress_tun_port=%d" % self.get_attr(
596 "OVS_USERSPACE_ATTR_EGRESS_TUN_PORT"
597 )
598 print_str += ")"
599 return print_str
600
601 def parse(self, actstr):
602 attrs_desc = (
603 ("pid", "OVS_USERSPACE_ATTR_PID", int),
604 ("userdata", "OVS_USERSPACE_ATTR_USERDATA",
605 lambda x: list(bytearray.fromhex(x))),
606 ("egress_tun_port", "OVS_USERSPACE_ATTR_EGRESS_TUN_PORT", int)
607 )
608
609 attrs, actstr = parse_attrs(actstr, attrs_desc)
610 for attr in attrs:
611 self["attrs"].append(attr)
612
613 return actstr
614
615 def dpstr(self, more=False):
616 print_str = ""
617
618 for field in self["attrs"]:
619 if field[1] == "none" or self.get_attr(field[0]) is None:
620 continue
621 if print_str != "":
622 print_str += ","
623
624 if field[0] == "OVS_ACTION_ATTR_OUTPUT":
625 print_str += "%d" % int(self.get_attr(field[0]))
626 elif field[0] == "OVS_ACTION_ATTR_RECIRC":
627 print_str += "recirc(0x%x)" % int(self.get_attr(field[0]))
628 elif field[0] == "OVS_ACTION_ATTR_TRUNC":
629 print_str += "trunc(%d)" % int(self.get_attr(field[0]))
630 elif field[0] == "OVS_ACTION_ATTR_DROP":
631 print_str += "drop(%d)" % int(self.get_attr(field[0]))
632 elif field[0] == "OVS_ACTION_ATTR_CT_CLEAR":
633 print_str += "ct_clear"
634 elif field[0] == "OVS_ACTION_ATTR_POP_VLAN":
635 print_str += "pop_vlan"
636 elif field[0] == "OVS_ACTION_ATTR_POP_ETH":
637 print_str += "pop_eth"
638 elif field[0] == "OVS_ACTION_ATTR_POP_NSH":
639 print_str += "pop_nsh"
640 elif field[0] == "OVS_ACTION_ATTR_POP_MPLS":
641 print_str += "pop_mpls"
642 else:
643 datum = self.get_attr(field[0])
644 if field[0] == "OVS_ACTION_ATTR_CLONE":
645 print_str += "clone("
646 print_str += datum.dpstr(more)
647 print_str += ")"
648 elif field[0] == "OVS_ACTION_ATTR_SET" or \
649 field[0] == "OVS_ACTION_ATTR_SET_MASKED":
650 print_str += "set"
651 field = datum
652 mask = None
653 if field[0] == "OVS_ACTION_ATTR_SET_MASKED":
654 print_str += "_masked"
655 field = datum[0]
656 mask = datum[1]
657 print_str += "("
658 print_str += field.dpstr(mask, more)
659 print_str += ")"
660 else:
661 try:
662 print_str += datum.dpstr(more)
663 except:
664 print_str += "{ATTR: %s not decoded}" % field[0]
665
666 return print_str
667
668 def parse(self, actstr):
669 totallen = len(actstr)
670 while len(actstr) != 0:
671 parsed = False
672 parencount = 0
673 if actstr.startswith("drop"):
674 # If no reason is provided, the implicit drop is used (i.e no
675 # action). If some reason is given, an explicit action is used.
676 reason = None
677 if actstr.startswith("drop("):
678 parencount += 1
679
680 actstr, reason = parse_extract_field(
681 actstr,
682 "drop(",
683 r"([0-9]+)",
684 lambda x: int(x, 0),
685 False,
686 None,
687 )
688
689 if reason is not None:
690 self["attrs"].append(["OVS_ACTION_ATTR_DROP", reason])
691 parsed = True
692 else:
693 actstr = actstr[len("drop"): ]
694 return (totallen - len(actstr))
695
696 elif parse_starts_block(actstr, r"^(\d+)", False, True):
697 actstr, output = parse_extract_field(
698 actstr, None, r"(\d+)", lambda x: int(x), False, "0"
699 )
700 self["attrs"].append(["OVS_ACTION_ATTR_OUTPUT", output])
701 parsed = True
702 elif parse_starts_block(actstr, "recirc(", False):
703 actstr, recircid = parse_extract_field(
704 actstr,
705 "recirc(",
706 r"([0-9a-fA-Fx]+)",
707 lambda x: int(x, 0),
708 False,
709 0,
710 )
711 parencount += 1
712 self["attrs"].append(["OVS_ACTION_ATTR_RECIRC", recircid])
713 parsed = True
714
715 parse_flat_map = (
716 ("ct_clear", "OVS_ACTION_ATTR_CT_CLEAR"),
717 ("pop_vlan", "OVS_ACTION_ATTR_POP_VLAN"),
718 ("pop_eth", "OVS_ACTION_ATTR_POP_ETH"),
719 ("pop_nsh", "OVS_ACTION_ATTR_POP_NSH"),
720 )
721
722 for flat_act in parse_flat_map:
723 if parse_starts_block(actstr, flat_act[0], False):
724 actstr = actstr[len(flat_act[0]):]
725 self["attrs"].append([flat_act[1], True])
726 actstr = actstr[strspn(actstr, ", ") :]
727 parsed = True
728
729 if parse_starts_block(actstr, "clone(", False):
730 parencount += 1
731 subacts = ovsactions()
732 actstr = actstr[len("clone("):]
733 parsedLen = subacts.parse(actstr)
734 lst = []
735 self["attrs"].append(("OVS_ACTION_ATTR_CLONE", subacts))
736 actstr = actstr[parsedLen:]
737 parsed = True
738 elif parse_starts_block(actstr, "set(", False):
739 parencount += 1
740 k = ovskey()
741 actstr = actstr[len("set("):]
742 actstr = k.parse(actstr, None)
743 self["attrs"].append(("OVS_ACTION_ATTR_SET", k))
744 if not actstr.startswith(")"):
745 actstr = ")" + actstr
746 parsed = True
747 elif parse_starts_block(actstr, "set_masked(", False):
748 parencount += 1
749 k = ovskey()
750 m = ovskey()
751 actstr = actstr[len("set_masked("):]
752 actstr = k.parse(actstr, m)
753 self["attrs"].append(("OVS_ACTION_ATTR_SET_MASKED", [k, m]))
754 if not actstr.startswith(")"):
755 actstr = ")" + actstr
756 parsed = True
757 elif parse_starts_block(actstr, "ct(", False):
758 parencount += 1
759 actstr = actstr[len("ct(") :]
760 ctact = ovsactions.ctact()
761
762 for scan in (
763 ("commit", "OVS_CT_ATTR_COMMIT", None),
764 ("force_commit", "OVS_CT_ATTR_FORCE_COMMIT", None),
765 ("zone", "OVS_CT_ATTR_ZONE", int),
766 ("mark", "OVS_CT_ATTR_MARK", int),
767 ("helper", "OVS_CT_ATTR_HELPER", lambda x, y: str(x)),
768 ("timeout", "OVS_CT_ATTR_TIMEOUT", lambda x, y: str(x)),
769 ):
770 if actstr.startswith(scan[0]):
771 actstr = actstr[len(scan[0]) :]
772 if scan[2] is not None:
773 if actstr[0] != "=":
774 raise ValueError("Invalid ct attr")
775 actstr = actstr[1:]
776 pos = strcspn(actstr, ",)")
777 datum = scan[2](actstr[:pos], 0)
778 ctact["attrs"].append([scan[1], datum])
779 actstr = actstr[pos:]
780 else:
781 ctact["attrs"].append([scan[1], None])
782 actstr = actstr[strspn(actstr, ", ") :]
783 # it seems strange to put this here, but nat() is a complex
784 # sub-action and this lets it sit anywhere in the ct() action
785 if actstr.startswith("nat"):
786 actstr = actstr[3:]
787 natact = ovsactions.ctact.natattr()
788
789 if actstr.startswith("("):
790 parencount += 1
791 t = None
792 actstr = actstr[1:]
793 if actstr.startswith("src"):
794 t = "OVS_NAT_ATTR_SRC"
795 actstr = actstr[3:]
796 elif actstr.startswith("dst"):
797 t = "OVS_NAT_ATTR_DST"
798 actstr = actstr[3:]
799
800 actstr, ip_block_min = parse_extract_field(
801 actstr, "=", r"([0-9a-fA-F\.]+)", str, False
802 )
803 actstr, ip_block_max = parse_extract_field(
804 actstr, "-", r"([0-9a-fA-F\.]+)", str, False
805 )
806
807 actstr, proto_min = parse_extract_field(
808 actstr, ":", r"(\d+)", int, False
809 )
810 actstr, proto_max = parse_extract_field(
811 actstr, "-", r"(\d+)", int, False
812 )
813
814 if t is not None:
815 natact["attrs"].append([t, None])
816
817 if ip_block_min is not None:
818 natact["attrs"].append(
819 ["OVS_NAT_ATTR_IP_MIN", ip_block_min]
820 )
821 if ip_block_max is not None:
822 natact["attrs"].append(
823 ["OVS_NAT_ATTR_IP_MAX", ip_block_max]
824 )
825 if proto_min is not None:
826 natact["attrs"].append(
827 ["OVS_NAT_ATTR_PROTO_MIN", proto_min]
828 )
829 if proto_max is not None:
830 natact["attrs"].append(
831 ["OVS_NAT_ATTR_PROTO_MAX", proto_max]
832 )
833
834 for natscan in (
835 ("persistent", "OVS_NAT_ATTR_PERSISTENT"),
836 ("hash", "OVS_NAT_ATTR_PROTO_HASH"),
837 ("random", "OVS_NAT_ATTR_PROTO_RANDOM"),
838 ):
839 if actstr.startswith(natscan[0]):
840 actstr = actstr[len(natscan[0]) :]
841 natact["attrs"].append([natscan[1], None])
842 actstr = actstr[strspn(actstr, ", ") :]
843
844 ctact["attrs"].append(["OVS_CT_ATTR_NAT", natact])
845 actstr = actstr[strspn(actstr, ", ") :]
846
847 self["attrs"].append(["OVS_ACTION_ATTR_CT", ctact])
848 parsed = True
849
850 elif parse_starts_block(actstr, "sample(", False):
851 sampleact = self.sample()
852 actstr = sampleact.parse(actstr[len("sample(") : ])
853 self["attrs"].append(["OVS_ACTION_ATTR_SAMPLE", sampleact])
854 parsed = True
855
856 elif parse_starts_block(actstr, "psample(", False):
857 psampleact = self.psample()
858 actstr = psampleact.parse(actstr[len("psample(") : ])
859 self["attrs"].append(["OVS_ACTION_ATTR_PSAMPLE", psampleact])
860 parsed = True
861
862 elif parse_starts_block(actstr, "userspace(", False):
863 uact = self.userspace()
864 actstr = uact.parse(actstr[len("userspace(") : ])
865 self["attrs"].append(["OVS_ACTION_ATTR_USERSPACE", uact])
866 parsed = True
867
868 elif parse_starts_block(actstr, "trunc(", False):
869 parencount += 1
870 actstr, val = parse_extract_field(
871 actstr,
872 "trunc(",
873 r"([0-9]+)",
874 int,
875 False,
876 None,
877 )
878 self["attrs"].append(["OVS_ACTION_ATTR_TRUNC", val])
879 parsed = True
880
881 actstr = actstr[strspn(actstr, ", ") :]
882 while parencount > 0:
883 parencount -= 1
884 actstr = actstr[strspn(actstr, " "):]
885 if len(actstr) and actstr[0] != ")":
886 raise ValueError("Action str: '%s' unbalanced" % actstr)
887 actstr = actstr[1:]
888
889 if len(actstr) and actstr[0] == ")":
890 return (totallen - len(actstr))
891
892 actstr = actstr[strspn(actstr, ", ") :]
893
894 if not parsed:
895 raise ValueError("Action str: '%s' not supported" % actstr)
896
897 return (totallen - len(actstr))
898
899
900class ovskey(nla):
901 nla_flags = NLA_F_NESTED
902 nla_map = (
903 ("OVS_KEY_ATTR_UNSPEC", "none"),
904 ("OVS_KEY_ATTR_ENCAP", "none"),
905 ("OVS_KEY_ATTR_PRIORITY", "uint32"),
906 ("OVS_KEY_ATTR_IN_PORT", "uint32"),
907 ("OVS_KEY_ATTR_ETHERNET", "ethaddr"),
908 ("OVS_KEY_ATTR_VLAN", "uint16"),
909 ("OVS_KEY_ATTR_ETHERTYPE", "be16"),
910 ("OVS_KEY_ATTR_IPV4", "ovs_key_ipv4"),
911 ("OVS_KEY_ATTR_IPV6", "ovs_key_ipv6"),
912 ("OVS_KEY_ATTR_TCP", "ovs_key_tcp"),
913 ("OVS_KEY_ATTR_UDP", "ovs_key_udp"),
914 ("OVS_KEY_ATTR_ICMP", "ovs_key_icmp"),
915 ("OVS_KEY_ATTR_ICMPV6", "ovs_key_icmpv6"),
916 ("OVS_KEY_ATTR_ARP", "ovs_key_arp"),
917 ("OVS_KEY_ATTR_ND", "ovs_key_nd"),
918 ("OVS_KEY_ATTR_SKB_MARK", "uint32"),
919 ("OVS_KEY_ATTR_TUNNEL", "ovs_key_tunnel"),
920 ("OVS_KEY_ATTR_SCTP", "ovs_key_sctp"),
921 ("OVS_KEY_ATTR_TCP_FLAGS", "be16"),
922 ("OVS_KEY_ATTR_DP_HASH", "uint32"),
923 ("OVS_KEY_ATTR_RECIRC_ID", "uint32"),
924 ("OVS_KEY_ATTR_MPLS", "array(ovs_key_mpls)"),
925 ("OVS_KEY_ATTR_CT_STATE", "uint32"),
926 ("OVS_KEY_ATTR_CT_ZONE", "uint16"),
927 ("OVS_KEY_ATTR_CT_MARK", "uint32"),
928 ("OVS_KEY_ATTR_CT_LABELS", "none"),
929 ("OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV4", "ovs_key_ct_tuple_ipv4"),
930 ("OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV6", "ovs_key_ct_tuple_ipv6"),
931 ("OVS_KEY_ATTR_NSH", "none"),
932 ("OVS_KEY_ATTR_PACKET_TYPE", "none"),
933 ("OVS_KEY_ATTR_ND_EXTENSIONS", "none"),
934 ("OVS_KEY_ATTR_TUNNEL_INFO", "none"),
935 ("OVS_KEY_ATTR_IPV6_EXTENSIONS", "none"),
936 )
937
938 class ovs_key_proto(nla):
939 fields = (
940 ("src", "!H"),
941 ("dst", "!H"),
942 )
943
944 fields_map = (
945 ("src", "src", "%d", lambda x: int(x) if x else 0,
946 convert_int(16)),
947 ("dst", "dst", "%d", lambda x: int(x) if x else 0,
948 convert_int(16)),
949 )
950
951 def __init__(
952 self,
953 protostr,
954 data=None,
955 offset=None,
956 parent=None,
957 length=None,
958 init=None,
959 ):
960 self.proto_str = protostr
961 nla.__init__(
962 self,
963 data=data,
964 offset=offset,
965 parent=parent,
966 length=length,
967 init=init,
968 )
969
970 def parse(self, flowstr, typeInst):
971 if not flowstr.startswith(self.proto_str):
972 return None, None
973
974 k = typeInst()
975 m = typeInst()
976
977 flowstr = flowstr[len(self.proto_str) :]
978 if flowstr.startswith("("):
979 flowstr = flowstr[1:]
980
981 keybits = b""
982 maskbits = b""
983 for f in self.fields_map:
984 if flowstr.startswith(f[1]):
985 # the following assumes that the field looks
986 # something like 'field.' where '.' is a
987 # character that we don't exactly care about.
