3 AT_SETUP([ofproto - echo request])
5 AT_CHECK([ovs-ofctl -vwarn probe br0])
9 AT_SETUP([ofproto - handling messages with bad version])
12 # Start a monitor running OpenFlow 1.0, then send the switch an OF1.1 features
14 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
15 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
16 AT_CAPTURE_FILE([monitor.log])
17 ovs-appctl -t ovs-ofctl ofctl/send 0205000801234567
18 ovs-appctl -t ovs-ofctl ofctl/barrier
19 ovs-appctl -t ovs-ofctl exit
21 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//
22 /ECHO/d' monitor.log], [0], [dnl
23 send: OFPT_FEATURES_REQUEST (OF1.1):
24 OFPT_ERROR (OF1.1): OFPBRC_BAD_VERSION
25 OFPT_FEATURES_REQUEST (OF1.1):
29 OVS_VSWITCHD_STOP(["/received OpenFlow version 0x02 != expected 01/d"])
32 AT_SETUP([ofproto - feature request, config request])
34 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
35 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
36 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
37 n_tables:254, n_buffers:256
38 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
39 actions: OUTPUT SET_VLAN_VID SET_VLAN_PCP STRIP_VLAN SET_DL_SRC SET_DL_DST SET_NW_SRC SET_NW_DST SET_NW_TOS SET_TP_SRC SET_TP_DST ENQUEUE
40 LOCAL(br0): addr:aa:55:aa:55:00:00
43 speed: 0 Mbps now, 0 Mbps max
44 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
49 AT_SETUP([ofproto - set OpenFlow port number])
51 [add-port br0 p1 -- set Interface p1 type=dummy --\
52 add-port br0 p2 -- set Interface p2 type=dummy ofport_request=99])
53 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
55 s/ (xid=0x[0-9a-fA-F]*)//
56 s/00:0.$/00:0x/' < stdout]],
58 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
59 n_tables:254, n_buffers:256
60 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
61 actions: OUTPUT SET_VLAN_VID SET_VLAN_PCP STRIP_VLAN SET_DL_SRC SET_DL_DST SET_NW_SRC SET_NW_DST SET_NW_TOS SET_TP_SRC SET_TP_DST ENQUEUE
62 1(p1): addr:aa:55:aa:55:00:0x
65 speed: 0 Mbps now, 0 Mbps max
66 99(p2): addr:aa:55:aa:55:00:0x
69 speed: 0 Mbps now, 0 Mbps max
70 LOCAL(br0): addr:aa:55:aa:55:00:0x
73 speed: 0 Mbps now, 0 Mbps max
74 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
80 dnl This is really bare-bones.
81 dnl It at least checks request and reply serialization and deserialization.
82 AT_SETUP([ofproto - port stats - (OpenFlow 1.0)])
84 AT_CHECK([ovs-ofctl -vwarn dump-ports br0], [0], [stdout])
85 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
86 OFPST_PORT reply: 1 ports
87 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
88 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
93 AT_SETUP([ofproto - port stats - (OpenFlow 1.2)])
95 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-ports br0], [0], [stdout])
96 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
97 OFPST_PORT reply (OF1.2): 1 ports
98 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
99 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
104 AT_SETUP([ofproto - port stats - (OpenFlow 1.4)])
106 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn dump-ports br0], [0], [stdout])
107 AT_CHECK([STRIP_XIDS stdout | sed 's/duration=[[0-9.]]*s/duration=?s/'],
109 OFPST_PORT reply (OF1.4): 1 ports
110 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
111 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
117 dnl This is really bare-bones.
118 dnl It at least checks request and reply serialization and deserialization.
119 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.0)])
121 AT_CHECK([ovs-ofctl -vwarn dump-ports-desc br0], [0], [stdout])
122 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
123 OFPST_PORT_DESC reply:
124 LOCAL(br0): addr:aa:55:aa:55:00:00
127 speed: 0 Mbps now, 0 Mbps max
132 dnl This is really bare-bones.
133 dnl It at least checks request and reply serialization and deserialization.
134 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.2)])
136 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-ports-desc br0], [0], [stdout])
137 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
138 OFPST_PORT_DESC reply (OF1.2):
139 LOCAL(br0): addr:aa:55:aa:55:00:00
142 speed: 0 Mbps now, 0 Mbps max
147 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.5)])
149 ADD_OF_PORTS([br0], 1, 2, 3)
150 AT_CHECK([ovs-ofctl -F OXM-OpenFlow15 -O OpenFlow15 -vwarn dump-ports-desc br0], [0], [stdout])
151 AT_CHECK([STRIP_XIDS stdout | sed 's/00:0./00:0x/'], [0], [dnl
152 OFPST_PORT_DESC reply (OF1.5):
153 1(p1): addr:aa:55:aa:55:00:0x
156 speed: 0 Mbps now, 0 Mbps max
157 2(p2): addr:aa:55:aa:55:00:0x
160 speed: 0 Mbps now, 0 Mbps max
161 3(p3): addr:aa:55:aa:55:00:0x
164 speed: 0 Mbps now, 0 Mbps max
165 LOCAL(br0): addr:aa:55:aa:55:00:0x
168 speed: 0 Mbps now, 0 Mbps max
170 AT_CHECK([ovs-ofctl -F OXM-OpenFlow15 -O OpenFlow15 -vwarn dump-ports-desc br0 2], [0], [stdout])
171 AT_CHECK([STRIP_XIDS stdout | sed 's/00:0./00:0x/'], [0], [dnl
172 OFPST_PORT_DESC reply (OF1.5):
173 2(p2): addr:aa:55:aa:55:00:0x
176 speed: 0 Mbps now, 0 Mbps max
181 dnl This is really bare-bones.
182 dnl It at least checks request and reply serialization and deserialization.
183 AT_SETUP([ofproto - queue stats - (OpenFlow 1.0)])
185 AT_CHECK([ovs-ofctl -vwarn queue-stats br0], [0], [stdout])
186 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
187 OFPST_QUEUE reply: 0 queues
189 AT_CHECK([ovs-ofctl -vwarn queue-stats br0 ANY 5], [0],
190 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_QUEUE
191 OFPST_QUEUE request (xid=0x2):port=ANY queue=5
193 AT_CHECK([ovs-ofctl -vwarn queue-stats br0 10], [0],
194 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_PORT
195 OFPST_QUEUE request (xid=0x2):port=10 queue=ALL
200 AT_SETUP([ofproto - queue stats - (OpenFlow 1.2)])
202 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0], [0], [stdout])
203 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
204 OFPST_QUEUE reply (OF1.2): 0 queues
206 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0 ALL 5], [0],
207 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_QUEUE
208 OFPST_QUEUE request (OF1.2) (xid=0x2):port=ANY queue=5
210 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0 10], [0],
211 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_PORT
212 OFPST_QUEUE request (OF1.2) (xid=0x2):port=10 queue=ALL
217 AT_SETUP([ofproto - queue stats - (OpenFlow 1.4)])
219 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn queue-stats br0], [0], [stdout])
220 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
221 OFPST_QUEUE reply (OF1.4): 0 queues
223 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn queue-stats br0 ALL 5], [0],
224 [OFPT_ERROR (OF1.4) (xid=0x2): OFPQOFC_BAD_QUEUE
225 OFPST_QUEUE request (OF1.4) (xid=0x2):port=ANY queue=5
227 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn queue-stats br0 10], [0],
228 [OFPT_ERROR (OF1.4) (xid=0x2): OFPQOFC_BAD_PORT
229 OFPST_QUEUE request (OF1.4) (xid=0x2):port=10 queue=ALL
234 dnl This is really bare-bones.
235 dnl It at least checks request and reply serialization and deserialization.
236 AT_SETUP([ofproto - queue configuration - (OpenFlow 1.0)])
238 ADD_OF_PORTS([br0], [1], [2])
239 AT_CHECK([ovs-ofctl queue-get-config br0 1], [0], [stdout])
240 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
241 OFPT_QUEUE_GET_CONFIG_REPLY: port=1
243 AT_CHECK([ovs-ofctl queue-get-config br0 10], [0],
244 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_PORT
245 OFPT_QUEUE_GET_CONFIG_REQUEST (xid=0x2): port=10
250 AT_SETUP([ofproto - queue configuration - (OpenFlow 1.2)])
252 ADD_OF_PORTS([br0], [1], [2])
253 AT_CHECK([ovs-ofctl -O OpenFlow12 queue-get-config br0 1], [0], [stdout])
254 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
255 OFPT_QUEUE_GET_CONFIG_REPLY (OF1.2): port=1
257 AT_CHECK([ovs-ofctl -O OpenFlow12 queue-get-config br0 10], [0],
258 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_PORT
259 OFPT_QUEUE_GET_CONFIG_REQUEST (OF1.2) (xid=0x2): port=10
264 dnl This is really bare-bones.
265 dnl It at least checks request and reply serialization and deserialization.
266 AT_SETUP([ofproto - del group])
268 AT_DATA([groups.txt], [dnl
269 group_id=1234,type=all,bucket=output:10
270 group_id=1235,type=all,bucket=output:10
272 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
273 AT_CHECK([ovs-ofctl -F OXM-OpenFlow15 -O OpenFlow15 -vwarn dump-groups br0 1234], [0], [stdout])
274 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
275 OFPST_GROUP_DESC reply (OF1.5):
276 group_id=1234,type=all,bucket=actions=output:10
278 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
279 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
280 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
281 OFPST_GROUP_DESC reply (OF1.1):
282 group_id=1235,type=all,bucket=actions=output:10
284 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
285 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
286 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
287 OFPST_GROUP_DESC reply (OF1.1):
288 group_id=1235,type=all,bucket=actions=output:10
290 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0], [0])
291 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
292 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
293 OFPST_GROUP_DESC reply (OF1.1):
298 dnl This is really bare-bones.
299 dnl It at least checks request and reply serialization and deserialization.
300 AT_SETUP([ofproto - del group deletes flows])
302 AT_DATA([groups.txt], [dnl
303 group_id=1234,type=all,bucket=output:10
304 group_id=1235,type=all,bucket=output:10
306 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
307 AT_DATA([flows.txt], [dnl
308 tcp actions=group:1234
309 udp actions=group:1235
311 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flows br0 flows.txt])
312 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
314 tcp actions=group:1234
315 udp actions=group:1235
316 OFPST_FLOW reply (OF1.1):
318 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
319 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
321 udp actions=group:1235
322 OFPST_FLOW reply (OF1.1):
324 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
325 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
327 udp actions=group:1235
328 OFPST_FLOW reply (OF1.1):
330 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0])
331 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
333 OFPST_FLOW reply (OF1.1):
338 dnl This is really bare-bones.
339 dnl It at least checks request and reply serialization and deserialization.
340 AT_SETUP([ofproto - flow mod checks group availability])
342 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10])
343 AT_DATA([flows.txt], [dnl
344 tcp actions=group:1234
345 udp actions=group:1235
347 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1234'])
348 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1235'], [1], [], [stderr])
350 # The output should look like this:
352 # 00000000 02 0e 00 98 00 00 00 02-00 00 00 00 00 00 00 00 |................|
353 # 00000010 00 00 00 00 00 00 00 00-ff 00 00 00 00 00 80 00 |................|
354 # 00000020 ff ff ff ff ff ff ff ff-ff ff ff ff 00 00 00 00 |................|
355 # 00000030 00 00 00 58 00 00 00 00-00 00 03 d7 00 00 00 00 |...X............|
357 # This 'sed' command captures the error message but drops details.
