[ovs-dev] [PATCH v4 ovn 2/2] Add DNSSL support to OVN

Numan Siddique numans at ovn.org
Tue Oct 29 07:30:38 UTC 2019


On Mon, Oct 28, 2019 at 8:10 PM Lorenzo Bianconi
<lorenzo.bianconi at redhat.com> wrote:
>
> Introduce the possibility to specify a DNSSL option to Router
> Advertisement packets. DNS Search list can be specified using
> 'dnssl' tag in the ipv6_ra_configs column of logical router
> port table
>
> Signed-off-by: Lorenzo Bianconi <lorenzo.bianconi at redhat.com>
> ---
>  controller/pinctrl.c | 51 ++++++++++++++++++++++++++++++++++++++++++++
>  lib/ovn-l7.h         | 11 ++++++++++
>  northd/ovn-northd.c  |  4 ++++
>  ovn-nb.xml           |  5 +++++
>  tests/ovn.at         | 30 +++++++++++++++++---------
>  5 files changed, 91 insertions(+), 10 deletions(-)
>
> diff --git a/controller/pinctrl.c b/controller/pinctrl.c
> index f105ebb5c..0bd1ef3ef 100644
> --- a/controller/pinctrl.c
> +++ b/controller/pinctrl.c
> @@ -2194,6 +2194,7 @@ struct ipv6_ra_config {
>      struct lport_addresses prefixes;
>      struct in6_addr rdnss;
>      bool has_rdnss;
> +    struct ds dnssl;
>  };
>
>  struct ipv6_ra_state {
> @@ -2215,6 +2216,7 @@ ipv6_ra_config_delete(struct ipv6_ra_config *config)
>  {
>      if (config) {
>          destroy_lport_addresses(&config->prefixes);
> +        ds_destroy(&config->dnssl);
>          free(config);
>      }
>  }
> @@ -2253,6 +2255,7 @@ ipv6_ra_update_config(const struct sbrec_port_binding *pb)
>              nd_ra_min_interval_default(config->max_interval));
>      config->mtu = smap_get_int(&pb->options, "ipv6_ra_mtu", ND_MTU_DEFAULT);
>      config->la_flags = IPV6_ND_RA_OPT_PREFIX_ON_LINK;
> +    ds_init(&config->dnssl);
>
>      const char *address_mode = smap_get(&pb->options, "ipv6_ra_address_mode");
>      if (!address_mode) {
> @@ -2298,6 +2301,11 @@ ipv6_ra_update_config(const struct sbrec_port_binding *pb)
>      }
>      config->has_rdnss = !!rdnss;
>
> +    const char *dnssl = smap_get(&pb->options, "ipv6_ra_dnssl");
> +    if (dnssl) {
> +        ds_put_buffer(&config->dnssl, dnssl, strlen(dnssl));
> +    }
> +
>      return config;
>
>  fail:
> @@ -2354,6 +2362,45 @@ packet_put_ra_rdnss_opt(struct dp_packet *b, uint8_t num,
>                                                        prev_l4_size + len * 8));
>  }
>
> +static void
> +packet_put_ra_dnssl_opt(struct dp_packet *b, ovs_be32 lifetime,
> +                        char *dnssl_list)
> +{
> +    char *t0, *r0 = dnssl_list, dnssl[255] = {};
> +    size_t prev_l4_size = dp_packet_l4_size(b);
> +    size_t size = sizeof(struct ovs_nd_dnssl);
> +    struct ip6_hdr *nh = dp_packet_l3(b);
> +    int i = 0;
> +
> +    while ((t0 = strtok_r(r0, ",", &r0))) {

Are we not suppose to pass NULL as the first argument to subsequent
calls of strtok_r ?

Is there a chance that we might cross dnssl 255 length and have a segfault ?

Can you please add comments on how the dnssl string is to be encoded ?

Since the code here, is already handling for multiple dnssl values in
the "dnssl_list", we can just accept
multiple values of dnssl right ? Right now the patch is restricting to
just 1 dnssl for the CMS to configure.