988 flowstr = flowstr[len(f[1]) + 1 :]
989 splitchar = 0
990 for c in flowstr:
991 if c == "," or c == ")":
992 break
993 splitchar += 1
994 data = flowstr[:splitchar]
995 flowstr = flowstr[splitchar:]
996 else:
997 data = ""
998
999 if len(f) > 4:
1000 k[f[0]], m[f[0]] = f[4](data)
1001 else:
1002 k[f[0]] = f[3](data)
1003 m[f[0]] = f[3](data)
1004
1005 flowstr = flowstr[strspn(flowstr, ", ") :]
1006 if len(flowstr) == 0:
1007 return flowstr, k, m
1008
1009 flowstr = flowstr[strspn(flowstr, "), ") :]
1010
1011 return flowstr, k, m
1012
1013 def dpstr(self, masked=None, more=False):
1014 outstr = self.proto_str + "("
1015 first = False
1016 for f in self.fields_map:
1017 if first:
1018 outstr += ","
1019 if masked is None:
1020 outstr += "%s=" % f[0]
1021 if isinstance(f[2], str):
1022 outstr += f[2] % self[f[1]]
1023 else:
1024 outstr += f[2](self[f[1]])
1025 first = True
1026 elif more or f[3](masked[f[1]]) != 0:
1027 outstr += "%s=" % f[0]
1028 if isinstance(f[2], str):
1029 outstr += f[2] % self[f[1]]
1030 else:
1031 outstr += f[2](self[f[1]])
1032 outstr += "/"
1033 if isinstance(f[2], str):
1034 outstr += f[2] % masked[f[1]]
1035 else:
1036 outstr += f[2](masked[f[1]])
1037 first = True
1038 outstr += ")"
1039 return outstr
1040
1041 class ethaddr(ovs_key_proto):
1042 fields = (
1043 ("src", "!6s"),
1044 ("dst", "!6s"),
1045 )
1046
1047 fields_map = (
1048 (
1049 "src",
1050 "src",
1051 macstr,
1052 lambda x: int.from_bytes(x, "big"),
1053 convert_mac,
1054 ),
1055 (
1056 "dst",
1057 "dst",
1058 macstr,
1059 lambda x: int.from_bytes(x, "big"),
1060 convert_mac,
1061 ),
1062 )
1063
1064 def __init__(
1065 self,
1066 data=None,
1067 offset=None,
1068 parent=None,
1069 length=None,
1070 init=None,
1071 ):
1072 ovskey.ovs_key_proto.__init__(
1073 self,
1074 "eth",
1075 data=data,
1076 offset=offset,
1077 parent=parent,
1078 length=length,
1079 init=init,
1080 )
1081
1082 class ovs_key_ipv4(ovs_key_proto):
1083 fields = (
1084 ("src", "!I"),
1085 ("dst", "!I"),
1086 ("proto", "B"),
1087 ("tos", "B"),
1088 ("ttl", "B"),
1089 ("frag", "B"),
1090 )
1091
1092 fields_map = (
1093 (
1094 "src",
1095 "src",
1096 lambda x: str(ipaddress.IPv4Address(x)),
1097 int,
1098 convert_ipv4,
1099 ),
1100 (
1101 "dst",
1102 "dst",
1103 lambda x: str(ipaddress.IPv4Address(x)),
1104 int,
1105 convert_ipv4,
1106 ),
1107 ("proto", "proto", "%d", lambda x: int(x) if x else 0,
1108 convert_int(8)),
1109 ("tos", "tos", "%d", lambda x: int(x) if x else 0,
1110 convert_int(8)),
1111 ("ttl", "ttl", "%d", lambda x: int(x) if x else 0,
1112 convert_int(8)),
1113 ("frag", "frag", "%d", lambda x: int(x) if x else 0,
1114 convert_int(8)),
1115 )
1116
1117 def __init__(
1118 self,
1119 data=None,
1120 offset=None,
1121 parent=None,
1122 length=None,
1123 init=None,
1124 ):
1125 ovskey.ovs_key_proto.__init__(
1126 self,
1127 "ipv4",
1128 data=data,
1129 offset=offset,
1130 parent=parent,
1131 length=length,
1132 init=init,
1133 )
1134
1135 class ovs_key_ipv6(ovs_key_proto):
1136 fields = (
1137 ("src", "!16s"),
1138 ("dst", "!16s"),
1139 ("label", "!I"),
1140 ("proto", "B"),
1141 ("tclass", "B"),
1142 ("hlimit", "B"),
1143 ("frag", "B"),
1144 )
1145
1146 fields_map = (
1147 (
1148 "src",
1149 "src",
1150 lambda x: str(ipaddress.IPv6Address(x)),
1151 lambda x: ipaddress.IPv6Address(x).packed if x else 0,
1152 convert_ipv6,
1153 ),
1154 (
1155 "dst",
1156 "dst",
1157 lambda x: str(ipaddress.IPv6Address(x)),
1158 lambda x: ipaddress.IPv6Address(x).packed if x else 0,
1159 convert_ipv6,
1160 ),
1161 ("label", "label", "%d", lambda x: int(x) if x else 0),
1162 ("proto", "proto", "%d", lambda x: int(x) if x else 0),
1163 ("tclass", "tclass", "%d", lambda x: int(x) if x else 0),
1164 ("hlimit", "hlimit", "%d", lambda x: int(x) if x else 0),
1165 ("frag", "frag", "%d", lambda x: int(x) if x else 0),
1166 )
1167
1168 def __init__(
1169 self,
1170 data=None,
1171 offset=None,
1172 parent=None,
1173 length=None,
1174 init=None,
1175 ):
1176 ovskey.ovs_key_proto.__init__(
1177 self,
1178 "ipv6",
1179 data=data,
1180 offset=offset,
1181 parent=parent,
1182 length=length,
1183 init=init,
1184 )
1185
1186 class ovs_key_tcp(ovs_key_proto):
1187 def __init__(
1188 self,
1189 data=None,
1190 offset=None,
1191 parent=None,
1192 length=None,
1193 init=None,
1194 ):
1195 ovskey.ovs_key_proto.__init__(
1196 self,
1197 "tcp",
1198 data=data,
1199 offset=offset,
1200 parent=parent,
1201 length=length,
1202 init=init,
1203 )
1204
1205 class ovs_key_udp(ovs_key_proto):
1206 def __init__(
1207 self,
1208 data=None,
1209 offset=None,
1210 parent=None,
1211 length=None,
1212 init=None,
1213 ):
1214 ovskey.ovs_key_proto.__init__(
1215 self,
1216 "udp",
1217 data=data,
1218 offset=offset,
1219 parent=parent,
1220 length=length,
1221 init=init,
1222 )
1223
1224 class ovs_key_sctp(ovs_key_proto):
1225 def __init__(
1226 self,
1227 data=None,
1228 offset=None,
1229 parent=None,
1230 length=None,
1231 init=None,
1232 ):
1233 ovskey.ovs_key_proto.__init__(
1234 self,
1235 "sctp",
1236 data=data,
1237 offset=offset,
1238 parent=parent,
1239 length=length,
1240 init=init,
1241 )
1242
1243 class ovs_key_icmp(ovs_key_proto):
1244 fields = (
1245 ("type", "B"),
1246 ("code", "B"),
1247 )
1248
1249 fields_map = (
1250 ("type", "type", "%d", lambda x: int(x) if x else 0),
1251 ("code", "code", "%d", lambda x: int(x) if x else 0),
1252 )
1253
1254 def __init__(
1255 self,
1256 data=None,
1257 offset=None,
1258 parent=None,
1259 length=None,
1260 init=None,
1261 ):
1262 ovskey.ovs_key_proto.__init__(
1263 self,
1264 "icmp",
1265 data=data,
1266 offset=offset,
1267 parent=parent,
1268 length=length,
1269 init=init,
1270 )
1271
1272 class ovs_key_icmpv6(ovs_key_icmp):
1273 def __init__(
1274 self,
1275 data=None,
1276 offset=None,
1277 parent=None,
1278 length=None,
1279 init=None,
1280 ):
1281 ovskey.ovs_key_proto.__init__(
1282 self,
1283 "icmpv6",
1284 data=data,
1285 offset=offset,
1286 parent=parent,
1287 length=length,
1288 init=init,
1289 )
1290
1291 class ovs_key_arp(ovs_key_proto):
1292 fields = (
1293 ("sip", "!I"),
1294 ("tip", "!I"),
1295 ("op", "!H"),
1296 ("sha", "!6s"),
1297 ("tha", "!6s"),
1298 ("pad", "xx"),
1299 )
1300
1301 fields_map = (
1302 (
1303 "sip",
1304 "sip",
1305 lambda x: str(ipaddress.IPv4Address(x)),
1306 int,
1307 convert_ipv4,
1308 ),
1309 (
1310 "tip",
1311 "tip",
1312 lambda x: str(ipaddress.IPv4Address(x)),
1313 int,
1314 convert_ipv4,
1315 ),
1316 ("op", "op", "%d", lambda x: int(x) if x else 0),
1317 (
1318 "sha",
1319 "sha",
1320 macstr,
1321 lambda x: int.from_bytes(x, "big"),
1322 convert_mac,
1323 ),
1324 (
1325 "tha",
1326 "tha",
1327 macstr,
1328 lambda x: int.from_bytes(x, "big"),
1329 convert_mac,
1330 ),
1331 )
1332
1333 def __init__(
1334 self,
1335 data=None,
1336 offset=None,
1337 parent=None,
1338 length=None,
1339 init=None,
1340 ):
1341 ovskey.ovs_key_proto.__init__(
1342 self,
1343 "arp",
1344 data=data,
1345 offset=offset,
1346 parent=parent,
1347 length=length,
1348 init=init,
1349 )
1350
1351 class ovs_key_nd(ovs_key_proto):
1352 fields = (
1353 ("target", "!16s"),
1354 ("sll", "!6s"),
1355 ("tll", "!6s"),
1356 )
1357
1358 fields_map = (
1359 (
1360 "target",
1361 "target",
1362 lambda x: str(ipaddress.IPv6Address(x)),
1363 convert_ipv6,
1364 ),
1365 ("sll", "sll", macstr, lambda x: int.from_bytes(x, "big")),
1366 ("tll", "tll", macstr, lambda x: int.from_bytes(x, "big")),
1367 )
1368
1369 def __init__(
1370 self,
1371 data=None,
1372 offset=None,
1373 parent=None,
1374 length=None,
1375 init=None,
1376 ):
1377 ovskey.ovs_key_proto.__init__(
1378 self,
1379 "nd",
1380 data=data,
1381 offset=offset,
1382 parent=parent,
1383 length=length,
1384 init=init,
1385 )
1386
1387 class ovs_key_ct_tuple_ipv4(ovs_key_proto):
1388 fields = (
1389 ("src", "!I"),
1390 ("dst", "!I"),
1391 ("tp_src", "!H"),
1392 ("tp_dst", "!H"),
1393 ("proto", "B"),
1394 )
1395
1396 fields_map = (
1397 (
1398 "src",
1399 "src",
1400 lambda x: str(ipaddress.IPv4Address(x)),
1401 int,
1402 convert_ipv4,
1403 ),
1404 (
1405 "dst",
1406 "dst",
1407 lambda x: str(ipaddress.IPv4Address(x)),
1408 int,
1409 convert_ipv4,
1410 ),
1411 ("tp_src", "tp_src", "%d", int),
1412 ("tp_dst", "tp_dst", "%d", int),
1413 ("proto", "proto", "%d", int),
1414 )
1415
1416 def __init__(
1417 self,
1418 data=None,
1419 offset=None,
1420 parent=None,
1421 length=None,
1422 init=None,
1423 ):
1424 ovskey.ovs_key_proto.__init__(
1425 self,
1426 "ct_tuple4",
1427 data=data,
1428 offset=offset,
1429 parent=parent,
1430 length=length,
1431 init=init,
1432 )
1433
1434 class ovs_key_ct_tuple_ipv6(nla):
1435 fields = (
1436 ("src", "!16s"),
1437 ("dst", "!16s"),
1438 ("tp_src", "!H"),
1439 ("tp_dst", "!H"),
1440 ("proto", "B"),
1441 )
1442
1443 fields_map = (
1444 (
1445 "src",
1446 "src",
1447 lambda x: str(ipaddress.IPv6Address(x)),
1448 convert_ipv6,
1449 ),
1450 (
1451 "dst",
1452 "dst",
1453 lambda x: str(ipaddress.IPv6Address(x)),
1454 convert_ipv6,
1455 ),
1456 ("tp_src", "tp_src", "%d", int),
1457 ("tp_dst", "tp_dst", "%d", int),
1458 ("proto", "proto", "%d", int),
1459 )
1460
1461 def __init__(
1462 self,
1463 data=None,
1464 offset=None,
1465 parent=None,
1466 length=None,
1467 init=None,
1468 ):
1469 ovskey.ovs_key_proto.__init__(
1470 self,
1471 "ct_tuple6",
1472 data=data,
1473 offset=offset,
1474 parent=parent,
1475 length=length,
1476 init=init,
1477 )
1478
1479 class ovs_key_tunnel(nla):
1480 nla_flags = NLA_F_NESTED
1481
1482 nla_map = (
1483 ("OVS_TUNNEL_KEY_ATTR_ID", "be64"),
1484 ("OVS_TUNNEL_KEY_ATTR_IPV4_SRC", "ipaddr"),
1485 ("OVS_TUNNEL_KEY_ATTR_IPV4_DST", "ipaddr"),
1486 ("OVS_TUNNEL_KEY_ATTR_TOS", "uint8"),
1487 ("OVS_TUNNEL_KEY_ATTR_TTL", "uint8"),
1488 ("OVS_TUNNEL_KEY_ATTR_DONT_FRAGMENT", "flag"),
1489 ("OVS_TUNNEL_KEY_ATTR_CSUM", "flag"),
1490 ("OVS_TUNNEL_KEY_ATTR_OAM", "flag"),
1491 ("OVS_TUNNEL_KEY_ATTR_GENEVE_OPTS", "array(uint32)"),
1492 ("OVS_TUNNEL_KEY_ATTR_TP_SRC", "be16"),
1493 ("OVS_TUNNEL_KEY_ATTR_TP_DST", "be16"),
1494 ("OVS_TUNNEL_KEY_ATTR_VXLAN_OPTS", "none"),
1495 ("OVS_TUNNEL_KEY_ATTR_IPV6_SRC", "ipaddr"),
1496 ("OVS_TUNNEL_KEY_ATTR_IPV6_DST", "ipaddr"),
1497 ("OVS_TUNNEL_KEY_ATTR_PAD", "none"),
1498 ("OVS_TUNNEL_KEY_ATTR_ERSPAN_OPTS", "none"),
1499 ("OVS_TUNNEL_KEY_ATTR_IPV4_INFO_BRIDGE", "flag"),
1500 )
1501
1502 def parse(self, flowstr, mask=None):
1503 if not flowstr.startswith("tunnel("):
1504 return None, None
1505
1506 k = ovskey.ovs_key_tunnel()
1507 if mask is not None:
1508 mask = ovskey.ovs_key_tunnel()
1509
1510 flowstr = flowstr[len("tunnel("):]
1511
1512 v6_address = None
1513
1514 fields = [
1515 ("tun_id=", r"(\d+)", int, "OVS_TUNNEL_KEY_ATTR_ID",
1516 0xffffffffffffffff, None, None),
1517
1518 ("src=", r"([0-9a-fA-F\.]+)", str,
1519 "OVS_TUNNEL_KEY_ATTR_IPV4_SRC", "255.255.255.255", "0.0.0.0",
1520 False),
1521 ("dst=", r"([0-9a-fA-F\.]+)", str,
1522 "OVS_TUNNEL_KEY_ATTR_IPV4_DST", "255.255.255.255", "0.0.0.0",
1523 False),
1524
1525 ("ipv6_src=", r"([0-9a-fA-F:]+)", str,
1526 "OVS_TUNNEL_KEY_ATTR_IPV6_SRC",
1527 "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", "::", True),
1528 ("ipv6_dst=", r"([0-9a-fA-F:]+)", str,
1529 "OVS_TUNNEL_KEY_ATTR_IPV6_DST",
1530 "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff", "::", True),
1531
1532 ("tos=", r"(\d+)", int, "OVS_TUNNEL_KEY_ATTR_TOS", 255, 0,
1533 None),
1534 ("ttl=", r"(\d+)", int, "OVS_TUNNEL_KEY_ATTR_TTL", 255, 0,
1535 None),
1536
1537 ("tp_src=", r"(\d+)", int, "OVS_TUNNEL_KEY_ATTR_TP_SRC",
1538 65535, 0, None),
1539 ("tp_dst=", r"(\d+)", int, "OVS_TUNNEL_KEY_ATTR_TP_DST",
1540 65535, 0, None),
1541 ]
1542
1543 forced_include = ["OVS_TUNNEL_KEY_ATTR_TTL"]
1544
1545 for prefix, regex, typ, attr_name, mask_val, default_val, v46_flag in fields:
1546 flowstr, value = parse_extract_field(flowstr, prefix, regex, typ, False)
1547 if not attr_name:
1548 raise Exception("Bad list value in tunnel fields")
1549
1550 if value is None and attr_name in forced_include:
1551 value = default_val
1552 mask_val = default_val
1553
1554 if value is not None:
1555 if v46_flag is not None:
1556 if v6_address is None:
1557 v6_address = v46_flag
1558 if v46_flag != v6_address:
1559 raise ValueError("Cannot mix v6 and v4 addresses")
1560 k["attrs"].append([attr_name, value])
1561 if mask is not None:
1562 mask["attrs"].append([attr_name, mask_val])
1563 else:
1564 if v46_flag is not None:
1565 if v6_address is None or v46_flag != v6_address:
1566 continue
1567 if mask is not None:
1568 mask["attrs"].append([attr_name, default_val])
1569
1570 if k["attrs"][0][0] != "OVS_TUNNEL_KEY_ATTR_ID":
1571 raise ValueError("Needs a tunid set")
1572
1573 if flowstr.startswith("flags("):
1574 flowstr = flowstr[len("flags("):]
1575 flagspos = flowstr.find(")")
1576 flags = flowstr[:flagspos]
1577 flowstr = flowstr[flagspos + 1:]
1578
1579 flag_attrs = {
1580 "df": "OVS_TUNNEL_KEY_ATTR_DONT_FRAGMENT",
1581 "csum": "OVS_TUNNEL_KEY_ATTR_CSUM",
1582 "oam": "OVS_TUNNEL_KEY_ATTR_OAM"
1583 }
1584
1585 for flag in flags.split("|"):
1586 if flag in flag_attrs:
1587 k["attrs"].append([flag_attrs[flag], True])
1588 if mask is not None:
1589 mask["attrs"].append([flag_attrs[flag], True])
1590
1591 flowstr = flowstr[strspn(flowstr, ", ") :]
1592 return flowstr, k, mask
1593
1594 def dpstr(self, mask=None, more=False):
1595 print_str = "tunnel("
1596
1597 flagsattrs = []
1598 for k in self["attrs"]:
1599 noprint = False
1600 if k[0] == "OVS_TUNNEL_KEY_ATTR_ID":
1601 print_str += "tun_id=%d" % k[1]
1602 elif k[0] == "OVS_TUNNEL_KEY_ATTR_IPV4_SRC":
1603 print_str += "src=%s" % k[1]
1604 elif k[0] == "OVS_TUNNEL_KEY_ATTR_IPV4_DST":
1605 print_str += "dst=%s" % k[1]
1606 elif k[0] == "OVS_TUNNEL_KEY_ATTR_IPV6_SRC":
1607 print_str += "ipv6_src=%s" % k[1]
1608 elif k[0] == "OVS_TUNNEL_KEY_ATTR_IPV6_DST":
1609 print_str += "ipv6_dst=%s" % k[1]
1610 elif k[0] == "OVS_TUNNEL_KEY_ATTR_TOS":
1611 print_str += "tos=%d" % k[1]
1612 elif k[0] == "OVS_TUNNEL_KEY_ATTR_TTL":
1613 print_str += "ttl=%d" % k[1]
1614 elif k[0] == "OVS_TUNNEL_KEY_ATTR_TP_SRC":
1615 print_str += "tp_src=%d" % k[1]
1616 elif k[0] == "OVS_TUNNEL_KEY_ATTR_TP_DST":
1617 print_str += "tp_dst=%d" % k[1]
1618 elif k[0] == "OVS_TUNNEL_KEY_ATTR_DONT_FRAGMENT":
1619 noprint = True
1620 flagsattrs.append("df")
1621 elif k[0] == "OVS_TUNNEL_KEY_ATTR_CSUM":
1622 noprint = True
1623 flagsattrs.append("csum")
1624 elif k[0] == "OVS_TUNNEL_KEY_ATTR_OAM":
1625 noprint = True
1626 flagsattrs.append("oam")
1627
1628 if not noprint:
1629 print_str += ","
1630
1631 if len(flagsattrs):
1632 print_str += "flags(" + "|".join(flagsattrs) + ")"
1633 print_str += ")"
1634 return print_str
1635
1636 class ovs_key_mpls(nla):
1637 fields = (("lse", ">I"),)
1638
1639 def parse(self, flowstr, mask=None):
1640 for field in (
1641 ("OVS_KEY_ATTR_PRIORITY", "skb_priority", intparse),
1642 ("OVS_KEY_ATTR_SKB_MARK", "skb_mark", intparse),
1643 ("OVS_KEY_ATTR_RECIRC_ID", "recirc_id", intparse),
1644 ("OVS_KEY_ATTR_TUNNEL", "tunnel", ovskey.ovs_key_tunnel),
1645 ("OVS_KEY_ATTR_DP_HASH", "dp_hash", intparse),
1646 ("OVS_KEY_ATTR_CT_STATE", "ct_state", parse_ct_state),
1647 ("OVS_KEY_ATTR_CT_ZONE", "ct_zone", intparse),
1648 ("OVS_KEY_ATTR_CT_MARK", "ct_mark", intparse),
1649 ("OVS_KEY_ATTR_IN_PORT", "in_port", intparse),
1650 (
1651 "OVS_KEY_ATTR_ETHERNET",
1652 "eth",
1653 ovskey.ethaddr,
1654 ),
1655 (
1656 "OVS_KEY_ATTR_ETHERTYPE",
1657 "eth_type",
1658 lambda x: intparse(x, "0xffff"),
1659 ),
1660 (
1661 "OVS_KEY_ATTR_IPV4",
1662 "ipv4",
1663 ovskey.ovs_key_ipv4,
1664 ),
1665 (
1666 "OVS_KEY_ATTR_IPV6",
1667 "ipv6",
1668 ovskey.ovs_key_ipv6,
1669 ),
1670 (
1671 "OVS_KEY_ATTR_ARP",
1672 "arp",
1673 ovskey.ovs_key_arp,
1674 ),
1675 (
1676 "OVS_KEY_ATTR_TCP",
1677 "tcp",
1678 ovskey.ovs_key_tcp,
1679 ),
1680 (
1681 "OVS_KEY_ATTR_UDP",
1682 "udp",
1683 ovskey.ovs_key_udp,
1684 ),
1685 (
1686 "OVS_KEY_ATTR_ICMP",
1687 "icmp",
1688 ovskey.ovs_key_icmp,
1689 ),
1690 (
1691 "OVS_KEY_ATTR_TCP_FLAGS",
1692 "tcp_flags",
1693 lambda x: parse_flags(x, None),
1694 ),
1695 ):
1696 fld = field[1] + "("
1697 if not flowstr.startswith(fld):
1698 continue
1699
1700 if not isinstance(field[2], types.FunctionType):
1701 nk = field[2]()
1702 flowstr, k, m = nk.parse(flowstr, field[2])
1703 else:
1704 flowstr = flowstr[len(fld) :]
1705 flowstr, k, m = field[2](flowstr)
1706
1707 if m and mask is not None:
1708 mask["attrs"].append([field[0], m])
1709 self["attrs"].append([field[0], k])
1710
1711 flowstr = flowstr[strspn(flowstr, "), ") :]
1712
1713 return flowstr
1714
1715 def dpstr(self, mask=None, more=False):
1716 print_str = ""
1717
1718 for field in (
1719 (
1720 "OVS_KEY_ATTR_PRIORITY",
1721 "skb_priority",
1722 "%d",
1723 lambda x: False,
1724 True,
1725 ),
1726 (
1727 "OVS_KEY_ATTR_SKB_MARK",
1728 "skb_mark",
1729 "%d",
1730 lambda x: False,
1731 True,
1732 ),
1733 (
1734 "OVS_KEY_ATTR_RECIRC_ID",
1735 "recirc_id",
1736 "0x%08X",
1737 lambda x: False,
1738 True,
1739 ),
1740 (
1741 "OVS_KEY_ATTR_DP_HASH",
1742 "dp_hash",
1743 "0x%08X",
1744 lambda x: False,
1745 True,
1746 ),
1747 (
1748 "OVS_KEY_ATTR_TUNNEL",
1749 "tunnel",
1750 None,
1751 False,
1752 False,
1753 ),
1754 (
1755 "OVS_KEY_ATTR_CT_STATE",
1756 "ct_state",
1757 "0x%04x",
1758 lambda x: False,
1759 True,
1760 ),
1761 (
1762 "OVS_KEY_ATTR_CT_ZONE",
1763 "ct_zone",
1764 "0x%04x",
1765 lambda x: False,
1766 True,
1767 ),
1768 (
1769 "OVS_KEY_ATTR_CT_MARK",
1770 "ct_mark",
1771 "0x%08x",
1772 lambda x: False,
1773 True,
1774 ),
1775 (
1776 "OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV4",
1777 None,
1778 None,
1779 False,
1780 False,
1781 ),
1782 (
1783 "OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV6",
1784 None,
1785 None,
1786 False,
1787 False,
1788 ),
1789 (
1790 "OVS_KEY_ATTR_IN_PORT",
1791 "in_port",
1792 "%d",
1793 lambda x: True,
1794 True,
1795 ),
1796 ("OVS_KEY_ATTR_ETHERNET", None, None, False, False),
1797 (
1798 "OVS_KEY_ATTR_ETHERTYPE",
1799 "eth_type",
1800 "0x%04x",
1801 lambda x: int(x) == 0xFFFF,
1802 True,
1803 ),
1804 ("OVS_KEY_ATTR_IPV4", None, None, False, False),
1805 ("OVS_KEY_ATTR_IPV6", None, None, False, False),
1806 ("OVS_KEY_ATTR_ARP", None, None, False, False),
1807 ("OVS_KEY_ATTR_TCP", None, None, False, False),
1808 (
1809 "OVS_KEY_ATTR_TCP_FLAGS",
1810 "tcp_flags",
1811 "0x%04x",
1812 lambda x: False,
1813 True,
1814 ),
1815 ("OVS_KEY_ATTR_UDP", None, None, False, False),
1816 ("OVS_KEY_ATTR_SCTP", None, None, False, False),
1817 ("OVS_KEY_ATTR_ICMP", None, None, False, False),
1818 ("OVS_KEY_ATTR_ICMPV6", None, None, False, False),
1819 ("OVS_KEY_ATTR_ND", None, None, False, False),
1820 ):
1821 v = self.get_attr(field[0])
1822 if v is not None:
1823 m = None if mask is None else mask.get_attr(field[0])
1824 if field[4] is False:
1825 print_str += v.dpstr(m, more)
1826 print_str += ","
1827 else:
1828 if m is None or field[3](m):
1829 print_str += field[1] + "("
1830 print_str += field[2] % v
1831 print_str += "),"
1832 elif more or m != 0:
1833 print_str += field[1] + "("
1834 print_str += (field[2] % v) + "/" + (field[2] % m)
1835 print_str += "),"
1836
1837 return print_str
1838
1839
1840class OvsPacket(GenericNetlinkSocket):
1841 OVS_PACKET_CMD_MISS = 1 # Flow table miss
1842 OVS_PACKET_CMD_ACTION = 2 # USERSPACE action
1843 OVS_PACKET_CMD_EXECUTE = 3 # Apply actions to packet
1844
1845 class ovs_packet_msg(ovs_dp_msg):
1846 nla_map = (
1847 ("OVS_PACKET_ATTR_UNSPEC", "none"),
1848 ("OVS_PACKET_ATTR_PACKET", "array(uint8)"),
1849 ("OVS_PACKET_ATTR_KEY", "ovskey"),
1850 ("OVS_PACKET_ATTR_ACTIONS", "ovsactions"),
1851 ("OVS_PACKET_ATTR_USERDATA", "none"),
1852 ("OVS_PACKET_ATTR_EGRESS_TUN_KEY", "none"),
1853 ("OVS_PACKET_ATTR_UNUSED1", "none"),
1854 ("OVS_PACKET_ATTR_UNUSED2", "none"),
1855 ("OVS_PACKET_ATTR_PROBE", "none"),
1856 ("OVS_PACKET_ATTR_MRU", "uint16"),
1857 ("OVS_PACKET_ATTR_LEN", "uint32"),
1858 ("OVS_PACKET_ATTR_HASH", "uint64"),
1859 )
1860
1861 def __init__(self):
1862 GenericNetlinkSocket.__init__(self)
1863 self.bind(OVS_PACKET_FAMILY, OvsPacket.ovs_packet_msg)
1864
1865 def upcall_handler(self, up=None):
1866 print("listening on upcall packet handler:", self.epid)
1867 while True:
1868 try:
1869 msgs = self.get()
1870 for msg in msgs:
1871 if not up:
1872 continue
1873 if msg["cmd"] == OvsPacket.OVS_PACKET_CMD_MISS:
1874 up.miss(msg)
1875 elif msg["cmd"] == OvsPacket.OVS_PACKET_CMD_ACTION:
1876 up.action(msg)
1877 elif msg["cmd"] == OvsPacket.OVS_PACKET_CMD_EXECUTE:
1878 up.execute(msg)
1879 else:
1880 print("Unkonwn cmd: %d" % msg["cmd"])
1881 except NetlinkError as ne:
1882 raise ne
1883
1884
1885class OvsDatapath(GenericNetlinkSocket):
1886 OVS_DP_F_VPORT_PIDS = 1 << 1
1887 OVS_DP_F_DISPATCH_UPCALL_PER_CPU = 1 << 3
1888
1889 class dp_cmd_msg(ovs_dp_msg):
1890 """
