3 AT_SETUP([ofproto - echo request])
5 AT_CHECK([ovs-ofctl -vwarn probe br0])
9 AT_SETUP([ofproto - handling messages with bad version])
12 # Start a monitor running OpenFlow 1.0, then send the switch an OF1.1 features
14 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
15 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
16 AT_CAPTURE_FILE([monitor.log])
17 ovs-appctl -t ovs-ofctl ofctl/send 0205000801234567
18 ovs-appctl -t ovs-ofctl ofctl/barrier
19 ovs-appctl -t ovs-ofctl exit
21 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//
22 /ECHO/d' monitor.log], [0], [dnl
23 send: OFPT_FEATURES_REQUEST (OF1.1):
24 OFPT_ERROR (OF1.1): OFPBRC_BAD_VERSION
25 OFPT_FEATURES_REQUEST (OF1.1):
29 OVS_VSWITCHD_STOP(["/received OpenFlow version 0x02 != expected 01/d"])
32 AT_SETUP([ofproto - feature request, config request])
34 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
35 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
36 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
37 n_tables:254, n_buffers:256
38 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
39 actions: OUTPUT SET_VLAN_VID SET_VLAN_PCP STRIP_VLAN SET_DL_SRC SET_DL_DST SET_NW_SRC SET_NW_DST SET_NW_TOS SET_TP_SRC SET_TP_DST ENQUEUE
40 LOCAL(br0): addr:aa:55:aa:55:00:00
43 speed: 0 Mbps now, 0 Mbps max
44 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
49 AT_SETUP([ofproto - set OpenFlow port number])
51 [add-port br0 p1 -- set Interface p1 type=dummy --\
52 add-port br0 p2 -- set Interface p2 type=dummy ofport_request=99])
53 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
55 s/ (xid=0x[0-9a-fA-F]*)//
56 s/00:0.$/00:0x/' < stdout]],
58 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
59 n_tables:254, n_buffers:256
60 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
61 actions: OUTPUT SET_VLAN_VID SET_VLAN_PCP STRIP_VLAN SET_DL_SRC SET_DL_DST SET_NW_SRC SET_NW_DST SET_NW_TOS SET_TP_SRC SET_TP_DST ENQUEUE
62 1(p1): addr:aa:55:aa:55:00:0x
65 speed: 0 Mbps now, 0 Mbps max
66 99(p2): addr:aa:55:aa:55:00:0x
69 speed: 0 Mbps now, 0 Mbps max
70 LOCAL(br0): addr:aa:55:aa:55:00:0x
73 speed: 0 Mbps now, 0 Mbps max
74 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
80 dnl This is really bare-bones.
81 dnl It at least checks request and reply serialization and deserialization.
82 AT_SETUP([ofproto - port stats - (OpenFlow 1.0)])
84 AT_CHECK([ovs-ofctl -vwarn dump-ports br0], [0], [stdout])
85 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
86 OFPST_PORT reply: 1 ports
87 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
88 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
93 AT_SETUP([ofproto - port stats - (OpenFlow 1.2)])
95 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-ports br0], [0], [stdout])
96 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
97 OFPST_PORT reply (OF1.2): 1 ports
98 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
99 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
104 AT_SETUP([ofproto - port stats - (OpenFlow 1.4)])
106 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn dump-ports br0], [0], [stdout])
107 AT_CHECK([STRIP_XIDS stdout | sed 's/duration=[[0-9.]]*s/duration=?s/'],
109 OFPST_PORT reply (OF1.4): 1 ports
110 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
111 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
117 dnl This is really bare-bones.
118 dnl It at least checks request and reply serialization and deserialization.
119 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.0)])
121 AT_CHECK([ovs-ofctl -vwarn dump-ports-desc br0], [0], [stdout])
122 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
123 OFPST_PORT_DESC reply:
124 LOCAL(br0): addr:aa:55:aa:55:00:00
127 speed: 0 Mbps now, 0 Mbps max
132 dnl This is really bare-bones.
133 dnl It at least checks request and reply serialization and deserialization.
134 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.2)])
136 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-ports-desc br0], [0], [stdout])
137 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
138 OFPST_PORT_DESC reply (OF1.2):
139 LOCAL(br0): addr:aa:55:aa:55:00:00
142 speed: 0 Mbps now, 0 Mbps max
147 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.5)])
149 ADD_OF_PORTS([br0], 1, 2, 3)
150 AT_CHECK([ovs-ofctl -F OXM-OpenFlow15 -O OpenFlow15 -vwarn dump-ports-desc br0], [0], [stdout])
151 AT_CHECK([STRIP_XIDS stdout | sed 's/00:0./00:0x/'], [0], [dnl
152 OFPST_PORT_DESC reply (OF1.5):
153 1(p1): addr:aa:55:aa:55:00:0x
156 speed: 0 Mbps now, 0 Mbps max
157 2(p2): addr:aa:55:aa:55:00:0x
160 speed: 0 Mbps now, 0 Mbps max
161 3(p3): addr:aa:55:aa:55:00:0x
164 speed: 0 Mbps now, 0 Mbps max
165 LOCAL(br0): addr:aa:55:aa:55:00:0x
168 speed: 0 Mbps now, 0 Mbps max
170 AT_CHECK([ovs-ofctl -F OXM-OpenFlow15 -O OpenFlow15 -vwarn dump-ports-desc br0 2], [0], [stdout])
171 AT_CHECK([STRIP_XIDS stdout | sed 's/00:0./00:0x/'], [0], [dnl
172 OFPST_PORT_DESC reply (OF1.5):
173 2(p2): addr:aa:55:aa:55:00:0x
176 speed: 0 Mbps now, 0 Mbps max
181 dnl This is really bare-bones.
182 dnl It at least checks request and reply serialization and deserialization.
183 AT_SETUP([ofproto - queue stats - (OpenFlow 1.0)])
185 AT_CHECK([ovs-ofctl -vwarn queue-stats br0], [0], [stdout])
186 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
187 OFPST_QUEUE reply: 0 queues
189 AT_CHECK([ovs-ofctl -vwarn queue-stats br0 ANY 5], [0],
190 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_QUEUE
191 OFPST_QUEUE request (xid=0x2):port=ANY queue=5
193 AT_CHECK([ovs-ofctl -vwarn queue-stats br0 10], [0],
194 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_PORT
195 OFPST_QUEUE request (xid=0x2):port=10 queue=ALL
200 AT_SETUP([ofproto - queue stats - (OpenFlow 1.2)])
202 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0], [0], [stdout])
203 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
204 OFPST_QUEUE reply (OF1.2): 0 queues
206 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0 ALL 5], [0],
207 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_QUEUE
208 OFPST_QUEUE request (OF1.2) (xid=0x2):port=ANY queue=5
210 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0 10], [0],
211 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_PORT
212 OFPST_QUEUE request (OF1.2) (xid=0x2):port=10 queue=ALL
217 AT_SETUP([ofproto - queue stats - (OpenFlow 1.4)])
219 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn queue-stats br0], [0], [stdout])
220 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
221 OFPST_QUEUE reply (OF1.4): 0 queues
223 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn queue-stats br0 ALL 5], [0],
224 [OFPT_ERROR (OF1.4) (xid=0x2): OFPQOFC_BAD_QUEUE
225 OFPST_QUEUE request (OF1.4) (xid=0x2):port=ANY queue=5
227 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn queue-stats br0 10], [0],
228 [OFPT_ERROR (OF1.4) (xid=0x2): OFPQOFC_BAD_PORT
229 OFPST_QUEUE request (OF1.4) (xid=0x2):port=10 queue=ALL
234 dnl This is really bare-bones.
235 dnl It at least checks request and reply serialization and deserialization.
236 AT_SETUP([ofproto - queue configuration - (OpenFlow 1.0)])
238 ADD_OF_PORTS([br0], [1], [2])
239 AT_CHECK([ovs-ofctl queue-get-config br0 1], [0], [stdout])
240 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
241 OFPT_QUEUE_GET_CONFIG_REPLY: port=1
243 AT_CHECK([ovs-ofctl queue-get-config br0 10], [0],
244 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_PORT
245 OFPT_QUEUE_GET_CONFIG_REQUEST (xid=0x2): port=10
250 AT_SETUP([ofproto - queue configuration - (OpenFlow 1.2)])
252 ADD_OF_PORTS([br0], [1], [2])
253 AT_CHECK([ovs-ofctl -O OpenFlow12 queue-get-config br0 1], [0], [stdout])
254 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
255 OFPT_QUEUE_GET_CONFIG_REPLY (OF1.2): port=1
257 AT_CHECK([ovs-ofctl -O OpenFlow12 queue-get-config br0 10], [0],
258 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_PORT
259 OFPT_QUEUE_GET_CONFIG_REQUEST (OF1.2) (xid=0x2): port=10
264 dnl This is really bare-bones.
265 dnl It at least checks request and reply serialization and deserialization.
266 dnl Actions definition listed in both supported formats (w/ actions=)
267 AT_SETUP([ofproto - del group])
269 AT_DATA([groups.txt], [dnl
270 group_id=1234,type=all,bucket=output:10
271 group_id=1235,type=all,bucket=actions=output:10
273 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
274 AT_CHECK([ovs-ofctl -F OXM-OpenFlow15 -O OpenFlow15 -vwarn dump-groups br0 1234], [0], [stdout])
275 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
276 OFPST_GROUP_DESC reply (OF1.5):
277 group_id=1234,type=all,bucket=actions=output:10
279 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
280 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
281 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
282 OFPST_GROUP_DESC reply (OF1.1):
283 group_id=1235,type=all,bucket=actions=output:10
285 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
286 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
287 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
288 OFPST_GROUP_DESC reply (OF1.1):
289 group_id=1235,type=all,bucket=actions=output:10
291 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0], [0])
292 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
293 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
294 OFPST_GROUP_DESC reply (OF1.1):
299 dnl This is really bare-bones.
300 dnl It at least checks request and reply serialization and deserialization.
301 AT_SETUP([ofproto - del group deletes flows])
303 AT_DATA([groups.txt], [dnl
304 group_id=1234,type=all,bucket=output:10
305 group_id=1235,type=all,bucket=output:10
307 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
308 AT_DATA([flows.txt], [dnl
309 tcp actions=group:1234
310 udp actions=group:1235
312 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flows br0 flows.txt])
313 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
315 tcp actions=group:1234
316 udp actions=group:1235
317 OFPST_FLOW reply (OF1.1):
319 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
320 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
322 udp actions=group:1235
323 OFPST_FLOW reply (OF1.1):
325 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
326 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
328 udp actions=group:1235
329 OFPST_FLOW reply (OF1.1):
331 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0])
332 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
334 OFPST_FLOW reply (OF1.1):
339 dnl This is really bare-bones.
340 dnl It at least checks request and reply serialization and deserialization.
341 AT_SETUP([ofproto - flow mod checks group availability])
343 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10])
344 AT_DATA([flows.txt], [dnl
345 tcp actions=group:1234
346 udp actions=group:1235
348 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1234'])
349 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1235'], [1], [], [stderr])
351 # The output should look like this:
353 # 00000000 02 0e 00 98 00 00 00 02-00 00 00 00 00 00 00 00 |................|
354 # 00000010 00 00 00 00 00 00 00 00-ff 00 00 00 00 00 80 00 |................|
355 # 00000020 ff ff ff ff ff ff ff ff-ff ff ff ff 00 00 00 00 |................|
356 # 00000030 00 00 00 58 00 00 00 00-00 00 03 d7 00 00 00 00 |...X............|
358 # This 'sed' command captures the error message but drops details.