358 AT_CHECK([sed '/truncated/d
359 /^000000.0/d' stderr | STRIP_XIDS], [0],
360 [OFPT_ERROR (OF1.1): OFPBAC_BAD_OUT_GROUP
361 OFPT_FLOW_MOD (OF1.1):
366 dnl This is really bare-bones.
367 dnl It at least checks request and reply serialization and deserialization.
368 AT_SETUP([ofproto - group description])
370 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10], [0], [stdout])
371 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
372 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
373 OFPST_GROUP_DESC reply (OF1.1):
374 group_id=1234,type=all,bucket=actions=output:10
379 dnl This is really bare-bones.
380 dnl It at least checks request and reply serialization and deserialization.
381 AT_SETUP([ofproto - group description])
383 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10])
384 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
385 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
386 OFPST_GROUP_DESC reply (OF1.1):
387 group_id=1234,type=all,bucket=actions=output:10
392 dnl This is really bare-bones.
393 dnl It at least checks request and reply serialization and deserialization.
394 AT_SETUP([ofproto - group features])
396 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-group-features br0], [0], [stdout])
397 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
398 OFPST_GROUP_FEATURES reply (OF1.2):
406 dnl This is really bare-bones.
407 dnl It at least checks request and reply serialization and deserialization.
408 AT_SETUP([ofproto - group stats])
410 AT_DATA([groups.txt], [dnl
411 group_id=1234,type=all,bucket=output:10
412 group_id=1235,type=all,bucket=output:10
414 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
415 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1234'])
416 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-group-stats br0 group_id=1234], [0], [stdout])
417 AT_CHECK([STRIP_XIDS stdout | sort], [0], [dnl
418 group_id=1234,ref_count=1,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
419 OFPST_GROUP reply (OF1.1):
421 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-group-stats br0], [0], [stdout])
422 AT_CHECK([STRIP_XIDS stdout | sort], [0], [dnl
423 group_id=1234,ref_count=1,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
424 group_id=1235,ref_count=0,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
425 OFPST_GROUP reply (OF1.1):
430 AT_SETUP([ofproto - mod-port (OpenFlow 1.0)])
432 for command_config_state in \
434 'noflood NO_FLOOD 0' \
435 'down PORT_DOWN,NO_FLOOD LINK_DOWN' \
436 'flood PORT_DOWN LINK_DOWN' \
437 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
438 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
439 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
440 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
441 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
445 set $command_config_state
446 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
447 AT_CHECK([ovs-ofctl -vwarn mod-port br0 br0 $command])
448 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
449 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
450 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
451 n_tables:254, n_buffers:256
452 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
453 actions: OUTPUT SET_VLAN_VID SET_VLAN_PCP STRIP_VLAN SET_DL_SRC SET_DL_DST SET_NW_SRC SET_NW_DST SET_NW_TOS SET_TP_SRC SET_TP_DST ENQUEUE
454 LOCAL(br0): addr:aa:55:aa:55:00:00
457 speed: 0 Mbps now, 0 Mbps max
458 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
464 AT_SETUP([ofproto - mod-port (OpenFlow 1.2)])
466 for command_config_state in \
468 'down PORT_DOWN LINK_DOWN' \
469 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
470 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
471 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
472 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
473 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
477 set $command_config_state
478 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
479 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn mod-port br0 br0 $command])
480 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn show br0], [0], [stdout])
481 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
482 OFPT_FEATURES_REPLY (OF1.2): dpid:fedcba9876543210
483 n_tables:254, n_buffers:256
484 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS
485 LOCAL(br0): addr:aa:55:aa:55:00:00
488 speed: 0 Mbps now, 0 Mbps max
489 OFPT_GET_CONFIG_REPLY (OF1.2): frags=normal miss_send_len=0
495 AT_SETUP([ofproto - mod-port (OpenFlow 1.4)])
497 for command_config_state in \
499 'down PORT_DOWN LINK_DOWN' \
500 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
501 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
502 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
503 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
504 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
508 set $command_config_state
509 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
510 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn mod-port br0 br0 $command])
511 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn show br0], [0], [stdout])
512 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
513 OFPT_FEATURES_REPLY (OF1.4): dpid:fedcba9876543210
514 n_tables:254, n_buffers:256
515 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS
516 OFPST_PORT_DESC reply (OF1.4):
517 LOCAL(br0): addr:aa:55:aa:55:00:00
520 speed: 0 Mbps now, 0 Mbps max
521 OFPT_GET_CONFIG_REPLY (OF1.4): frags=normal miss_send_len=0
527 AT_SETUP([ofproto - basic flow_mod commands (NXM)])
529 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
531 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl add-flows br0 -])
532 AT_CHECK([ovs-ofctl add-flow br0 in_port=1,actions=2])
533 AT_CHECK([ovs-ofctl -F nxm add-flow br0 table=1,in_port=4,actions=3])
534 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
535 in_port=1 actions=output:2
536 in_port=2 actions=output:1
537 table=1, in_port=4 actions=output:3
540 AT_CHECK([ovs-ofctl dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
541 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=2
543 AT_CHECK([ovs-ofctl del-flows br0])
544 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
549 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.0)])
551 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply:
553 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -F openflow10 add-flows br0 -])
554 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 in_port=1,actions=2])
555 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 table=1,in_port=4,actions=3])
556 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
557 in_port=1 actions=output:2
558 in_port=2 actions=output:1
559 table=1, in_port=4 actions=output:3
562 AT_CHECK([ovs-ofctl -F openflow10 dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
563 OFPST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=2
565 AT_CHECK([ovs-ofctl -F openflow10 del-flows br0])
566 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply:
571 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.1)])
573 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.1):
575 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -O OpenFlow11 add-flows br0 -])
576 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 in_port=1,actions=2])
577 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 table=1,in_port=4,actions=3])
578 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
579 in_port=1 actions=output:2
580 in_port=2 actions=output:1
581 table=1, in_port=4 actions=output:3
582 OFPST_FLOW reply (OF1.1):
584 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
585 OFPST_AGGREGATE reply (OF1.1): packet_count=0 byte_count=0 flow_count=2
587 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0])
588 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.1):
589 table=1, in_port=4 actions=output:3
594 AT_SETUP([ofproto - flow_mod negative test (OpenFlow 1.1)])
596 [set bridge br0 protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13])
597 AT_CHECK([ovs-ofctl add-flow -O OpenFlow11 br0 table=1,action=goto_table:2])
599 # The error message here actually comes from ovs-ofctl, not from ovs-vswitchd,
600 # but at least it's the same code in ofpacts_check() that issues the error.
601 AT_CHECK([ovs-ofctl add-flow -O OpenFlow11 br0 table=1,action=goto_table:1],
603 [ovs-ofctl: actions are invalid with specified match (OFPBRC_BAD_TABLE_ID)
608 AT_SETUP([ofproto - set-field flow_mod commands (NXM)])
610 AT_CHECK([ovs-ofctl add-flow br0 ipv6,table=1,in_port=3,actions=drop])
611 AT_CHECK([ovs-ofctl add-flow br0 ipv6,table=1,in_port=3,actions=set_field:fe80:0123:4567:890a:a6ba:dbff:fefe:59fa-\>ipv6_src])
612 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
613 table=1, ipv6,in_port=3 actions=load:0xa6badbfffefe59fa->NXM_NX_IPV6_SRC[[0..63]],load:0xfe8001234567890a->NXM_NX_IPV6_SRC[[64..127]]
619 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.2)])
621 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.2):
623 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -O OpenFlow12 add-flows br0 -])
624 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=1,actions=2])
625 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 table=1,in_port=4,actions=3])
626 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
627 in_port=1 actions=output:2
628 in_port=2 actions=output:1
629 table=1, in_port=4 actions=output:3
630 OFPST_FLOW reply (OF1.2):
632 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0])
633 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.2):
638 AT_SETUP([ofproto - dump flows with cookie])
640 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
641 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
642 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
643 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
644 cookie=0x1, in_port=1 actions=output:1
645 cookie=0x2, in_port=2 actions=output:1
646 cookie=0x3, in_port=3 actions=output:1
649 AT_CHECK([ovs-ofctl dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
650 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=3
652 AT_CHECK([ovs-ofctl dump-flows br0 cookie=0x3/-1 | ofctl_strip | sort], [0], [dnl
653 cookie=0x3, in_port=3 actions=output:1
656 AT_CHECK([ovs-ofctl dump-aggregate br0 cookie=0x3/-1 | STRIP_XIDS], [0], [dnl
657 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=1
662 AT_SETUP([ofproto - mod flow with cookie change (OpenFlow 1.0)])
664 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 cookie=0x1,in_port=1,actions=1])
665 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
666 cookie=0x1, in_port=1 actions=output:1
670 AT_CHECK([ovs-ofctl -F openflow10 mod-flows br0 cookie=0x2,in_port=1,actions=1])
671 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
672 cookie=0x2, in_port=1 actions=output:1
678 AT_SETUP([ofproto - mod flow with cookie change (NXM)])
680 AT_CHECK([ovs-ofctl -F nxm add-flow br0 cookie=0x1,in_port=1,actions=1])
681 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
682 cookie=0x1, in_port=1 actions=output:1
686 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=0x2,in_port=1,actions=1])
687 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
688 cookie=0x2, in_port=1 actions=output:1
694 AT_SETUP([ofproto - no mod flow with cookie change (OpenFlow 1.1)])
696 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
697 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
698 cookie=0x1, in_port=1 actions=output:1
699 OFPST_FLOW reply (OF1.1):
701 AT_CHECK([ovs-ofctl -O OpenFlow11 mod-flows br0 cookie=0x2,in_port=1,actions=1])
702 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
703 cookie=0x1, in_port=1 actions=output:1
704 OFPST_FLOW reply (OF1.1):
709 dnl The OpenFlow 1.2 spec states that the cookie may not be modified
710 AT_SETUP([ofproto - no mod flow with cookie change (OpenFlow 1.2)])
712 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
713 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
714 cookie=0x1, in_port=1 actions=output:1
715 OFPST_FLOW reply (OF1.2):
718 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 cookie=0x2,in_port=1,actions=1])
719 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
720 cookie=0x1, in_port=1 actions=output:1
721 OFPST_FLOW reply (OF1.2):
726 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.0)])
728 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
729 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=2,actions=1])
730 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=3,actions=1])
731 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
732 cookie=0x1, in_port=1 actions=output:1
733 cookie=0x1, in_port=2 actions=output:1
734 cookie=0x2, in_port=3 actions=output:1
738 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=0x1/0xff,actions=4])