1891 Message class that will be used to communicate with the kernel module.
1892 """
1893
1894 nla_map = (
1895 ("OVS_DP_ATTR_UNSPEC", "none"),
1896 ("OVS_DP_ATTR_NAME", "asciiz"),
1897 ("OVS_DP_ATTR_UPCALL_PID", "array(uint32)"),
1898 ("OVS_DP_ATTR_STATS", "dpstats"),
1899 ("OVS_DP_ATTR_MEGAFLOW_STATS", "megaflowstats"),
1900 ("OVS_DP_ATTR_USER_FEATURES", "uint32"),
1901 ("OVS_DP_ATTR_PAD", "none"),
1902 ("OVS_DP_ATTR_MASKS_CACHE_SIZE", "uint32"),
1903 ("OVS_DP_ATTR_PER_CPU_PIDS", "array(uint32)"),
1904 )
1905
1906 class dpstats(nla):
1907 fields = (
1908 ("hit", "=Q"),
1909 ("missed", "=Q"),
1910 ("lost", "=Q"),
1911 ("flows", "=Q"),
1912 )
1913
1914 class megaflowstats(nla):
1915 fields = (
1916 ("mask_hit", "=Q"),
1917 ("masks", "=I"),
1918 ("padding", "=I"),
1919 ("cache_hits", "=Q"),
1920 ("pad1", "=Q"),
1921 )
1922
1923 def __init__(self):
1924 GenericNetlinkSocket.__init__(self)
1925 self.bind(OVS_DATAPATH_FAMILY, OvsDatapath.dp_cmd_msg)
1926
1927 def info(self, dpname, ifindex=0):
1928 msg = OvsDatapath.dp_cmd_msg()
1929 msg["cmd"] = OVS_DP_CMD_GET
1930 msg["version"] = OVS_DATAPATH_VERSION
1931 msg["reserved"] = 0
1932 msg["dpifindex"] = ifindex
1933 msg["attrs"].append(["OVS_DP_ATTR_NAME", dpname])
1934
1935 try:
1936 reply = self.nlm_request(
1937 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST
1938 )
1939 reply = reply[0]
1940 except NetlinkError as ne:
1941 if ne.code == errno.ENODEV:
1942 reply = None
1943 else:
1944 raise ne
1945
1946 return reply
1947
1948 def create(
1949 self, dpname, shouldUpcall=False, versionStr=None, p=OvsPacket()
1950 ):
1951 msg = OvsDatapath.dp_cmd_msg()
1952 msg["cmd"] = OVS_DP_CMD_NEW
1953 if versionStr is None:
1954 msg["version"] = OVS_DATAPATH_VERSION
1955 else:
1956 msg["version"] = int(versionStr.split(":")[0], 0)
1957 msg["reserved"] = 0
1958 msg["dpifindex"] = 0
1959 msg["attrs"].append(["OVS_DP_ATTR_NAME", dpname])
1960
1961 dpfeatures = 0
1962 if versionStr is not None and versionStr.find(":") != -1:
1963 dpfeatures = int(versionStr.split(":")[1], 0)
1964 else:
1965 if versionStr is None or versionStr.find(":") == -1:
1966 dpfeatures |= OvsDatapath.OVS_DP_F_DISPATCH_UPCALL_PER_CPU
1967 dpfeatures &= ~OvsDatapath.OVS_DP_F_VPORT_PIDS
1968
1969 nproc = multiprocessing.cpu_count()
1970 procarray = []
1971 for i in range(1, nproc):
1972 procarray += [int(p.epid)]
1973 msg["attrs"].append(["OVS_DP_ATTR_UPCALL_PID", procarray])
1974 msg["attrs"].append(["OVS_DP_ATTR_USER_FEATURES", dpfeatures])
1975 if not shouldUpcall:
1976 msg["attrs"].append(["OVS_DP_ATTR_UPCALL_PID", [0]])
1977
1978 try:
1979 reply = self.nlm_request(
1980 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
1981 )
1982 reply = reply[0]
1983 except NetlinkError as ne:
1984 if ne.code == errno.EEXIST:
1985 reply = None
1986 else:
1987 raise ne
1988
1989 return reply
1990
1991 def destroy(self, dpname):
1992 msg = OvsDatapath.dp_cmd_msg()
1993 msg["cmd"] = OVS_DP_CMD_DEL
1994 msg["version"] = OVS_DATAPATH_VERSION
1995 msg["reserved"] = 0
1996 msg["dpifindex"] = 0
1997 msg["attrs"].append(["OVS_DP_ATTR_NAME", dpname])
1998
1999 try:
2000 reply = self.nlm_request(
2001 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
2002 )
2003 reply = reply[0]
2004 except NetlinkError as ne:
2005 if ne.code == errno.ENODEV:
2006 reply = None
2007 else:
2008 raise ne
2009
2010 return reply
2011
2012
2013class OvsVport(GenericNetlinkSocket):
2014 OVS_VPORT_TYPE_NETDEV = 1
2015 OVS_VPORT_TYPE_INTERNAL = 2
2016 OVS_VPORT_TYPE_GRE = 3
2017 OVS_VPORT_TYPE_VXLAN = 4
2018 OVS_VPORT_TYPE_GENEVE = 5
2019
2020 class ovs_vport_msg(ovs_dp_msg):
2021 nla_map = (
2022 ("OVS_VPORT_ATTR_UNSPEC", "none"),
2023 ("OVS_VPORT_ATTR_PORT_NO", "uint32"),
2024 ("OVS_VPORT_ATTR_TYPE", "uint32"),
2025 ("OVS_VPORT_ATTR_NAME", "asciiz"),
2026 ("OVS_VPORT_ATTR_OPTIONS", "vportopts"),
2027 ("OVS_VPORT_ATTR_UPCALL_PID", "array(uint32)"),
2028 ("OVS_VPORT_ATTR_STATS", "vportstats"),
2029 ("OVS_VPORT_ATTR_PAD", "none"),
2030 ("OVS_VPORT_ATTR_IFINDEX", "uint32"),
2031 ("OVS_VPORT_ATTR_NETNSID", "uint32"),
2032 )
2033
2034 class vportopts(nla):
2035 nla_map = (
2036 ("OVS_TUNNEL_ATTR_UNSPEC", "none"),
2037 ("OVS_TUNNEL_ATTR_DST_PORT", "uint16"),
2038 ("OVS_TUNNEL_ATTR_EXTENSION", "none"),
2039 )
2040
2041 class vportstats(nla):
2042 fields = (
2043 ("rx_packets", "=Q"),
2044 ("tx_packets", "=Q"),
2045 ("rx_bytes", "=Q"),
2046 ("tx_bytes", "=Q"),
2047 ("rx_errors", "=Q"),
2048 ("tx_errors", "=Q"),
2049 ("rx_dropped", "=Q"),
2050 ("tx_dropped", "=Q"),
2051 )
2052
2053 def type_to_str(vport_type):
2054 if vport_type == OvsVport.OVS_VPORT_TYPE_NETDEV:
2055 return "netdev"
2056 elif vport_type == OvsVport.OVS_VPORT_TYPE_INTERNAL:
2057 return "internal"
2058 elif vport_type == OvsVport.OVS_VPORT_TYPE_GRE:
2059 return "gre"
2060 elif vport_type == OvsVport.OVS_VPORT_TYPE_VXLAN:
2061 return "vxlan"
2062 elif vport_type == OvsVport.OVS_VPORT_TYPE_GENEVE:
2063 return "geneve"
2064 raise ValueError("Unknown vport type:%d" % vport_type)
2065
2066 def str_to_type(vport_type):
2067 if vport_type == "netdev":
2068 return OvsVport.OVS_VPORT_TYPE_NETDEV
2069 elif vport_type == "internal":
2070 return OvsVport.OVS_VPORT_TYPE_INTERNAL
2071 elif vport_type == "gre":
2072 return OvsVport.OVS_VPORT_TYPE_INTERNAL
2073 elif vport_type == "vxlan":
2074 return OvsVport.OVS_VPORT_TYPE_VXLAN
2075 elif vport_type == "geneve":
2076 return OvsVport.OVS_VPORT_TYPE_GENEVE
2077 raise ValueError("Unknown vport type: '%s'" % vport_type)
2078
2079 def __init__(self, packet=OvsPacket()):
2080 GenericNetlinkSocket.__init__(self)
2081 self.bind(OVS_VPORT_FAMILY, OvsVport.ovs_vport_msg)
2082 self.upcall_packet = packet
2083
2084 def info(self, vport_name, dpifindex=0, portno=None):
2085 msg = OvsVport.ovs_vport_msg()
2086
2087 msg["cmd"] = OVS_VPORT_CMD_GET
2088 msg["version"] = OVS_DATAPATH_VERSION
2089 msg["reserved"] = 0
2090 msg["dpifindex"] = dpifindex
2091
2092 if portno is None:
2093 msg["attrs"].append(["OVS_VPORT_ATTR_NAME", vport_name])
2094 else:
2095 msg["attrs"].append(["OVS_VPORT_ATTR_PORT_NO", portno])
2096
2097 try:
2098 reply = self.nlm_request(
2099 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST
2100 )
2101 reply = reply[0]
2102 except NetlinkError as ne:
2103 if ne.code == errno.ENODEV:
2104 reply = None
2105 else:
2106 raise ne
2107 return reply
2108
2109 def attach(self, dpindex, vport_ifname, ptype, dport, lwt):
2110 msg = OvsVport.ovs_vport_msg()
2111
2112 msg["cmd"] = OVS_VPORT_CMD_NEW
2113 msg["version"] = OVS_DATAPATH_VERSION
2114 msg["reserved"] = 0
2115 msg["dpifindex"] = dpindex
2116 port_type = OvsVport.str_to_type(ptype)
2117
2118 msg["attrs"].append(["OVS_VPORT_ATTR_NAME", vport_ifname])
2119 msg["attrs"].append(
2120 ["OVS_VPORT_ATTR_UPCALL_PID", [self.upcall_packet.epid]]
2121 )
2122
2123 TUNNEL_DEFAULTS = [("geneve", 6081),
2124 ("vxlan", 4789)]
2125
2126 for tnl in TUNNEL_DEFAULTS:
2127 if ptype == tnl[0]:
2128 if not dport:
2129 dport = tnl[1]
2130
2131 if not lwt:
2132 vportopt = OvsVport.ovs_vport_msg.vportopts()
2133 vportopt["attrs"].append(
2134 ["OVS_TUNNEL_ATTR_DST_PORT", socket.htons(dport)]
2135 )
2136 msg["attrs"].append(
2137 ["OVS_VPORT_ATTR_OPTIONS", vportopt]
2138 )
2139 else:
2140 port_type = OvsVport.OVS_VPORT_TYPE_NETDEV
2141 ipr = pyroute2.iproute.IPRoute()
2142
2143 if tnl[0] == "geneve":
2144 ipr.link("add", ifname=vport_ifname, kind=tnl[0],
2145 geneve_port=dport,
2146 geneve_collect_metadata=True,
2147 geneve_udp_zero_csum6_rx=1)
2148 elif tnl[0] == "vxlan":
2149 ipr.link("add", ifname=vport_ifname, kind=tnl[0],
2150 vxlan_learning=0, vxlan_collect_metadata=1,
2151 vxlan_udp_zero_csum6_rx=1, vxlan_port=dport)
2152 break
2153 msg["attrs"].append(["OVS_VPORT_ATTR_TYPE", port_type])
2154
2155 try:
2156 reply = self.nlm_request(
2157 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
2158 )
2159 reply = reply[0]
2160 except NetlinkError as ne:
2161 if ne.code == errno.EEXIST:
2162 reply = None
2163 else:
2164 raise ne
2165 return reply
2166
2167 def reset_upcall(self, dpindex, vport_ifname, p=None):
2168 msg = OvsVport.ovs_vport_msg()
2169
2170 msg["cmd"] = OVS_VPORT_CMD_SET
2171 msg["version"] = OVS_DATAPATH_VERSION
2172 msg["reserved"] = 0
2173 msg["dpifindex"] = dpindex
2174 msg["attrs"].append(["OVS_VPORT_ATTR_NAME", vport_ifname])
2175
2176 if p == None:
2177 p = self.upcall_packet
2178 else:
2179 self.upcall_packet = p
2180
2181 msg["attrs"].append(["OVS_VPORT_ATTR_UPCALL_PID", [p.epid]])
2182
2183 try:
2184 reply = self.nlm_request(
2185 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
2186 )
2187 reply = reply[0]
2188 except NetlinkError as ne:
2189 raise ne
2190 return reply
2191
2192 def detach(self, dpindex, vport_ifname):
2193 msg = OvsVport.ovs_vport_msg()
2194
2195 msg["cmd"] = OVS_VPORT_CMD_DEL
2196 msg["version"] = OVS_DATAPATH_VERSION
2197 msg["reserved"] = 0
2198 msg["dpifindex"] = dpindex
2199 msg["attrs"].append(["OVS_VPORT_ATTR_NAME", vport_ifname])
2200
2201 try:
2202 reply = self.nlm_request(
2203 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
2204 )
2205 reply = reply[0]
2206 except NetlinkError as ne:
2207 if ne.code == errno.ENODEV:
2208 reply = None
2209 else:
2210 raise ne
2211 return reply
2212
2213 def upcall_handler(self, handler=None):
2214 self.upcall_packet.upcall_handler(handler)
2215
2216
2217class OvsFlow(GenericNetlinkSocket):
2218 class ovs_flow_msg(ovs_dp_msg):
2219 nla_map = (
2220 ("OVS_FLOW_ATTR_UNSPEC", "none"),
2221 ("OVS_FLOW_ATTR_KEY", "ovskey"),
2222 ("OVS_FLOW_ATTR_ACTIONS", "ovsactions"),
2223 ("OVS_FLOW_ATTR_STATS", "flowstats"),
2224 ("OVS_FLOW_ATTR_TCP_FLAGS", "uint8"),
2225 ("OVS_FLOW_ATTR_USED", "uint64"),
2226 ("OVS_FLOW_ATTR_CLEAR", "none"),
2227 ("OVS_FLOW_ATTR_MASK", "ovskey"),
2228 ("OVS_FLOW_ATTR_PROBE", "none"),
2229 ("OVS_FLOW_ATTR_UFID", "array(uint32)"),
2230 ("OVS_FLOW_ATTR_UFID_FLAGS", "uint32"),
2231 )
2232
2233 class flowstats(nla):
2234 fields = (
2235 ("packets", "=Q"),
2236 ("bytes", "=Q"),
2237 )
2238
2239 def dpstr(self, more=False):
2240 ufid = self.get_attr("OVS_FLOW_ATTR_UFID")
2241 ufid_str = ""
2242 if ufid is not None:
2243 ufid_str = (
2244 "ufid:{:08x}-{:04x}-{:04x}-{:04x}-{:04x}{:08x}".format(
2245 ufid[0],
2246 ufid[1] >> 16,
2247 ufid[1] & 0xFFFF,
2248 ufid[2] >> 16,
2249 ufid[2] & 0,
2250 ufid[3],
2251 )
2252 )
2253
2254 key_field = self.get_attr("OVS_FLOW_ATTR_KEY")
2255 keymsg = None
2256 if key_field is not None:
2257 keymsg = key_field
2258
2259 mask_field = self.get_attr("OVS_FLOW_ATTR_MASK")
2260 maskmsg = None
2261 if mask_field is not None:
2262 maskmsg = mask_field
2263
2264 acts_field = self.get_attr("OVS_FLOW_ATTR_ACTIONS")
2265 actsmsg = None
2266 if acts_field is not None:
2267 actsmsg = acts_field
2268
2269 print_str = ""
2270
2271 if more:
2272 print_str += ufid_str + ","
2273
2274 if keymsg is not None:
2275 print_str += keymsg.dpstr(maskmsg, more)
2276
2277 stats = self.get_attr("OVS_FLOW_ATTR_STATS")
2278 if stats is None:
2279 print_str += " packets:0, bytes:0,"
2280 else:
2281 print_str += " packets:%d, bytes:%d," % (
2282 stats["packets"],
2283 stats["bytes"],
2284 )
2285
2286 used = self.get_attr("OVS_FLOW_ATTR_USED")
2287 print_str += " used:"
2288 if used is None:
2289 print_str += "never,"
2290 else:
2291 used_time = int(used)
2292 cur_time_sec = time.clock_gettime(time.CLOCK_MONOTONIC)
2293 used_time = (cur_time_sec * 1000) - used_time
2294 print_str += "{}s,".format(used_time / 1000)
2295
2296 print_str += " actions:"
2297 if (
2298 actsmsg is None
2299 or "attrs" not in actsmsg
2300 or len(actsmsg["attrs"]) == 0
2301 ):
2302 print_str += "drop"
2303 else:
2304 print_str += actsmsg.dpstr(more)
2305
2306 return print_str
2307
2308 def parse(self, flowstr, actstr, dpidx=0):
2309 OVS_UFID_F_OMIT_KEY = 1 << 0
2310 OVS_UFID_F_OMIT_MASK = 1 << 1
2311 OVS_UFID_F_OMIT_ACTIONS = 1 << 2
2312
2313 self["cmd"] = 0
2314 self["version"] = 0
2315 self["reserved"] = 0
2316 self["dpifindex"] = 0
2317
2318 if flowstr.startswith("ufid:"):
2319 count = 5
2320 while flowstr[count] != ",":
2321 count += 1
2322 ufidstr = flowstr[5:count]
2323 flowstr = flowstr[count + 1 :]
2324 else:
2325 ufidstr = str(uuid.uuid4())
2326 uuidRawObj = uuid.UUID(ufidstr).fields
2327
2328 self["attrs"].append(
2329 [
2330 "OVS_FLOW_ATTR_UFID",
2331 [
2332 uuidRawObj[0],
2333 uuidRawObj[1] << 16 | uuidRawObj[2],
2334 uuidRawObj[3] << 24
2335 | uuidRawObj[4] << 16
2336 | uuidRawObj[5] & (0xFF << 32) >> 32,
2337 uuidRawObj[5] & (0xFFFFFFFF),
2338 ],
2339 ]
2340 )
2341 self["attrs"].append(
2342 [
2343 "OVS_FLOW_ATTR_UFID_FLAGS",
2344 int(
2345 OVS_UFID_F_OMIT_KEY
2346 | OVS_UFID_F_OMIT_MASK
2347 | OVS_UFID_F_OMIT_ACTIONS
2348 ),
2349 ]
2350 )
2351
2352 k = ovskey()
2353 m = ovskey()
2354 k.parse(flowstr, m)
2355 self["attrs"].append(["OVS_FLOW_ATTR_KEY", k])
2356 self["attrs"].append(["OVS_FLOW_ATTR_MASK", m])
2357
2358 a = ovsactions()
2359 a.parse(actstr)
2360 self["attrs"].append(["OVS_FLOW_ATTR_ACTIONS", a])
2361
2362 def __init__(self):
2363 GenericNetlinkSocket.__init__(self)
2364
2365 self.bind(OVS_FLOW_FAMILY, OvsFlow.ovs_flow_msg)
2366
2367 def add_flow(self, dpifindex, flowmsg):
2368 """