359 AT_CHECK([sed '/truncated/d
360 /^000000.0/d' stderr | STRIP_XIDS], [0],
361 [OFPT_ERROR (OF1.1): OFPBAC_BAD_OUT_GROUP
362 OFPT_FLOW_MOD (OF1.1):
367 dnl This is really bare-bones.
368 dnl It at least checks request and reply serialization and deserialization.
369 AT_SETUP([ofproto - group description])
371 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10], [0], [stdout])
372 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
373 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
374 OFPST_GROUP_DESC reply (OF1.1):
375 group_id=1234,type=all,bucket=actions=output:10
380 dnl This is really bare-bones.
381 dnl It at least checks request and reply serialization and deserialization.
382 AT_SETUP([ofproto - group description])
384 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10])
385 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
386 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
387 OFPST_GROUP_DESC reply (OF1.1):
388 group_id=1234,type=all,bucket=actions=output:10
393 dnl This is really bare-bones.
394 dnl It at least checks request and reply serialization and deserialization.
395 AT_SETUP([ofproto - group features])
397 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-group-features br0], [0], [stdout])
398 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
399 OFPST_GROUP_FEATURES reply (OF1.2):
407 dnl This is really bare-bones.
408 dnl It at least checks request and reply serialization and deserialization.
409 AT_SETUP([ofproto - group stats])
411 AT_DATA([groups.txt], [dnl
412 group_id=1234,type=all,bucket=output:10
413 group_id=1235,type=all,bucket=output:10
415 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
416 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1234'])
417 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-group-stats br0 group_id=1234], [0], [stdout])
418 AT_CHECK([STRIP_XIDS stdout | sort], [0], [dnl
419 group_id=1234,ref_count=1,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
420 OFPST_GROUP reply (OF1.1):
422 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-group-stats br0], [0], [stdout])
423 AT_CHECK([STRIP_XIDS stdout | sort], [0], [dnl
424 group_id=1234,ref_count=1,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
425 group_id=1235,ref_count=0,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
426 OFPST_GROUP reply (OF1.1):
431 AT_SETUP([ofproto - mod-port (OpenFlow 1.0)])
433 for command_config_state in \
435 'noflood NO_FLOOD 0' \
436 'down PORT_DOWN,NO_FLOOD LINK_DOWN' \
437 'flood PORT_DOWN LINK_DOWN' \
438 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
439 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
440 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
441 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
442 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
446 set $command_config_state
447 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
448 AT_CHECK([ovs-ofctl -vwarn mod-port br0 br0 $command])
449 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
450 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
451 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
452 n_tables:254, n_buffers:256
453 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
454 actions: OUTPUT SET_VLAN_VID SET_VLAN_PCP STRIP_VLAN SET_DL_SRC SET_DL_DST SET_NW_SRC SET_NW_DST SET_NW_TOS SET_TP_SRC SET_TP_DST ENQUEUE
455 LOCAL(br0): addr:aa:55:aa:55:00:00
458 speed: 0 Mbps now, 0 Mbps max
459 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
465 AT_SETUP([ofproto - mod-port (OpenFlow 1.2)])
467 for command_config_state in \
469 'down PORT_DOWN LINK_DOWN' \
470 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
471 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
472 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
473 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
474 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
478 set $command_config_state
479 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
480 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn mod-port br0 br0 $command])
481 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn show br0], [0], [stdout])
482 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
483 OFPT_FEATURES_REPLY (OF1.2): dpid:fedcba9876543210
484 n_tables:254, n_buffers:256
485 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS
486 LOCAL(br0): addr:aa:55:aa:55:00:00
489 speed: 0 Mbps now, 0 Mbps max
490 OFPT_GET_CONFIG_REPLY (OF1.2): frags=normal miss_send_len=0
496 AT_SETUP([ofproto - mod-port (OpenFlow 1.4)])
498 for command_config_state in \
500 'down PORT_DOWN LINK_DOWN' \
501 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
502 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
503 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
504 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
505 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
509 set $command_config_state
510 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
511 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn mod-port br0 br0 $command])
512 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn show br0], [0], [stdout])
513 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
514 OFPT_FEATURES_REPLY (OF1.4): dpid:fedcba9876543210
515 n_tables:254, n_buffers:256
516 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS
517 OFPST_PORT_DESC reply (OF1.4):
518 LOCAL(br0): addr:aa:55:aa:55:00:00
521 speed: 0 Mbps now, 0 Mbps max
522 OFPT_GET_CONFIG_REPLY (OF1.4): frags=normal miss_send_len=0
528 AT_SETUP([ofproto - basic flow_mod commands (NXM)])
530 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
532 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl add-flows br0 -])
533 AT_CHECK([ovs-ofctl add-flow br0 in_port=1,actions=2])
534 AT_CHECK([ovs-ofctl -F nxm add-flow br0 table=1,in_port=4,actions=3])
535 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
536 in_port=1 actions=output:2
537 in_port=2 actions=output:1
538 table=1, in_port=4 actions=output:3
541 AT_CHECK([ovs-ofctl dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
542 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=2
544 AT_CHECK([ovs-ofctl del-flows br0])
545 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
550 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.0)])
552 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply:
554 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -F openflow10 add-flows br0 -])
555 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 in_port=1,actions=2])
556 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 table=1,in_port=4,actions=3])
557 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
558 in_port=1 actions=output:2
559 in_port=2 actions=output:1
560 table=1, in_port=4 actions=output:3
563 AT_CHECK([ovs-ofctl -F openflow10 dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
564 OFPST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=2
566 AT_CHECK([ovs-ofctl -F openflow10 del-flows br0])
567 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply:
572 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.1)])
574 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.1):
576 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -O OpenFlow11 add-flows br0 -])
577 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 in_port=1,actions=2])
578 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 table=1,in_port=4,actions=3])
579 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
580 in_port=1 actions=output:2
581 in_port=2 actions=output:1
582 table=1, in_port=4 actions=output:3
583 OFPST_FLOW reply (OF1.1):
585 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
586 OFPST_AGGREGATE reply (OF1.1): packet_count=0 byte_count=0 flow_count=2
588 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0])
589 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.1):
590 table=1, in_port=4 actions=output:3
595 AT_SETUP([ofproto - flow_mod negative test (OpenFlow 1.1)])
597 [set bridge br0 protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13])
598 AT_CHECK([ovs-ofctl add-flow -O OpenFlow11 br0 table=1,action=goto_table:2])
600 # The error message here actually comes from ovs-ofctl, not from ovs-vswitchd,
601 # but at least it's the same code in ofpacts_check() that issues the error.
602 AT_CHECK([ovs-ofctl add-flow -O OpenFlow11 br0 table=1,action=goto_table:1],
604 [ovs-ofctl: actions are invalid with specified match (OFPBRC_BAD_TABLE_ID)
609 AT_SETUP([ofproto - set-field flow_mod commands (NXM)])
611 AT_CHECK([ovs-ofctl add-flow br0 ipv6,table=1,in_port=3,actions=drop])
612 AT_CHECK([ovs-ofctl add-flow br0 ipv6,table=1,in_port=3,actions=set_field:fe80:0123:4567:890a:a6ba:dbff:fefe:59fa-\>ipv6_src])
613 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
614 table=1, ipv6,in_port=3 actions=load:0xa6badbfffefe59fa->NXM_NX_IPV6_SRC[[0..63]],load:0xfe8001234567890a->NXM_NX_IPV6_SRC[[64..127]]
620 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.2)])
622 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.2):
624 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -O OpenFlow12 add-flows br0 -])
625 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=1,actions=2])
626 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 table=1,in_port=4,actions=3])
627 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
628 in_port=1 actions=output:2
629 in_port=2 actions=output:1
630 table=1, in_port=4 actions=output:3
631 OFPST_FLOW reply (OF1.2):
633 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0])
634 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.2):
639 AT_SETUP([ofproto - dump flows with cookie])
641 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
642 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
643 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
644 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
645 cookie=0x1, in_port=1 actions=output:1
646 cookie=0x2, in_port=2 actions=output:1
647 cookie=0x3, in_port=3 actions=output:1
650 AT_CHECK([ovs-ofctl dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
651 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=3
653 AT_CHECK([ovs-ofctl dump-flows br0 cookie=0x3/-1 | ofctl_strip | sort], [0], [dnl
654 cookie=0x3, in_port=3 actions=output:1
657 AT_CHECK([ovs-ofctl dump-aggregate br0 cookie=0x3/-1 | STRIP_XIDS], [0], [dnl
658 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=1
663 AT_SETUP([ofproto - mod flow with cookie change (OpenFlow 1.0)])
665 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 cookie=0x1,in_port=1,actions=1])
666 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
667 cookie=0x1, in_port=1 actions=output:1
671 AT_CHECK([ovs-ofctl -F openflow10 mod-flows br0 cookie=0x2,in_port=1,actions=1])
672 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
673 cookie=0x2, in_port=1 actions=output:1
679 AT_SETUP([ofproto - mod flow with cookie change (NXM)])
681 AT_CHECK([ovs-ofctl -F nxm add-flow br0 cookie=0x1,in_port=1,actions=1])
682 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
683 cookie=0x1, in_port=1 actions=output:1
687 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=0x2,in_port=1,actions=1])
688 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
689 cookie=0x2, in_port=1 actions=output:1
695 AT_SETUP([ofproto - no mod flow with cookie change (OpenFlow 1.1)])
697 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
698 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
699 cookie=0x1, in_port=1 actions=output:1
700 OFPST_FLOW reply (OF1.1):
702 AT_CHECK([ovs-ofctl -O OpenFlow11 mod-flows br0 cookie=0x2,in_port=1,actions=1])
703 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
704 cookie=0x1, in_port=1 actions=output:1
705 OFPST_FLOW reply (OF1.1):
710 dnl The OpenFlow 1.2 spec states that the cookie may not be modified
711 AT_SETUP([ofproto - no mod flow with cookie change (OpenFlow 1.2)])
713 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
714 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
715 cookie=0x1, in_port=1 actions=output:1
716 OFPST_FLOW reply (OF1.2):
719 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 cookie=0x2,in_port=1,actions=1])
720 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
721 cookie=0x1, in_port=1 actions=output:1
722 OFPST_FLOW reply (OF1.2):
727 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.0)])
729 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
730 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=2,actions=1])
731 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=3,actions=1])
732 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
733 cookie=0x1, in_port=1 actions=output:1
734 cookie=0x1, in_port=2 actions=output:1
735 cookie=0x2, in_port=3 actions=output:1
739 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=0x1/0xff,actions=4])
740 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
741 cookie=0x1, in_port=1 actions=output:4
742 cookie=0x1, in_port=2 actions=output:4
743 cookie=0x2, in_port=3 actions=output:1
749 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.1)])
751 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
752 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=2,actions=1])
753 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=3,actions=1])
754 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
755 cookie=0x1, in_port=1 actions=output:1
756 cookie=0x1, in_port=2 actions=output:1
757 cookie=0x2, in_port=3 actions=output:1
758 OFPST_FLOW reply (OF1.1):
761 AT_CHECK([ovs-ofctl -O OpenFlow11 mod-flows br0 cookie=0x1/0xff,actions=4])
762 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
763 cookie=0x1, in_port=1 actions=output:4
764 cookie=0x1, in_port=2 actions=output:4