Thanks
Numan


> +        char *t1, *r1 = t0;
> +
> +        size += strlen(t0) + 2;
> +        while ((t1 = strtok_r(r1, ".", &r1))) {
> +            dnssl[i++] = strlen(t1);
> +            memcpy(&dnssl[i], t1, strlen(t1));
> +            i += strlen(t1);
> +        }
> +        dnssl[i++] = 0;
> +    }
> +    size = ROUND_UP(size, 8);
> +    nh->ip6_plen = htons(prev_l4_size + size);
> +
> +    struct ovs_nd_dnssl *nd_dnssl = dp_packet_put_uninit(b, sizeof *nd_dnssl);
> +    nd_dnssl->type = ND_OPT_DNSSL;
> +    nd_dnssl->len = size / 8;
> +    nd_dnssl->reserved = 0;
> +    put_16aligned_be32(&nd_dnssl->lifetime, lifetime);
> +
> +    dp_packet_put(b, dnssl, size - sizeof *nd_dnssl);
> +
> +    struct ovs_ra_msg *ra = dp_packet_l4(b);
> +    ra->icmph.icmp6_cksum = 0;
> +    uint32_t icmp_csum = packet_csum_pseudoheader6(dp_packet_l3(b));
> +    ra->icmph.icmp6_cksum = csum_finish(csum_continue(icmp_csum, ra,
> +                                                      prev_l4_size + size));
> +}
> +
>  /* Called with in the pinctrl_handler thread context. */
>  static long long int
>  ipv6_ra_send(struct rconn *swconn, struct ipv6_ra_state *ra)
> @@ -2382,6 +2429,10 @@ ipv6_ra_send(struct rconn *swconn, struct ipv6_ra_state *ra)
>          packet_put_ra_rdnss_opt(&packet, 1, htonl(0xffffffff),
>                                  &ra->config->rdnss);
>      }
> +    if (ra->config->dnssl.length) {
> +        packet_put_ra_dnssl_opt(&packet, htonl(0xffffffff),
> +                                ra->config->dnssl.string);
> +    }
>
>      uint64_t ofpacts_stub[4096 / 8];
>      struct ofpbuf ofpacts = OFPBUF_STUB_INITIALIZER(ofpacts_stub);
> diff --git a/lib/ovn-l7.h b/lib/ovn-l7.h
> index 12cee6329..5fc370bf5 100644
> --- a/lib/ovn-l7.h
> +++ b/lib/ovn-l7.h
> @@ -231,6 +231,17 @@ struct nd_rdnss_opt {
>  };
>  BUILD_ASSERT_DECL(ND_RDNSS_OPT_LEN == sizeof(struct nd_rdnss_opt));
>
> +/* DNSSL option RFC 6106 */
> +#define ND_OPT_DNSSL        31
> +#define ND_DNSSL_OPT_LEN    8
> +struct ovs_nd_dnssl {
> +    u_int8_t type;  /* ND_OPT_DNSSL */
> +    u_int8_t len;   /* >= 2 */
> +    ovs_be16 reserved;
> +    ovs_16aligned_be32 lifetime;
> +};
> +BUILD_ASSERT_DECL(ND_DNSSL_OPT_LEN == sizeof(struct ovs_nd_dnssl));
> +
>  #define DHCPV6_DUID_LL      3
>  #define DHCPV6_HW_TYPE_ETH  1
>
> diff --git a/northd/ovn-northd.c b/northd/ovn-northd.c
> index d1de36e08..dbb279052 100644
> --- a/northd/ovn-northd.c
> +++ b/northd/ovn-northd.c
> @@ -6489,6 +6489,10 @@ copy_ra_to_sb(struct ovn_port *op, const char *address_mode)
>      if (rdnss) {
>          smap_add(&options, "ipv6_ra_rdnss", rdnss);
>      }
> +    const char *dnssl = smap_get(&op->nbrp->ipv6_ra_configs, "dnssl");
> +    if (dnssl) {
> +        smap_add(&options, "ipv6_ra_dnssl", dnssl);
> +    }
>
>      smap_add(&options, "ipv6_ra_src_eth", op->lrp_networks.ea_s);
>
> diff --git a/ovn-nb.xml b/ovn-nb.xml
> index 2faf9390b..c49144848 100644
> --- a/ovn-nb.xml
> +++ b/ovn-nb.xml
> @@ -1890,6 +1890,11 @@
>          IPv6 address of RDNSS server announced in RA packets. At the moment
>          OVN supports just one RDNSS server.
>        </column>
> +
> +      <column name="ipv6_ra_configs" key="dnssl">
> +        DNS Search List announced in RA packets. At the moment OVN supports
> +        just one DNS Search entry
> +      </column>
>      </group>
>
>      <group title="Options">
> diff --git a/tests/ovn.at b/tests/ovn.at