2369 Send a new flow message to the kernel.
2370
2371 dpifindex should be a valid datapath obtained by calling
2372 into the OvsDatapath lookup
2373
2374 flowmsg is a flow object obtained by calling a dpparse
2375 """
2376
2377 flowmsg["cmd"] = OVS_FLOW_CMD_NEW
2378 flowmsg["version"] = OVS_DATAPATH_VERSION
2379 flowmsg["reserved"] = 0
2380 flowmsg["dpifindex"] = dpifindex
2381
2382 try:
2383 reply = self.nlm_request(
2384 flowmsg,
2385 msg_type=self.prid,
2386 msg_flags=NLM_F_REQUEST | NLM_F_ACK,
2387 )
2388 reply = reply[0]
2389 except NetlinkError as ne:
2390 print(flowmsg)
2391 raise ne
2392 return reply
2393
2394 def del_flows(self, dpifindex):
2395 """
2396 Send a del message to the kernel that will drop all flows.
2397
2398 dpifindex should be a valid datapath obtained by calling
2399 into the OvsDatapath lookup
2400 """
2401
2402 flowmsg = OvsFlow.ovs_flow_msg()
2403 flowmsg["cmd"] = OVS_FLOW_CMD_DEL
2404 flowmsg["version"] = OVS_DATAPATH_VERSION
2405 flowmsg["reserved"] = 0
2406 flowmsg["dpifindex"] = dpifindex
2407
2408 try:
2409 reply = self.nlm_request(
2410 flowmsg,
2411 msg_type=self.prid,
2412 msg_flags=NLM_F_REQUEST | NLM_F_ACK,
2413 )
2414 reply = reply[0]
2415 except NetlinkError as ne:
2416 print(flowmsg)
2417 raise ne
2418 return reply
2419
2420 def dump(self, dpifindex, flowspec=None):
2421 """
2422 Returns a list of messages containing flows.
2423
2424 dpifindex should be a valid datapath obtained by calling
2425 into the OvsDatapath lookup
2426
2427 flowpsec is a string which represents a flow in the dpctl
2428 format.
2429 """
2430 msg = OvsFlow.ovs_flow_msg()
2431
2432 msg["cmd"] = OVS_FLOW_CMD_GET
2433 msg["version"] = OVS_DATAPATH_VERSION
2434 msg["reserved"] = 0
2435 msg["dpifindex"] = dpifindex
2436
2437 msg_flags = NLM_F_REQUEST | NLM_F_ACK
2438 if flowspec is None:
2439 msg_flags |= NLM_F_DUMP
2440 rep = None
2441
2442 try:
2443 rep = self.nlm_request(
2444 msg,
2445 msg_type=self.prid,
2446 msg_flags=msg_flags,
2447 )
2448 except NetlinkError as ne:
2449 raise ne
2450 return rep
2451
2452 def miss(self, packetmsg):
2453 seq = packetmsg["header"]["sequence_number"]
2454 keystr = "(none)"
2455 key_field = packetmsg.get_attr("OVS_PACKET_ATTR_KEY")
2456 if key_field is not None:
2457 keystr = key_field.dpstr(None, True)
2458
2459 pktdata = packetmsg.get_attr("OVS_PACKET_ATTR_PACKET")
2460 pktpres = "yes" if pktdata is not None else "no"
2461
2462 print("MISS upcall[%d/%s]: %s" % (seq, pktpres, keystr), flush=True)
2463
2464 def execute(self, packetmsg):
2465 print("userspace execute command", flush=True)
2466
2467 def action(self, packetmsg):
2468 print("userspace action command", flush=True)
2469
2470
2471class psample_sample(genlmsg):
2472 nla_map = (
2473 ("PSAMPLE_ATTR_IIFINDEX", "none"),
2474 ("PSAMPLE_ATTR_OIFINDEX", "none"),
2475 ("PSAMPLE_ATTR_ORIGSIZE", "none"),
2476 ("PSAMPLE_ATTR_SAMPLE_GROUP", "uint32"),
2477 ("PSAMPLE_ATTR_GROUP_SEQ", "none"),
2478 ("PSAMPLE_ATTR_SAMPLE_RATE", "uint32"),
2479 ("PSAMPLE_ATTR_DATA", "array(uint8)"),
2480 ("PSAMPLE_ATTR_GROUP_REFCOUNT", "none"),
2481 ("PSAMPLE_ATTR_TUNNEL", "none"),
2482 ("PSAMPLE_ATTR_PAD", "none"),
2483 ("PSAMPLE_ATTR_OUT_TC", "none"),
2484 ("PSAMPLE_ATTR_OUT_TC_OCC", "none"),
2485 ("PSAMPLE_ATTR_LATENCY", "none"),
2486 ("PSAMPLE_ATTR_TIMESTAMP", "none"),
2487 ("PSAMPLE_ATTR_PROTO", "none"),
2488 ("PSAMPLE_ATTR_USER_COOKIE", "array(uint8)"),
2489 )
2490
2491 def dpstr(self):
2492 fields = []
2493 data = ""
2494 for (attr, value) in self["attrs"]:
2495 if attr == "PSAMPLE_ATTR_SAMPLE_GROUP":
2496 fields.append("group:%d" % value)
2497 if attr == "PSAMPLE_ATTR_SAMPLE_RATE":
2498 fields.append("rate:%d" % value)
2499 if attr == "PSAMPLE_ATTR_USER_COOKIE":
2500 value = "".join(format(x, "02x") for x in value)
2501 fields.append("cookie:%s" % value)
2502 if attr == "PSAMPLE_ATTR_DATA" and len(value) > 0:
2503 data = "data:%s" % "".join(format(x, "02x") for x in value)
2504
2505 return ("%s %s" % (",".join(fields), data)).strip()
2506
2507
2508class psample_msg(Marshal):
2509 PSAMPLE_CMD_SAMPLE = 0
2510 PSAMPLE_CMD_GET_GROUP = 1
2511 PSAMPLE_CMD_NEW_GROUP = 2
2512 PSAMPLE_CMD_DEL_GROUP = 3
2513 PSAMPLE_CMD_SET_FILTER = 4
2514 msg_map = {PSAMPLE_CMD_SAMPLE: psample_sample}
2515
2516
2517class PsampleEvent(EventSocket):
2518 genl_family = "psample"
2519 mcast_groups = ["packets"]
2520 marshal_class = psample_msg
2521
2522 def read_samples(self):
2523 print("listening for psample events", flush=True)
2524 while True:
2525 try:
2526 for msg in self.get():
2527 print(msg.dpstr(), flush=True)
2528 except NetlinkError as ne:
2529 raise ne
2530
2531
2532def print_ovsdp_full(dp_lookup_rep, ifindex, ndb=NDB(), vpl=OvsVport()):
2533 dp_name = dp_lookup_rep.get_attr("OVS_DP_ATTR_NAME")
2534 base_stats = dp_lookup_rep.get_attr("OVS_DP_ATTR_STATS")
2535 megaflow_stats = dp_lookup_rep.get_attr("OVS_DP_ATTR_MEGAFLOW_STATS")
2536 user_features = dp_lookup_rep.get_attr("OVS_DP_ATTR_USER_FEATURES")
2537 masks_cache_size = dp_lookup_rep.get_attr("OVS_DP_ATTR_MASKS_CACHE_SIZE")
2538
2539 print("%s:" % dp_name)
2540 print(
2541 " lookups: hit:%d missed:%d lost:%d"
2542 % (base_stats["hit"], base_stats["missed"], base_stats["lost"])
2543 )
2544 print(" flows:%d" % base_stats["flows"])
2545 pkts = base_stats["hit"] + base_stats["missed"]
2546 avg = (megaflow_stats["mask_hit"] / pkts) if pkts != 0 else 0.0
2547 print(
2548 " masks: hit:%d total:%d hit/pkt:%f"
2549 % (megaflow_stats["mask_hit"], megaflow_stats["masks"], avg)
2550 )
2551 print(" caches:")
2552 print(" masks-cache: size:%d" % masks_cache_size)
2553
2554 if user_features is not None:
2555 print(" features: 0x%X" % user_features)
2556
2557 # port print out
2558 for iface in ndb.interfaces:
2559 rep = vpl.info(iface.ifname, ifindex)
2560 if rep is not None:
2561 opts = ""
2562 vpo = rep.get_attr("OVS_VPORT_ATTR_OPTIONS")
2563 if vpo:
2564 dpo = vpo.get_attr("OVS_TUNNEL_ATTR_DST_PORT")
2565 if dpo:
2566 opts += " tnl-dport:%s" % socket.ntohs(dpo)
2567 print(
2568 " port %d: %s (%s%s)"
2569 % (
2570 rep.get_attr("OVS_VPORT_ATTR_PORT_NO"),
2571 rep.get_attr("OVS_VPORT_ATTR_NAME"),
2572 OvsVport.type_to_str(rep.get_attr("OVS_VPORT_ATTR_TYPE")),
2573 opts,
2574 )
2575 )
2576
2577
2578def main(argv):
2579 nlmsg_atoms.ovskey = ovskey
2580 nlmsg_atoms.ovsactions = ovsactions
2581
2582 # version check for pyroute2
2583 prverscheck = pyroute2.__version__.split(".")
2584 if int(prverscheck[0]) == 0 and int(prverscheck[1]) < 6:
2585 print("Need to upgrade the python pyroute2 package to >= 0.6.")
2586 sys.exit(0)
2587
2588 parser = argparse.ArgumentParser()
2589 parser.add_argument(
2590 "-v",
2591 "--verbose",
2592 action="count",
2593 help="Increment 'verbose' output counter.",
2594 default=0,
2595 )
2596 subparsers = parser.add_subparsers(dest="subcommand")
2597
2598 showdpcmd = subparsers.add_parser("show")
2599 showdpcmd.add_argument(
2600 "showdp", metavar="N", type=str, nargs="?", help="Datapath Name"
2601 )
2602
2603 adddpcmd = subparsers.add_parser("add-dp")
2604 adddpcmd.add_argument("adddp", help="Datapath Name")
2605 adddpcmd.add_argument(
2606 "-u",
2607 "--upcall",
2608 action="store_true",
2609 help="Leave open a reader for upcalls",
2610 )
2611 adddpcmd.add_argument(
2612 "-V",
2613 "--versioning",
2614 required=False,
2615 help="Specify a custom version / feature string",
2616 )
2617
2618 deldpcmd = subparsers.add_parser("del-dp")
2619 deldpcmd.add_argument("deldp", help="Datapath Name")
2620
2621 addifcmd = subparsers.add_parser("add-if")
2622 addifcmd.add_argument("dpname", help="Datapath Name")
2623 addifcmd.add_argument("addif", help="Interface name for adding")
2624 addifcmd.add_argument(
2625 "-u",
2626 "--upcall",
2627 action="store_true",
2628 help="Leave open a reader for upcalls",
2629 )
2630 addifcmd.add_argument(
2631 "-t",
2632 "--ptype",
2633 type=str,
2634 default="netdev",
2635 choices=["netdev", "internal", "geneve", "vxlan"],
2636 help="Interface type (default netdev)",
2637 )
2638 addifcmd.add_argument(
2639 "-p",
2640 "--dport",
2641 type=int,
2642 default=0,
2643 help="Destination port (0 for default)"
2644 )
2645 addifcmd.add_argument(
2646 "-l",
2647 "--lwt",
2648 type=bool,
2649 default=True,
2650 help="Use LWT infrastructure instead of vport (default true)."
2651 )
2652 delifcmd = subparsers.add_parser("del-if")
2653 delifcmd.add_argument("dpname", help="Datapath Name")
2654 delifcmd.add_argument("delif", help="Interface name for adding")
2655 delifcmd.add_argument("-d",
2656 "--dellink",
2657 type=bool, default=False,
2658 help="Delete the link as well.")
2659
2660 dumpflcmd = subparsers.add_parser("dump-flows")
2661 dumpflcmd.add_argument("dumpdp", help="Datapath Name")
2662
2663 addflcmd = subparsers.add_parser("add-flow")
2664 addflcmd.add_argument("flbr", help="Datapath name")
2665 addflcmd.add_argument("flow", help="Flow specification")
2666 addflcmd.add_argument("acts", help="Flow actions")
2667
2668 delfscmd = subparsers.add_parser("del-flows")
2669 delfscmd.add_argument("flsbr", help="Datapath name")
2670
2671 subparsers.add_parser("psample-events")
2672
2673 args = parser.parse_args()
2674
2675 if args.verbose > 0:
2676 if args.verbose > 1:
2677 logging.basicConfig(level=logging.DEBUG)
2678
2679 ovspk = OvsPacket()
2680 ovsdp = OvsDatapath()
2681 ovsvp = OvsVport(ovspk)
2682 ovsflow = OvsFlow()
2683 ndb = NDB()
2684
2685 sys.setrecursionlimit(100000)
2686
2687 if args.subcommand == "psample-events":
2688 PsampleEvent().read_samples()
2689
2690 if hasattr(args, "showdp"):
2691 found = False
2692 for iface in ndb.interfaces:
2693 rep = None
2694 if args.showdp is None:
2695 rep = ovsdp.info(iface.ifname, 0)
2696 elif args.showdp == iface.ifname:
2697 rep = ovsdp.info(iface.ifname, 0)
2698
2699 if rep is not None:
2700 found = True
2701 print_ovsdp_full(rep, iface.index, ndb, ovsvp)
2702
2703 if not found:
2704 msg = "No DP found"
2705 if args.showdp is not None:
2706 msg += ":'%s'" % args.showdp
2707 print(msg)
2708 elif hasattr(args, "adddp"):
2709 rep = ovsdp.create(args.adddp, args.upcall, args.versioning, ovspk)
2710 if rep is None:
2711 print("DP '%s' already exists" % args.adddp)
2712 else:
2713 print("DP '%s' added" % args.adddp)
2714 if args.upcall:
2715 ovspk.upcall_handler(ovsflow)
2716 elif hasattr(args, "deldp"):
2717 ovsdp.destroy(args.deldp)
2718 elif hasattr(args, "addif"):
2719 rep = ovsdp.info(args.dpname, 0)
2720 if rep is None:
2721 print("DP '%s' not found." % args.dpname)
2722 return 1
2723 dpindex = rep["dpifindex"]
2724 rep = ovsvp.attach(rep["dpifindex"], args.addif, args.ptype,
2725 args.dport, args.lwt)
2726 msg = "vport '%s'" % args.addif
2727 if rep and rep["header"]["error"] is None:
2728 msg += " added."
2729 else:
2730 msg += " failed to add."
2731 if args.upcall:
2732 if rep is None:
2733 rep = ovsvp.reset_upcall(dpindex, args.addif, ovspk)
2734 ovsvp.upcall_handler(ovsflow)
2735 elif hasattr(args, "delif"):
2736 rep = ovsdp.info(args.dpname, 0)
2737 if rep is None:
2738 print("DP '%s' not found." % args.dpname)
2739 return 1
2740 rep = ovsvp.detach(rep["dpifindex"], args.delif)
2741 msg = "vport '%s'" % args.delif
2742 if rep and rep["header"]["error"] is None:
2743 msg += " removed."
2744 else:
2745 msg += " failed to remove."