765 cookie=0x2, in_port=3 actions=output:1
766 OFPST_FLOW reply (OF1.1):
771 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.2)])
773 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
774 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=2,actions=1])
775 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=3,actions=1])
776 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
777 cookie=0x1, in_port=1 actions=output:1
778 cookie=0x1, in_port=2 actions=output:1
779 cookie=0x2, in_port=3 actions=output:1
780 OFPST_FLOW reply (OF1.2):
783 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 cookie=0x1/0xff,actions=4])
784 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
785 cookie=0x1, in_port=1 actions=output:4
786 cookie=0x1, in_port=2 actions=output:4
787 cookie=0x2, in_port=3 actions=output:1
788 OFPST_FLOW reply (OF1.2):
793 dnl The OpenFlow 1.2 spec states that the cookie may not be modified
794 AT_SETUP([ofproto - mod flows based on cookie mask with cookie change])
796 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
797 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=2,actions=1])
798 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=3,actions=1])
799 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
800 cookie=0x1, in_port=1 actions=output:1
801 cookie=0x1, in_port=2 actions=output:1
802 cookie=0x2, in_port=3 actions=output:1
806 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=1/-1,cookie=4,actions=4])
807 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
808 cookie=0x2, in_port=3 actions=output:1
809 cookie=0x4, in_port=1 actions=output:4
810 cookie=0x4, in_port=2 actions=output:4
816 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - NXM])
818 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 in_port=1,actions=1])
819 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
820 in_port=1 actions=output:1
826 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - OF1.1])
828 AT_CHECK([ovs-ofctl -O openflow11 mod-flows br0 in_port=1,actions=1])
829 AT_CHECK([ovs-ofctl -O openflow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
830 in_port=1 actions=output:1
831 OFPST_FLOW reply (OF1.1):
836 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - OF1.2])
838 AT_CHECK([ovs-ofctl -O openflow12 mod-flows br0 in_port=1,actions=1])
839 AT_CHECK([ovs-ofctl -O openflow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
840 OFPST_FLOW reply (OF1.2):
845 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - NXM])
847 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=1/1,in_port=1,actions=1])
848 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
854 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - OF1.1])
856 AT_CHECK([ovs-ofctl -O openflow11 mod-flows br0 cookie=1/1,in_port=1,actions=1])
857 AT_CHECK([ovs-ofctl -O openflow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
858 OFPST_FLOW reply (OF1.1):
863 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - OF1.2])
865 AT_CHECK([ovs-ofctl -O openflow12 mod-flows br0 cookie=1/1,in_port=1,actions=1])
866 AT_CHECK([ovs-ofctl -O openflow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
867 OFPST_FLOW reply (OF1.2):
872 AT_SETUP([ofproto - del flows with cookies])
874 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
875 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
876 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
877 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
878 cookie=0x1, in_port=1 actions=output:1
879 cookie=0x2, in_port=2 actions=output:1
880 cookie=0x3, in_port=3 actions=output:1
884 AT_CHECK([ovs-ofctl del-flows br0])
885 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
891 AT_SETUP([ofproto - del flows based on cookie])
893 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
894 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
895 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
896 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
897 cookie=0x1, in_port=1 actions=output:1
898 cookie=0x2, in_port=2 actions=output:1
899 cookie=0x3, in_port=3 actions=output:1
903 AT_CHECK([ovs-ofctl del-flows br0 cookie=0x3/-1])
904 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
905 cookie=0x1, in_port=1 actions=output:1
906 cookie=0x2, in_port=2 actions=output:1
912 AT_SETUP([ofproto - del flows based on cookie mask])
914 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
915 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
916 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
917 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
918 cookie=0x1, in_port=1 actions=output:1
919 cookie=0x2, in_port=2 actions=output:1
920 cookie=0x3, in_port=3 actions=output:1
923 AT_CHECK([ovs-ofctl del-flows br0 cookie=0x3/0x1])
924 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
925 cookie=0x2, in_port=2 actions=output:1
931 AT_SETUP([ofproto - del flows based on table id (NXM)])
933 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
934 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
935 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
936 cookie=0x1, in_port=1 actions=output:1
937 cookie=0x2, table=1, in_port=2 actions=output:1
940 AT_CHECK([ovs-ofctl del-flows br0 table=0])
941 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
942 cookie=0x2, table=1, in_port=2 actions=output:1
945 AT_CHECK([ovs-ofctl del-flows br0 table=1])
946 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
949 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
950 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
951 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
952 cookie=0x1, in_port=1 actions=output:1
953 cookie=0x2, table=1, in_port=2 actions=output:1
956 AT_CHECK([ovs-ofctl del-flows br0])
957 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
963 AT_SETUP([ofproto - del flows based on table id (OpenFlow 1.1)])
965 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
966 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
967 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
968 cookie=0x1, in_port=1 actions=output:1
969 cookie=0x2, table=1, in_port=2 actions=output:1
970 OFPST_FLOW reply (OF1.1):
972 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0 table=0])
973 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
974 cookie=0x2, table=1, in_port=2 actions=output:1
975 OFPST_FLOW reply (OF1.1):
977 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0 table=1])
978 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
979 OFPST_FLOW reply (OF1.1):
981 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
982 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
983 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
984 cookie=0x1, in_port=1 actions=output:1
985 cookie=0x2, table=1, in_port=2 actions=output:1
986 OFPST_FLOW reply (OF1.1):
988 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0])
989 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [dnl
990 OFPST_FLOW reply (OF1.1):
991 cookie=0x2, table=1, in_port=2 actions=output:1
996 AT_SETUP([ofproto - del flows based on table id (OpenFlow 1.2)])
998 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
999 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
1000 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1001 cookie=0x1, in_port=1 actions=output:1
1002 cookie=0x2, table=1, in_port=2 actions=output:1
1003 OFPST_FLOW reply (OF1.2):
1005 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0 table=0])
1006 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1007 cookie=0x2, table=1, in_port=2 actions=output:1
1008 OFPST_FLOW reply (OF1.2):
1010 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0 table=1])
1011 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1012 OFPST_FLOW reply (OF1.2):
1014 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
1015 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
1016 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1017 cookie=0x1, in_port=1 actions=output:1
1018 cookie=0x2, table=1, in_port=2 actions=output:1
1019 OFPST_FLOW reply (OF1.2):
1021 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0])
1022 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1023 OFPST_FLOW reply (OF1.2):
1028 AT_SETUP([ofproto - flow table configuration (OpenFlow 1.0)])
1030 # Check the default configuration.
1031 (echo "OFPST_TABLE reply (xid=0x2): 254 tables
1032 0: classifier: wild=0x3fffff, max=1000000, active=0
1033 lookup=0, matched=0"
1035 while test $x -lt 254; do
1036 printf " %d: %-8s: wild=0x3fffff, max=1000000, active=0
1041 AT_CHECK([ovs-ofctl dump-tables br0], [0], [expout])
1042 # Change the configuration.
1045 -- --id=@t0 create Flow_Table name=main \
1046 -- --id=@t1 create Flow_Table flow-limit=1024 \
1047 -- set bridge br0 'flow_tables={1=@t1,0=@t0}' \
1048 | ${PERL} $srcdir/uuidfilt.pl],
1052 # Check that the configuration was updated.
1053 mv expout orig-expout
1054 (echo "OFPST_TABLE reply (xid=0x2): 254 tables
1055 0: main : wild=0x3fffff, max=1000000, active=0
1057 1: table1 : wild=0x3fffff, max= 1024, active=0
1058 lookup=0, matched=0"
1059 tail -n +6 orig-expout) > expout
1060 AT_CHECK([ovs-ofctl dump-tables br0], [0], [expout])
1064 AT_SETUP([ofproto - flow table configuration (OpenFlow 1.2)])
1066 # Check the default configuration.
1067 (mid="wild=0xfffffffff, max=1000000,"
1070 match=0xfffffffff, instructions=0x00000007, config=0x00000003
1071 write_actions=0x00000000, apply_actions=0x00000000
1072 write_setfields=0x0000000fffffffff
1073 apply_setfields=0x0000000fffffffff
1074 metadata_match=0xffffffffffffffff
1075 metadata_write=0xffffffffffffffff"
1076 echo "OFPST_TABLE reply (OF1.2) (xid=0x2): 254 tables
1077 0: classifier: $mid active=0$tail"
1079 while test $x -lt 254; do
1080 printf " %d: %-8s: $mid active=0$tail
1084 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-tables br0], [0], [expout])
1085 # Change the configuration.
1088 -- --id=@t0 create Flow_Table name=main \
1089 -- --id=@t1 create Flow_Table flow-limit=1024 \
1090 -- set bridge br0 'flow_tables={1=@t1,0=@t0}' \
1091 | ${PERL} $srcdir/uuidfilt.pl],
1095 # Check that the configuration was updated.
1096 mv expout orig-expout
1097 (echo "OFPST_TABLE reply (OF1.2) (xid=0x2): 254 tables
1098 0: main : wild=0xfffffffff, max=1000000, active=0"
1099 tail -n +3 orig-expout | head -7
1100 echo " 1: table1 : wild=0xfffffffff, max= 1024, active=0"
1101 tail -n +11 orig-expout) > expout
1102 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-tables br0], [0], [expout])
1106 AT_SETUP([ofproto - hard limits on flow table size (OpenFlow 1.0)])
1108 # Configure a maximum of 4 flows.
1111 -- --id=@t0 create Flow_Table flow-limit=4 \
1112 -- set bridge br0 flow_tables:0=@t0 \
1113 | ${PERL} $srcdir/uuidfilt.pl],
1117 for in_port in 1 2 3 4; do
1118 ovs-ofctl add-flow br0 in_port=$in_port,actions=drop
1120 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1121 in_port=1 actions=drop
1122 in_port=2 actions=drop
1123 in_port=3 actions=drop
1124 in_port=4 actions=drop
1127 # Adding another flow will be refused.
1128 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop], [1], [], [stderr])
1129 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1130 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1132 # Also a mod-flow that would add a flow will be refused.
1133 AT_CHECK([ovs-ofctl mod-flows br0 in_port=5,actions=drop], [1], [], [stderr])
1134 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1135 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1137 # Replacing or modifying an existing flow is allowed.
1138 AT_CHECK([ovs-ofctl add-flow br0 in_port=4,actions=normal])
1139 AT_CHECK([ovs-ofctl mod-flows br0 in_port=3,actions=output:1])
1140 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1141 in_port=1 actions=drop
1142 in_port=2 actions=drop
1143 in_port=3 actions=output:1
1144 in_port=4 actions=NORMAL
1150 AT_SETUP([ofproto - hard limits on flow table size (OpenFlow 1.2)])
1152 # Configure a maximum of 4 flows.
1155 -- --id=@t0 create Flow_Table flow-limit=4 \
1156 -- set bridge br0 flow_tables:0=@t0 \
1157 | ${PERL} $srcdir/uuidfilt.pl],
1161 for in_port in 1 2 3 4; do
1162 ovs-ofctl -O OpenFlow12 add-flow br0 in_port=$in_port,actions=drop
1164 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1165 in_port=1 actions=drop
1166 in_port=2 actions=drop
1167 in_port=3 actions=drop
1168 in_port=4 actions=drop
1169 OFPST_FLOW reply (OF1.2):
1171 # Adding another flow will be refused.
1172 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=5,actions=drop], [1], [], [stderr])
1173 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1174 [OFPT_ERROR (OF1.2): OFPFMFC_TABLE_FULL
1176 # Replacing or modifying an existing flow is allowed.
1177 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=4,actions=normal])
1178 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=3,actions=output:1])
1179 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1180 in_port=1 actions=drop
1181 in_port=2 actions=drop
1182 in_port=3 actions=output:1
1183 in_port=4 actions=NORMAL
1184 OFPST_FLOW reply (OF1.2):
1189 AT_SETUP([ofproto - eviction upon table overflow (OpenFlow 1.0)])
1191 # Configure a maximum of 4 flows.
1194 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1195 -- set bridge br0 flow_tables:0=@t0 \
1196 | ${PERL} $srcdir/uuidfilt.pl],
1200 for in_port in 4 3 2 1; do
1201 ovs-ofctl add-flow br0 idle_timeout=${in_port}0,in_port=$in_port,actions=drop
1203 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1204 idle_timeout=10, in_port=1 actions=drop
1205 idle_timeout=20, in_port=2 actions=drop
1206 idle_timeout=30, in_port=3 actions=drop
1207 idle_timeout=40, in_port=4 actions=drop
1210 # Adding another flow will cause the one that expires soonest to be evicted.