739 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
740 cookie=0x1, in_port=1 actions=output:4
741 cookie=0x1, in_port=2 actions=output:4
742 cookie=0x2, in_port=3 actions=output:1
748 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.1)])
750 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
751 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=2,actions=1])
752 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=3,actions=1])
753 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
754 cookie=0x1, in_port=1 actions=output:1
755 cookie=0x1, in_port=2 actions=output:1
756 cookie=0x2, in_port=3 actions=output:1
757 OFPST_FLOW reply (OF1.1):
760 AT_CHECK([ovs-ofctl -O OpenFlow11 mod-flows br0 cookie=0x1/0xff,actions=4])
761 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
762 cookie=0x1, in_port=1 actions=output:4
763 cookie=0x1, in_port=2 actions=output:4
764 cookie=0x2, in_port=3 actions=output:1
765 OFPST_FLOW reply (OF1.1):
770 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.2)])
772 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
773 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=2,actions=1])
774 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=3,actions=1])
775 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
776 cookie=0x1, in_port=1 actions=output:1
777 cookie=0x1, in_port=2 actions=output:1
778 cookie=0x2, in_port=3 actions=output:1
779 OFPST_FLOW reply (OF1.2):
782 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 cookie=0x1/0xff,actions=4])
783 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
784 cookie=0x1, in_port=1 actions=output:4
785 cookie=0x1, in_port=2 actions=output:4
786 cookie=0x2, in_port=3 actions=output:1
787 OFPST_FLOW reply (OF1.2):
792 dnl The OpenFlow 1.2 spec states that the cookie may not be modified
793 AT_SETUP([ofproto - mod flows based on cookie mask with cookie change])
795 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
796 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=2,actions=1])
797 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=3,actions=1])
798 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
799 cookie=0x1, in_port=1 actions=output:1
800 cookie=0x1, in_port=2 actions=output:1
801 cookie=0x2, in_port=3 actions=output:1
805 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=1/-1,cookie=4,actions=4])
806 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
807 cookie=0x2, in_port=3 actions=output:1
808 cookie=0x4, in_port=1 actions=output:4
809 cookie=0x4, in_port=2 actions=output:4
815 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - NXM])
817 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 in_port=1,actions=1])
818 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
819 in_port=1 actions=output:1
825 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - OF1.1])
827 AT_CHECK([ovs-ofctl -O openflow11 mod-flows br0 in_port=1,actions=1])
828 AT_CHECK([ovs-ofctl -O openflow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
829 in_port=1 actions=output:1
830 OFPST_FLOW reply (OF1.1):
835 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - OF1.2])
837 AT_CHECK([ovs-ofctl -O openflow12 mod-flows br0 in_port=1,actions=1])
838 AT_CHECK([ovs-ofctl -O openflow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
839 OFPST_FLOW reply (OF1.2):
844 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - NXM])
846 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=1/1,in_port=1,actions=1])
847 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
853 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - OF1.1])
855 AT_CHECK([ovs-ofctl -O openflow11 mod-flows br0 cookie=1/1,in_port=1,actions=1])
856 AT_CHECK([ovs-ofctl -O openflow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
857 OFPST_FLOW reply (OF1.1):
862 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - OF1.2])
864 AT_CHECK([ovs-ofctl -O openflow12 mod-flows br0 cookie=1/1,in_port=1,actions=1])
865 AT_CHECK([ovs-ofctl -O openflow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
866 OFPST_FLOW reply (OF1.2):
871 AT_SETUP([ofproto - del flows with cookies])
873 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
874 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
875 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
876 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
877 cookie=0x1, in_port=1 actions=output:1
878 cookie=0x2, in_port=2 actions=output:1
879 cookie=0x3, in_port=3 actions=output:1
883 AT_CHECK([ovs-ofctl del-flows br0])
884 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
890 AT_SETUP([ofproto - del flows based on cookie])
892 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
893 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
894 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
895 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
896 cookie=0x1, in_port=1 actions=output:1
897 cookie=0x2, in_port=2 actions=output:1
898 cookie=0x3, in_port=3 actions=output:1
902 AT_CHECK([ovs-ofctl del-flows br0 cookie=0x3/-1])
903 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
904 cookie=0x1, in_port=1 actions=output:1
905 cookie=0x2, in_port=2 actions=output:1
911 AT_SETUP([ofproto - del flows based on cookie mask])
913 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
914 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
915 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
916 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
917 cookie=0x1, in_port=1 actions=output:1
918 cookie=0x2, in_port=2 actions=output:1
919 cookie=0x3, in_port=3 actions=output:1
922 AT_CHECK([ovs-ofctl del-flows br0 cookie=0x3/0x1])
923 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
924 cookie=0x2, in_port=2 actions=output:1
930 AT_SETUP([ofproto - del flows based on table id (NXM)])
932 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
933 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
934 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
935 cookie=0x1, in_port=1 actions=output:1
936 cookie=0x2, table=1, in_port=2 actions=output:1
939 AT_CHECK([ovs-ofctl del-flows br0 table=0])
940 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
941 cookie=0x2, table=1, in_port=2 actions=output:1
944 AT_CHECK([ovs-ofctl del-flows br0 table=1])
945 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
948 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
949 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
950 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
951 cookie=0x1, in_port=1 actions=output:1
952 cookie=0x2, table=1, in_port=2 actions=output:1
955 AT_CHECK([ovs-ofctl del-flows br0])
956 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
962 AT_SETUP([ofproto - del flows based on table id (OpenFlow 1.1)])
964 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
965 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
966 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
967 cookie=0x1, in_port=1 actions=output:1
968 cookie=0x2, table=1, in_port=2 actions=output:1
969 OFPST_FLOW reply (OF1.1):
971 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0 table=0])
972 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
973 cookie=0x2, table=1, in_port=2 actions=output:1
974 OFPST_FLOW reply (OF1.1):
976 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0 table=1])
977 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
978 OFPST_FLOW reply (OF1.1):
980 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
981 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
982 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
983 cookie=0x1, in_port=1 actions=output:1
984 cookie=0x2, table=1, in_port=2 actions=output:1
985 OFPST_FLOW reply (OF1.1):
987 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0])
988 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [dnl
989 OFPST_FLOW reply (OF1.1):
990 cookie=0x2, table=1, in_port=2 actions=output:1
995 AT_SETUP([ofproto - del flows based on table id (OpenFlow 1.2)])
997 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
998 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
999 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1000 cookie=0x1, in_port=1 actions=output:1
1001 cookie=0x2, table=1, in_port=2 actions=output:1
1002 OFPST_FLOW reply (OF1.2):
1004 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0 table=0])
1005 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1006 cookie=0x2, table=1, in_port=2 actions=output:1
1007 OFPST_FLOW reply (OF1.2):
1009 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0 table=1])
1010 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1011 OFPST_FLOW reply (OF1.2):
1013 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
1014 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
1015 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1016 cookie=0x1, in_port=1 actions=output:1
1017 cookie=0x2, table=1, in_port=2 actions=output:1
1018 OFPST_FLOW reply (OF1.2):
1020 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0])
1021 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1022 OFPST_FLOW reply (OF1.2):
1027 AT_SETUP([ofproto - flow table configuration (OpenFlow 1.0)])
1029 # Check the default configuration.
1030 (echo "OFPST_TABLE reply (xid=0x2): 254 tables
1031 0: classifier: wild=0x3fffff, max=1000000, active=0
1032 lookup=0, matched=0"
1034 while test $x -lt 254; do
1035 printf " %d: %-8s: wild=0x3fffff, max=1000000, active=0
1040 AT_CHECK([ovs-ofctl dump-tables br0], [0], [expout])
1041 # Change the configuration.
1044 -- --id=@t0 create Flow_Table name=main \
1045 -- --id=@t1 create Flow_Table flow-limit=1024 \
1046 -- set bridge br0 'flow_tables={1=@t1,0=@t0}' \
1047 | ${PERL} $srcdir/uuidfilt.pl],
1051 # Check that the configuration was updated.
1052 mv expout orig-expout
1053 (echo "OFPST_TABLE reply (xid=0x2): 254 tables
1054 0: main : wild=0x3fffff, max=1000000, active=0
1056 1: table1 : wild=0x3fffff, max= 1024, active=0
1057 lookup=0, matched=0"
1058 tail -n +6 orig-expout) > expout
1059 AT_CHECK([ovs-ofctl dump-tables br0], [0], [expout])
1063 AT_SETUP([ofproto - flow table configuration (OpenFlow 1.2)])
1065 # Check the default configuration.
1066 (mid="wild=0xfffffffff, max=1000000,"
1069 match=0xfffffffff, instructions=0x00000007, config=0x00000003
1070 write_actions=0x00000000, apply_actions=0x00000000
1071 write_setfields=0x0000000fffffffff
1072 apply_setfields=0x0000000fffffffff
1073 metadata_match=0xffffffffffffffff
1074 metadata_write=0xffffffffffffffff"
1075 echo "OFPST_TABLE reply (OF1.2) (xid=0x2): 254 tables
1076 0: classifier: $mid active=0$tail"
1078 while test $x -lt 254; do
1079 printf " %d: %-8s: $mid active=0$tail
1083 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-tables br0], [0], [expout])
1084 # Change the configuration.
1087 -- --id=@t0 create Flow_Table name=main \
1088 -- --id=@t1 create Flow_Table flow-limit=1024 \
1089 -- set bridge br0 'flow_tables={1=@t1,0=@t0}' \
1090 | ${PERL} $srcdir/uuidfilt.pl],
1094 # Check that the configuration was updated.
1095 mv expout orig-expout
1096 (echo "OFPST_TABLE reply (OF1.2) (xid=0x2): 254 tables
1097 0: main : wild=0xfffffffff, max=1000000, active=0"
1098 tail -n +3 orig-expout | head -7
1099 echo " 1: table1 : wild=0xfffffffff, max= 1024, active=0"
1100 tail -n +11 orig-expout) > expout
1101 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-tables br0], [0], [expout])
1105 AT_SETUP([ofproto - hard limits on flow table size (OpenFlow 1.0)])
1107 # Configure a maximum of 4 flows.
1110 -- --id=@t0 create Flow_Table flow-limit=4 \
1111 -- set bridge br0 flow_tables:0=@t0 \
1112 | ${PERL} $srcdir/uuidfilt.pl],
1116 for in_port in 1 2 3 4; do
1117 ovs-ofctl add-flow br0 in_port=$in_port,actions=drop
1119 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1120 in_port=1 actions=drop
1121 in_port=2 actions=drop
1122 in_port=3 actions=drop
1123 in_port=4 actions=drop
1126 # Adding another flow will be refused.
1127 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop], [1], [], [stderr])
1128 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1129 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1131 # Also a mod-flow that would add a flow will be refused.
1132 AT_CHECK([ovs-ofctl mod-flows br0 in_port=5,actions=drop], [1], [], [stderr])
1133 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1134 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1136 # Replacing or modifying an existing flow is allowed.
1137 AT_CHECK([ovs-ofctl add-flow br0 in_port=4,actions=normal])
1138 AT_CHECK([ovs-ofctl mod-flows br0 in_port=3,actions=output:1])
1139 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1140 in_port=1 actions=drop
1141 in_port=2 actions=drop
1142 in_port=3 actions=output:1
1143 in_port=4 actions=NORMAL
1149 AT_SETUP([ofproto - hard limits on flow table size (OpenFlow 1.2)])
1151 # Configure a maximum of 4 flows.