2746 if args.dellink:
2747 ipr = pyroute2.iproute.IPRoute()
2748 ipr.link("del", index=ipr.link_lookup(ifname=args.delif)[0])
2749 elif hasattr(args, "dumpdp"):
2750 rep = ovsdp.info(args.dumpdp, 0)
2751 if rep is None:
2752 print("DP '%s' not found." % args.dumpdp)
2753 return 1
2754 rep = ovsflow.dump(rep["dpifindex"])
2755 for flow in rep:
2756 print(flow.dpstr(True if args.verbose > 0 else False))
2757 elif hasattr(args, "flbr"):
2758 rep = ovsdp.info(args.flbr, 0)
2759 if rep is None:
2760 print("DP '%s' not found." % args.flbr)
2761 return 1
2762 flow = OvsFlow.ovs_flow_msg()
2763 flow.parse(args.flow, args.acts, rep["dpifindex"])
2764 ovsflow.add_flow(rep["dpifindex"], flow)
2765 elif hasattr(args, "flsbr"):
2766 rep = ovsdp.info(args.flsbr, 0)
2767 if rep is None:
2768 print("DP '%s' not found." % args.flsbr)
2769 ovsflow.del_flows(rep["dpifindex"])
2770
2771 return 0
2772
2773
2774if __name__ == "__main__":
2775 sys.exit(main(sys.argv))
1#!/usr/bin/env python3
2# SPDX-License-Identifier: GPL-2.0
3
4# Controls the openvswitch module. Part of the kselftest suite, but
5# can be used for some diagnostic purpose as well.
6
7import argparse
8import errno
9import ipaddress
10import logging
11import multiprocessing
12import re
13import struct
14import sys
15import time
16import types
17import uuid
18
19try:
20 from pyroute2 import NDB
21
22 from pyroute2.netlink import NLA_F_NESTED
23 from pyroute2.netlink import NLM_F_ACK
24 from pyroute2.netlink import NLM_F_DUMP
25 from pyroute2.netlink import NLM_F_REQUEST
26 from pyroute2.netlink import genlmsg
27 from pyroute2.netlink import nla
28 from pyroute2.netlink import nlmsg_atoms
29 from pyroute2.netlink.exceptions import NetlinkError
30 from pyroute2.netlink.generic import GenericNetlinkSocket
31 import pyroute2
32
33except ModuleNotFoundError:
34 print("Need to install the python pyroute2 package >= 0.6.")
35 sys.exit(0)
36
37
38OVS_DATAPATH_FAMILY = "ovs_datapath"
39OVS_VPORT_FAMILY = "ovs_vport"
40OVS_FLOW_FAMILY = "ovs_flow"
41OVS_PACKET_FAMILY = "ovs_packet"
42OVS_METER_FAMILY = "ovs_meter"
43OVS_CT_LIMIT_FAMILY = "ovs_ct_limit"
44
45OVS_DATAPATH_VERSION = 2
46OVS_DP_CMD_NEW = 1
47OVS_DP_CMD_DEL = 2
48OVS_DP_CMD_GET = 3
49OVS_DP_CMD_SET = 4
50
51OVS_VPORT_CMD_NEW = 1
52OVS_VPORT_CMD_DEL = 2
53OVS_VPORT_CMD_GET = 3
54OVS_VPORT_CMD_SET = 4
55
56OVS_FLOW_CMD_NEW = 1
57OVS_FLOW_CMD_DEL = 2
58OVS_FLOW_CMD_GET = 3
59OVS_FLOW_CMD_SET = 4
60
61
62def macstr(mac):
63 outstr = ":".join(["%02X" % i for i in mac])
64 return outstr
65
66
67def strcspn(str1, str2):
68 tot = 0
69 for char in str1:
70 if str2.find(char) != -1:
71 return tot
72 tot += 1
73 return tot
74
75
76def strspn(str1, str2):
77 tot = 0
78 for char in str1:
79 if str2.find(char) == -1:
80 return tot
81 tot += 1
82 return tot
83
84
85def intparse(statestr, defmask="0xffffffff"):
86 totalparse = strspn(statestr, "0123456789abcdefABCDEFx/")
87 # scan until "/"
88 count = strspn(statestr, "x0123456789abcdefABCDEF")
89
90 firstnum = statestr[:count]
91 if firstnum[-1] == "/":
92 firstnum = firstnum[:-1]
93 k = int(firstnum, 0)
94
95 m = None
96 if defmask is not None:
97 secondnum = defmask
98 if statestr[count] == "/":
99 secondnum = statestr[count + 1 :] # this is wrong...
100 m = int(secondnum, 0)
101
102 return statestr[totalparse + 1 :], k, m
103
104
105def parse_flags(flag_str, flag_vals):
106 bitResult = 0
107 maskResult = 0
108
109 if len(flag_str) == 0:
110 return flag_str, bitResult, maskResult
111
112 if flag_str[0].isdigit():
113 idx = 0
114 while flag_str[idx].isdigit() or flag_str[idx] == "x":
115 idx += 1
116 digits = flag_str[:idx]
117 flag_str = flag_str[idx:]
118
119 bitResult = int(digits, 0)
120 maskResult = int(digits, 0)
121
122 while len(flag_str) > 0 and (flag_str[0] == "+" or flag_str[0] == "-"):
123 if flag_str[0] == "+":
124 setFlag = True
125 elif flag_str[0] == "-":
126 setFlag = False
127
128 flag_str = flag_str[1:]
129
130 flag_len = 0
131 while (
132 flag_str[flag_len] != "+"
133 and flag_str[flag_len] != "-"
134 and flag_str[flag_len] != ","
135 and flag_str[flag_len] != ")"
136 ):
137 flag_len += 1
138
139 flag = flag_str[0:flag_len]
140
141 if flag in flag_vals:
142 if maskResult & flag_vals[flag]:
143 raise KeyError(
144 "Flag %s set once, cannot be set in multiples" % flag
145 )
146
147 if setFlag:
148 bitResult |= flag_vals[flag]
149
150 maskResult |= flag_vals[flag]
151 else:
152 raise KeyError("Missing flag value: %s" % flag)
153
154 flag_str = flag_str[flag_len:]
155
156 return flag_str, bitResult, maskResult
157
158
159def parse_ct_state(statestr):
160 ct_flags = {
161 "new": 1 << 0,
162 "est": 1 << 1,
163 "rel": 1 << 2,
164 "rpl": 1 << 3,
165 "inv": 1 << 4,
166 "trk": 1 << 5,
167 "snat": 1 << 6,
168 "dnat": 1 << 7,
169 }
170
171 return parse_flags(statestr, ct_flags)
172
173
174def convert_mac(data):
175 def to_bytes(mac):
176 mac_split = mac.split(":")
177 ret = bytearray([int(i, 16) for i in mac_split])
178 return bytes(ret)
179
180 mac_str, _, mask_str = data.partition('/')
181
182 if not mac_str:
183 mac_str = mask_str = "00:00:00:00:00:00"
184 elif not mask_str:
185 mask_str = "FF:FF:FF:FF:FF:FF"
186
187 return to_bytes(mac_str), to_bytes(mask_str)
188
189def convert_ipv4(data):
190 ip, _, mask = data.partition('/')
191
192 if not ip:
193 ip = mask = 0
194 elif not mask:
195 mask = 0xFFFFFFFF
196 elif mask.isdigit():
197 mask = (0xFFFFFFFF << (32 - int(mask))) & 0xFFFFFFFF
198
199 return int(ipaddress.IPv4Address(ip)), int(ipaddress.IPv4Address(mask))
200
201def convert_int(size):
202 def convert_int_sized(data):
203 value, _, mask = data.partition('/')
204
205 if not value:
206 return 0, 0
207 elif not mask:
208 return int(value, 0), pow(2, size) - 1
209 else:
210 return int(value, 0), int(mask, 0)
211
212 return convert_int_sized
213
214def parse_starts_block(block_str, scanstr, returnskipped, scanregex=False):
215 if scanregex:
216 m = re.search(scanstr, block_str)
217 if m is None:
218 if returnskipped:
219 return block_str
220 return False
221 if returnskipped:
222 block_str = block_str[len(m.group(0)) :]
223 return block_str
224 return True
225
226 if block_str.startswith(scanstr):
227 if returnskipped:
228 block_str = block_str[len(scanstr) :]
229 else:
230 return True
231
232 if returnskipped:
233 return block_str
234
235 return False
236
237
238def parse_extract_field(
239 block_str, fieldstr, scanfmt, convert, masked=False, defval=None
240):
241 if fieldstr and not block_str.startswith(fieldstr):
242 return block_str, defval
243
244 if fieldstr:
245 str_skiplen = len(fieldstr)
246 str_skipped = block_str[str_skiplen:]
247 if str_skiplen == 0:
248 return str_skipped, defval
249 else:
250 str_skiplen = 0
251 str_skipped = block_str
252
253 m = re.search(scanfmt, str_skipped)
254 if m is None:
255 raise ValueError("Bad fmt string")
256
257 data = m.group(0)
258 if convert:
259 data = convert(m.group(0))
260
261 str_skipped = str_skipped[len(m.group(0)) :]
262 if masked:
263 if str_skipped[0] == "/":
264 raise ValueError("Masking support TBD...")
265
266 str_skipped = str_skipped[strspn(str_skipped, ", ") :]
267 return str_skipped, data
268
269
270class ovs_dp_msg(genlmsg):
271 # include the OVS version
272 # We need a custom header rather than just being able to rely on
273 # genlmsg because fields ends up not expressing everything correctly
274 # if we use the canonical example of setting fields = (('customfield',),)
275 fields = genlmsg.fields + (("dpifindex", "I"),)
276
277
278class ovsactions(nla):
279 nla_flags = NLA_F_NESTED
280
281 nla_map = (
282 ("OVS_ACTION_ATTR_UNSPEC", "none"),
283 ("OVS_ACTION_ATTR_OUTPUT", "uint32"),
284 ("OVS_ACTION_ATTR_USERSPACE", "userspace"),
285 ("OVS_ACTION_ATTR_SET", "none"),
286 ("OVS_ACTION_ATTR_PUSH_VLAN", "none"),
287 ("OVS_ACTION_ATTR_POP_VLAN", "flag"),
288 ("OVS_ACTION_ATTR_SAMPLE", "none"),
289 ("OVS_ACTION_ATTR_RECIRC", "uint32"),
290 ("OVS_ACTION_ATTR_HASH", "none"),
291 ("OVS_ACTION_ATTR_PUSH_MPLS", "none"),
292 ("OVS_ACTION_ATTR_POP_MPLS", "flag"),
293 ("OVS_ACTION_ATTR_SET_MASKED", "none"),
294 ("OVS_ACTION_ATTR_CT", "ctact"),
295 ("OVS_ACTION_ATTR_TRUNC", "uint32"),
296 ("OVS_ACTION_ATTR_PUSH_ETH", "none"),
297 ("OVS_ACTION_ATTR_POP_ETH", "flag"),
298 ("OVS_ACTION_ATTR_CT_CLEAR", "flag"),
299 ("OVS_ACTION_ATTR_PUSH_NSH", "none"),
300 ("OVS_ACTION_ATTR_POP_NSH", "flag"),
301 ("OVS_ACTION_ATTR_METER", "none"),
302 ("OVS_ACTION_ATTR_CLONE", "recursive"),
303 ("OVS_ACTION_ATTR_CHECK_PKT_LEN", "none"),
304 ("OVS_ACTION_ATTR_ADD_MPLS", "none"),
305 ("OVS_ACTION_ATTR_DEC_TTL", "none"),
306 ("OVS_ACTION_ATTR_DROP", "uint32"),
307 )
308
309 class ctact(nla):
310 nla_flags = NLA_F_NESTED
311
312 nla_map = (
313 ("OVS_CT_ATTR_NONE", "none"),
314 ("OVS_CT_ATTR_COMMIT", "flag"),
315 ("OVS_CT_ATTR_ZONE", "uint16"),
316 ("OVS_CT_ATTR_MARK", "none"),
317 ("OVS_CT_ATTR_LABELS", "none"),
318 ("OVS_CT_ATTR_HELPER", "asciiz"),
319 ("OVS_CT_ATTR_NAT", "natattr"),
320 ("OVS_CT_ATTR_FORCE_COMMIT", "flag"),
321 ("OVS_CT_ATTR_EVENTMASK", "uint32"),
322 ("OVS_CT_ATTR_TIMEOUT", "asciiz"),
323 )
324
325 class natattr(nla):
326 nla_flags = NLA_F_NESTED
327
328 nla_map = (
329 ("OVS_NAT_ATTR_NONE", "none"),
330 ("OVS_NAT_ATTR_SRC", "flag"),
331 ("OVS_NAT_ATTR_DST", "flag"),
332 ("OVS_NAT_ATTR_IP_MIN", "ipaddr"),
333 ("OVS_NAT_ATTR_IP_MAX", "ipaddr"),
334 ("OVS_NAT_ATTR_PROTO_MIN", "uint16"),
335 ("OVS_NAT_ATTR_PROTO_MAX", "uint16"),
336 ("OVS_NAT_ATTR_PERSISTENT", "flag"),
337 ("OVS_NAT_ATTR_PROTO_HASH", "flag"),
338 ("OVS_NAT_ATTR_PROTO_RANDOM", "flag"),
339 )
340
341 def dpstr(self, more=False):
342 print_str = "nat("
343
344 if self.get_attr("OVS_NAT_ATTR_SRC"):
345 print_str += "src"
346 elif self.get_attr("OVS_NAT_ATTR_DST"):
347 print_str += "dst"
348 else:
349 print_str += "XXX-unknown-nat"
350
351 if self.get_attr("OVS_NAT_ATTR_IP_MIN") or self.get_attr(
352 "OVS_NAT_ATTR_IP_MAX"
353 ):
354 if self.get_attr("OVS_NAT_ATTR_IP_MIN"):
355 print_str += "=%s," % str(
356 self.get_attr("OVS_NAT_ATTR_IP_MIN")
357 )
358
359 if self.get_attr("OVS_NAT_ATTR_IP_MAX"):
360 print_str += "-%s," % str(
361 self.get_attr("OVS_NAT_ATTR_IP_MAX")
362 )
363 else:
364 print_str += ","
365
366 if self.get_attr("OVS_NAT_ATTR_PROTO_MIN"):
367 print_str += "proto_min=%d," % self.get_attr(
368 "OVS_NAT_ATTR_PROTO_MIN"
369 )
370
371 if self.get_attr("OVS_NAT_ATTR_PROTO_MAX"):
372 print_str += "proto_max=%d," % self.get_attr(
373 "OVS_NAT_ATTR_PROTO_MAX"
374 )
375
376 if self.get_attr("OVS_NAT_ATTR_PERSISTENT"):
377 print_str += "persistent,"
378 if self.get_attr("OVS_NAT_ATTR_HASH"):
379 print_str += "hash,"
380 if self.get_attr("OVS_NAT_ATTR_RANDOM"):
381 print_str += "random"
382 print_str += ")"
383 return print_str
384
385 def dpstr(self, more=False):
386 print_str = "ct("
387
388 if self.get_attr("OVS_CT_ATTR_COMMIT") is not None:
389 print_str += "commit,"
390 if self.get_attr("OVS_CT_ATTR_ZONE") is not None:
391 print_str += "zone=%d," % self.get_attr("OVS_CT_ATTR_ZONE")
392 if self.get_attr("OVS_CT_ATTR_HELPER") is not None:
393 print_str += "helper=%s," % self.get_attr("OVS_CT_ATTR_HELPER")
394 if self.get_attr("OVS_CT_ATTR_NAT") is not None:
395 print_str += self.get_attr("OVS_CT_ATTR_NAT").dpstr(more)
396 print_str += ","
397 if self.get_attr("OVS_CT_ATTR_FORCE_COMMIT") is not None:
398 print_str += "force,"
399 if self.get_attr("OVS_CT_ATTR_EVENTMASK") is not None:
400 print_str += "emask=0x%X," % self.get_attr(
401 "OVS_CT_ATTR_EVENTMASK"
402 )
403 if self.get_attr("OVS_CT_ATTR_TIMEOUT") is not None:
404 print_str += "timeout=%s" % self.get_attr(
405 "OVS_CT_ATTR_TIMEOUT"
406 )
407 print_str += ")"
408 return print_str
409
410 class userspace(nla):
411 nla_flags = NLA_F_NESTED
412
413 nla_map = (
414 ("OVS_USERSPACE_ATTR_UNUSED", "none"),
415 ("OVS_USERSPACE_ATTR_PID", "uint32"),
416 ("OVS_USERSPACE_ATTR_USERDATA", "array(uint8)"),
417 ("OVS_USERSPACE_ATTR_EGRESS_TUN_PORT", "uint32"),
418 )
419
420 def dpstr(self, more=False):
421 print_str = "userspace("
422 if self.get_attr("OVS_USERSPACE_ATTR_PID") is not None:
423 print_str += "pid=%d," % self.get_attr(
424 "OVS_USERSPACE_ATTR_PID"
425 )
426 if self.get_attr("OVS_USERSPACE_ATTR_USERDATA") is not None:
427 print_str += "userdata="
428 for f in self.get_attr("OVS_USERSPACE_ATTR_USERDATA"):
429 print_str += "%x." % f
430 if self.get_attr("OVS_USERSPACE_ATTR_TUN_PORT") is not None:
431 print_str += "egress_tun_port=%d" % self.get_attr(
432 "OVS_USERSPACE_ATTR_TUN_PORT"
433 )
434 print_str += ")"
435 return print_str
436
437 def dpstr(self, more=False):
438 print_str = ""
439
440 for field in self.nla_map:
441 if field[1] == "none" or self.get_attr(field[0]) is None:
442 continue
443 if print_str != "":
444 print_str += ","
445
446 if field[1] == "uint32":
447 if field[0] == "OVS_ACTION_ATTR_OUTPUT":
448 print_str += "%d" % int(self.get_attr(field[0]))
449 elif field[0] == "OVS_ACTION_ATTR_RECIRC":
450 print_str += "recirc(0x%x)" % int(self.get_attr(field[0]))
451 elif field[0] == "OVS_ACTION_ATTR_TRUNC":
452 print_str += "trunc(%d)" % int(self.get_attr(field[0]))
453 elif field[0] == "OVS_ACTION_ATTR_DROP":
454 print_str += "drop(%d)" % int(self.get_attr(field[0]))
455 elif field[1] == "flag":
456 if field[0] == "OVS_ACTION_ATTR_CT_CLEAR":
457 print_str += "ct_clear"
458 elif field[0] == "OVS_ACTION_ATTR_POP_VLAN":
459 print_str += "pop_vlan"
460 elif field[0] == "OVS_ACTION_ATTR_POP_ETH":
461 print_str += "pop_eth"
462 elif field[0] == "OVS_ACTION_ATTR_POP_NSH":
463 print_str += "pop_nsh"
464 elif field[0] == "OVS_ACTION_ATTR_POP_MPLS":
465 print_str += "pop_mpls"
466 else:
467 datum = self.get_attr(field[0])
468 if field[0] == "OVS_ACTION_ATTR_CLONE":
469 print_str += "clone("
470 print_str += datum.dpstr(more)
471 print_str += ")"
472 else:
473 print_str += datum.dpstr(more)
474
475 return print_str
476
477 def parse(self, actstr):
478 totallen = len(actstr)
479 while len(actstr) != 0:
480 parsed = False
481 parencount = 0
482 if actstr.startswith("drop"):
483 # If no reason is provided, the implicit drop is used (i.e no
484 # action). If some reason is given, an explicit action is used.