1211 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1212 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1213 idle_timeout=20, in_port=2 actions=drop
1214 idle_timeout=30, in_port=3 actions=drop
1215 idle_timeout=40, in_port=4 actions=drop
1216 in_port=5 actions=drop
1219 # A mod-flow that adds a flow also causes eviction, but replacing or
1220 # modifying an existing flow doesn't.
1221 AT_CHECK([ovs-ofctl mod-flows br0 in_port=6,actions=drop])
1222 AT_CHECK([ovs-ofctl add-flow br0 in_port=4,actions=normal])
1223 AT_CHECK([ovs-ofctl mod-flows br0 in_port=3,actions=output:1])
1224 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1225 idle_timeout=30, in_port=3 actions=output:1
1226 in_port=4 actions=NORMAL
1227 in_port=5 actions=drop
1228 in_port=6 actions=drop
1231 # Flows with no timeouts at all cannot be evicted.
1232 AT_CHECK([ovs-ofctl add-flow br0 in_port=7,actions=normal])
1233 AT_CHECK([ovs-ofctl add-flow br0 in_port=8,actions=drop], [1], [], [stderr])
1234 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1235 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1237 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1238 in_port=4 actions=NORMAL
1239 in_port=5 actions=drop
1240 in_port=6 actions=drop
1241 in_port=7 actions=NORMAL
1247 AT_SETUP([ofproto - eviction upon table overflow (OpenFlow 1.2)])
1249 # Configure a maximum of 4 flows.
1252 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1253 -- set bridge br0 flow_tables:0=@t0 \
1254 | ${PERL} $srcdir/uuidfilt.pl],
1258 for in_port in 4 3 2 1; do
1259 ovs-ofctl -O OpenFlow12 add-flow br0 idle_timeout=${in_port}0,in_port=$in_port,actions=drop
1261 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1262 idle_timeout=10, in_port=1 actions=drop
1263 idle_timeout=20, in_port=2 actions=drop
1264 idle_timeout=30, in_port=3 actions=drop
1265 idle_timeout=40, in_port=4 actions=drop
1266 OFPST_FLOW reply (OF1.2):
1268 # Adding another flow will cause the one that expires soonest to be evicted.
1269 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=5,actions=drop])
1270 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1271 idle_timeout=20, in_port=2 actions=drop
1272 idle_timeout=30, in_port=3 actions=drop
1273 idle_timeout=40, in_port=4 actions=drop
1274 in_port=5 actions=drop
1275 OFPST_FLOW reply (OF1.2):
1277 # In Open Flow 1.2 a mod-flow does not ever add a flow and thus
1278 # has no effect on eviction
1279 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=6,actions=drop])
1280 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=4,actions=normal])
1281 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=3,actions=output:1])
1282 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1283 idle_timeout=20, in_port=2 actions=drop
1284 idle_timeout=30, in_port=3 actions=output:1
1285 in_port=4 actions=NORMAL
1286 in_port=5 actions=drop
1287 OFPST_FLOW reply (OF1.2):
1289 # Flows with no timeouts at all cannot be evicted.
1290 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=6,actions=drop])
1291 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=7,actions=normal])
1292 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=8,actions=drop], [1], [], [stderr])
1293 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1294 [OFPT_ERROR (OF1.2): OFPFMFC_TABLE_FULL
1296 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1297 in_port=4 actions=NORMAL
1298 in_port=5 actions=drop
1299 in_port=6 actions=drop
1300 in_port=7 actions=NORMAL
1301 OFPST_FLOW reply (OF1.2):
1306 AT_SETUP([ofproto - eviction upon table overflow, with fairness (OpenFlow 1.0)])
1308 # Configure a maximum of 4 flows.
1311 -- --id=@t0 create Flow_Table name=evict flow-limit=4 \
1312 overflow-policy=evict \
1313 groups='"NXM_OF_IN_PORT[[]]"' \
1314 -- set bridge br0 flow_tables:0=@t0 \
1315 | ${PERL} $srcdir/uuidfilt.pl],
1319 ovs-ofctl add-flows br0 - <<EOF
1320 idle_timeout=10 in_port=2 dl_src=00:44:55:66:77:88 actions=drop
1321 idle_timeout=20 in_port=1 dl_src=00:11:22:33:44:55 actions=drop
1322 idle_timeout=30 in_port=1 dl_src=00:22:33:44:55:66 actions=drop
1323 idle_timeout=40 in_port=1 dl_src=00:33:44:55:66:77 actions=drop
1325 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1326 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1327 idle_timeout=20, in_port=1,dl_src=00:11:22:33:44:55 actions=drop
1328 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1329 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1332 # Adding another flow will cause the one that expires soonest within
1333 # the largest group (those with in_port=1) to be evicted. In this
1334 # case this is not the same as the one that expires soonest overall
1335 # (which is what makes the test interesting):
1336 AT_CHECK([ovs-ofctl add-flow br0 in_port=2,dl_src=00:55:66:77:88:99,actions=drop])
1337 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1338 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1339 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1340 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1341 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1344 # Enlarge the flow limit, change the eviction policy back to strictly
1345 # based on expiration, and and add some flows.
1346 AT_CHECK([ovs-vsctl set Flow_Table evict groups='[[]]' flow-limit=7])
1347 ovs-ofctl add-flows br0 - <<EOF
1348 idle_timeout=50 in_port=2 dl_src=00:66:77:88:99:aa actions=drop
1349 idle_timeout=60 in_port=2 dl_src=00:77:88:99:aa:bb actions=drop
1350 idle_timeout=70 in_port=2 dl_src=00:88:99:aa:bb:cc actions=drop
1352 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1353 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1354 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1355 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1356 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1357 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1358 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1359 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1362 # Adding another flow will cause the one that expires soonest overall
1364 AT_CHECK([ovs-ofctl add-flow br0 'idle_timeout=80 in_port=2 dl_src=00:99:aa:bb:cc:dd actions=drop'])
1365 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1366 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1367 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1368 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1369 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1370 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1371 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1372 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1375 # Reducing the flow limit also causes the flows that expire soonest
1376 # overall to be evicted.
1377 AT_CHECK([ovs-vsctl set Flow_Table evict flow-limit=4])
1378 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1379 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1380 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1381 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1382 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1388 AT_SETUP([ofproto - eviction upon table overflow, with fairness (OpenFlow 1.2)])
1390 # Configure a maximum of 4 flows.
1393 -- --id=@t0 create Flow_Table name=evict flow-limit=4 \
1394 overflow-policy=evict \
1395 groups='"NXM_OF_IN_PORT[[]]"' \
1396 -- set bridge br0 flow_tables:0=@t0 \
1397 | ${PERL} $srcdir/uuidfilt.pl],
1401 ovs-ofctl -O OpenFlow12 add-flows br0 - <<EOF
1402 idle_timeout=10 in_port=2 dl_src=00:44:55:66:77:88 actions=drop
1403 idle_timeout=20 in_port=1 dl_src=00:11:22:33:44:55 actions=drop
1404 idle_timeout=30 in_port=1 dl_src=00:22:33:44:55:66 actions=drop
1405 idle_timeout=40 in_port=1 dl_src=00:33:44:55:66:77 actions=drop
1407 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1408 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1409 idle_timeout=20, in_port=1,dl_src=00:11:22:33:44:55 actions=drop
1410 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1411 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1412 OFPST_FLOW reply (OF1.2):
1414 # Adding another flow will cause the one that expires soonest within
1415 # the largest group (those with in_port=1) to be evicted. In this
1416 # case this is not the same as the one that expires soonest overall
1417 # (which is what makes the test interesting):
1418 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=2,dl_src=00:55:66:77:88:99,actions=drop])
1419 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1420 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1421 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1422 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1423 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1424 OFPST_FLOW reply (OF1.2):
1426 # Enlarge the flow limit, change the eviction policy back to strictly
1427 # based on expiration, and and add some flows.
1428 AT_CHECK([ovs-vsctl set Flow_Table evict groups='[[]]' flow-limit=7])
1429 ovs-ofctl -O OpenFlow12 add-flows br0 - <<EOF
1430 idle_timeout=50 in_port=2 dl_src=00:66:77:88:99:aa actions=drop
1431 idle_timeout=60 in_port=2 dl_src=00:77:88:99:aa:bb actions=drop
1432 idle_timeout=70 in_port=2 dl_src=00:88:99:aa:bb:cc actions=drop
1434 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1435 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1436 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1437 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1438 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1439 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1440 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1441 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1442 OFPST_FLOW reply (OF1.2):
1444 # Adding another flow will cause the one that expires soonest overall
1446 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 'idle_timeout=80 in_port=2 dl_src=00:99:aa:bb:cc:dd actions=drop'])
1447 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1448 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1449 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1450 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1451 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1452 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1453 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1454 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1455 OFPST_FLOW reply (OF1.2):
1457 # Reducing the flow limit also causes the flows that expire soonest
1458 # overall to be evicted.
1459 AT_CHECK([ovs-vsctl set Flow_Table evict flow-limit=4])
1460 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1461 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1462 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1463 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1464 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1465 OFPST_FLOW reply (OF1.2):
1470 AT_SETUP([ofproto - eviction upon table overflow, with modified hard timeout])
1472 # Configure a maximum of 4 flows.
1475 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1476 -- set bridge br0 flow_tables:0=@t0 \
1477 | ${PERL} $srcdir/uuidfilt.pl],
1480 ovs-appctl time/stop
1482 for in_port in 4 3 2 1; do
1483 ovs-ofctl add-flow br0 hard_timeout=$((10 + in_port * 3)),in_port=$in_port,actions=drop
1485 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1486 hard_timeout=13, in_port=1 actions=drop
1487 hard_timeout=16, in_port=2 actions=drop
1488 hard_timeout=19, in_port=3 actions=drop
1489 hard_timeout=22, in_port=4 actions=drop
1492 # Sleep and modify the one that expires soonest
1493 ovs-appctl time/warp 5000
1494 AT_CHECK([ovs-ofctl mod-flows br0 in_port=1,actions=drop])
1495 # At this point the table would looks like:
1496 # in_port seconds to expire
1501 ovs-appctl time/warp 2000
1502 # Adding another flow will cause the one that expires soonest to be evicted.
1503 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1504 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1505 hard_timeout=13, in_port=1 actions=drop
1506 hard_timeout=19, in_port=3 actions=drop
1507 hard_timeout=22, in_port=4 actions=drop
1508 in_port=5 actions=drop
1514 AT_SETUP([ofproto - eviction upon table overflow, with modified idle timeout])
1515 OVS_VSWITCHD_START([add-port br0 p1 -- set interface p1 type=dummy ofport_request=1])
1516 # Configure a maximum of 4 flows.
1519 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1520 -- set bridge br0 flow_tables:0=@t0 \
1521 | ${PERL} $srcdir/uuidfilt.pl],
1525 for in_port in 4 3 2 1; do
1526 ovs-ofctl add-flow br0 idle_timeout=$((10 + in_port * 3)),in_port=$in_port,actions=drop
1528 ovs-appctl time/stop
1529 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1530 idle_timeout=13, in_port=1 actions=drop
1531 idle_timeout=16, in_port=2 actions=drop
1532 idle_timeout=19, in_port=3 actions=drop
1533 idle_timeout=22, in_port=4 actions=drop
1536 # Sleep and receive on the flow that expires soonest
1537 ovs-appctl time/warp 5000
1538 AT_CHECK([ovs-appctl netdev-dummy/receive p1 'in_port(1)'])
1539 # At this point the table would looks like:
1540 # in_port seconds to expire
1545 ovs-appctl time/warp 2000
1546 # Adding another flow will cause the one that expires soonest to be evicted.