1154 -- --id=@t0 create Flow_Table flow-limit=4 \
1155 -- set bridge br0 flow_tables:0=@t0 \
1156 | ${PERL} $srcdir/uuidfilt.pl],
1160 for in_port in 1 2 3 4; do
1161 ovs-ofctl -O OpenFlow12 add-flow br0 in_port=$in_port,actions=drop
1163 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1164 in_port=1 actions=drop
1165 in_port=2 actions=drop
1166 in_port=3 actions=drop
1167 in_port=4 actions=drop
1168 OFPST_FLOW reply (OF1.2):
1170 # Adding another flow will be refused.
1171 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=5,actions=drop], [1], [], [stderr])
1172 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1173 [OFPT_ERROR (OF1.2): OFPFMFC_TABLE_FULL
1175 # Replacing or modifying an existing flow is allowed.
1176 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=4,actions=normal])
1177 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=3,actions=output:1])
1178 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1179 in_port=1 actions=drop
1180 in_port=2 actions=drop
1181 in_port=3 actions=output:1
1182 in_port=4 actions=NORMAL
1183 OFPST_FLOW reply (OF1.2):
1188 AT_SETUP([ofproto - eviction upon table overflow (OpenFlow 1.0)])
1190 # Configure a maximum of 4 flows.
1193 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1194 -- set bridge br0 flow_tables:0=@t0 \
1195 | ${PERL} $srcdir/uuidfilt.pl],
1199 for in_port in 4 3 2 1; do
1200 ovs-ofctl add-flow br0 idle_timeout=${in_port}0,in_port=$in_port,actions=drop
1202 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1203 idle_timeout=10, in_port=1 actions=drop
1204 idle_timeout=20, in_port=2 actions=drop
1205 idle_timeout=30, in_port=3 actions=drop
1206 idle_timeout=40, in_port=4 actions=drop
1209 # Adding another flow will cause the one that expires soonest to be evicted.
1210 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1211 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1212 idle_timeout=20, in_port=2 actions=drop
1213 idle_timeout=30, in_port=3 actions=drop
1214 idle_timeout=40, in_port=4 actions=drop
1215 in_port=5 actions=drop
1218 # A mod-flow that adds a flow also causes eviction, but replacing or
1219 # modifying an existing flow doesn't.
1220 AT_CHECK([ovs-ofctl mod-flows br0 in_port=6,actions=drop])
1221 AT_CHECK([ovs-ofctl add-flow br0 in_port=4,actions=normal])
1222 AT_CHECK([ovs-ofctl mod-flows br0 in_port=3,actions=output:1])
1223 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1224 idle_timeout=30, in_port=3 actions=output:1
1225 in_port=4 actions=NORMAL
1226 in_port=5 actions=drop
1227 in_port=6 actions=drop
1230 # Flows with no timeouts at all cannot be evicted.
1231 AT_CHECK([ovs-ofctl add-flow br0 in_port=7,actions=normal])
1232 AT_CHECK([ovs-ofctl add-flow br0 in_port=8,actions=drop], [1], [], [stderr])
1233 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1234 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1236 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1237 in_port=4 actions=NORMAL
1238 in_port=5 actions=drop
1239 in_port=6 actions=drop
1240 in_port=7 actions=NORMAL
1246 AT_SETUP([ofproto - eviction upon table overflow (OpenFlow 1.2)])
1248 # Configure a maximum of 4 flows.
1251 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1252 -- set bridge br0 flow_tables:0=@t0 \
1253 | ${PERL} $srcdir/uuidfilt.pl],
1257 for in_port in 4 3 2 1; do
1258 ovs-ofctl -O OpenFlow12 add-flow br0 idle_timeout=${in_port}0,in_port=$in_port,actions=drop
1260 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1261 idle_timeout=10, in_port=1 actions=drop
1262 idle_timeout=20, in_port=2 actions=drop
1263 idle_timeout=30, in_port=3 actions=drop
1264 idle_timeout=40, in_port=4 actions=drop
1265 OFPST_FLOW reply (OF1.2):
1267 # Adding another flow will cause the one that expires soonest to be evicted.
1268 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=5,actions=drop])
1269 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1270 idle_timeout=20, in_port=2 actions=drop
1271 idle_timeout=30, in_port=3 actions=drop
1272 idle_timeout=40, in_port=4 actions=drop
1273 in_port=5 actions=drop
1274 OFPST_FLOW reply (OF1.2):
1276 # In Open Flow 1.2 a mod-flow does not ever add a flow and thus
1277 # has no effect on eviction
1278 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=6,actions=drop])
1279 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=4,actions=normal])
1280 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=3,actions=output:1])
1281 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1282 idle_timeout=20, in_port=2 actions=drop
1283 idle_timeout=30, in_port=3 actions=output:1
1284 in_port=4 actions=NORMAL
1285 in_port=5 actions=drop
1286 OFPST_FLOW reply (OF1.2):
1288 # Flows with no timeouts at all cannot be evicted.
1289 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=6,actions=drop])
1290 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=7,actions=normal])
1291 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=8,actions=drop], [1], [], [stderr])
1292 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1293 [OFPT_ERROR (OF1.2): OFPFMFC_TABLE_FULL
1295 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1296 in_port=4 actions=NORMAL
1297 in_port=5 actions=drop
1298 in_port=6 actions=drop
1299 in_port=7 actions=NORMAL
1300 OFPST_FLOW reply (OF1.2):
1305 AT_SETUP([ofproto - eviction upon table overflow, with fairness (OpenFlow 1.0)])
1307 # Configure a maximum of 4 flows.
1310 -- --id=@t0 create Flow_Table name=evict flow-limit=4 \
1311 overflow-policy=evict \
1312 groups='"NXM_OF_IN_PORT[[]]"' \
1313 -- set bridge br0 flow_tables:0=@t0 \
1314 | ${PERL} $srcdir/uuidfilt.pl],
1318 ovs-ofctl add-flows br0 - <<EOF
1319 idle_timeout=10 in_port=2 dl_src=00:44:55:66:77:88 actions=drop
1320 idle_timeout=20 in_port=1 dl_src=00:11:22:33:44:55 actions=drop
1321 idle_timeout=30 in_port=1 dl_src=00:22:33:44:55:66 actions=drop
1322 idle_timeout=40 in_port=1 dl_src=00:33:44:55:66:77 actions=drop
1324 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1325 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1326 idle_timeout=20, in_port=1,dl_src=00:11:22:33:44:55 actions=drop
1327 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1328 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1331 # Adding another flow will cause the one that expires soonest within
1332 # the largest group (those with in_port=1) to be evicted. In this
1333 # case this is not the same as the one that expires soonest overall
1334 # (which is what makes the test interesting):
1335 AT_CHECK([ovs-ofctl add-flow br0 in_port=2,dl_src=00:55:66:77:88:99,actions=drop])
1336 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1337 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1338 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1339 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1340 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1343 # Enlarge the flow limit, change the eviction policy back to strictly
1344 # based on expiration, and and add some flows.
1345 AT_CHECK([ovs-vsctl set Flow_Table evict groups='[[]]' flow-limit=7])
1346 ovs-ofctl add-flows br0 - <<EOF
1347 idle_timeout=50 in_port=2 dl_src=00:66:77:88:99:aa actions=drop
1348 idle_timeout=60 in_port=2 dl_src=00:77:88:99:aa:bb actions=drop
1349 idle_timeout=70 in_port=2 dl_src=00:88:99:aa:bb:cc actions=drop
1351 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1352 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1353 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1354 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1355 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1356 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1357 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1358 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1361 # Adding another flow will cause the one that expires soonest overall
1363 AT_CHECK([ovs-ofctl add-flow br0 'idle_timeout=80 in_port=2 dl_src=00:99:aa:bb:cc:dd actions=drop'])
1364 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1365 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1366 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1367 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1368 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1369 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1370 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1371 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1374 # Reducing the flow limit also causes the flows that expire soonest
1375 # overall to be evicted.
1376 AT_CHECK([ovs-vsctl set Flow_Table evict flow-limit=4])
1377 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1378 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1379 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1380 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1381 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1387 AT_SETUP([ofproto - eviction upon table overflow, with fairness (OpenFlow 1.2)])
1389 # Configure a maximum of 4 flows.
1392 -- --id=@t0 create Flow_Table name=evict flow-limit=4 \
1393 overflow-policy=evict \
1394 groups='"NXM_OF_IN_PORT[[]]"' \
1395 -- set bridge br0 flow_tables:0=@t0 \
1396 | ${PERL} $srcdir/uuidfilt.pl],
1400 ovs-ofctl -O OpenFlow12 add-flows br0 - <<EOF
1401 idle_timeout=10 in_port=2 dl_src=00:44:55:66:77:88 actions=drop
1402 idle_timeout=20 in_port=1 dl_src=00:11:22:33:44:55 actions=drop
1403 idle_timeout=30 in_port=1 dl_src=00:22:33:44:55:66 actions=drop
1404 idle_timeout=40 in_port=1 dl_src=00:33:44:55:66:77 actions=drop
1406 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1407 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1408 idle_timeout=20, in_port=1,dl_src=00:11:22:33:44:55 actions=drop
1409 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1410 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1411 OFPST_FLOW reply (OF1.2):
1413 # Adding another flow will cause the one that expires soonest within
1414 # the largest group (those with in_port=1) to be evicted. In this
1415 # case this is not the same as the one that expires soonest overall
1416 # (which is what makes the test interesting):
1417 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=2,dl_src=00:55:66:77:88:99,actions=drop])
1418 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1419 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1420 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1421 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1422 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1423 OFPST_FLOW reply (OF1.2):
1425 # Enlarge the flow limit, change the eviction policy back to strictly
1426 # based on expiration, and and add some flows.
1427 AT_CHECK([ovs-vsctl set Flow_Table evict groups='[[]]' flow-limit=7])
1428 ovs-ofctl -O OpenFlow12 add-flows br0 - <<EOF
1429 idle_timeout=50 in_port=2 dl_src=00:66:77:88:99:aa actions=drop
1430 idle_timeout=60 in_port=2 dl_src=00:77:88:99:aa:bb actions=drop
1431 idle_timeout=70 in_port=2 dl_src=00:88:99:aa:bb:cc actions=drop
1433 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1434 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1435 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1436 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1437 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1438 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1439 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1440 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1441 OFPST_FLOW reply (OF1.2):
1443 # Adding another flow will cause the one that expires soonest overall
1445 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 'idle_timeout=80 in_port=2 dl_src=00:99:aa:bb:cc:dd actions=drop'])
1446 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1447 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1448 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1449 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1450 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1451 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1452 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1453 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1454 OFPST_FLOW reply (OF1.2):
1456 # Reducing the flow limit also causes the flows that expire soonest
1457 # overall to be evicted.
1458 AT_CHECK([ovs-vsctl set Flow_Table evict flow-limit=4])
1459 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1460 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1461 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1462 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1463 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1464 OFPST_FLOW reply (OF1.2):
1469 AT_SETUP([ofproto - eviction upon table overflow, with modified hard timeout])
1471 # Configure a maximum of 4 flows.