> index 3e7692895..f4f5ddd5a 100644
> --- a/tests/ovn.at
> +++ b/tests/ovn.at
> @@ -12538,14 +12538,15 @@ construct_expected_ra() {
>      local mtu=$1
>      local ra_mo=$2
>      local rdnss=$3
> -    local ra_prefix_la=$4
> +    local dnssl=$4
> +    local ra_prefix_la=$5
>
>      local slla=0101${src_mac}
>      local mtu_opt=""
>      if test $mtu != 0; then
>          mtu_opt=05010000${mtu}
>      fi
> -    shift 4
> +    shift 5
>
>      local prefix=""
>      while [[ $# -gt 0 ]] ; do
> @@ -12559,8 +12560,12 @@ construct_expected_ra() {
>      if test $rdnss != 0; then
>          rdnss_opt=19030000ffffffff${rdnss}
>      fi
> +    local dnssl_opt=""
> +    if test $dnssl != 0; then
> +        dnssl_opt=1f030000ffffffff${dnssl}
> +    fi
>
> -    local ra=ff${ra_mo}ffff0000000000000000${slla}${mtu_opt}${prefix}${rdnss_opt}
> +    local ra=ff${ra_mo}ffff0000000000000000${slla}${mtu_opt}${prefix}${rdnss_opt}${dnssl_opt}
>      local icmp=8600XXXX${ra}
>
>      local ip_len=$(expr ${#icmp} / 2)
> @@ -12595,28 +12600,33 @@ ra_test() {
>  }
>
>  # Baseline test with no MTU
> -ra_test 0 00 0 c0 40 aef00000000000000000000000000000
> +ra_test 0 00 0 0 c0 40 aef00000000000000000000000000000
>
>  # Now make sure an MTU option makes it
>  ovn-nbctl --wait=hv set Logical_Router_Port ro-sw ipv6_ra_configs:mtu=1500
> -ra_test 000005dc 00 0 c0 40 aef00000000000000000000000000000
> +ra_test 000005dc 00 0 0 c0 40 aef00000000000000000000000000000
>
>  # Now test for multiple network prefixes
>  ovn-nbctl --wait=hv set Logical_Router_port ro-sw networks='aef0\:\:1/64 fd0f\:\:1/48'
> -ra_test 000005dc 00 0 c0 40 aef00000000000000000000000000000 30 fd0f0000000000000000000000000000
> +ra_test 000005dc 00 0 0 c0 40 aef00000000000000000000000000000 30 fd0f0000000000000000000000000000
>
>  # Now test for RDNSS
>  ovn-nbctl --wait=hv set Logical_Router_port ro-sw ipv6_ra_configs:rdnss='aef0::11'
>  dns_addr=aef00000000000000000000000000011
> -ra_test 000005dc 00 $dns_addr c0 40 aef00000000000000000000000000000 30 fd0f0000000000000000000000000000
> +ra_test 000005dc 00 $dns_addr 0 c0 40 aef00000000000000000000000000000 30 fd0f0000000000000000000000000000
> +
> +# Now test for DNSSL
> +ovn-nbctl --wait=hv set Logical_Router_port ro-sw ipv6_ra_configs:dnssl="aa.bb.cc"
> +dnssl=02616102626202636300000000000000
> +ra_test 000005dc 00 $dns_addr $dnssl c0 40 aef00000000000000000000000000000 30 fd0f0000000000000000000000000000
>
> -# Test a different address mode now
> +## Test a different address mode now
>  ovn-nbctl --wait=hv set Logical_Router_Port ro-sw ipv6_ra_configs:address_mode=dhcpv6_stateful
> -ra_test 000005dc 80 $dns_addr 80 40 aef00000000000000000000000000000 30 fd0f0000000000000000000000000000
> +ra_test 000005dc 80 $dns_addr $dnssl 80 40 aef00000000000000000000000000000 30 fd0f0000000000000000000000000000
>
>  # And the other address mode
>  ovn-nbctl --wait=hv set Logical_Router_Port ro-sw ipv6_ra_configs:address_mode=dhcpv6_stateless
> -ra_test 000005dc 40 $dns_addr c0 40 aef00000000000000000000000000000 30 fd0f0000000000000000000000000000
> +ra_test 000005dc 40 $dns_addr $dnssl c0 40 aef00000000000000000000000000000 30 fd0f0000000000000000000000000000
>
>  OVN_CLEANUP([hv1],[hv2])
>  AT_CLEANUP
> --
> 2.21.0
>
> _______________________________________________
> dev mailing list
> dev at openvswitch.org
> https://mail.openvswitch.org/mailman/listinfo/ovs-dev


More information about the dev mailing list