1547 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1548 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1549 idle_timeout=19, in_port=3 actions=drop
1550 idle_timeout=22, in_port=4 actions=drop
1551 in_port=5 actions=drop
1552 n_packets=1, n_bytes=60, idle_timeout=13, in_port=1 actions=drop
1558 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.0)])
1560 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
1562 printf '\n\n--- check_async %d ---\n\n\n' $1
1565 ovs-appctl -t ovs-ofctl ofctl/barrier
1566 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1569 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1570 ovs-ofctl -v packet-out br0 controller controller '0001020304050010203040501234'
1571 if test X"$1" = X"OFPR_ACTION"; then shift;
1572 echo >>expout "OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1573 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1576 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1577 ovs-ofctl -v packet-out br0 controller 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1578 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1579 echo >>expout "OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via no_match) data_len=14 (unbuffered)
1580 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1583 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1584 ovs-ofctl packet-out br0 controller dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1585 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1586 echo >>expout "OFPT_PACKET_IN: total_len=76 in_port=CONTROLLER (via invalid_ttl) data_len=76 (unbuffered)
1587 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1590 # OFPT_PORT_STATUS, OFPPR_ADD
1591 ovs-vsctl add-port br0 test -- set Interface test type=dummy ofport_request=1
1592 if test X"$1" = X"OFPPR_ADD"; then shift;
1593 echo >>expout "OFPT_PORT_STATUS: ADD: 1(test): addr:aa:55:aa:55:00:0x
1596 speed: 0 Mbps now, 0 Mbps max"
1599 # OFPT_PORT_STATUS, OFPPR_DELETE
1600 ovs-vsctl del-port br0 test
1601 if test X"$1" = X"OFPPR_DELETE"; then shift;
1602 echo >>expout "OFPT_PORT_STATUS: DEL: 1(test): addr:aa:55:aa:55:00:0x
1605 speed: 0 Mbps now, 0 Mbps max"
1608 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1609 ovs-ofctl add-flow br0 send_flow_rem,actions=drop
1610 ovs-ofctl --strict del-flows br0 ''
1611 if test X"$1" = X"OFPRR_DELETE"; then shift;
1612 echo >>expout "OFPT_FLOW_REMOVED: reason=delete"
1614 AT_FAIL_IF([test X"$1" != X])
1616 ovs-appctl -t ovs-ofctl ofctl/barrier
1617 echo >>expout "OFPT_BARRIER_REPLY:"
1621 s/ (xid=0x[0-9a-fA-F]*)//
1623 s/00:0.$/00:0x/' < monitor.log]],
1627 # It's a service connection so initially there should be no async messages.
1630 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1631 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
1632 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1634 # Set miss_send_len to 128 and enable invalid_ttl.
1635 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700040080
1636 check_async 3 OFPR_ACTION OFPR_INVALID_TTL OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1638 # Become slave, which should disable everything except port status.
1639 ovs-appctl -t ovs-ofctl ofctl/send 0104001400000002000023200000000a00000002
1640 check_async 4 OFPPR_ADD OFPPR_DELETE
1642 # Use NXT_SET_ASYNC_CONFIG to enable a patchwork of asynchronous messages.
1643 ovs-appctl -t ovs-ofctl ofctl/send 01040028000000020000232000000013000000020000000500000005000000020000000200000005
1644 check_async 5 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1646 # Set controller ID 123.
1647 ovs-appctl -t ovs-ofctl ofctl/send 01040018000000030000232000000014000000000000007b
1648 check_async 6 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1650 # Restore controller ID 0.
1651 ovs-appctl -t ovs-ofctl ofctl/send 010400180000000300002320000000140000000000000000
1654 ovs-appctl -t ovs-ofctl ofctl/send 0104001400000002000023200000000a00000001
1655 check_async 7 OFPR_ACTION OFPPR_ADD
1657 ovs-appctl -t ovs-ofctl exit
1661 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.2)])
1663 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1665 printf '\n\n--- check_async %d ---\n\n\n' $1
1669 ovs-appctl -t ovs-ofctl ofctl/barrier
1670 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1673 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1674 ovs-ofctl -O OpenFlow12 -v packet-out br0 none controller '0001020304050010203040501234'
1675 if test X"$1" = X"OFPR_ACTION"; then shift;
1676 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1677 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1680 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1681 ovs-ofctl -O OpenFlow12 -v packet-out br0 none 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1682 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1683 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via no_match) data_len=14 (unbuffered)
1684 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1687 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1688 ovs-ofctl -O OpenFlow12 packet-out br0 none dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1689 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1690 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=76 in_port=ANY (via invalid_ttl) data_len=76 (unbuffered)
1691 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1694 # OFPT_PORT_STATUS, OFPPR_ADD
1695 ovs-vsctl add-port br0 test -- set Interface test type=dummy
1696 if test X"$1" = X"OFPPR_ADD"; then shift;
1697 echo >>expout "OFPT_PORT_STATUS (OF1.2): ADD: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1700 speed: 0 Mbps now, 0 Mbps max"
1703 # OFPT_PORT_STATUS, OFPPR_DELETE
1704 ovs-vsctl del-port br0 test
1705 if test X"$1" = X"OFPPR_DELETE"; then shift;
1706 echo >>expout "OFPT_PORT_STATUS (OF1.2): DEL: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1709 speed: 0 Mbps now, 0 Mbps max"
1712 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1713 ovs-ofctl -O OpenFlow12 add-flow br0 send_flow_rem,actions=drop
1714 ovs-ofctl -O OpenFlow12 --strict del-flows br0 ''
1715 if test X"$1" = X"OFPRR_DELETE"; then shift;
1716 echo >>expout "OFPT_FLOW_REMOVED (OF1.2): reason=delete table_id=0"
1718 AT_FAIL_IF([test X"$1" != X])
1720 ovs-appctl -t ovs-ofctl ofctl/barrier
1721 echo >>expout "OFPT_BARRIER_REPLY (OF1.2):"
1725 s/ (xid=0x[0-9a-fA-F]*)//
1727 s/00:0.$/00:0x/' < monitor.log]],
1731 # It's a service connection so initially there should be no async messages.
1734 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1735 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
1736 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1738 # Set miss_send_len to 128 and enable invalid_ttl.
1739 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700040080
1740 check_async 3 OFPR_ACTION OFPR_INVALID_TTL OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1742 # Become slave (OF 1.2), which should disable everything except port status.
1743 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000200000003000000000000000000000001
1744 check_async 4 OFPPR_ADD OFPPR_DELETE
1746 # Use NXT_SET_ASYNC_CONFIG to enable a patchwork of asynchronous messages.
1747 ovs-appctl -t ovs-ofctl ofctl/send 03040028000000020000232000000013000000020000000500000005000000020000000200000005
1748 check_async 5 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1750 # Set controller ID 123.
1751 ovs-appctl -t ovs-ofctl ofctl/send 03040018000000030000232000000014000000000000007b
1752 check_async 6 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1754 # Restore controller ID 0.
1755 ovs-appctl -t ovs-ofctl ofctl/send 030400180000000300002320000000140000000000000000
1757 # Become master (OF 1.2).
1758 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000400000002000000000000000000000002
1759 check_async 7 OFPR_ACTION OFPPR_ADD
1761 ovs-appctl -t ovs-ofctl exit
1765 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.3)])
1767 AT_CHECK([ovs-ofctl -O OpenFlow13 monitor br0 --detach --no-chdir --pidfile])
1769 printf '\n\n--- check_async %d ---\n\n\n' $1
1773 ovs-appctl -t ovs-ofctl ofctl/barrier
1774 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1777 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1778 ovs-ofctl -O OpenFlow13 -v packet-out br0 none controller '0001020304050010203040501234'
1779 if test X"$1" = X"OFPR_ACTION"; then shift;
1780 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1781 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1784 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1785 ovs-ofctl -O OpenFlow13 -v packet-out br0 none 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1786 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1787 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=14 in_port=ANY (via no_match) data_len=14 (unbuffered)
1788 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1791 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1792 ovs-ofctl -O OpenFlow13 packet-out br0 none dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1793 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1794 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=76 in_port=ANY (via invalid_ttl) data_len=76 (unbuffered)
1795 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1798 # OFPT_PORT_STATUS, OFPPR_ADD
1799 ovs-vsctl add-port br0 test -- set Interface test type=dummy
1800 if test X"$1" = X"OFPPR_ADD"; then shift;
1801 echo >>expout "OFPT_PORT_STATUS (OF1.3): ADD: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1804 speed: 0 Mbps now, 0 Mbps max"
1807 # OFPT_PORT_STATUS, OFPPR_DELETE
1808 ovs-vsctl del-port br0 test
1809 if test X"$1" = X"OFPPR_DELETE"; then shift;
1810 echo >>expout "OFPT_PORT_STATUS (OF1.3): DEL: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1813 speed: 0 Mbps now, 0 Mbps max"
1816 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1817 ovs-ofctl -O OpenFlow13 add-flow br0 send_flow_rem,actions=drop
1818 ovs-ofctl -O OpenFlow13 --strict del-flows br0 ''
1819 if test X"$1" = X"OFPRR_DELETE"; then shift;
1820 echo >>expout "OFPT_FLOW_REMOVED (OF1.3): reason=delete table_id=0"
1823 # OFPT_FLOW_REMOVED, OFPRR_GROUP_DELETE
1824 ovs-ofctl -O OpenFlow13 add-group br0 group_id=1234,type=all,bucket=output:10
1825 ovs-ofctl -O OpenFlow13 add-flow br0 send_flow_rem,actions=group:1234
1826 ovs-ofctl -O OpenFlow13 --strict del-groups br0 group_id=1234
1827 if test X"$1" = X"OFPRR_DELETE"; then shift;
1828 echo >>expout "OFPT_FLOW_REMOVED (OF1.3): reason=gropu_delete table_id=0"
1831 AT_FAIL_IF([test X"$1" != X])
1833 ovs-appctl -t ovs-ofctl ofctl/barrier
1834 echo >>expout "OFPT_BARRIER_REPLY (OF1.3):"
1838 s/ (xid=0x[0-9a-fA-F]*)//
1840 s/00:0.$/00:0x/' < monitor.log]],
1844 # It's a service connection so initially there should be no async messages.
1847 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1848 ovs-appctl -t ovs-ofctl ofctl/send 0409000c0123456700000080
1849 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1851 # Become slave (OF 1.3), which should disable everything except port status.
1852 ovs-appctl -t ovs-ofctl ofctl/send 041800180000000200000003000000000000000000000001
1853 check_async 3 OFPPR_ADD OFPPR_DELETE
1855 # Use OF 1.3 OFPT_SET_ASYNC to enable a patchwork of asynchronous messages.
1856 ovs-appctl -t ovs-ofctl ofctl/send 041c002000000002000000020000000500000005000000020000000200000005
1857 check_async 4 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1859 # Set controller ID 123.
1860 ovs-appctl -t ovs-ofctl ofctl/send 04040018000000030000232000000014000000000000007b
1861 check_async 5 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1863 # Restore controller ID 0.
1864 ovs-appctl -t ovs-ofctl ofctl/send 040400180000000300002320000000140000000000000000
1866 # Become master (OF 1.3).
1867 ovs-appctl -t ovs-ofctl ofctl/send 041800180000000400000002000000000000000000000002
1868 check_async 6 OFPR_ACTION OFPPR_ADD
1870 ovs-appctl -t ovs-ofctl exit
1874 dnl This test checks that the role request/response messaging works
1875 dnl and that generation_id is handled properly.