1474 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1475 -- set bridge br0 flow_tables:0=@t0 \
1476 | ${PERL} $srcdir/uuidfilt.pl],
1479 ovs-appctl time/stop
1481 for in_port in 4 3 2 1; do
1482 ovs-ofctl add-flow br0 hard_timeout=$((10 + in_port * 3)),in_port=$in_port,actions=drop
1484 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1485 hard_timeout=13, in_port=1 actions=drop
1486 hard_timeout=16, in_port=2 actions=drop
1487 hard_timeout=19, in_port=3 actions=drop
1488 hard_timeout=22, in_port=4 actions=drop
1491 # Sleep and modify the one that expires soonest
1492 ovs-appctl time/warp 5000
1493 AT_CHECK([ovs-ofctl mod-flows br0 in_port=1,actions=drop])
1494 # At this point the table would looks like:
1495 # in_port seconds to expire
1500 ovs-appctl time/warp 2000
1501 # Adding another flow will cause the one that expires soonest to be evicted.
1502 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1503 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1504 hard_timeout=13, in_port=1 actions=drop
1505 hard_timeout=19, in_port=3 actions=drop
1506 hard_timeout=22, in_port=4 actions=drop
1507 in_port=5 actions=drop
1513 AT_SETUP([ofproto - eviction upon table overflow, with modified idle timeout])
1514 OVS_VSWITCHD_START([add-port br0 p1 -- set interface p1 type=dummy ofport_request=1])
1515 # Configure a maximum of 4 flows.
1518 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1519 -- set bridge br0 flow_tables:0=@t0 \
1520 | ${PERL} $srcdir/uuidfilt.pl],
1524 for in_port in 4 3 2 1; do
1525 ovs-ofctl add-flow br0 idle_timeout=$((10 + in_port * 3)),in_port=$in_port,actions=drop
1527 ovs-appctl time/stop
1528 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1529 idle_timeout=13, in_port=1 actions=drop
1530 idle_timeout=16, in_port=2 actions=drop
1531 idle_timeout=19, in_port=3 actions=drop
1532 idle_timeout=22, in_port=4 actions=drop
1535 # Sleep and receive on the flow that expires soonest
1536 ovs-appctl time/warp 5000
1537 AT_CHECK([ovs-appctl netdev-dummy/receive p1 'in_port(1)'])
1538 # At this point the table would looks like:
1539 # in_port seconds to expire
1544 ovs-appctl time/warp 2000
1545 # Adding another flow will cause the one that expires soonest to be evicted.
1546 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1547 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1548 idle_timeout=19, in_port=3 actions=drop
1549 idle_timeout=22, in_port=4 actions=drop
1550 in_port=5 actions=drop
1551 n_packets=1, n_bytes=60, idle_timeout=13, in_port=1 actions=drop
1557 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.0)])
1559 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
1561 printf '\n\n--- check_async %d ---\n\n\n' $1
1564 ovs-appctl -t ovs-ofctl ofctl/barrier
1565 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1568 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1569 ovs-ofctl -v packet-out br0 controller controller '0001020304050010203040501234'
1570 if test X"$1" = X"OFPR_ACTION"; then shift;
1571 echo >>expout "OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1572 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1575 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1576 ovs-ofctl -v packet-out br0 controller 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1577 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1578 echo >>expout "OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via no_match) data_len=14 (unbuffered)
1579 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1582 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1583 ovs-ofctl packet-out br0 controller dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1584 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1585 echo >>expout "OFPT_PACKET_IN: total_len=76 in_port=CONTROLLER (via invalid_ttl) data_len=76 (unbuffered)
1586 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1589 # OFPT_PORT_STATUS, OFPPR_ADD
1590 ovs-vsctl add-port br0 test -- set Interface test type=dummy ofport_request=1
1591 if test X"$1" = X"OFPPR_ADD"; then shift;
1592 echo >>expout "OFPT_PORT_STATUS: ADD: 1(test): addr:aa:55:aa:55:00:0x
1595 speed: 0 Mbps now, 0 Mbps max"
1598 # OFPT_PORT_STATUS, OFPPR_DELETE
1599 ovs-vsctl del-port br0 test
1600 if test X"$1" = X"OFPPR_DELETE"; then shift;
1601 echo >>expout "OFPT_PORT_STATUS: DEL: 1(test): addr:aa:55:aa:55:00:0x
1604 speed: 0 Mbps now, 0 Mbps max"
1607 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1608 ovs-ofctl add-flow br0 send_flow_rem,actions=drop
1609 ovs-ofctl --strict del-flows br0 ''
1610 if test X"$1" = X"OFPRR_DELETE"; then shift;
1611 echo >>expout "OFPT_FLOW_REMOVED: reason=delete"
1613 AT_FAIL_IF([test X"$1" != X])
1615 ovs-appctl -t ovs-ofctl ofctl/barrier
1616 echo >>expout "OFPT_BARRIER_REPLY:"
1620 s/ (xid=0x[0-9a-fA-F]*)//
1622 s/00:0.$/00:0x/' < monitor.log]],
1626 # It's a service connection so initially there should be no async messages.
1629 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1630 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
1631 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1633 # Set miss_send_len to 128 and enable invalid_ttl.
1634 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700040080
1635 check_async 3 OFPR_ACTION OFPR_INVALID_TTL OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1637 # Become slave, which should disable everything except port status.
1638 ovs-appctl -t ovs-ofctl ofctl/send 0104001400000002000023200000000a00000002
1639 check_async 4 OFPPR_ADD OFPPR_DELETE
1641 # Use NXT_SET_ASYNC_CONFIG to enable a patchwork of asynchronous messages.
1642 ovs-appctl -t ovs-ofctl ofctl/send 01040028000000020000232000000013000000020000000500000005000000020000000200000005
1643 check_async 5 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1645 # Set controller ID 123.
1646 ovs-appctl -t ovs-ofctl ofctl/send 01040018000000030000232000000014000000000000007b
1647 check_async 6 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1649 # Restore controller ID 0.
1650 ovs-appctl -t ovs-ofctl ofctl/send 010400180000000300002320000000140000000000000000
1653 ovs-appctl -t ovs-ofctl ofctl/send 0104001400000002000023200000000a00000001
1654 check_async 7 OFPR_ACTION OFPPR_ADD
1656 ovs-appctl -t ovs-ofctl exit
1660 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.2)])
1662 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1664 printf '\n\n--- check_async %d ---\n\n\n' $1
1668 ovs-appctl -t ovs-ofctl ofctl/barrier
1669 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1672 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1673 ovs-ofctl -O OpenFlow12 -v packet-out br0 none controller '0001020304050010203040501234'
1674 if test X"$1" = X"OFPR_ACTION"; then shift;
1675 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1676 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1679 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1680 ovs-ofctl -O OpenFlow12 -v packet-out br0 none 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1681 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1682 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via no_match) data_len=14 (unbuffered)
1683 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1686 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1687 ovs-ofctl -O OpenFlow12 packet-out br0 none dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1688 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1689 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=76 in_port=ANY (via invalid_ttl) data_len=76 (unbuffered)
1690 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1693 # OFPT_PORT_STATUS, OFPPR_ADD
1694 ovs-vsctl add-port br0 test -- set Interface test type=dummy
1695 if test X"$1" = X"OFPPR_ADD"; then shift;
1696 echo >>expout "OFPT_PORT_STATUS (OF1.2): ADD: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1699 speed: 0 Mbps now, 0 Mbps max"
1702 # OFPT_PORT_STATUS, OFPPR_DELETE
1703 ovs-vsctl del-port br0 test
1704 if test X"$1" = X"OFPPR_DELETE"; then shift;
1705 echo >>expout "OFPT_PORT_STATUS (OF1.2): DEL: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1708 speed: 0 Mbps now, 0 Mbps max"
1711 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1712 ovs-ofctl -O OpenFlow12 add-flow br0 send_flow_rem,actions=drop
1713 ovs-ofctl -O OpenFlow12 --strict del-flows br0 ''
1714 if test X"$1" = X"OFPRR_DELETE"; then shift;
1715 echo >>expout "OFPT_FLOW_REMOVED (OF1.2): reason=delete table_id=0"
1717 AT_FAIL_IF([test X"$1" != X])
1719 ovs-appctl -t ovs-ofctl ofctl/barrier
1720 echo >>expout "OFPT_BARRIER_REPLY (OF1.2):"
1724 s/ (xid=0x[0-9a-fA-F]*)//
1726 s/00:0.$/00:0x/' < monitor.log]],
1730 # It's a service connection so initially there should be no async messages.
1733 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1734 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
1735 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1737 # Set miss_send_len to 128 and enable invalid_ttl.
1738 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700040080
1739 check_async 3 OFPR_ACTION OFPR_INVALID_TTL OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1741 # Become slave (OF 1.2), which should disable everything except port status.
1742 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000200000003000000000000000000000001
1743 check_async 4 OFPPR_ADD OFPPR_DELETE
1745 # Use NXT_SET_ASYNC_CONFIG to enable a patchwork of asynchronous messages.
1746 ovs-appctl -t ovs-ofctl ofctl/send 03040028000000020000232000000013000000020000000500000005000000020000000200000005
1747 check_async 5 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1749 # Set controller ID 123.
1750 ovs-appctl -t ovs-ofctl ofctl/send 03040018000000030000232000000014000000000000007b
1751 check_async 6 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1753 # Restore controller ID 0.
1754 ovs-appctl -t ovs-ofctl ofctl/send 030400180000000300002320000000140000000000000000
1756 # Become master (OF 1.2).
1757 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000400000002000000000000000000000002
1758 check_async 7 OFPR_ACTION OFPPR_ADD
1760 ovs-appctl -t ovs-ofctl exit
1764 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.3)])
1766 AT_CHECK([ovs-ofctl -O OpenFlow13 monitor br0 --detach --no-chdir --pidfile])
1768 printf '\n\n--- check_async %d ---\n\n\n' $1
1772 ovs-appctl -t ovs-ofctl ofctl/barrier
1773 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1776 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1777 ovs-ofctl -O OpenFlow13 -v packet-out br0 none controller '0001020304050010203040501234'
1778 if test X"$1" = X"OFPR_ACTION"; then shift;
1779 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1780 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1783 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1784 ovs-ofctl -O OpenFlow13 -v packet-out br0 none 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1785 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1786 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=14 in_port=ANY (via no_match) data_len=14 (unbuffered)
1787 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1790 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1791 ovs-ofctl -O OpenFlow13 packet-out br0 none dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1792 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1793 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=76 in_port=ANY (via invalid_ttl) data_len=76 (unbuffered)
1794 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1797 # OFPT_PORT_STATUS, OFPPR_ADD
1798 ovs-vsctl add-port br0 test -- set Interface test type=dummy
1799 if test X"$1" = X"OFPPR_ADD"; then shift;
1800 echo >>expout "OFPT_PORT_STATUS (OF1.3): ADD: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1803 speed: 0 Mbps now, 0 Mbps max"
1806 # OFPT_PORT_STATUS, OFPPR_DELETE
1807 ovs-vsctl del-port br0 test
1808 if test X"$1" = X"OFPPR_DELETE"; then shift;
1809 echo >>expout "OFPT_PORT_STATUS (OF1.3): DEL: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1812 speed: 0 Mbps now, 0 Mbps max"
1815 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1816 ovs-ofctl -O OpenFlow13 add-flow br0 send_flow_rem,actions=drop
1817 ovs-ofctl -O OpenFlow13 --strict del-flows br0 ''
1818 if test X"$1" = X"OFPRR_DELETE"; then shift;
1819 echo >>expout "OFPT_FLOW_REMOVED (OF1.3): reason=delete table_id=0"
1821 AT_FAIL_IF([test X"$1" != X])
1823 ovs-appctl -t ovs-ofctl ofctl/barrier
1824 echo >>expout "OFPT_BARRIER_REPLY (OF1.3):"
1828 s/ (xid=0x[0-9a-fA-F]*)//
1830 s/00:0.$/00:0x/' < monitor.log]],
1834 # It's a service connection so initially there should be no async messages.