485 reason = None
486 if actstr.startswith("drop("):
487 parencount += 1
488
489 actstr, reason = parse_extract_field(
490 actstr,
491 "drop(",
492 "([0-9]+)",
493 lambda x: int(x, 0),
494 False,
495 None,
496 )
497
498 if reason is not None:
499 self["attrs"].append(["OVS_ACTION_ATTR_DROP", reason])
500 parsed = True
501 else:
502 actstr = actstr[len("drop"): ]
503 return (totallen - len(actstr))
504
505 elif parse_starts_block(actstr, "^(\d+)", False, True):
506 actstr, output = parse_extract_field(
507 actstr, None, "(\d+)", lambda x: int(x), False, "0"
508 )
509 self["attrs"].append(["OVS_ACTION_ATTR_OUTPUT", output])
510 parsed = True
511 elif parse_starts_block(actstr, "recirc(", False):
512 actstr, recircid = parse_extract_field(
513 actstr,
514 "recirc(",
515 "([0-9a-fA-Fx]+)",
516 lambda x: int(x, 0),
517 False,
518 0,
519 )
520 parencount += 1
521 self["attrs"].append(["OVS_ACTION_ATTR_RECIRC", recircid])
522 parsed = True
523
524 parse_flat_map = (
525 ("ct_clear", "OVS_ACTION_ATTR_CT_CLEAR"),
526 ("pop_vlan", "OVS_ACTION_ATTR_POP_VLAN"),
527 ("pop_eth", "OVS_ACTION_ATTR_POP_ETH"),
528 ("pop_nsh", "OVS_ACTION_ATTR_POP_NSH"),
529 )
530
531 for flat_act in parse_flat_map:
532 if parse_starts_block(actstr, flat_act[0], False):
533 actstr = actstr[len(flat_act[0]):]
534 self["attrs"].append([flat_act[1]])
535 actstr = actstr[strspn(actstr, ", ") :]
536 parsed = True
537
538 if parse_starts_block(actstr, "clone(", False):
539 parencount += 1
540 subacts = ovsactions()
541 actstr = actstr[len("clone("):]
542 parsedLen = subacts.parse(actstr)
543 lst = []
544 self["attrs"].append(("OVS_ACTION_ATTR_CLONE", subacts))
545 actstr = actstr[parsedLen:]
546 parsed = True
547 elif parse_starts_block(actstr, "ct(", False):
548 parencount += 1
549 actstr = actstr[len("ct(") :]
550 ctact = ovsactions.ctact()
551
552 for scan in (
553 ("commit", "OVS_CT_ATTR_COMMIT", None),
554 ("force_commit", "OVS_CT_ATTR_FORCE_COMMIT", None),
555 ("zone", "OVS_CT_ATTR_ZONE", int),
556 ("mark", "OVS_CT_ATTR_MARK", int),
557 ("helper", "OVS_CT_ATTR_HELPER", lambda x, y: str(x)),
558 ("timeout", "OVS_CT_ATTR_TIMEOUT", lambda x, y: str(x)),
559 ):
560 if actstr.startswith(scan[0]):
561 actstr = actstr[len(scan[0]) :]
562 if scan[2] is not None:
563 if actstr[0] != "=":
564 raise ValueError("Invalid ct attr")
565 actstr = actstr[1:]
566 pos = strcspn(actstr, ",)")
567 datum = scan[2](actstr[:pos], 0)
568 ctact["attrs"].append([scan[1], datum])
569 actstr = actstr[pos:]
570 else:
571 ctact["attrs"].append([scan[1], None])
572 actstr = actstr[strspn(actstr, ", ") :]
573 # it seems strange to put this here, but nat() is a complex
574 # sub-action and this lets it sit anywhere in the ct() action
575 if actstr.startswith("nat"):
576 actstr = actstr[3:]
577 natact = ovsactions.ctact.natattr()
578
579 if actstr.startswith("("):
580 parencount += 1
581 t = None
582 actstr = actstr[1:]
583 if actstr.startswith("src"):
584 t = "OVS_NAT_ATTR_SRC"
585 actstr = actstr[3:]
586 elif actstr.startswith("dst"):
587 t = "OVS_NAT_ATTR_DST"
588 actstr = actstr[3:]
589
590 actstr, ip_block_min = parse_extract_field(
591 actstr, "=", "([0-9a-fA-F\.]+)", str, False
592 )
593 actstr, ip_block_max = parse_extract_field(
594 actstr, "-", "([0-9a-fA-F\.]+)", str, False
595 )
596
597 actstr, proto_min = parse_extract_field(
598 actstr, ":", "(\d+)", int, False
599 )
600 actstr, proto_max = parse_extract_field(
601 actstr, "-", "(\d+)", int, False
602 )
603
604 if t is not None:
605 natact["attrs"].append([t, None])
606
607 if ip_block_min is not None:
608 natact["attrs"].append(
609 ["OVS_NAT_ATTR_IP_MIN", ip_block_min]
610 )
611 if ip_block_max is not None:
612 natact["attrs"].append(
613 ["OVS_NAT_ATTR_IP_MAX", ip_block_max]
614 )
615 if proto_min is not None:
616 natact["attrs"].append(
617 ["OVS_NAT_ATTR_PROTO_MIN", proto_min]
618 )
619 if proto_max is not None:
620 natact["attrs"].append(
621 ["OVS_NAT_ATTR_PROTO_MAX", proto_max]
622 )
623
624 for natscan in (
625 ("persistent", "OVS_NAT_ATTR_PERSISTENT"),
626 ("hash", "OVS_NAT_ATTR_PROTO_HASH"),
627 ("random", "OVS_NAT_ATTR_PROTO_RANDOM"),
628 ):
629 if actstr.startswith(natscan[0]):
630 actstr = actstr[len(natscan[0]) :]
631 natact["attrs"].append([natscan[1], None])
632 actstr = actstr[strspn(actstr, ", ") :]
633
634 ctact["attrs"].append(["OVS_CT_ATTR_NAT", natact])
635 actstr = actstr[strspn(actstr, ", ") :]
636
637 self["attrs"].append(["OVS_ACTION_ATTR_CT", ctact])
638 parsed = True
639
640 actstr = actstr[strspn(actstr, ", ") :]
641 while parencount > 0:
642 parencount -= 1
643 actstr = actstr[strspn(actstr, " "):]
644 if len(actstr) and actstr[0] != ")":
645 raise ValueError("Action str: '%s' unbalanced" % actstr)
646 actstr = actstr[1:]
647
648 if len(actstr) and actstr[0] == ")":
649 return (totallen - len(actstr))
650
651 actstr = actstr[strspn(actstr, ", ") :]
652
653 if not parsed:
654 raise ValueError("Action str: '%s' not supported" % actstr)
655
656 return (totallen - len(actstr))
657
658
659class ovskey(nla):
660 nla_flags = NLA_F_NESTED
661 nla_map = (
662 ("OVS_KEY_ATTR_UNSPEC", "none"),
663 ("OVS_KEY_ATTR_ENCAP", "none"),
664 ("OVS_KEY_ATTR_PRIORITY", "uint32"),
665 ("OVS_KEY_ATTR_IN_PORT", "uint32"),
666 ("OVS_KEY_ATTR_ETHERNET", "ethaddr"),
667 ("OVS_KEY_ATTR_VLAN", "uint16"),
668 ("OVS_KEY_ATTR_ETHERTYPE", "be16"),
669 ("OVS_KEY_ATTR_IPV4", "ovs_key_ipv4"),
670 ("OVS_KEY_ATTR_IPV6", "ovs_key_ipv6"),
671 ("OVS_KEY_ATTR_TCP", "ovs_key_tcp"),
672 ("OVS_KEY_ATTR_UDP", "ovs_key_udp"),
673 ("OVS_KEY_ATTR_ICMP", "ovs_key_icmp"),
674 ("OVS_KEY_ATTR_ICMPV6", "ovs_key_icmpv6"),
675 ("OVS_KEY_ATTR_ARP", "ovs_key_arp"),
676 ("OVS_KEY_ATTR_ND", "ovs_key_nd"),
677 ("OVS_KEY_ATTR_SKB_MARK", "uint32"),
678 ("OVS_KEY_ATTR_TUNNEL", "none"),
679 ("OVS_KEY_ATTR_SCTP", "ovs_key_sctp"),
680 ("OVS_KEY_ATTR_TCP_FLAGS", "be16"),
681 ("OVS_KEY_ATTR_DP_HASH", "uint32"),
682 ("OVS_KEY_ATTR_RECIRC_ID", "uint32"),
683 ("OVS_KEY_ATTR_MPLS", "array(ovs_key_mpls)"),
684 ("OVS_KEY_ATTR_CT_STATE", "uint32"),
685 ("OVS_KEY_ATTR_CT_ZONE", "uint16"),
686 ("OVS_KEY_ATTR_CT_MARK", "uint32"),
687 ("OVS_KEY_ATTR_CT_LABELS", "none"),
688 ("OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV4", "ovs_key_ct_tuple_ipv4"),
689 ("OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV6", "ovs_key_ct_tuple_ipv6"),
690 ("OVS_KEY_ATTR_NSH", "none"),
691 ("OVS_KEY_ATTR_PACKET_TYPE", "none"),
692 ("OVS_KEY_ATTR_ND_EXTENSIONS", "none"),
693 ("OVS_KEY_ATTR_TUNNEL_INFO", "none"),
694 ("OVS_KEY_ATTR_IPV6_EXTENSIONS", "none"),
695 )
696
697 class ovs_key_proto(nla):
698 fields = (
699 ("src", "!H"),
700 ("dst", "!H"),
701 )
702
703 fields_map = (
704 ("src", "src", "%d", lambda x: int(x) if x else 0,
705 convert_int(16)),
706 ("dst", "dst", "%d", lambda x: int(x) if x else 0,
707 convert_int(16)),
708 )
709
710 def __init__(
711 self,
712 protostr,
713 data=None,
714 offset=None,
715 parent=None,
716 length=None,
717 init=None,
718 ):
719 self.proto_str = protostr
720 nla.__init__(
721 self,
722 data=data,
723 offset=offset,
724 parent=parent,
725 length=length,
726 init=init,
727 )
728
729 def parse(self, flowstr, typeInst):
730 if not flowstr.startswith(self.proto_str):
731 return None, None
732
733 k = typeInst()
734 m = typeInst()
735
736 flowstr = flowstr[len(self.proto_str) :]
737 if flowstr.startswith("("):
738 flowstr = flowstr[1:]
739
740 keybits = b""
741 maskbits = b""
742 for f in self.fields_map:
743 if flowstr.startswith(f[1]):
744 # the following assumes that the field looks
745 # something like 'field.' where '.' is a
746 # character that we don't exactly care about.
747 flowstr = flowstr[len(f[1]) + 1 :]
748 splitchar = 0
749 for c in flowstr:
750 if c == "," or c == ")":
751 break
752 splitchar += 1
753 data = flowstr[:splitchar]
754 flowstr = flowstr[splitchar:]
755 else:
756 data = ""
757
758 if len(f) > 4:
759 k[f[0]], m[f[0]] = f[4](data)
760 else:
761 k[f[0]] = f[3](data)
762 m[f[0]] = f[3](data)
763
764 flowstr = flowstr[strspn(flowstr, ", ") :]
765 if len(flowstr) == 0:
766 return flowstr, k, m
767
768 flowstr = flowstr[strspn(flowstr, "), ") :]
769
770 return flowstr, k, m
771
772 def dpstr(self, masked=None, more=False):
773 outstr = self.proto_str + "("
774 first = False
775 for f in self.fields_map:
776 if first:
777 outstr += ","
778 if masked is None:
779 outstr += "%s=" % f[0]
780 if isinstance(f[2], str):
781 outstr += f[2] % self[f[1]]
782 else:
783 outstr += f[2](self[f[1]])
784 first = True
785 elif more or f[3](masked[f[1]]) != 0:
786 outstr += "%s=" % f[0]
787 if isinstance(f[2], str):
788 outstr += f[2] % self[f[1]]
789 else:
790 outstr += f[2](self[f[1]])
791 outstr += "/"
792 if isinstance(f[2], str):
793 outstr += f[2] % masked[f[1]]
794 else:
795 outstr += f[2](masked[f[1]])
796 first = True
797 outstr += ")"
798 return outstr
799
800 class ethaddr(ovs_key_proto):
801 fields = (
802 ("src", "!6s"),
803 ("dst", "!6s"),
804 )
805
806 fields_map = (
807 (
808 "src",
809 "src",
810 macstr,
811 lambda x: int.from_bytes(x, "big"),
812 convert_mac,
813 ),
814 (
815 "dst",
816 "dst",
817 macstr,
818 lambda x: int.from_bytes(x, "big"),
819 convert_mac,
820 ),
821 )
822
823 def __init__(
824 self,
825 data=None,
826 offset=None,
827 parent=None,
828 length=None,
829 init=None,
830 ):
831 ovskey.ovs_key_proto.__init__(
832 self,
833 "eth",
834 data=data,
835 offset=offset,
836 parent=parent,
837 length=length,
838 init=init,
839 )
840
841 class ovs_key_ipv4(ovs_key_proto):
842 fields = (
843 ("src", "!I"),
844 ("dst", "!I"),
845 ("proto", "B"),
846 ("tos", "B"),
847 ("ttl", "B"),
848 ("frag", "B"),
849 )
850
851 fields_map = (
852 (
853 "src",
854 "src",
855 lambda x: str(ipaddress.IPv4Address(x)),
856 int,
857 convert_ipv4,
858 ),
859 (
860 "dst",
861 "dst",
862 lambda x: str(ipaddress.IPv4Address(x)),
863 int,
864 convert_ipv4,
865 ),
866 ("proto", "proto", "%d", lambda x: int(x) if x else 0,
867 convert_int(8)),
868 ("tos", "tos", "%d", lambda x: int(x) if x else 0,
869 convert_int(8)),
870 ("ttl", "ttl", "%d", lambda x: int(x) if x else 0,
871 convert_int(8)),
872 ("frag", "frag", "%d", lambda x: int(x) if x else 0,
873 convert_int(8)),
874 )
875
876 def __init__(
877 self,
878 data=None,
879 offset=None,
880 parent=None,
881 length=None,
882 init=None,
883 ):
884 ovskey.ovs_key_proto.__init__(
885 self,
886 "ipv4",
887 data=data,
888 offset=offset,
889 parent=parent,
890 length=length,
891 init=init,
892 )
893
894 class ovs_key_ipv6(ovs_key_proto):
895 fields = (
896 ("src", "!16s"),
897 ("dst", "!16s"),
898 ("label", "!I"),
899 ("proto", "B"),
900 ("tclass", "B"),
901 ("hlimit", "B"),
902 ("frag", "B"),
903 )
904
905 fields_map = (
906 (
907 "src",
908 "src",
909 lambda x: str(ipaddress.IPv6Address(x)),
910 lambda x: int.from_bytes(x, "big"),
911 lambda x: ipaddress.IPv6Address(x),
912 ),
913 (
914 "dst",
915 "dst",
916 lambda x: str(ipaddress.IPv6Address(x)),
917 lambda x: int.from_bytes(x, "big"),
918 lambda x: ipaddress.IPv6Address(x),
919 ),
920 ("label", "label", "%d", int),
921 ("proto", "proto", "%d", int),
922 ("tclass", "tclass", "%d", int),
923 ("hlimit", "hlimit", "%d", int),
924 ("frag", "frag", "%d", int),
925 )
926
927 def __init__(
928 self,
929 data=None,
930 offset=None,
931 parent=None,
932 length=None,
933 init=None,
934 ):
935 ovskey.ovs_key_proto.__init__(
936 self,
937 "ipv6",
938 data=data,
939 offset=offset,
940 parent=parent,
941 length=length,
942 init=init,
943 )
944
945 class ovs_key_tcp(ovs_key_proto):
946 def __init__(
947 self,
948 data=None,
949 offset=None,
950 parent=None,
951 length=None,
952 init=None,
953 ):
954 ovskey.ovs_key_proto.__init__(
955 self,
956 "tcp",
957 data=data,
958 offset=offset,
959 parent=parent,
960 length=length,
961 init=init,
962 )
963
964 class ovs_key_udp(ovs_key_proto):
965 def __init__(
966 self,
967 data=None,
968 offset=None,
969 parent=None,
970 length=None,
971 init=None,
972 ):
973 ovskey.ovs_key_proto.__init__(
974 self,
975 "udp",
976 data=data,
977 offset=offset,
978 parent=parent,
979 length=length,
980 init=init,
981 )
982
983 class ovs_key_sctp(ovs_key_proto):
984 def __init__(
985 self,
986 data=None,
987 offset=None,
988 parent=None,
989 length=None,
990 init=None,
991 ):
992 ovskey.ovs_key_proto.__init__(
993 self,
994 "sctp",
995 data=data,
996 offset=offset,
997 parent=parent,
998 length=length,
999 init=init,
1000 )
1001
1002 class ovs_key_icmp(ovs_key_proto):
1003 fields = (
1004 ("type", "B"),
1005 ("code", "B"),
1006 )
1007
1008 fields_map = (
1009 ("type", "type", "%d", lambda x: int(x) if x else 0),
1010 ("code", "code", "%d", lambda x: int(x) if x else 0),
1011 )
1012
1013 def __init__(
1014 self,
1015 data=None,
1016 offset=None,
1017 parent=None,
1018 length=None,
1019 init=None,
1020 ):
1021 ovskey.ovs_key_proto.__init__(
1022 self,
1023 "icmp",
1024 data=data,
1025 offset=offset,
1026 parent=parent,
1027 length=length,
1028 init=init,
1029 )
1030
1031 class ovs_key_icmpv6(ovs_key_icmp):
1032 def __init__(
1033 self,
1034 data=None,
1035 offset=None,
1036 parent=None,
1037 length=None,
1038 init=None,
1039 ):
1040 ovskey.ovs_key_proto.__init__(
1041 self,
1042 "icmpv6",
1043 data=data,
1044 offset=offset,
1045 parent=parent,
1046 length=length,
1047 init=init,
1048 )
1049
1050 class ovs_key_arp(ovs_key_proto):
1051 fields = (
1052 ("sip", "!I"),
1053 ("tip", "!I"),
1054 ("op", "!H"),
1055 ("sha", "!6s"),
1056 ("tha", "!6s"),
1057 ("pad", "xx"),
1058 )
1059
1060 fields_map = (
1061 (
1062 "sip",
1063 "sip",
1064 lambda x: str(ipaddress.IPv4Address(x)),
1065 int,
1066 convert_ipv4,
1067 ),
1068 (
1069 "tip",
1070 "tip",
1071 lambda x: str(ipaddress.IPv4Address(x)),
1072 int,
1073 convert_ipv4,
1074 ),
1075 ("op", "op", "%d", lambda x: int(x) if x else 0),
1076 (
1077 "sha",
1078 "sha",
1079 macstr,
1080 lambda x: int.from_bytes(x, "big"),
1081 convert_mac,
1082 ),
1083 (
1084 "tha",
1085 "tha",
1086 macstr,
1087 lambda x: int.from_bytes(x, "big"),
1088 convert_mac,
1089 ),
1090 )
1091
1092 def __init__(
1093 self,
1094 data=None,
1095 offset=None,
1096 parent=None,
1097 length=None,
1098 init=None,
1099 ):
1100 ovskey.ovs_key_proto.__init__(
1101 self,
1102 "arp",
1103 data=data,
1104 offset=offset,
1105 parent=parent,
1106 length=length,
1107 init=init,
1108 )
1109
1110 class ovs_key_nd(ovs_key_proto):
1111 fields = (
1112 ("target", "!16s"),
1113 ("sll", "!6s"),
1114 ("tll", "!6s"),
1115 )
1116
1117 fields_map = (
1118 (
1119 "target",
1120 "target",
1121 lambda x: str(ipaddress.IPv6Address(x)),
1122 lambda x: int.from_bytes(x, "big"),
1123 ),
1124 ("sll", "sll", macstr, lambda x: int.from_bytes(x, "big")),
1125 ("tll", "tll", macstr, lambda x: int.from_bytes(x, "big")),