1876 AT_SETUP([ofproto - controller role (OpenFlow 1.2)])
1878 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1880 ovs-appctl -t ovs-ofctl ofctl/barrier
1881 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1885 # find out current role
1886 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000200000000000000000000000000000000
1887 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x2): role=nochange"
1888 echo >>expout "OFPT_ROLE_REPLY (OF1.2) (xid=0x2): role=equal"
1890 # Become slave (generation_id is initially undefined, so 2^63+2 should not be stale)
1891 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000300000003000000008000000000000002
1892 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x3): role=slave generation_id=9223372036854775810"
1893 echo >>expout "OFPT_ROLE_REPLY (OF1.2) (xid=0x3): role=slave generation_id=9223372036854775810"
1895 # Try to become the master using a stale generation ID
1896 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000400000002000000000000000000000002
1897 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x4): role=master generation_id=2"
1898 echo >>expout "OFPT_ERROR (OF1.2) (xid=0x4): OFPRRFC_STALE"
1899 echo >>expout "OFPT_ROLE_REQUEST (OF1.2) (xid=0x4): role=master generation_id=2"
1901 # Become master using a valid generation ID
1902 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000500000002000000000000000000000001
1903 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x5): role=master generation_id=1"
1904 echo >>expout "OFPT_ROLE_REPLY (OF1.2) (xid=0x5): role=master generation_id=1"
1905 ovs-appctl -t ovs-ofctl ofctl/barrier
1906 echo >>expout "OFPT_BARRIER_REPLY (OF1.2) (xid=0x3):"
1908 AT_CHECK([grep -v '^send:' monitor.log], [0], [expout])
1910 AT_CHECK([grep '^send:' monitor.log], [0], [expout])
1912 ovs-appctl -t ovs-ofctl exit
1916 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
1917 dnl specified by OpenFlow 1.0) and OFPP_CONTROLLER (used by some
1918 dnl controllers despite the spec) as meaning a packet that was generated
1919 dnl by the controller.
1920 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.0)])
1922 ADD_OF_PORTS([br0], [1])
1924 # Start a monitor listening for packet-ins.
1925 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
1926 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
1927 ovs-appctl -t ovs-ofctl ofctl/barrier
1928 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1929 AT_CAPTURE_FILE([monitor.log])
1931 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
1932 AT_CHECK([ovs-ofctl packet-out br0 none controller,1 '0001020304050010203040501234'])
1933 AT_CHECK([ovs-ofctl packet-out br0 controller controller,1 '0001020304050010203040505678'])
1935 # Stop the monitor and check its output.
1936 ovs-appctl -t ovs-ofctl ofctl/barrier
1937 ovs-appctl -t ovs-ofctl exit
1939 ovs-ofctl dump-ports br0
1941 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1942 OFPT_PACKET_IN: total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1943 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1944 OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1945 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
1952 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
1953 dnl specified by OpenFlow 1.2) and OFPP_CONTROLLER (used by some
1954 dnl controllers despite the spec) as meaning a packet that was generated
1955 dnl by the controller.
1956 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.2)])
1959 # Start a monitor listening for packet-ins.
1960 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1961 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
1962 ovs-appctl -t ovs-ofctl ofctl/barrier
1963 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1964 AT_CAPTURE_FILE([monitor.log])
1966 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
1967 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none controller '0001020304050010203040501234'])
1968 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 4294967293 controller '0001020304050010203040505678'])
1970 # Stop the monitor and check its output.
1971 ovs-appctl -t ovs-ofctl ofctl/barrier
1972 ovs-appctl -t ovs-ofctl exit
1974 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1975 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1976 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1977 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1978 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
1979 OFPT_BARRIER_REPLY (OF1.2):
1985 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
1986 dnl specified by OpenFlow 1.1) and OFPP_CONTROLLER (used by some
1987 dnl controllers despite the spec) as meaning a packet that was generated
1988 dnl by the controller.
1989 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.1)])
1992 # Start a monitor listening for packet-ins.
1993 AT_CHECK([ovs-ofctl -O OpenFlow11 monitor br0 --detach --no-chdir --pidfile])
1994 ovs-appctl -t ovs-ofctl ofctl/send 0209000c0123456700000080
1995 ovs-appctl -t ovs-ofctl ofctl/barrier
1996 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1997 AT_CAPTURE_FILE([monitor.log])
1999 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
2000 AT_CHECK([ovs-ofctl -O OpenFlow11 packet-out br0 none controller '0001020304050010203040501234'])
2001 AT_CHECK([ovs-ofctl -O OpenFlow11 packet-out br0 4294967293 controller '0001020304050010203040505678'])
2003 # Stop the monitor and check its output.
2004 ovs-appctl -t ovs-ofctl ofctl/barrier
2005 ovs-appctl -t ovs-ofctl exit
2007 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2008 OFPT_PACKET_IN (OF1.1): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
2009 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2010 OFPT_PACKET_IN (OF1.1): total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
2011 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
2012 OFPT_BARRIER_REPLY (OF1.1):
2018 dnl This test checks that metadata is encoded in packet_in structures,
2019 dnl supported by NXAST.
2020 AT_SETUP([ofproto - packet-out with metadata (NXM)])
2023 # Start a monitor listening for packet-ins.
2024 AT_CHECK([ovs-ofctl -P nxm monitor br0 --detach --no-chdir --pidfile])
2025 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
2026 ovs-appctl -t ovs-ofctl ofctl/barrier
2027 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2028 AT_CAPTURE_FILE([monitor.log])
2030 # Send a packet-out with a load action to set some metadata, and forward to controller
2031 AT_CHECK([ovs-ofctl packet-out br0 controller 'load(0xfafafafa5a5a5a5a->OXM_OF_METADATA[[0..63]]), load(0xaa->NXM_NX_PKT_MARK[[]]), controller' '0001020304050010203040501234'])
2033 # Stop the monitor and check its output.
2034 ovs-appctl -t ovs-ofctl ofctl/barrier
2035 ovs-appctl -t ovs-ofctl exit
2037 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2038 NXT_PACKET_IN: total_len=14 in_port=CONTROLLER metadata=0xfafafafa5a5a5a5a pkt_mark=0xaa (via action) data_len=14 (unbuffered)
2039 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2046 dnl This test checks that metadata is encoded in packet_in structures,
2047 dnl supported by NXAST.
2048 AT_SETUP([ofproto - packet-out with metadata (OpenFlow 1.2)])
2051 # Start a monitor listening for packet-ins.
2052 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
2053 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
2054 ovs-appctl -t ovs-ofctl ofctl/barrier
2055 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2056 AT_CAPTURE_FILE([monitor.log])
2058 # Send a packet-out with a set-field action to set some metadata, and forward to controller
2059 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none 'set_field:0xfafafafa5a5a5a5a->metadata, controller' '0001020304050010203040501234'])
2061 # Stop the monitor and check its output.
2062 ovs-appctl -t ovs-ofctl ofctl/barrier
2063 ovs-appctl -t ovs-ofctl exit
2065 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2066 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY metadata=0xfafafafa5a5a5a5a (via action) data_len=14 (unbuffered)
2067 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2068 OFPT_BARRIER_REPLY (OF1.2):
2074 dnl This test checks that tunnel metadata is encoded in packet_in structures.
2075 AT_SETUP([ofproto - packet-out with tunnel metadata (OpenFlow 1.2)])
2078 # Start a monitor listening for packet-ins.
2079 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
2080 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
2081 ovs-appctl -t ovs-ofctl ofctl/barrier
2082 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2083 AT_CAPTURE_FILE([monitor.log])
2085 # Send a packet-out with set field actions to set some tunnel metadata, and forward to controller
2086 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none 'set_field:127.0.0.1->tun_src,set_field:0x01020304->tun_id,set_field:192.168.0.1->tun_dst, controller' '0001020304050010203040501234'])
2088 # Stop the monitor and check its output.
2089 ovs-appctl -t ovs-ofctl ofctl/barrier
2090 ovs-appctl -t ovs-ofctl exit
2092 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2093 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY tun_id=0x1020304 tun_src=127.0.0.1 tun_dst=192.168.0.1 (via action) data_len=14 (unbuffered)
2094 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2095 OFPT_BARRIER_REPLY (OF1.2):
2101 m4_divert_push([PREPARE_TESTS])
2102 # Sorts groups of lines that start with a space, without moving them
2103 # past the nearest line that does not start with a space.
2113 print $_ foreach sort(@buffer);
2118 print $_ foreach sort(@buffer);
2121 m4_divert_pop([PREPARE_TESTS])
2123 AT_SETUP([ofproto - flow monitoring])
2124 AT_KEYWORDS([monitor])
2127 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:1
2129 # Start a monitor watching the flow table and check the initial reply.
2130 ovs-ofctl monitor br0 watch: --detach --no-chdir --pidfile >monitor.log 2>&1
2131 AT_CAPTURE_FILE([monitor.log])
2132 ovs-appctl -t ovs-ofctl ofctl/barrier
2133 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2134 [NXST_FLOW_MONITOR reply:
2135 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:1
2139 # Add, delete, and modify some flows and check the updates.
2140 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2141 ovs-ofctl add-flow br0 in_port=0,dl_vlan=124,actions=output:2
2142 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:5
2143 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,dl_vlan_pcp=0,actions=output:6
2144 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,dl_vlan_pcp=1,actions=output:7
2145 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:8
2146 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,dl_vlan_pcp=0,actions=output:9
2147 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,dl_vlan_pcp=1,actions=output:10
2148 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,actions=output:11
2149 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,dl_vlan_pcp=0,actions=output:12
2150 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,dl_vlan_pcp=1,actions=output:13
2151 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,actions=output:14
2152 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=0,actions=output:15
2153 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=1,actions=output:16
2154 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,actions=output:17
2155 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=0,actions=output:18
2156 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=1,actions=output:19
2157 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,actions=output:20
2158 ovs-ofctl add-flow br0 in_port=0,dl_vlan_pcp=0,actions=output:21
2159 ovs-ofctl add-flow br0 in_port=0,dl_vlan_pcp=1,actions=output:22
2160 ovs-ofctl add-flow br0 in_port=0,actions=output:23
2161 ovs-ofctl mod-flows br0 dl_vlan=123,actions=output:3
2162 ovs-ofctl mod-flows br0 cookie=5,dl_vlan=123,actions=output:3
2163 ovs-ofctl del-flows br0 dl_vlan=123
2164 ovs-ofctl del-flows br0
2165 ovs-appctl -t ovs-ofctl ofctl/barrier
2166 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log | multiline_sort], [0],
2167 [NXST_FLOW_MONITOR reply (xid=0x0):
2168 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=124 actions=output:2
2169 NXST_FLOW_MONITOR reply (xid=0x0):
2170 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:5
2171 NXST_FLOW_MONITOR reply (xid=0x0):
2172 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:6
2173 NXST_FLOW_MONITOR reply (xid=0x0):
2174 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:7
2175 NXST_FLOW_MONITOR reply (xid=0x0):
2176 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:8
2177 NXST_FLOW_MONITOR reply (xid=0x0):
2178 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:9
2179 NXST_FLOW_MONITOR reply (xid=0x0):
2180 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:10
2181 NXST_FLOW_MONITOR reply (xid=0x0):
2182 event=ADDED table=0 cookie=0 in_port=0,vlan_tci=0x0000 actions=output:11
2183 NXST_FLOW_MONITOR reply (xid=0x0):
2184 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=0 actions=output:12
2185 NXST_FLOW_MONITOR reply (xid=0x0):
2186 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=1 actions=output:13
2187 NXST_FLOW_MONITOR reply (xid=0x0):
2188 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095 actions=output:14
2189 NXST_FLOW_MONITOR reply (xid=0x0):
2190 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:15
2191 NXST_FLOW_MONITOR reply (xid=0x0):
2192 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:16
2193 NXST_FLOW_MONITOR reply (xid=0x0):
2194 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:17
2195 NXST_FLOW_MONITOR reply (xid=0x0):
2196 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:18
2197 NXST_FLOW_MONITOR reply (xid=0x0):
2198 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:19
2199 NXST_FLOW_MONITOR reply (xid=0x0):
2200 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:20
2201 NXST_FLOW_MONITOR reply (xid=0x0):
2202 event=ADDED table=0 cookie=0 in_port=0,dl_vlan_pcp=0 actions=output:21
2203 NXST_FLOW_MONITOR reply (xid=0x0):
2204 event=ADDED table=0 cookie=0 in_port=0,dl_vlan_pcp=1 actions=output:22
2205 NXST_FLOW_MONITOR reply (xid=0x0):
2206 event=ADDED table=0 cookie=0 in_port=0 actions=output:23
2207 NXST_FLOW_MONITOR reply (xid=0x0):
2208 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:3
2209 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2210 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2211 NXST_FLOW_MONITOR reply (xid=0x0):
2212 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123 actions=output:3
2213 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2214 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2215 NXST_FLOW_MONITOR reply (xid=0x0):
2216 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123 actions=output:3
2217 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2218 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2219 NXST_FLOW_MONITOR reply (xid=0x0):
2220 event=DELETED reason=delete table=0 cookie=0 in_port=0 actions=output:23
2221 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:20
2222 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:18
2223 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:19
2224 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=124 actions=output:2
2225 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095 actions=output:14
2226 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=0 actions=output:12
2227 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=1 actions=output:13
2228 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan_pcp=0 actions=output:21
2229 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan_pcp=1 actions=output:22
2230 event=DELETED reason=delete table=0 cookie=0 in_port=0,vlan_tci=0x0000 actions=output:11
2234 # Check that our own changes are reported as full updates.