1837 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1838 ovs-appctl -t ovs-ofctl ofctl/send 0409000c0123456700000080
1839 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1841 # Become slave (OF 1.3), which should disable everything except port status.
1842 ovs-appctl -t ovs-ofctl ofctl/send 041800180000000200000003000000000000000000000001
1843 check_async 3 OFPPR_ADD OFPPR_DELETE
1845 # Use OF 1.3 OFPT_SET_ASYNC to enable a patchwork of asynchronous messages.
1846 ovs-appctl -t ovs-ofctl ofctl/send 041c002000000002000000020000000500000005000000020000000200000005
1847 check_async 4 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1849 # Set controller ID 123.
1850 ovs-appctl -t ovs-ofctl ofctl/send 04040018000000030000232000000014000000000000007b
1851 check_async 5 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1853 # Restore controller ID 0.
1854 ovs-appctl -t ovs-ofctl ofctl/send 040400180000000300002320000000140000000000000000
1856 # Become master (OF 1.3).
1857 ovs-appctl -t ovs-ofctl ofctl/send 041800180000000400000002000000000000000000000002
1858 check_async 6 OFPR_ACTION OFPPR_ADD
1860 ovs-appctl -t ovs-ofctl exit
1864 dnl This test checks that the role request/response messaging works
1865 dnl and that generation_id is handled properly.
1866 AT_SETUP([ofproto - controller role (OpenFlow 1.2)])
1868 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1870 ovs-appctl -t ovs-ofctl ofctl/barrier
1871 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1875 # find out current role
1876 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000200000000000000000000000000000000
1877 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x2): role=nochange"
1878 echo >>expout "OFPT_ROLE_REPLY (OF1.2) (xid=0x2): role=equal"
1880 # Become slave (generation_id is initially undefined, so 2^63+2 should not be stale)
1881 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000300000003000000008000000000000002
1882 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x3): role=slave generation_id=9223372036854775810"
1883 echo >>expout "OFPT_ROLE_REPLY (OF1.2) (xid=0x3): role=slave generation_id=9223372036854775810"
1885 # Try to become the master using a stale generation ID
1886 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000400000002000000000000000000000002
1887 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x4): role=master generation_id=2"
1888 echo >>expout "OFPT_ERROR (OF1.2) (xid=0x4): OFPRRFC_STALE"
1889 echo >>expout "OFPT_ROLE_REQUEST (OF1.2) (xid=0x4): role=master generation_id=2"
1891 # Become master using a valid generation ID
1892 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000500000002000000000000000000000001
1893 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x5): role=master generation_id=1"
1894 echo >>expout "OFPT_ROLE_REPLY (OF1.2) (xid=0x5): role=master generation_id=1"
1895 ovs-appctl -t ovs-ofctl ofctl/barrier
1896 echo >>expout "OFPT_BARRIER_REPLY (OF1.2) (xid=0x3):"
1898 AT_CHECK([grep -v '^send:' monitor.log], [0], [expout])
1900 AT_CHECK([grep '^send:' monitor.log], [0], [expout])
1902 ovs-appctl -t ovs-ofctl exit
1906 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
1907 dnl specified by OpenFlow 1.0) and OFPP_CONTROLLER (used by some
1908 dnl controllers despite the spec) as meaning a packet that was generated
1909 dnl by the controller.
1910 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.0)])
1912 ADD_OF_PORTS([br0], [1])
1914 # Start a monitor listening for packet-ins.
1915 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
1916 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
1917 ovs-appctl -t ovs-ofctl ofctl/barrier
1918 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1919 AT_CAPTURE_FILE([monitor.log])
1921 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
1922 AT_CHECK([ovs-ofctl packet-out br0 none controller,1 '0001020304050010203040501234'])
1923 AT_CHECK([ovs-ofctl packet-out br0 controller controller,1 '0001020304050010203040505678'])
1925 # Stop the monitor and check its output.
1926 ovs-appctl -t ovs-ofctl ofctl/barrier
1927 ovs-appctl -t ovs-ofctl exit
1929 ovs-ofctl dump-ports br0
1931 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1932 OFPT_PACKET_IN: total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1933 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1934 OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1935 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
1942 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
1943 dnl specified by OpenFlow 1.2) and OFPP_CONTROLLER (used by some
1944 dnl controllers despite the spec) as meaning a packet that was generated
1945 dnl by the controller.
1946 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.2)])
1949 # Start a monitor listening for packet-ins.
1950 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1951 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
1952 ovs-appctl -t ovs-ofctl ofctl/barrier
1953 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1954 AT_CAPTURE_FILE([monitor.log])
1956 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
1957 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none controller '0001020304050010203040501234'])
1958 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 4294967293 controller '0001020304050010203040505678'])
1960 # Stop the monitor and check its output.
1961 ovs-appctl -t ovs-ofctl ofctl/barrier
1962 ovs-appctl -t ovs-ofctl exit
1964 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1965 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1966 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1967 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1968 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
1969 OFPT_BARRIER_REPLY (OF1.2):
1975 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
1976 dnl specified by OpenFlow 1.1) and OFPP_CONTROLLER (used by some
1977 dnl controllers despite the spec) as meaning a packet that was generated
1978 dnl by the controller.
1979 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.1)])
1982 # Start a monitor listening for packet-ins.
1983 AT_CHECK([ovs-ofctl -O OpenFlow11 monitor br0 --detach --no-chdir --pidfile])
1984 ovs-appctl -t ovs-ofctl ofctl/send 0209000c0123456700000080
1985 ovs-appctl -t ovs-ofctl ofctl/barrier
1986 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1987 AT_CAPTURE_FILE([monitor.log])
1989 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
1990 AT_CHECK([ovs-ofctl -O OpenFlow11 packet-out br0 none controller '0001020304050010203040501234'])
1991 AT_CHECK([ovs-ofctl -O OpenFlow11 packet-out br0 4294967293 controller '0001020304050010203040505678'])
1993 # Stop the monitor and check its output.
1994 ovs-appctl -t ovs-ofctl ofctl/barrier
1995 ovs-appctl -t ovs-ofctl exit
1997 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1998 OFPT_PACKET_IN (OF1.1): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1999 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2000 OFPT_PACKET_IN (OF1.1): total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
2001 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
2002 OFPT_BARRIER_REPLY (OF1.1):
2008 dnl This test checks that metadata is encoded in packet_in structures,
2009 dnl supported by NXAST.
2010 AT_SETUP([ofproto - packet-out with metadata (NXM)])
2013 # Start a monitor listening for packet-ins.
2014 AT_CHECK([ovs-ofctl -P nxm monitor br0 --detach --no-chdir --pidfile])
2015 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
2016 ovs-appctl -t ovs-ofctl ofctl/barrier
2017 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2018 AT_CAPTURE_FILE([monitor.log])
2020 # Send a packet-out with a load action to set some metadata, and forward to controller
2021 AT_CHECK([ovs-ofctl packet-out br0 controller 'load(0xfafafafa5a5a5a5a->OXM_OF_METADATA[[0..63]]), load(0xaa->NXM_NX_PKT_MARK[[]]), controller' '0001020304050010203040501234'])
2023 # Stop the monitor and check its output.
2024 ovs-appctl -t ovs-ofctl ofctl/barrier
2025 ovs-appctl -t ovs-ofctl exit
2027 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2028 NXT_PACKET_IN: total_len=14 in_port=CONTROLLER metadata=0xfafafafa5a5a5a5a pkt_mark=0xaa (via action) data_len=14 (unbuffered)
2029 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2036 dnl This test checks that metadata is encoded in packet_in structures,
2037 dnl supported by NXAST.
2038 AT_SETUP([ofproto - packet-out with metadata (OpenFlow 1.2)])
2041 # Start a monitor listening for packet-ins.
2042 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
2043 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
2044 ovs-appctl -t ovs-ofctl ofctl/barrier
2045 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2046 AT_CAPTURE_FILE([monitor.log])
2048 # Send a packet-out with a load action to set some metadata, and forward to controller
2049 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none 'load(0xfafafafa5a5a5a5a->OXM_OF_METADATA[[0..63]]), controller' '0001020304050010203040501234'])
2051 # Stop the monitor and check its output.
2052 ovs-appctl -t ovs-ofctl ofctl/barrier
2053 ovs-appctl -t ovs-ofctl exit
2055 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2056 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY metadata=0xfafafafa5a5a5a5a (via action) data_len=14 (unbuffered)
2057 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2058 OFPT_BARRIER_REPLY (OF1.2):
2064 dnl This test checks that tunnel metadata is encoded in packet_in structures.
2065 AT_SETUP([ofproto - packet-out with tunnel metadata (OpenFlow 1.2)])
2068 # Start a monitor listening for packet-ins.
2069 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
2070 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
2071 ovs-appctl -t ovs-ofctl ofctl/barrier
2072 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2073 AT_CAPTURE_FILE([monitor.log])
2075 # Send a packet-out with set field actions to set some tunnel metadata, and forward to controller
2076 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none 'set_field:127.0.0.1->tun_src,set_field:0x01020304->tun_id,set_field:192.168.0.1->tun_dst, controller' '0001020304050010203040501234'])
2078 # Stop the monitor and check its output.
2079 ovs-appctl -t ovs-ofctl ofctl/barrier
2080 ovs-appctl -t ovs-ofctl exit
2082 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2083 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY tun_id=0x1020304 tun_src=127.0.0.1 tun_dst=192.168.0.1 (via action) data_len=14 (unbuffered)
2084 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2085 OFPT_BARRIER_REPLY (OF1.2):
2091 AT_SETUP([ofproto - flow monitoring])
2092 AT_KEYWORDS([monitor])
2095 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:1
2097 # Start a monitor watching the flow table and check the initial reply.
2098 ovs-ofctl monitor br0 watch: --detach --no-chdir --pidfile >monitor.log 2>&1
2099 AT_CAPTURE_FILE([monitor.log])
2100 ovs-appctl -t ovs-ofctl ofctl/barrier
2101 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2102 [NXST_FLOW_MONITOR reply:
2103 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:1
2107 # Add, delete, and modify some flows and check the updates.