1126 )
1127
1128 def __init__(
1129 self,
1130 data=None,
1131 offset=None,
1132 parent=None,
1133 length=None,
1134 init=None,
1135 ):
1136 ovskey.ovs_key_proto.__init__(
1137 self,
1138 "nd",
1139 data=data,
1140 offset=offset,
1141 parent=parent,
1142 length=length,
1143 init=init,
1144 )
1145
1146 class ovs_key_ct_tuple_ipv4(ovs_key_proto):
1147 fields = (
1148 ("src", "!I"),
1149 ("dst", "!I"),
1150 ("tp_src", "!H"),
1151 ("tp_dst", "!H"),
1152 ("proto", "B"),
1153 )
1154
1155 fields_map = (
1156 (
1157 "src",
1158 "src",
1159 lambda x: str(ipaddress.IPv4Address(x)),
1160 int,
1161 convert_ipv4,
1162 ),
1163 (
1164 "dst",
1165 "dst",
1166 lambda x: str(ipaddress.IPv4Address(x)),
1167 int,
1168 convert_ipv4,
1169 ),
1170 ("tp_src", "tp_src", "%d", int),
1171 ("tp_dst", "tp_dst", "%d", int),
1172 ("proto", "proto", "%d", int),
1173 )
1174
1175 def __init__(
1176 self,
1177 data=None,
1178 offset=None,
1179 parent=None,
1180 length=None,
1181 init=None,
1182 ):
1183 ovskey.ovs_key_proto.__init__(
1184 self,
1185 "ct_tuple4",
1186 data=data,
1187 offset=offset,
1188 parent=parent,
1189 length=length,
1190 init=init,
1191 )
1192
1193 class ovs_key_ct_tuple_ipv6(nla):
1194 fields = (
1195 ("src", "!16s"),
1196 ("dst", "!16s"),
1197 ("tp_src", "!H"),
1198 ("tp_dst", "!H"),
1199 ("proto", "B"),
1200 )
1201
1202 fields_map = (
1203 (
1204 "src",
1205 "src",
1206 lambda x: str(ipaddress.IPv6Address(x)),
1207 lambda x: int.from_bytes(x, "big", convertmac),
1208 ),
1209 (
1210 "dst",
1211 "dst",
1212 lambda x: str(ipaddress.IPv6Address(x)),
1213 lambda x: int.from_bytes(x, "big"),
1214 ),
1215 ("tp_src", "tp_src", "%d", int),
1216 ("tp_dst", "tp_dst", "%d", int),
1217 ("proto", "proto", "%d", int),
1218 )
1219
1220 def __init__(
1221 self,
1222 data=None,
1223 offset=None,
1224 parent=None,
1225 length=None,
1226 init=None,
1227 ):
1228 ovskey.ovs_key_proto.__init__(
1229 self,
1230 "ct_tuple6",
1231 data=data,
1232 offset=offset,
1233 parent=parent,
1234 length=length,
1235 init=init,
1236 )
1237
1238 class ovs_key_mpls(nla):
1239 fields = (("lse", ">I"),)
1240
1241 def parse(self, flowstr, mask=None):
1242 for field in (
1243 ("OVS_KEY_ATTR_PRIORITY", "skb_priority", intparse),
1244 ("OVS_KEY_ATTR_SKB_MARK", "skb_mark", intparse),
1245 ("OVS_KEY_ATTR_RECIRC_ID", "recirc_id", intparse),
1246 ("OVS_KEY_ATTR_DP_HASH", "dp_hash", intparse),
1247 ("OVS_KEY_ATTR_CT_STATE", "ct_state", parse_ct_state),
1248 ("OVS_KEY_ATTR_CT_ZONE", "ct_zone", intparse),
1249 ("OVS_KEY_ATTR_CT_MARK", "ct_mark", intparse),
1250 ("OVS_KEY_ATTR_IN_PORT", "in_port", intparse),
1251 (
1252 "OVS_KEY_ATTR_ETHERNET",
1253 "eth",
1254 ovskey.ethaddr,
1255 ),
1256 (
1257 "OVS_KEY_ATTR_ETHERTYPE",
1258 "eth_type",
1259 lambda x: intparse(x, "0xffff"),
1260 ),
1261 (
1262 "OVS_KEY_ATTR_IPV4",
1263 "ipv4",
1264 ovskey.ovs_key_ipv4,
1265 ),
1266 (
1267 "OVS_KEY_ATTR_IPV6",
1268 "ipv6",
1269 ovskey.ovs_key_ipv6,
1270 ),
1271 (
1272 "OVS_KEY_ATTR_ARP",
1273 "arp",
1274 ovskey.ovs_key_arp,
1275 ),
1276 (
1277 "OVS_KEY_ATTR_TCP",
1278 "tcp",
1279 ovskey.ovs_key_tcp,
1280 ),
1281 (
1282 "OVS_KEY_ATTR_UDP",
1283 "udp",
1284 ovskey.ovs_key_udp,
1285 ),
1286 (
1287 "OVS_KEY_ATTR_ICMP",
1288 "icmp",
1289 ovskey.ovs_key_icmp,
1290 ),
1291 (
1292 "OVS_KEY_ATTR_TCP_FLAGS",
1293 "tcp_flags",
1294 lambda x: parse_flags(x, None),
1295 ),
1296 ):
1297 fld = field[1] + "("
1298 if not flowstr.startswith(fld):
1299 continue
1300
1301 if not isinstance(field[2], types.FunctionType):
1302 nk = field[2]()
1303 flowstr, k, m = nk.parse(flowstr, field[2])
1304 else:
1305 flowstr = flowstr[len(fld) :]
1306 flowstr, k, m = field[2](flowstr)
1307
1308 if m and mask is not None:
1309 mask["attrs"].append([field[0], m])
1310 self["attrs"].append([field[0], k])
1311
1312 flowstr = flowstr[strspn(flowstr, "),") :]
1313
1314 return flowstr
1315
1316 def dpstr(self, mask=None, more=False):
1317 print_str = ""
1318
1319 for field in (
1320 (
1321 "OVS_KEY_ATTR_PRIORITY",
1322 "skb_priority",
1323 "%d",
1324 lambda x: False,
1325 True,
1326 ),
1327 (
1328 "OVS_KEY_ATTR_SKB_MARK",
1329 "skb_mark",
1330 "%d",
1331 lambda x: False,
1332 True,
1333 ),
1334 (
1335 "OVS_KEY_ATTR_RECIRC_ID",
1336 "recirc_id",
1337 "0x%08X",
1338 lambda x: False,
1339 True,
1340 ),
1341 (
1342 "OVS_KEY_ATTR_DP_HASH",
1343 "dp_hash",
1344 "0x%08X",
1345 lambda x: False,
1346 True,
1347 ),
1348 (
1349 "OVS_KEY_ATTR_CT_STATE",
1350 "ct_state",
1351 "0x%04x",
1352 lambda x: False,
1353 True,
1354 ),
1355 (
1356 "OVS_KEY_ATTR_CT_ZONE",
1357 "ct_zone",
1358 "0x%04x",
1359 lambda x: False,
1360 True,
1361 ),
1362 (
1363 "OVS_KEY_ATTR_CT_MARK",
1364 "ct_mark",
1365 "0x%08x",
1366 lambda x: False,
1367 True,
1368 ),
1369 (
1370 "OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV4",
1371 None,
1372 None,
1373 False,
1374 False,
1375 ),
1376 (
1377 "OVS_KEY_ATTR_CT_ORIG_TUPLE_IPV6",
1378 None,
1379 None,
1380 False,
1381 False,
1382 ),
1383 (
1384 "OVS_KEY_ATTR_IN_PORT",
1385 "in_port",
1386 "%d",
1387 lambda x: True,
1388 True,
1389 ),
1390 ("OVS_KEY_ATTR_ETHERNET", None, None, False, False),
1391 (
1392 "OVS_KEY_ATTR_ETHERTYPE",
1393 "eth_type",
1394 "0x%04x",
1395 lambda x: int(x) == 0xFFFF,
1396 True,
1397 ),
1398 ("OVS_KEY_ATTR_IPV4", None, None, False, False),
1399 ("OVS_KEY_ATTR_IPV6", None, None, False, False),
1400 ("OVS_KEY_ATTR_ARP", None, None, False, False),
1401 ("OVS_KEY_ATTR_TCP", None, None, False, False),
1402 (
1403 "OVS_KEY_ATTR_TCP_FLAGS",
1404 "tcp_flags",
1405 "0x%04x",
1406 lambda x: False,
1407 True,
1408 ),
1409 ("OVS_KEY_ATTR_UDP", None, None, False, False),
1410 ("OVS_KEY_ATTR_SCTP", None, None, False, False),
1411 ("OVS_KEY_ATTR_ICMP", None, None, False, False),
1412 ("OVS_KEY_ATTR_ICMPV6", None, None, False, False),
1413 ("OVS_KEY_ATTR_ND", None, None, False, False),
1414 ):
1415 v = self.get_attr(field[0])
1416 if v is not None:
1417 m = None if mask is None else mask.get_attr(field[0])
1418 if field[4] is False:
1419 print_str += v.dpstr(m, more)
1420 print_str += ","
1421 else:
1422 if m is None or field[3](m):
1423 print_str += field[1] + "("
1424 print_str += field[2] % v
1425 print_str += "),"
1426 elif more or m != 0:
1427 print_str += field[1] + "("
1428 print_str += (field[2] % v) + "/" + (field[2] % m)
1429 print_str += "),"
1430
1431 return print_str
1432
1433
1434class OvsPacket(GenericNetlinkSocket):
1435 OVS_PACKET_CMD_MISS = 1 # Flow table miss
1436 OVS_PACKET_CMD_ACTION = 2 # USERSPACE action
1437 OVS_PACKET_CMD_EXECUTE = 3 # Apply actions to packet
1438
1439 class ovs_packet_msg(ovs_dp_msg):
1440 nla_map = (
1441 ("OVS_PACKET_ATTR_UNSPEC", "none"),
1442 ("OVS_PACKET_ATTR_PACKET", "array(uint8)"),
1443 ("OVS_PACKET_ATTR_KEY", "ovskey"),
1444 ("OVS_PACKET_ATTR_ACTIONS", "ovsactions"),
1445 ("OVS_PACKET_ATTR_USERDATA", "none"),
1446 ("OVS_PACKET_ATTR_EGRESS_TUN_KEY", "none"),
1447 ("OVS_PACKET_ATTR_UNUSED1", "none"),
1448 ("OVS_PACKET_ATTR_UNUSED2", "none"),
1449 ("OVS_PACKET_ATTR_PROBE", "none"),
1450 ("OVS_PACKET_ATTR_MRU", "uint16"),
1451 ("OVS_PACKET_ATTR_LEN", "uint32"),
1452 ("OVS_PACKET_ATTR_HASH", "uint64"),
1453 )
1454
1455 def __init__(self):
1456 GenericNetlinkSocket.__init__(self)
1457 self.bind(OVS_PACKET_FAMILY, OvsPacket.ovs_packet_msg)
1458
1459 def upcall_handler(self, up=None):
1460 print("listening on upcall packet handler:", self.epid)
1461 while True:
1462 try:
1463 msgs = self.get()
1464 for msg in msgs:
1465 if not up:
1466 continue
1467 if msg["cmd"] == OvsPacket.OVS_PACKET_CMD_MISS:
1468 up.miss(msg)
1469 elif msg["cmd"] == OvsPacket.OVS_PACKET_CMD_ACTION:
1470 up.action(msg)
1471 elif msg["cmd"] == OvsPacket.OVS_PACKET_CMD_EXECUTE:
1472 up.execute(msg)
1473 else:
1474 print("Unkonwn cmd: %d" % msg["cmd"])
1475 except NetlinkError as ne:
1476 raise ne
1477
1478
1479class OvsDatapath(GenericNetlinkSocket):
1480 OVS_DP_F_VPORT_PIDS = 1 << 1
1481 OVS_DP_F_DISPATCH_UPCALL_PER_CPU = 1 << 3
1482
1483 class dp_cmd_msg(ovs_dp_msg):
1484 """
1485 Message class that will be used to communicate with the kernel module.
1486 """
1487
1488 nla_map = (
1489 ("OVS_DP_ATTR_UNSPEC", "none"),
1490 ("OVS_DP_ATTR_NAME", "asciiz"),
1491 ("OVS_DP_ATTR_UPCALL_PID", "array(uint32)"),
1492 ("OVS_DP_ATTR_STATS", "dpstats"),
1493 ("OVS_DP_ATTR_MEGAFLOW_STATS", "megaflowstats"),
1494 ("OVS_DP_ATTR_USER_FEATURES", "uint32"),
1495 ("OVS_DP_ATTR_PAD", "none"),
1496 ("OVS_DP_ATTR_MASKS_CACHE_SIZE", "uint32"),
1497 ("OVS_DP_ATTR_PER_CPU_PIDS", "array(uint32)"),
1498 )
1499
1500 class dpstats(nla):
1501 fields = (
1502 ("hit", "=Q"),
1503 ("missed", "=Q"),
1504 ("lost", "=Q"),
1505 ("flows", "=Q"),
1506 )
1507
1508 class megaflowstats(nla):
1509 fields = (
1510 ("mask_hit", "=Q"),
1511 ("masks", "=I"),
1512 ("padding", "=I"),
1513 ("cache_hits", "=Q"),
1514 ("pad1", "=Q"),
1515 )
1516
1517 def __init__(self):
1518 GenericNetlinkSocket.__init__(self)
1519 self.bind(OVS_DATAPATH_FAMILY, OvsDatapath.dp_cmd_msg)
1520
1521 def info(self, dpname, ifindex=0):
1522 msg = OvsDatapath.dp_cmd_msg()
1523 msg["cmd"] = OVS_DP_CMD_GET
1524 msg["version"] = OVS_DATAPATH_VERSION
1525 msg["reserved"] = 0
1526 msg["dpifindex"] = ifindex
1527 msg["attrs"].append(["OVS_DP_ATTR_NAME", dpname])
1528
1529 try:
1530 reply = self.nlm_request(
1531 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST
1532 )
1533 reply = reply[0]
1534 except NetlinkError as ne:
1535 if ne.code == errno.ENODEV:
1536 reply = None
1537 else:
1538 raise ne
1539
1540 return reply
1541
1542 def create(
1543 self, dpname, shouldUpcall=False, versionStr=None, p=OvsPacket()
1544 ):
1545 msg = OvsDatapath.dp_cmd_msg()
1546 msg["cmd"] = OVS_DP_CMD_NEW
1547 if versionStr is None:
1548 msg["version"] = OVS_DATAPATH_VERSION
1549 else:
1550 msg["version"] = int(versionStr.split(":")[0], 0)
1551 msg["reserved"] = 0
1552 msg["dpifindex"] = 0
1553 msg["attrs"].append(["OVS_DP_ATTR_NAME", dpname])
1554
1555 dpfeatures = 0
1556 if versionStr is not None and versionStr.find(":") != -1:
1557 dpfeatures = int(versionStr.split(":")[1], 0)
1558 else:
1559 if versionStr is None or versionStr.find(":") == -1:
1560 dpfeatures |= OvsDatapath.OVS_DP_F_DISPATCH_UPCALL_PER_CPU
1561 dpfeatures &= ~OvsDatapath.OVS_DP_F_VPORT_PIDS
1562
1563 nproc = multiprocessing.cpu_count()
1564 procarray = []
1565 for i in range(1, nproc):
1566 procarray += [int(p.epid)]
1567 msg["attrs"].append(["OVS_DP_ATTR_UPCALL_PID", procarray])
1568 msg["attrs"].append(["OVS_DP_ATTR_USER_FEATURES", dpfeatures])
1569 if not shouldUpcall:
1570 msg["attrs"].append(["OVS_DP_ATTR_UPCALL_PID", [0]])
1571
1572 try:
1573 reply = self.nlm_request(
1574 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
1575 )
1576 reply = reply[0]
1577 except NetlinkError as ne:
1578 if ne.code == errno.EEXIST:
1579 reply = None
1580 else:
1581 raise ne
1582
1583 return reply
1584
1585 def destroy(self, dpname):
1586 msg = OvsDatapath.dp_cmd_msg()
1587 msg["cmd"] = OVS_DP_CMD_DEL
1588 msg["version"] = OVS_DATAPATH_VERSION
1589 msg["reserved"] = 0
1590 msg["dpifindex"] = 0
1591 msg["attrs"].append(["OVS_DP_ATTR_NAME", dpname])
1592
1593 try:
1594 reply = self.nlm_request(
1595 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
1596 )
1597 reply = reply[0]
1598 except NetlinkError as ne:
1599 if ne.code == errno.ENODEV:
1600 reply = None
1601 else:
1602 raise ne
1603
1604 return reply
1605
1606
1607class OvsVport(GenericNetlinkSocket):
1608 OVS_VPORT_TYPE_NETDEV = 1
1609 OVS_VPORT_TYPE_INTERNAL = 2
1610 OVS_VPORT_TYPE_GRE = 3
1611 OVS_VPORT_TYPE_VXLAN = 4
1612 OVS_VPORT_TYPE_GENEVE = 5
1613
1614 class ovs_vport_msg(ovs_dp_msg):
1615 nla_map = (
1616 ("OVS_VPORT_ATTR_UNSPEC", "none"),
1617 ("OVS_VPORT_ATTR_PORT_NO", "uint32"),
1618 ("OVS_VPORT_ATTR_TYPE", "uint32"),
1619 ("OVS_VPORT_ATTR_NAME", "asciiz"),
1620 ("OVS_VPORT_ATTR_OPTIONS", "none"),
1621 ("OVS_VPORT_ATTR_UPCALL_PID", "array(uint32)"),
1622 ("OVS_VPORT_ATTR_STATS", "vportstats"),
1623 ("OVS_VPORT_ATTR_PAD", "none"),
1624 ("OVS_VPORT_ATTR_IFINDEX", "uint32"),
1625 ("OVS_VPORT_ATTR_NETNSID", "uint32"),
1626 )
1627
1628 class vportstats(nla):
1629 fields = (
1630 ("rx_packets", "=Q"),
1631 ("tx_packets", "=Q"),
1632 ("rx_bytes", "=Q"),
1633 ("tx_bytes", "=Q"),
1634 ("rx_errors", "=Q"),
1635 ("tx_errors", "=Q"),
1636 ("rx_dropped", "=Q"),
1637 ("tx_dropped", "=Q"),
1638 )
1639
1640 def type_to_str(vport_type):
1641 if vport_type == OvsVport.OVS_VPORT_TYPE_NETDEV:
1642 return "netdev"
1643 elif vport_type == OvsVport.OVS_VPORT_TYPE_INTERNAL:
1644 return "internal"
1645 elif vport_type == OvsVport.OVS_VPORT_TYPE_GRE:
1646 return "gre"
1647 elif vport_type == OvsVport.OVS_VPORT_TYPE_VXLAN:
1648 return "vxlan"
1649 elif vport_type == OvsVport.OVS_VPORT_TYPE_GENEVE:
1650 return "geneve"
1651 raise ValueError("Unknown vport type:%d" % vport_type)
1652
1653 def str_to_type(vport_type):
1654 if vport_type == "netdev":
1655 return OvsVport.OVS_VPORT_TYPE_NETDEV
1656 elif vport_type == "internal":
1657 return OvsVport.OVS_VPORT_TYPE_INTERNAL
1658 elif vport_type == "gre":
1659 return OvsVport.OVS_VPORT_TYPE_INTERNAL
1660 elif vport_type == "vxlan":
1661 return OvsVport.OVS_VPORT_TYPE_VXLAN
1662 elif vport_type == "geneve":
1663 return OvsVport.OVS_VPORT_TYPE_GENEVE
1664 raise ValueError("Unknown vport type: '%s'" % vport_type)
1665
1666 def __init__(self, packet=OvsPacket()):
1667 GenericNetlinkSocket.__init__(self)
1668 self.bind(OVS_VPORT_FAMILY, OvsVport.ovs_vport_msg)
1669 self.upcall_packet = packet
1670
1671 def info(self, vport_name, dpifindex=0, portno=None):
1672 msg = OvsVport.ovs_vport_msg()
1673
1674 msg["cmd"] = OVS_VPORT_CMD_GET
1675 msg["version"] = OVS_DATAPATH_VERSION
1676 msg["reserved"] = 0
1677 msg["dpifindex"] = dpifindex
1678
1679 if portno is None:
1680 msg["attrs"].append(["OVS_VPORT_ATTR_NAME", vport_name])
1681 else:
1682 msg["attrs"].append(["OVS_VPORT_ATTR_PORT_NO", portno])
1683
1684 try:
1685 reply = self.nlm_request(
1686 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST
1687 )
1688 reply = reply[0]
1689 except NetlinkError as ne:
1690 if ne.code == errno.ENODEV:
1691 reply = None
1692 else:
1693 raise ne
1694 return reply
1695
1696 def attach(self, dpindex, vport_ifname, ptype):
1697 msg = OvsVport.ovs_vport_msg()
1698
1699 msg["cmd"] = OVS_VPORT_CMD_NEW
1700 msg["version"] = OVS_DATAPATH_VERSION
1701 msg["reserved"] = 0
1702 msg["dpifindex"] = dpindex
1703 port_type = OvsVport.str_to_type(ptype)
1704
1705 msg["attrs"].append(["OVS_VPORT_ATTR_TYPE", port_type])
1706 msg["attrs"].append(["OVS_VPORT_ATTR_NAME", vport_ifname])
1707 msg["attrs"].append(
1708 ["OVS_VPORT_ATTR_UPCALL_PID", [self.upcall_packet.epid]]
1709 )
1710
1711 try:
1712 reply = self.nlm_request(