2235 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2236 ovs-ofctl add-flow br0 in_port=1,actions=output:2
2237 ovs-ofctl add-flow br0 in_port=2,actions=output:1
2238 ovs-appctl -t ovs-ofctl ofctl/barrier
2239 ovs-appctl -t ovs-ofctl ofctl/send 010e004812345678003fffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000ffffffffffff0000
2240 ovs-appctl -t ovs-ofctl ofctl/barrier
2241 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
2243 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log | multiline_sort], [0],
2244 [NXST_FLOW_MONITOR reply (xid=0x0):
2245 event=ADDED table=0 cookie=0 in_port=1 actions=output:2
2246 NXST_FLOW_MONITOR reply (xid=0x0):
2247 event=ADDED table=0 cookie=0 in_port=2 actions=output:1
2249 send: OFPT_FLOW_MOD: DEL priority=0 actions=drop
2250 NXST_FLOW_MONITOR reply (xid=0x0):
2251 event=DELETED reason=delete table=0 cookie=0 in_port=1 actions=output:2
2252 event=DELETED reason=delete table=0 cookie=0 in_port=2 actions=output:1
2256 ovs-appctl -t ovs-ofctl exit
2260 AT_SETUP([ofproto - flow monitoring with !own])
2261 AT_KEYWORDS([monitor])
2264 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:1
2266 # Start a monitor watching the flow table and check the initial reply.
2267 ovs-ofctl monitor br0 watch:\!own --detach --no-chdir --pidfile >monitor.log 2>&1
2268 AT_CAPTURE_FILE([monitor.log])
2269 ovs-appctl -t ovs-ofctl ofctl/barrier
2270 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2271 [NXST_FLOW_MONITOR reply:
2272 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:1
2276 # Check that our own changes are reported as abbreviations.
2277 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2278 ovs-ofctl add-flow br0 in_port=1,actions=output:2
2279 ovs-ofctl add-flow br0 in_port=2,actions=output:1
2280 ovs-appctl -t ovs-ofctl ofctl/barrier
2281 ovs-appctl -t ovs-ofctl ofctl/send 010e004812345678003fffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000ffffffffffff0000
2282 ovs-appctl -t ovs-ofctl ofctl/barrier
2283 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
2285 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2286 [NXST_FLOW_MONITOR reply (xid=0x0):
2287 event=ADDED table=0 cookie=0 in_port=1 actions=output:2
2288 NXST_FLOW_MONITOR reply (xid=0x0):
2289 event=ADDED table=0 cookie=0 in_port=2 actions=output:1
2291 send: OFPT_FLOW_MOD: DEL priority=0 actions=drop
2292 NXST_FLOW_MONITOR reply (xid=0x0):
2293 event=ABBREV xid=0x12345678
2297 ovs-appctl -t ovs-ofctl exit
2301 AT_SETUP([ofproto - flow monitoring with out_port])
2302 AT_KEYWORDS([monitor])
2305 ovs-ofctl add-flow br0 in_port=0,dl_vlan=121,actions=output:1
2306 ovs-ofctl add-flow br0 in_port=0,dl_vlan=122,actions=output:1
2307 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:2
2309 # Start a monitor watching the flow table and check the initial reply.
2310 ovs-ofctl monitor br0 watch:out_port=2 --detach --no-chdir --pidfile >monitor.log 2>&1
2311 AT_CAPTURE_FILE([monitor.log])
2312 ovs-appctl -t ovs-ofctl ofctl/barrier
2313 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2314 [NXST_FLOW_MONITOR reply:
2315 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:2
2319 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2321 # Add, modify flows and check the updates.
2322 ovs-ofctl mod-flows br0 dl_vlan=121,actions=drop
2323 ovs-ofctl mod-flows br0 dl_vlan=122,actions=output:1,output:2
2324 ovs-appctl -t ovs-ofctl ofctl/barrier
2326 ovs-ofctl mod-flows br0 dl_vlan=123,actions=output:1,output:2
2327 ovs-appctl -t ovs-ofctl ofctl/barrier
2329 ovs-ofctl mod-flows br0 dl_vlan=122,actions=output:1
2330 ovs-appctl -t ovs-ofctl ofctl/barrier
2331 ovs-ofctl mod-flows br0 dl_vlan=123,actions=output:2
2332 ovs-appctl -t ovs-ofctl ofctl/barrier
2334 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2335 [NXST_FLOW_MONITOR reply (xid=0x0):
2336 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=122 actions=output:1,output:2
2338 NXST_FLOW_MONITOR reply (xid=0x0):
2339 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:1,output:2
2341 NXST_FLOW_MONITOR reply (xid=0x0):
2342 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=122 actions=output:1
2344 NXST_FLOW_MONITOR reply (xid=0x0):
2345 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:2
2349 ovs-appctl -t ovs-ofctl exit
2353 AT_SETUP([ofproto - flow monitoring pause and resume])
2354 AT_KEYWORDS([monitor])
2356 # The maximum socket receive buffer size is important for this test, which
2357 # tests behavior when the receive buffer overflows.
2358 if test -e /proc/sys/net/core/rmem_max; then
2360 rmem_max=`cat /proc/sys/net/core/rmem_max`
2361 elif rmem_max=`sysctl -n net.inet.tcp.recvbuf_max 2>/dev/null`; then
2364 # Don't know how to get maximum socket receive buffer on this OS
2367 # Calculate the total amount of queuing: rmem_max in the kernel, 128 kB
2368 # in ofproto sending userspace (see ofmonitor_flush() in connmgr.c).
2369 queue_size=`expr $rmem_max + 128 \* 1024`
2370 echo rmem_max=$rmem_max queue_size=$queue_size
2372 # If there's too much queuing skip the test to avoid timing out.
2373 AT_SKIP_IF([test $rmem_max -gt 1048576])
2375 # Each flow update message takes up at least 48 bytes of space in queues
2376 # and in practice more than that.
2377 n_msgs=`expr $queue_size / 48`
2382 # Start a monitor watching the flow table, then make it block.
2383 ON_EXIT([kill `cat ovs-ofctl.pid`])
2384 ovs-ofctl monitor br0 watch: --detach --no-chdir --pidfile >monitor.log 2>&1
2385 AT_CAPTURE_FILE([monitor.log])
2386 ovs-appctl -t ovs-ofctl ofctl/block
2388 # Add $n_msgs flows.
2389 (echo "in_port=2,actions=output:2"
2391 for ($i = 0; $i < '$n_msgs'; $i++) {
2392 print "cookie=1,reg1=$i,actions=drop\n";
2395 AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
2396 # Check that multipart flow dumps work properly:
2397 AT_CHECK([ovs-ofctl diff-flows br0 flows.txt])
2398 AT_CHECK([ovs-ofctl add-flow br0 in_port=1,cookie=3,actions=drop])
2399 AT_CHECK([ovs-ofctl mod-flows br0 in_port=2,cookie=2,actions=output:2])
2400 AT_CHECK([ovs-ofctl del-flows br0 cookie=1/-1])
2402 ovs-appctl -t ovs-ofctl ofctl/unblock
2404 # Wait for the connection resumed.
2405 # A barrier doesn't work for this purpose.
2406 # https://www.mail-archive.com/dev@openvswitch.org/msg27013.html
2407 # https://www.mail-archive.com/dev@openvswitch.org/msg27675.html
2408 OVS_WAIT_UNTIL([grep NXT_FLOW_MONITOR_RESUMED monitor.log])
2410 ovs-appctl -t ovs-ofctl exit
2412 # Check that the flow monitor reported the same number of flows
2413 # added and deleted, but fewer than we actually added and deleted.
2414 adds=`grep -c 'ADDED.*reg1=' monitor.log`
2415 deletes=`grep -c 'DELETED.*reg1=' monitor.log`
2416 echo adds=$adds deletes=$deletes
2417 AT_CHECK([test $adds -gt 100 && test $adds -lt $n_msgs])
2418 AT_CHECK([test $adds = $deletes])
2420 # Check that the flow monitor reported everything in the expected order:
2422 # event=ADDED table=0 cookie=0x1 reg1=0x22
2424 # NXT_FLOW_MONITOR_PAUSED:
2426 # event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2428 # event=ADDED table=0 cookie=0x3 in_port=1
2429 # event=MODIFIED table=0 cookie=0x2 in_port=2 actions=output:2
2430 # NXT_FLOW_MONITOR_RESUMED:
2432 # except that, between the PAUSED and RESUMED, the order of the ADDED
2433 # and MODIFIED lines lines depends on hash order, that is, it varies
2434 # as we change the hash function or change architecture. Therefore,
2435 # we use a couple of tests below to accept both orders.