2108 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2109 ovs-ofctl add-flow br0 in_port=0,dl_vlan=124,actions=output:2
2110 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:5
2111 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,dl_vlan_pcp=0,actions=output:6
2112 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,dl_vlan_pcp=1,actions=output:7
2113 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:8
2114 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,dl_vlan_pcp=0,actions=output:9
2115 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,dl_vlan_pcp=1,actions=output:10
2116 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,actions=output:11
2117 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,dl_vlan_pcp=0,actions=output:12
2118 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,dl_vlan_pcp=1,actions=output:13
2119 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,actions=output:14
2120 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=0,actions=output:15
2121 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=1,actions=output:16
2122 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,actions=output:17
2123 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=0,actions=output:18
2124 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=1,actions=output:19
2125 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,actions=output:20
2126 ovs-ofctl add-flow br0 in_port=0,dl_vlan_pcp=0,actions=output:21
2127 ovs-ofctl add-flow br0 in_port=0,dl_vlan_pcp=1,actions=output:22
2128 ovs-ofctl add-flow br0 in_port=0,actions=output:23
2129 ovs-ofctl mod-flows br0 dl_vlan=123,actions=output:3
2130 ovs-ofctl mod-flows br0 cookie=5,dl_vlan=123,actions=output:3
2131 ovs-ofctl del-flows br0 dl_vlan=123
2132 ovs-ofctl del-flows br0
2133 ovs-appctl -t ovs-ofctl ofctl/barrier
2135 # Sorts groups of lines that start with a space, without moving them
2136 # past the nearest line that does not start with a space.
2144 print $_ foreach sort(@buffer);
2149 print $_ foreach sort(@buffer);
2151 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log | ${PERL} -e "$sort"], [0],
2152 [NXST_FLOW_MONITOR reply (xid=0x0):
2153 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=124 actions=output:2
2154 NXST_FLOW_MONITOR reply (xid=0x0):
2155 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:5
2156 NXST_FLOW_MONITOR reply (xid=0x0):
2157 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:6
2158 NXST_FLOW_MONITOR reply (xid=0x0):
2159 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:7
2160 NXST_FLOW_MONITOR reply (xid=0x0):
2161 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:8
2162 NXST_FLOW_MONITOR reply (xid=0x0):
2163 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:9
2164 NXST_FLOW_MONITOR reply (xid=0x0):
2165 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:10
2166 NXST_FLOW_MONITOR reply (xid=0x0):
2167 event=ADDED table=0 cookie=0 in_port=0,vlan_tci=0x0000 actions=output:11
2168 NXST_FLOW_MONITOR reply (xid=0x0):
2169 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=0 actions=output:12
2170 NXST_FLOW_MONITOR reply (xid=0x0):
2171 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=1 actions=output:13
2172 NXST_FLOW_MONITOR reply (xid=0x0):
2173 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095 actions=output:14
2174 NXST_FLOW_MONITOR reply (xid=0x0):
2175 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:15
2176 NXST_FLOW_MONITOR reply (xid=0x0):
2177 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:16
2178 NXST_FLOW_MONITOR reply (xid=0x0):
2179 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:17
2180 NXST_FLOW_MONITOR reply (xid=0x0):
2181 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:18
2182 NXST_FLOW_MONITOR reply (xid=0x0):
2183 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:19
2184 NXST_FLOW_MONITOR reply (xid=0x0):
2185 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:20
2186 NXST_FLOW_MONITOR reply (xid=0x0):
2187 event=ADDED table=0 cookie=0 in_port=0,dl_vlan_pcp=0 actions=output:21
2188 NXST_FLOW_MONITOR reply (xid=0x0):
2189 event=ADDED table=0 cookie=0 in_port=0,dl_vlan_pcp=1 actions=output:22
2190 NXST_FLOW_MONITOR reply (xid=0x0):
2191 event=ADDED table=0 cookie=0 in_port=0 actions=output:23
2192 NXST_FLOW_MONITOR reply (xid=0x0):
2193 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:3
2194 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2195 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2196 NXST_FLOW_MONITOR reply (xid=0x0):
2197 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123 actions=output:3
2198 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2199 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2200 NXST_FLOW_MONITOR reply (xid=0x0):
2201 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123 actions=output:3
2202 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2203 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2204 NXST_FLOW_MONITOR reply (xid=0x0):
2205 event=DELETED reason=delete table=0 cookie=0 in_port=0 actions=output:23
2206 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:20
2207 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:18
2208 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:19
2209 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=124 actions=output:2
2210 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095 actions=output:14
2211 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=0 actions=output:12
2212 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=1 actions=output:13
2213 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan_pcp=0 actions=output:21
2214 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan_pcp=1 actions=output:22
2215 event=DELETED reason=delete table=0 cookie=0 in_port=0,vlan_tci=0x0000 actions=output:11
2219 # Check that our own changes are reported as abbreviations.
2220 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2221 ovs-ofctl add-flow br0 in_port=1,actions=output:2
2222 ovs-ofctl add-flow br0 in_port=2,actions=output:1
2223 ovs-appctl -t ovs-ofctl ofctl/barrier
2224 ovs-appctl -t ovs-ofctl ofctl/send 010e004812345678003fffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000ffffffffffff0000
2225 ovs-appctl -t ovs-ofctl ofctl/barrier
2226 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
2228 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2229 [NXST_FLOW_MONITOR reply (xid=0x0):
2230 event=ADDED table=0 cookie=0 in_port=1 actions=output:2
2231 NXST_FLOW_MONITOR reply (xid=0x0):
2232 event=ADDED table=0 cookie=0 in_port=2 actions=output:1
2234 send: OFPT_FLOW_MOD: DEL priority=0 actions=drop
2235 NXST_FLOW_MONITOR reply (xid=0x0):
2236 event=ABBREV xid=0x12345678
2240 ovs-appctl -t ovs-ofctl exit
2244 AT_SETUP([ofproto - flow monitoring pause and resume])
2245 AT_KEYWORDS([monitor])
2247 # The maximum socket receive buffer size is important for this test, which
2248 # tests behavior when the receive buffer overflows.
2249 if test -e /proc/sys/net/core/rmem_max; then
2251 rmem_max=`cat /proc/sys/net/core/rmem_max`
2252 elif rmem_max=`sysctl -n net.inet.tcp.recvbuf_max 2>/dev/null`; then
2255 # Don't know how to get maximum socket receive buffer on this OS
2258 # Calculate the total amount of queuing: rmem_max in the kernel, 128 kB
2259 # in ofproto sending userspace (see ofmonitor_flush() in connmgr.c).
2260 queue_size=`expr $rmem_max + 128 \* 1024`
2261 echo rmem_max=$rmem_max queue_size=$queue_size
2263 # If there's too much queuing skip the test to avoid timing out.
2264 AT_SKIP_IF([test $rmem_max -gt 1048576])
2266 # Each flow update message takes up at least 48 bytes of space in queues
2267 # and in practice more than that.
2268 n_msgs=`expr $queue_size / 48`
2273 # Start a monitor watching the flow table, then make it block.
2274 ON_EXIT([kill `cat ovs-ofctl.pid`])
2275 ovs-ofctl monitor br0 watch: --detach --no-chdir --pidfile >monitor.log 2>&1
2276 AT_CAPTURE_FILE([monitor.log])
2277 ovs-appctl -t ovs-ofctl ofctl/block
2279 # Add $n_msgs flows.
2280 (echo "in_port=2,actions=output:2"
2282 for ($i = 0; $i < '$n_msgs'; $i++) {
2283 print "cookie=1,reg1=$i,actions=drop\n";
2286 AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
2287 # Check that multipart flow dumps work properly:
2288 AT_CHECK([ovs-ofctl diff-flows br0 flows.txt])
2289 AT_CHECK([ovs-ofctl add-flow br0 in_port=1,cookie=3,actions=drop])
2290 AT_CHECK([ovs-ofctl mod-flows br0 in_port=2,cookie=2,actions=output:2])
2291 AT_CHECK([ovs-ofctl del-flows br0 cookie=1/-1])
2293 ovs-appctl -t ovs-ofctl ofctl/unblock
2295 # Wait for the connection resumed.
2296 # A barrier doesn't work for this purpose.
2297 # https://www.mail-archive.com/dev@openvswitch.org/msg27013.html
2298 # https://www.mail-archive.com/dev@openvswitch.org/msg27675.html
2299 OVS_WAIT_UNTIL([grep NXT_FLOW_MONITOR_RESUMED monitor.log])
2301 ovs-appctl -t ovs-ofctl exit
2303 # Check that the flow monitor reported the same number of flows
2304 # added and deleted, but fewer than we actually added and deleted.
2305 adds=`grep -c 'ADDED.*reg1=' monitor.log`
2306 deletes=`grep -c 'DELETED.*reg1=' monitor.log`
2307 echo adds=$adds deletes=$deletes
2308 AT_CHECK([test $adds -gt 100 && test $adds -lt $n_msgs])
2309 AT_CHECK([test $adds = $deletes])
2311 # Check that the flow monitor reported everything in the expected order:
2313 # event=ADDED table=0 cookie=0x1 reg1=0x22
2315 # NXT_FLOW_MONITOR_PAUSED:
2317 # event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2319 # event=ADDED table=0 cookie=0x3 in_port=1
2320 # event=MODIFIED table=0 cookie=0x2 in_port=2 actions=output:2
2321 # NXT_FLOW_MONITOR_RESUMED:
2323 # except that, between the PAUSED and RESUMED, the order of the ADDED
2324 # and MODIFIED lines lines depends on hash order, that is, it varies
2325 # as we change the hash function or change architecture. Therefore,
2326 # we use a couple of tests below to accept both orders.