1713 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
1714 )
1715 reply = reply[0]
1716 except NetlinkError as ne:
1717 if ne.code == errno.EEXIST:
1718 reply = None
1719 else:
1720 raise ne
1721 return reply
1722
1723 def reset_upcall(self, dpindex, vport_ifname, p=None):
1724 msg = OvsVport.ovs_vport_msg()
1725
1726 msg["cmd"] = OVS_VPORT_CMD_SET
1727 msg["version"] = OVS_DATAPATH_VERSION
1728 msg["reserved"] = 0
1729 msg["dpifindex"] = dpindex
1730 msg["attrs"].append(["OVS_VPORT_ATTR_NAME", vport_ifname])
1731
1732 if p == None:
1733 p = self.upcall_packet
1734 else:
1735 self.upcall_packet = p
1736
1737 msg["attrs"].append(["OVS_VPORT_ATTR_UPCALL_PID", [p.epid]])
1738
1739 try:
1740 reply = self.nlm_request(
1741 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
1742 )
1743 reply = reply[0]
1744 except NetlinkError as ne:
1745 raise ne
1746 return reply
1747
1748 def detach(self, dpindex, vport_ifname):
1749 msg = OvsVport.ovs_vport_msg()
1750
1751 msg["cmd"] = OVS_VPORT_CMD_DEL
1752 msg["version"] = OVS_DATAPATH_VERSION
1753 msg["reserved"] = 0
1754 msg["dpifindex"] = dpindex
1755 msg["attrs"].append(["OVS_VPORT_ATTR_NAME", vport_ifname])
1756
1757 try:
1758 reply = self.nlm_request(
1759 msg, msg_type=self.prid, msg_flags=NLM_F_REQUEST | NLM_F_ACK
1760 )
1761 reply = reply[0]
1762 except NetlinkError as ne:
1763 if ne.code == errno.ENODEV:
1764 reply = None
1765 else:
1766 raise ne
1767 return reply
1768
1769 def upcall_handler(self, handler=None):
1770 self.upcall_packet.upcall_handler(handler)
1771
1772
1773class OvsFlow(GenericNetlinkSocket):
1774 class ovs_flow_msg(ovs_dp_msg):
1775 nla_map = (
1776 ("OVS_FLOW_ATTR_UNSPEC", "none"),
1777 ("OVS_FLOW_ATTR_KEY", "ovskey"),
1778 ("OVS_FLOW_ATTR_ACTIONS", "ovsactions"),
1779 ("OVS_FLOW_ATTR_STATS", "flowstats"),
1780 ("OVS_FLOW_ATTR_TCP_FLAGS", "uint8"),
1781 ("OVS_FLOW_ATTR_USED", "uint64"),
1782 ("OVS_FLOW_ATTR_CLEAR", "none"),
1783 ("OVS_FLOW_ATTR_MASK", "ovskey"),
1784 ("OVS_FLOW_ATTR_PROBE", "none"),
1785 ("OVS_FLOW_ATTR_UFID", "array(uint32)"),
1786 ("OVS_FLOW_ATTR_UFID_FLAGS", "uint32"),
1787 )
1788
1789 class flowstats(nla):
1790 fields = (
1791 ("packets", "=Q"),
1792 ("bytes", "=Q"),
1793 )
1794
1795 def dpstr(self, more=False):
1796 ufid = self.get_attr("OVS_FLOW_ATTR_UFID")
1797 ufid_str = ""
1798 if ufid is not None:
1799 ufid_str = (
1800 "ufid:{:08x}-{:04x}-{:04x}-{:04x}-{:04x}{:08x}".format(
1801 ufid[0],
1802 ufid[1] >> 16,
1803 ufid[1] & 0xFFFF,
1804 ufid[2] >> 16,
1805 ufid[2] & 0,
1806 ufid[3],
1807 )
1808 )
1809
1810 key_field = self.get_attr("OVS_FLOW_ATTR_KEY")
1811 keymsg = None
1812 if key_field is not None:
1813 keymsg = key_field
1814
1815 mask_field = self.get_attr("OVS_FLOW_ATTR_MASK")
1816 maskmsg = None
1817 if mask_field is not None:
1818 maskmsg = mask_field
1819
1820 acts_field = self.get_attr("OVS_FLOW_ATTR_ACTIONS")
1821 actsmsg = None
1822 if acts_field is not None:
1823 actsmsg = acts_field
1824
1825 print_str = ""
1826
1827 if more:
1828 print_str += ufid_str + ","
1829
1830 if keymsg is not None:
1831 print_str += keymsg.dpstr(maskmsg, more)
1832
1833 stats = self.get_attr("OVS_FLOW_ATTR_STATS")
1834 if stats is None:
1835 print_str += " packets:0, bytes:0,"
1836 else:
1837 print_str += " packets:%d, bytes:%d," % (
1838 stats["packets"],
1839 stats["bytes"],
1840 )
1841
1842 used = self.get_attr("OVS_FLOW_ATTR_USED")
1843 print_str += " used:"
1844 if used is None:
1845 print_str += "never,"
1846 else:
1847 used_time = int(used)
1848 cur_time_sec = time.clock_gettime(time.CLOCK_MONOTONIC)
1849 used_time = (cur_time_sec * 1000) - used_time
1850 print_str += "{}s,".format(used_time / 1000)
1851
1852 print_str += " actions:"
1853 if (
1854 actsmsg is None
1855 or "attrs" not in actsmsg
1856 or len(actsmsg["attrs"]) == 0
1857 ):
1858 print_str += "drop"
1859 else:
1860 print_str += actsmsg.dpstr(more)
1861
1862 return print_str
1863
1864 def parse(self, flowstr, actstr, dpidx=0):
1865 OVS_UFID_F_OMIT_KEY = 1 << 0
1866 OVS_UFID_F_OMIT_MASK = 1 << 1
1867 OVS_UFID_F_OMIT_ACTIONS = 1 << 2
1868
1869 self["cmd"] = 0
1870 self["version"] = 0
1871 self["reserved"] = 0
1872 self["dpifindex"] = 0
1873
1874 if flowstr.startswith("ufid:"):
1875 count = 5
1876 while flowstr[count] != ",":
1877 count += 1
1878 ufidstr = flowstr[5:count]
1879 flowstr = flowstr[count + 1 :]
1880 else:
1881 ufidstr = str(uuid.uuid4())
1882 uuidRawObj = uuid.UUID(ufidstr).fields
1883
1884 self["attrs"].append(
1885 [
1886 "OVS_FLOW_ATTR_UFID",
1887 [
1888 uuidRawObj[0],
1889 uuidRawObj[1] << 16 | uuidRawObj[2],
1890 uuidRawObj[3] << 24
1891 | uuidRawObj[4] << 16
1892 | uuidRawObj[5] & (0xFF << 32) >> 32,
1893 uuidRawObj[5] & (0xFFFFFFFF),
1894 ],
1895 ]
1896 )
1897 self["attrs"].append(
1898 [
1899 "OVS_FLOW_ATTR_UFID_FLAGS",
1900 int(
1901 OVS_UFID_F_OMIT_KEY
1902 | OVS_UFID_F_OMIT_MASK
1903 | OVS_UFID_F_OMIT_ACTIONS
1904 ),
1905 ]
1906 )
1907
1908 k = ovskey()
1909 m = ovskey()
1910 k.parse(flowstr, m)
1911 self["attrs"].append(["OVS_FLOW_ATTR_KEY", k])
1912 self["attrs"].append(["OVS_FLOW_ATTR_MASK", m])
1913
1914 a = ovsactions()
1915 a.parse(actstr)
1916 self["attrs"].append(["OVS_FLOW_ATTR_ACTIONS", a])
1917
1918 def __init__(self):
1919 GenericNetlinkSocket.__init__(self)
1920
1921 self.bind(OVS_FLOW_FAMILY, OvsFlow.ovs_flow_msg)
1922
1923 def add_flow(self, dpifindex, flowmsg):
1924 """
1925 Send a new flow message to the kernel.
1926
1927 dpifindex should be a valid datapath obtained by calling
1928 into the OvsDatapath lookup
1929
1930 flowmsg is a flow object obtained by calling a dpparse
1931 """
1932
1933 flowmsg["cmd"] = OVS_FLOW_CMD_NEW
1934 flowmsg["version"] = OVS_DATAPATH_VERSION
1935 flowmsg["reserved"] = 0
1936 flowmsg["dpifindex"] = dpifindex
1937
1938 try:
1939 reply = self.nlm_request(
1940 flowmsg,
1941 msg_type=self.prid,
1942 msg_flags=NLM_F_REQUEST | NLM_F_ACK,
1943 )
1944 reply = reply[0]
1945 except NetlinkError as ne:
1946 print(flowmsg)
1947 raise ne
1948 return reply
1949
1950 def del_flows(self, dpifindex):
1951 """
1952 Send a del message to the kernel that will drop all flows.
1953
1954 dpifindex should be a valid datapath obtained by calling
1955 into the OvsDatapath lookup
1956 """
1957
1958 flowmsg = OvsFlow.ovs_flow_msg()
1959 flowmsg["cmd"] = OVS_FLOW_CMD_DEL
1960 flowmsg["version"] = OVS_DATAPATH_VERSION
1961 flowmsg["reserved"] = 0
1962 flowmsg["dpifindex"] = dpifindex
1963
1964 try:
1965 reply = self.nlm_request(
1966 flowmsg,
1967 msg_type=self.prid,
1968 msg_flags=NLM_F_REQUEST | NLM_F_ACK,
1969 )
1970 reply = reply[0]
1971 except NetlinkError as ne:
1972 print(flowmsg)
1973 raise ne
1974 return reply
1975
1976 def dump(self, dpifindex, flowspec=None):
1977 """
1978 Returns a list of messages containing flows.
1979
1980 dpifindex should be a valid datapath obtained by calling
1981 into the OvsDatapath lookup
1982
1983 flowpsec is a string which represents a flow in the dpctl
1984 format.
1985 """
1986 msg = OvsFlow.ovs_flow_msg()
1987
1988 msg["cmd"] = OVS_FLOW_CMD_GET
1989 msg["version"] = OVS_DATAPATH_VERSION
1990 msg["reserved"] = 0
1991 msg["dpifindex"] = dpifindex
1992
1993 msg_flags = NLM_F_REQUEST | NLM_F_ACK
1994 if flowspec is None:
1995 msg_flags |= NLM_F_DUMP
1996 rep = None
1997
1998 try:
1999 rep = self.nlm_request(
2000 msg,
2001 msg_type=self.prid,
2002 msg_flags=msg_flags,
2003 )
2004 except NetlinkError as ne:
2005 raise ne
2006 return rep
2007
2008 def miss(self, packetmsg):
2009 seq = packetmsg["header"]["sequence_number"]
2010 keystr = "(none)"
2011 key_field = packetmsg.get_attr("OVS_PACKET_ATTR_KEY")
2012 if key_field is not None:
2013 keystr = key_field.dpstr(None, True)
2014
2015 pktdata = packetmsg.get_attr("OVS_PACKET_ATTR_PACKET")
2016 pktpres = "yes" if pktdata is not None else "no"
2017
2018 print("MISS upcall[%d/%s]: %s" % (seq, pktpres, keystr), flush=True)
2019
2020 def execute(self, packetmsg):
2021 print("userspace execute command")
2022
2023 def action(self, packetmsg):
2024 print("userspace action command")
2025
2026
2027def print_ovsdp_full(dp_lookup_rep, ifindex, ndb=NDB(), vpl=OvsVport()):
2028 dp_name = dp_lookup_rep.get_attr("OVS_DP_ATTR_NAME")
2029 base_stats = dp_lookup_rep.get_attr("OVS_DP_ATTR_STATS")
2030 megaflow_stats = dp_lookup_rep.get_attr("OVS_DP_ATTR_MEGAFLOW_STATS")
2031 user_features = dp_lookup_rep.get_attr("OVS_DP_ATTR_USER_FEATURES")
2032 masks_cache_size = dp_lookup_rep.get_attr("OVS_DP_ATTR_MASKS_CACHE_SIZE")
2033
2034 print("%s:" % dp_name)
2035 print(
2036 " lookups: hit:%d missed:%d lost:%d"
2037 % (base_stats["hit"], base_stats["missed"], base_stats["lost"])
2038 )
2039 print(" flows:%d" % base_stats["flows"])
2040 pkts = base_stats["hit"] + base_stats["missed"]
2041 avg = (megaflow_stats["mask_hit"] / pkts) if pkts != 0 else 0.0
2042 print(
2043 " masks: hit:%d total:%d hit/pkt:%f"
2044 % (megaflow_stats["mask_hit"], megaflow_stats["masks"], avg)
2045 )
2046 print(" caches:")
2047 print(" masks-cache: size:%d" % masks_cache_size)
2048
2049 if user_features is not None:
2050 print(" features: 0x%X" % user_features)
2051
2052 # port print out
2053 for iface in ndb.interfaces:
2054 rep = vpl.info(iface.ifname, ifindex)
2055 if rep is not None:
2056 print(
2057 " port %d: %s (%s)"
2058 % (
2059 rep.get_attr("OVS_VPORT_ATTR_PORT_NO"),
2060 rep.get_attr("OVS_VPORT_ATTR_NAME"),
2061 OvsVport.type_to_str(rep.get_attr("OVS_VPORT_ATTR_TYPE")),
2062 )
2063 )
2064
2065
2066def main(argv):
2067 nlmsg_atoms.ovskey = ovskey
2068 nlmsg_atoms.ovsactions = ovsactions
2069
2070 # version check for pyroute2
2071 prverscheck = pyroute2.__version__.split(".")
2072 if int(prverscheck[0]) == 0 and int(prverscheck[1]) < 6:
2073 print("Need to upgrade the python pyroute2 package to >= 0.6.")
2074 sys.exit(0)
2075
2076 parser = argparse.ArgumentParser()
2077 parser.add_argument(
2078 "-v",
2079 "--verbose",
2080 action="count",
2081 help="Increment 'verbose' output counter.",
2082 default=0,
2083 )
2084 subparsers = parser.add_subparsers()
2085
2086 showdpcmd = subparsers.add_parser("show")
2087 showdpcmd.add_argument(
2088 "showdp", metavar="N", type=str, nargs="?", help="Datapath Name"
2089 )
2090
2091 adddpcmd = subparsers.add_parser("add-dp")
2092 adddpcmd.add_argument("adddp", help="Datapath Name")
2093 adddpcmd.add_argument(
2094 "-u",
2095 "--upcall",
2096 action="store_true",
2097 help="Leave open a reader for upcalls",
2098 )
2099 adddpcmd.add_argument(
2100 "-V",
2101 "--versioning",
2102 required=False,
2103 help="Specify a custom version / feature string",
2104 )
2105
2106 deldpcmd = subparsers.add_parser("del-dp")
2107 deldpcmd.add_argument("deldp", help="Datapath Name")
2108
2109 addifcmd = subparsers.add_parser("add-if")
2110 addifcmd.add_argument("dpname", help="Datapath Name")
2111 addifcmd.add_argument("addif", help="Interface name for adding")
2112 addifcmd.add_argument(
2113 "-u",
2114 "--upcall",
2115 action="store_true",
2116 help="Leave open a reader for upcalls",
2117 )
2118 addifcmd.add_argument(
2119 "-t",
2120 "--ptype",
2121 type=str,
2122 default="netdev",
2123 choices=["netdev", "internal"],
2124 help="Interface type (default netdev)",
2125 )
2126 delifcmd = subparsers.add_parser("del-if")
2127 delifcmd.add_argument("dpname", help="Datapath Name")
2128 delifcmd.add_argument("delif", help="Interface name for adding")
2129
2130 dumpflcmd = subparsers.add_parser("dump-flows")
2131 dumpflcmd.add_argument("dumpdp", help="Datapath Name")
2132
2133 addflcmd = subparsers.add_parser("add-flow")
2134 addflcmd.add_argument("flbr", help="Datapath name")
2135 addflcmd.add_argument("flow", help="Flow specification")
2136 addflcmd.add_argument("acts", help="Flow actions")
2137
2138 delfscmd = subparsers.add_parser("del-flows")
2139 delfscmd.add_argument("flsbr", help="Datapath name")
2140
2141 args = parser.parse_args()
2142
2143 if args.verbose > 0:
2144 if args.verbose > 1:
2145 logging.basicConfig(level=logging.DEBUG)
2146
2147 ovspk = OvsPacket()
2148 ovsdp = OvsDatapath()
2149 ovsvp = OvsVport(ovspk)
2150 ovsflow = OvsFlow()
2151 ndb = NDB()
2152
2153 sys.setrecursionlimit(100000)
2154
2155 if hasattr(args, "showdp"):
2156 found = False
2157 for iface in ndb.interfaces:
2158 rep = None
2159 if args.showdp is None:
2160 rep = ovsdp.info(iface.ifname, 0)
2161 elif args.showdp == iface.ifname:
2162 rep = ovsdp.info(iface.ifname, 0)
2163
2164 if rep is not None:
2165 found = True
2166 print_ovsdp_full(rep, iface.index, ndb, ovsvp)
2167
2168 if not found:
2169 msg = "No DP found"
2170 if args.showdp is not None:
2171 msg += ":'%s'" % args.showdp
2172 print(msg)
2173 elif hasattr(args, "adddp"):
2174 rep = ovsdp.create(args.adddp, args.upcall, args.versioning, ovspk)
2175 if rep is None:
2176 print("DP '%s' already exists" % args.adddp)
2177 else:
2178 print("DP '%s' added" % args.adddp)
2179 if args.upcall:
2180 ovspk.upcall_handler(ovsflow)
2181 elif hasattr(args, "deldp"):
2182 ovsdp.destroy(args.deldp)
2183 elif hasattr(args, "addif"):
2184 rep = ovsdp.info(args.dpname, 0)
2185 if rep is None:
2186 print("DP '%s' not found." % args.dpname)
2187 return 1
2188 dpindex = rep["dpifindex"]
2189 rep = ovsvp.attach(rep["dpifindex"], args.addif, args.ptype)
2190 msg = "vport '%s'" % args.addif
2191 if rep and rep["header"]["error"] is None:
2192 msg += " added."
2193 else:
2194 msg += " failed to add."
2195 if args.upcall:
2196 if rep is None:
2197 rep = ovsvp.reset_upcall(dpindex, args.addif, ovspk)
2198 ovsvp.upcall_handler(ovsflow)
2199 elif hasattr(args, "delif"):
2200 rep = ovsdp.info(args.dpname, 0)
2201 if rep is None:
2202 print("DP '%s' not found." % args.dpname)
2203 return 1
2204 rep = ovsvp.detach(rep["dpifindex"], args.delif)
2205 msg = "vport '%s'" % args.delif
2206 if rep and rep["header"]["error"] is None:
2207 msg += " removed."
2208 else:
2209 msg += " failed to remove."
2210 elif hasattr(args, "dumpdp"):
2211 rep = ovsdp.info(args.dumpdp, 0)
2212 if rep is None:
2213 print("DP '%s' not found." % args.dumpdp)
2214 return 1
2215 rep = ovsflow.dump(rep["dpifindex"])
2216 for flow in rep:
2217 print(flow.dpstr(True if args.verbose > 0 else False))
2218 elif hasattr(args, "flbr"):
2219 rep = ovsdp.info(args.flbr, 0)
2220 if rep is None:
2221 print("DP '%s' not found." % args.flbr)
2222 return 1
2223 flow = OvsFlow.ovs_flow_msg()
2224 flow.parse(args.flow, args.acts, rep["dpifindex"])
2225 ovsflow.add_flow(rep["dpifindex"], flow)
2226 elif hasattr(args, "flsbr"):
2227 rep = ovsdp.info(args.flsbr, 0)
2228 if rep is None:
2229 print("DP '%s' not found." % args.flsbr)
2230 ovsflow.del_flows(rep["dpifindex"])
2231
2232 return 0
2233
2234
2235if __name__ == "__main__":
2236 sys.exit(main(sys.argv))