2436 AT_CHECK([ofctl_strip < monitor.log | sed -n -e '
2439 /NXT_FLOW_MONITOR_PAUSED:/p
2440 /NXT_FLOW_MONITOR_RESUMED:/p
2441 ' > monitor.log.subset])
2442 AT_CHECK([grep -v MODIFIED monitor.log.subset], [0], [dnl
2443 event=ADDED table=0 cookie=0x1 reg1=0x22
2444 NXT_FLOW_MONITOR_PAUSED:
2445 event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2446 event=ADDED table=0 cookie=0x3 in_port=1
2447 NXT_FLOW_MONITOR_RESUMED:
2449 AT_CHECK([grep -v ADDED monitor.log.subset], [0], [dnl
2450 NXT_FLOW_MONITOR_PAUSED:
2451 event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2452 event=MODIFIED table=0 cookie=0x2 in_port=2 actions=output:2
2453 NXT_FLOW_MONITOR_RESUMED:
2459 AT_SETUP([ofproto - event filtering (OpenFlow 1.3)])
2460 AT_KEYWORDS([monitor])
2463 # Start a monitor, use the required protocol version
2464 ovs-ofctl -O OpenFlow13 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2465 AT_CAPTURE_FILE([monitor.log])
2467 # Send an OpenFlow13 message (04), OFPT_GET_ASYNC_REQUEST (1a), length (8), xid (0a)
2468 ovs-appctl -t ovs-ofctl ofctl/send 041a00080000000a
2469 ovs-appctl -t ovs-ofctl ofctl/barrier
2471 # Check default setting
2472 read -r -d '' expected <<'EOF'
2475 AT_CHECK([ofctl_strip < monitor.log], [], [dnl
2476 send: OFPT_GET_ASYNC_REQUEST (OF1.3):
2477 OFPT_GET_ASYNC_REPLY (OF1.3):
2479 PACKET_IN: no_match action
2480 PORT_STATUS: add delete modify
2481 FLOW_REMOVED: idle hard delete
2485 PORT_STATUS: add delete modify
2487 OFPT_BARRIER_REPLY (OF1.3):
2493 AT_SETUP([ofproto - ofport_request])
2495 ADD_OF_PORTS([br0], [1], [2], [3])
2497 set_and_check_specific_ofports () {
2498 ovs-vsctl set Interface p1 ofport_request="$1" -- \
2499 set Interface p2 ofport_request="$2" -- \
2500 set Interface p3 ofport_request="$3"
2501 ofports=`ovs-vsctl get Interface p1 ofport -- \
2502 get Interface p2 ofport -- \
2503 get Interface p3 ofport`
2504 AT_CHECK_UNQUOTED([echo $ofports], [0], [$1 $2 $3
2507 for pre in '1 2 3' '1 3 2' '2 1 3' '2 3 1' '3 1 2' '3 2 1'; do
2508 for post in '1 2 3' '1 3 2' '2 1 3' '2 3 1' '3 1 2' '3 2 1'; do
2509 echo -----------------------------------------------------------
2510 echo "Check changing port numbers from $pre to $post"
2511 set_and_check_specific_ofports $pre
2512 set_and_check_specific_ofports $post
2516 ovs-vsctl del-port p3
2518 set_and_check_poorly_specified_ofports () {
2519 ovs-vsctl set Interface p1 ofport_request="$1" -- \
2520 set Interface p2 ofport_request="$2"
2521 p1=`ovs-vsctl get Interface p1 ofport`
2522 p2=`ovs-vsctl get Interface p2 ofport`
2525 AT_CHECK([test "$p1" != "$p2"])
2526 if test "$1" = "$2" && test "$1" != '[[]]'; then
2527 # One port number must be the requested one.
2528 AT_CHECK([test "$p1" = "$1" || test "$p2" = "$1"])
2529 # The other port number must be different (already tested above).
2531 AT_CHECK([test "$1" = '[[]]' || test "$p1" == "$1"])
2532 AT_CHECK([test "$2" = '[[]]' || test "$p2" == "$2"])
2535 for pre in '1 2' '[[]] 2' '1 [[]]' '[[]] [[]]' '2 1' '[[]] 1' '2 [[]]' \
2537 for post in '1 2' '[[]] 2' '1 [[]]' '[[]] [[]]' '2 1' '[[]] 1' '2 [[]]' \
2539 echo -----------------------------------------------------------
2540 echo "Check changing port numbers from $pre to $post"
2541 set_and_check_poorly_specified_ofports $pre
2542 set_and_check_poorly_specified_ofports $post
2549 AT_SETUP([ofproto - bundles, open (OpenFlow 1.4)])
2550 AT_KEYWORDS([monitor])
2553 # Start a monitor, use the required protocol version
2554 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2555 AT_CAPTURE_FILE([monitor.log])
2557 # Send an OpenFlow14 message (05), OFPT_BUNDLE_CONTROL (21), length (10), xid (0a)
2558 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2559 ovs-appctl -t ovs-ofctl ofctl/barrier
2560 ovs-appctl -t ovs-ofctl exit
2562 AT_CHECK([ofctl_strip < monitor.log], [], [dnl
2563 send: OFPT_BUNDLE_CONTROL (OF1.4):
2564 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2565 OFPT_BUNDLE_CONTROL (OF1.4):
2566 bundle_id=0x1 type=OPEN_REPLY flags=0
2567 OFPT_BARRIER_REPLY (OF1.4):
2573 AT_SETUP([ofproto - bundles, double open (OpenFlow 1.4)])
2574 AT_KEYWORDS([monitor])
2577 # Start a monitor, use the required protocol version
2578 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2579 AT_CAPTURE_FILE([monitor.log])
2581 # Send twice an OpenFlow14 message (05), OFPT_BUNDLE_CONTROL (21), length (10), xid (0a)
2582 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2583 ovs-appctl -t ovs-ofctl ofctl/barrier
2584 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2585 ovs-appctl -t ovs-ofctl ofctl/barrier
2586 ovs-appctl -t ovs-ofctl exit
2588 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2589 send: OFPT_BUNDLE_CONTROL (OF1.4):
2590 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2591 OFPT_BUNDLE_CONTROL (OF1.4):
2592 bundle_id=0x1 type=OPEN_REPLY flags=0
2593 OFPT_BARRIER_REPLY (OF1.4):
2594 send: OFPT_BUNDLE_CONTROL (OF1.4):
2595 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2596 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2597 OFPT_BUNDLE_CONTROL (OF1.4):
2598 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2599 OFPT_BARRIER_REPLY (OF1.4):
2605 AT_SETUP([ofproto - bundle close without open (OpenFlow 1.4)])
2606 AT_KEYWORDS([monitor])
2609 # Start a monitor, use the required protocol version
2610 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2611 AT_CAPTURE_FILE([monitor.log])
2613 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 01"
2614 ovs-appctl -t ovs-ofctl ofctl/barrier
2615 ovs-appctl -t ovs-ofctl exit
2617 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2618 send: OFPT_BUNDLE_CONTROL (OF1.4):
2619 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2620 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2621 OFPT_BUNDLE_CONTROL (OF1.4):
2622 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2623 OFPT_BARRIER_REPLY (OF1.4):
2629 AT_SETUP([ofproto - bundle double close (OpenFlow 1.4)])
2630 AT_KEYWORDS([monitor])
2633 # Start a monitor, use the required protocol version
2634 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2635 AT_CAPTURE_FILE([monitor.log])
2637 # Open, Close, Close
2638 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2639 ovs-appctl -t ovs-ofctl ofctl/barrier
2640 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 01"
2641 ovs-appctl -t ovs-ofctl ofctl/barrier
2642 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 01"
2643 ovs-appctl -t ovs-ofctl ofctl/barrier
2644 ovs-appctl -t ovs-ofctl exit
2646 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2647 send: OFPT_BUNDLE_CONTROL (OF1.4):
2648 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2649 OFPT_BUNDLE_CONTROL (OF1.4):
2650 bundle_id=0x1 type=OPEN_REPLY flags=0
2651 OFPT_BARRIER_REPLY (OF1.4):
2652 send: OFPT_BUNDLE_CONTROL (OF1.4):
2653 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2654 OFPT_BUNDLE_CONTROL (OF1.4):
2655 bundle_id=0x1 type=CLOSE_REPLY flags=0
2656 OFPT_BARRIER_REPLY (OF1.4):
2657 send: OFPT_BUNDLE_CONTROL (OF1.4):
2658 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2659 OFPT_ERROR (OF1.4): OFPBFC_BUNDLE_CLOSED
2660 OFPT_BUNDLE_CONTROL (OF1.4):
2661 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2662 OFPT_BARRIER_REPLY (OF1.4):
2668 AT_SETUP([ofproto - bundle close, different flags (OpenFlow 1.4)])
2669 AT_KEYWORDS([monitor])
2672 # Start a monitor, use the required protocol version
2673 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2674 AT_CAPTURE_FILE([monitor.log])
2676 # Open, Close, Close
2677 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2678 ovs-appctl -t ovs-ofctl ofctl/barrier
2679 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 02"
2680 ovs-appctl -t ovs-ofctl ofctl/barrier
2681 ovs-appctl -t ovs-ofctl exit
2683 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2684 send: OFPT_BUNDLE_CONTROL (OF1.4):
2685 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2686 OFPT_BUNDLE_CONTROL (OF1.4):
2687 bundle_id=0x1 type=OPEN_REPLY flags=0
2688 OFPT_BARRIER_REPLY (OF1.4):
2689 send: OFPT_BUNDLE_CONTROL (OF1.4):
2690 bundle_id=0x1 type=CLOSE_REQUEST flags=ordered
2691 OFPT_ERROR (OF1.4): OFPBFC_BAD_FLAGS
2692 OFPT_BUNDLE_CONTROL (OF1.4):
2693 bundle_id=0x1 type=CLOSE_REQUEST flags=ordered
2694 OFPT_BARRIER_REPLY (OF1.4):
2700 AT_SETUP([ofproto - bundle commit without open (OpenFlow 1.4)])
2701 AT_KEYWORDS([monitor])
2704 # Start a monitor, use the required protocol version
2705 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2706 AT_CAPTURE_FILE([monitor.log])
2708 # Open, Close, Close
2709 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 04 00 01"
2710 ovs-appctl -t ovs-ofctl ofctl/barrier
2711 ovs-appctl -t ovs-ofctl exit
2713 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2714 send: OFPT_BUNDLE_CONTROL (OF1.4):
2715 bundle_id=0x1 type=COMMIT_REQUEST flags=atomic
2716 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2717 OFPT_BUNDLE_CONTROL (OF1.4):
2718 bundle_id=0x1 type=COMMIT_REQUEST flags=atomic
2719 OFPT_BARRIER_REPLY (OF1.4):
2725 AT_SETUP([ofproto - bundle commit, different flags (OpenFlow 1.4)])
2726 AT_KEYWORDS([monitor])
2729 # Start a monitor, use the required protocol version
2730 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2731 AT_CAPTURE_FILE([monitor.log])
2733 # Open, Close, Close
2734 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2735 ovs-appctl -t ovs-ofctl ofctl/barrier
2736 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 04 00 02"
2737 ovs-appctl -t ovs-ofctl ofctl/barrier
2738 ovs-appctl -t ovs-ofctl exit
2740 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2741 send: OFPT_BUNDLE_CONTROL (OF1.4):
2742 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2743 OFPT_BUNDLE_CONTROL (OF1.4):
2744 bundle_id=0x1 type=OPEN_REPLY flags=0
2745 OFPT_BARRIER_REPLY (OF1.4):
2746 send: OFPT_BUNDLE_CONTROL (OF1.4):
2747 bundle_id=0x1 type=COMMIT_REQUEST flags=ordered
2748 OFPT_ERROR (OF1.4): OFPBFC_BAD_FLAGS
2749 OFPT_BUNDLE_CONTROL (OF1.4):
2750 bundle_id=0x1 type=COMMIT_REQUEST flags=ordered
2751 OFPT_BARRIER_REPLY (OF1.4):
2757 AT_SETUP([ofproto - bundle discard without open (OpenFlow 1.4)])
2758 AT_KEYWORDS([monitor])
2761 # Start a monitor, use the required protocol version
2762 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2763 AT_CAPTURE_FILE([monitor.log])
2765 # Open, Close, Close
2766 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 06 00 01"
2767 ovs-appctl -t ovs-ofctl ofctl/barrier
2768 ovs-appctl -t ovs-ofctl exit
2770 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2771 send: OFPT_BUNDLE_CONTROL (OF1.4):
2772 bundle_id=0x1 type=DISCARD_REQUEST flags=atomic
2773 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2774 OFPT_BUNDLE_CONTROL (OF1.4):
2775 bundle_id=0x1 type=DISCARD_REQUEST flags=atomic
2776 OFPT_BARRIER_REPLY (OF1.4):