2327 AT_CHECK([ofctl_strip < monitor.log | sed -n -e '
2330 /NXT_FLOW_MONITOR_PAUSED:/p
2331 /NXT_FLOW_MONITOR_RESUMED:/p
2332 ' > monitor.log.subset])
2333 AT_CHECK([grep -v MODIFIED monitor.log.subset], [0], [dnl
2334 event=ADDED table=0 cookie=0x1 reg1=0x22
2335 NXT_FLOW_MONITOR_PAUSED:
2336 event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2337 event=ADDED table=0 cookie=0x3 in_port=1
2338 NXT_FLOW_MONITOR_RESUMED:
2340 AT_CHECK([grep -v ADDED monitor.log.subset], [0], [dnl
2341 NXT_FLOW_MONITOR_PAUSED:
2342 event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2343 event=MODIFIED table=0 cookie=0x2 in_port=2 actions=output:2
2344 NXT_FLOW_MONITOR_RESUMED:
2350 AT_SETUP([ofproto - event filtering (OpenFlow 1.3)])
2351 AT_KEYWORDS([monitor])
2354 # Start a monitor, use the required protocol version
2355 ovs-ofctl -O OpenFlow13 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2356 AT_CAPTURE_FILE([monitor.log])
2358 # Send an OpenFlow13 message (04), OFPT_GET_ASYNC_REQUEST (1a), length (8), xid (0a)
2359 ovs-appctl -t ovs-ofctl ofctl/send 041a00080000000a
2360 ovs-appctl -t ovs-ofctl ofctl/barrier
2362 # Check default setting
2363 read -r -d '' expected <<'EOF'
2366 AT_CHECK([ofctl_strip < monitor.log], [], [dnl
2367 send: OFPT_GET_ASYNC_REQUEST (OF1.3):
2368 OFPT_GET_ASYNC_REPLY (OF1.3):
2370 PACKET_IN: no_match action
2371 PORT_STATUS: add delete modify
2372 FLOW_REMOVED: idle hard delete
2376 PORT_STATUS: add delete modify
2378 OFPT_BARRIER_REPLY (OF1.3):
2384 AT_SETUP([ofproto - ofport_request])
2386 ADD_OF_PORTS([br0], [1], [2], [3])
2388 set_and_check_specific_ofports () {
2389 ovs-vsctl set Interface p1 ofport_request="$1" -- \
2390 set Interface p2 ofport_request="$2" -- \
2391 set Interface p3 ofport_request="$3"
2392 ofports=`ovs-vsctl get Interface p1 ofport -- \
2393 get Interface p2 ofport -- \
2394 get Interface p3 ofport`
2395 AT_CHECK_UNQUOTED([echo $ofports], [0], [$1 $2 $3
2398 for pre in '1 2 3' '1 3 2' '2 1 3' '2 3 1' '3 1 2' '3 2 1'; do
2399 for post in '1 2 3' '1 3 2' '2 1 3' '2 3 1' '3 1 2' '3 2 1'; do
2400 echo -----------------------------------------------------------
2401 echo "Check changing port numbers from $pre to $post"
2402 set_and_check_specific_ofports $pre
2403 set_and_check_specific_ofports $post
2407 ovs-vsctl del-port p3
2409 set_and_check_poorly_specified_ofports () {
2410 ovs-vsctl set Interface p1 ofport_request="$1" -- \
2411 set Interface p2 ofport_request="$2"
2412 p1=`ovs-vsctl get Interface p1 ofport`
2413 p2=`ovs-vsctl get Interface p2 ofport`
2416 AT_CHECK([test "$p1" != "$p2"])
2417 if test "$1" = "$2" && test "$1" != '[[]]'; then
2418 # One port number must be the requested one.
2419 AT_CHECK([test "$p1" = "$1" || test "$p2" = "$1"])
2420 # The other port number must be different (already tested above).
2422 AT_CHECK([test "$1" = '[[]]' || test "$p1" == "$1"])
2423 AT_CHECK([test "$2" = '[[]]' || test "$p2" == "$2"])
2426 for pre in '1 2' '[[]] 2' '1 [[]]' '[[]] [[]]' '2 1' '[[]] 1' '2 [[]]' \
2428 for post in '1 2' '[[]] 2' '1 [[]]' '[[]] [[]]' '2 1' '[[]] 1' '2 [[]]' \
2430 echo -----------------------------------------------------------
2431 echo "Check changing port numbers from $pre to $post"
2432 set_and_check_poorly_specified_ofports $pre
2433 set_and_check_poorly_specified_ofports $post
2440 AT_SETUP([ofproto - bundles, open (OpenFlow 1.4)])
2441 AT_KEYWORDS([monitor])
2444 # Start a monitor, use the required protocol version
2445 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2446 AT_CAPTURE_FILE([monitor.log])
2448 # Send an OpenFlow14 message (05), OFPT_BUNDLE_CONTROL (21), length (10), xid (0a)
2449 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2450 ovs-appctl -t ovs-ofctl ofctl/barrier
2451 ovs-appctl -t ovs-ofctl exit
2453 AT_CHECK([ofctl_strip < monitor.log], [], [dnl
2454 send: OFPT_BUNDLE_CONTROL (OF1.4):
2455 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2456 OFPT_BUNDLE_CONTROL (OF1.4):
2457 bundle_id=0x1 type=OPEN_REPLY flags=0
2458 OFPT_BARRIER_REPLY (OF1.4):
2464 AT_SETUP([ofproto - bundles, double open (OpenFlow 1.4)])
2465 AT_KEYWORDS([monitor])
2468 # Start a monitor, use the required protocol version
2469 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2470 AT_CAPTURE_FILE([monitor.log])
2472 # Send twice an OpenFlow14 message (05), OFPT_BUNDLE_CONTROL (21), length (10), xid (0a)
2473 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2474 ovs-appctl -t ovs-ofctl ofctl/barrier
2475 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2476 ovs-appctl -t ovs-ofctl ofctl/barrier
2477 ovs-appctl -t ovs-ofctl exit
2479 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2480 send: OFPT_BUNDLE_CONTROL (OF1.4):
2481 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2482 OFPT_BUNDLE_CONTROL (OF1.4):
2483 bundle_id=0x1 type=OPEN_REPLY flags=0
2484 OFPT_BARRIER_REPLY (OF1.4):
2485 send: OFPT_BUNDLE_CONTROL (OF1.4):
2486 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2487 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2488 OFPT_BUNDLE_CONTROL (OF1.4):
2489 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2490 OFPT_BARRIER_REPLY (OF1.4):
2496 AT_SETUP([ofproto - bundle close without open (OpenFlow 1.4)])
2497 AT_KEYWORDS([monitor])
2500 # Start a monitor, use the required protocol version
2501 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2502 AT_CAPTURE_FILE([monitor.log])
2504 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 01"
2505 ovs-appctl -t ovs-ofctl ofctl/barrier
2506 ovs-appctl -t ovs-ofctl exit
2508 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2509 send: OFPT_BUNDLE_CONTROL (OF1.4):
2510 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2511 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2512 OFPT_BUNDLE_CONTROL (OF1.4):
2513 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2514 OFPT_BARRIER_REPLY (OF1.4):
2520 AT_SETUP([ofproto - bundle double close (OpenFlow 1.4)])
2521 AT_KEYWORDS([monitor])
2524 # Start a monitor, use the required protocol version
2525 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2526 AT_CAPTURE_FILE([monitor.log])
2528 # Open, Close, Close
2529 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2530 ovs-appctl -t ovs-ofctl ofctl/barrier
2531 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 01"
2532 ovs-appctl -t ovs-ofctl ofctl/barrier
2533 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 01"
2534 ovs-appctl -t ovs-ofctl ofctl/barrier
2535 ovs-appctl -t ovs-ofctl exit
2537 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2538 send: OFPT_BUNDLE_CONTROL (OF1.4):
2539 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2540 OFPT_BUNDLE_CONTROL (OF1.4):
2541 bundle_id=0x1 type=OPEN_REPLY flags=0
2542 OFPT_BARRIER_REPLY (OF1.4):
2543 send: OFPT_BUNDLE_CONTROL (OF1.4):
2544 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2545 OFPT_BUNDLE_CONTROL (OF1.4):
2546 bundle_id=0x1 type=CLOSE_REPLY flags=0
2547 OFPT_BARRIER_REPLY (OF1.4):
2548 send: OFPT_BUNDLE_CONTROL (OF1.4):
2549 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2550 OFPT_ERROR (OF1.4): OFPBFC_BUNDLE_CLOSED
2551 OFPT_BUNDLE_CONTROL (OF1.4):
2552 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2553 OFPT_BARRIER_REPLY (OF1.4):
2559 AT_SETUP([ofproto - bundle close, different flags (OpenFlow 1.4)])
2560 AT_KEYWORDS([monitor])
2563 # Start a monitor, use the required protocol version
2564 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2565 AT_CAPTURE_FILE([monitor.log])
2567 # Open, Close, Close
2568 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2569 ovs-appctl -t ovs-ofctl ofctl/barrier
2570 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 02"
2571 ovs-appctl -t ovs-ofctl ofctl/barrier
2572 ovs-appctl -t ovs-ofctl exit
2574 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2575 send: OFPT_BUNDLE_CONTROL (OF1.4):
2576 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2577 OFPT_BUNDLE_CONTROL (OF1.4):
2578 bundle_id=0x1 type=OPEN_REPLY flags=0
2579 OFPT_BARRIER_REPLY (OF1.4):
2580 send: OFPT_BUNDLE_CONTROL (OF1.4):
2581 bundle_id=0x1 type=CLOSE_REQUEST flags=ordered
2582 OFPT_ERROR (OF1.4): OFPBFC_BAD_FLAGS
2583 OFPT_BUNDLE_CONTROL (OF1.4):
2584 bundle_id=0x1 type=CLOSE_REQUEST flags=ordered
2585 OFPT_BARRIER_REPLY (OF1.4):
2591 AT_SETUP([ofproto - bundle commit without open (OpenFlow 1.4)])
2592 AT_KEYWORDS([monitor])
2595 # Start a monitor, use the required protocol version
2596 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2597 AT_CAPTURE_FILE([monitor.log])
2599 # Open, Close, Close
2600 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 04 00 01"
2601 ovs-appctl -t ovs-ofctl ofctl/barrier
2602 ovs-appctl -t ovs-ofctl exit
2604 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2605 send: OFPT_BUNDLE_CONTROL (OF1.4):
2606 bundle_id=0x1 type=COMMIT_REQUEST flags=atomic
2607 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2608 OFPT_BUNDLE_CONTROL (OF1.4):
2609 bundle_id=0x1 type=COMMIT_REQUEST flags=atomic
2610 OFPT_BARRIER_REPLY (OF1.4):
2616 AT_SETUP([ofproto - bundle commit, different flags (OpenFlow 1.4)])
2617 AT_KEYWORDS([monitor])
2620 # Start a monitor, use the required protocol version
2621 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2622 AT_CAPTURE_FILE([monitor.log])
2624 # Open, Close, Close
2625 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2626 ovs-appctl -t ovs-ofctl ofctl/barrier
2627 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 04 00 02"
2628 ovs-appctl -t ovs-ofctl ofctl/barrier
2629 ovs-appctl -t ovs-ofctl exit
2631 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2632 send: OFPT_BUNDLE_CONTROL (OF1.4):
2633 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2634 OFPT_BUNDLE_CONTROL (OF1.4):
2635 bundle_id=0x1 type=OPEN_REPLY flags=0
2636 OFPT_BARRIER_REPLY (OF1.4):
2637 send: OFPT_BUNDLE_CONTROL (OF1.4):
2638 bundle_id=0x1 type=COMMIT_REQUEST flags=ordered
2639 OFPT_ERROR (OF1.4): OFPBFC_BAD_FLAGS
2640 OFPT_BUNDLE_CONTROL (OF1.4):
2641 bundle_id=0x1 type=COMMIT_REQUEST flags=ordered
2642 OFPT_BARRIER_REPLY (OF1.4):
2648 AT_SETUP([ofproto - bundle discard without open (OpenFlow 1.4)])
2649 AT_KEYWORDS([monitor])
2652 # Start a monitor, use the required protocol version
2653 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2654 AT_CAPTURE_FILE([monitor.log])
2656 # Open, Close, Close
2657 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 06 00 01"
2658 ovs-appctl -t ovs-ofctl ofctl/barrier
2659 ovs-appctl -t ovs-ofctl exit
2661 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2662 send: OFPT_BUNDLE_CONTROL (OF1.4):
2663 bundle_id=0x1 type=DISCARD_REQUEST flags=atomic
2664 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2665 OFPT_BUNDLE_CONTROL (OF1.4):
2666 bundle_id=0x1 type=DISCARD_REQUEST flags=atomic
2667 OFPT_BARRIER_REPLY (OF1.4):