X-Git-Url: http://git.cascardo.eti.br/?a=blobdiff_plain;f=tests%2Fovs-ofctl.at;h=f26f6223cad6bcda0de5ce225abe1b2333e72ea9;hb=221a2668d8442169390371294579378724404209;hp=4269311f3d1bea0b4258120b8dee40ccab7040a3;hpb=3947cc76e15ccfa314d4492d889e16a115efb37a;p=cascardo%2Fovs.git diff --git a/tests/ovs-ofctl.at b/tests/ovs-ofctl.at index 4269311f3..f26f6223c 100644 --- a/tests/ovs-ofctl.at +++ b/tests/ovs-ofctl.at @@ -9,10 +9,17 @@ for test_case in \ 'tun_src=1.2.3.4/0.0.0.1 NXM,OXM' \ 'tun_dst=1.2.3.4 NXM,OXM' \ 'tun_dst=1.2.3.4/0.0.0.1 NXM,OXM' \ - 'tun_flags=0 none' \ - 'tun_flags=1/1 none' \ + 'tun_flags=1 NXM,OXM' \ + 'tun_flags=+oam NXM,OXM' \ 'tun_tos=0 none' \ 'tun_ttl=0 none' \ + 'tun_gbp_id=0 NXM,OXM' \ + 'tun_gbp_id=0/0x1 NXM,OXM' \ + 'tun_gbp_flags=0 NXM,OXM' \ + 'tun_gbp_flags=0/0x1 NXM,OXM' \ + 'tun_metadata0=0 NXM,OXM' \ + 'tun_metadata0=0/0x1 NXM,OXM' \ + 'tun_metadata0 NXM,OXM' \ 'metadata=0 NXM,OXM,OpenFlow11' \ 'metadata=1/1 NXM,OXM,OpenFlow11' \ 'in_port=1 any' \ @@ -114,16 +121,21 @@ for test_case in \ 'icmp,icmp_type=1 any' \ 'icmp,icmp_code=2 any' \ 'icmp6,icmpv6_type=1 NXM,OXM' \ - 'icmp6,icmpv6_code=2 NXM,OXM' + 'icmp6,icmpv6_code=2 NXM,OXM' \ + 'ct_state=+trk NXM,OXM' \ + 'ct_zone=0 NXM,OXM' \ + 'ct_mark=0 NXM,OXM' \ + 'ct_label=0 NXM,OXM' \ + 'ct_label=0x1234567890ABCDEF12345678 NXM,OXM' do set $test_case echo echo "### test case: '$1' should have usable protocols '$2'" if test "$2" = none; then AT_CHECK([ovs-ofctl parse-flow "$1,actions=drop"], [1], - [usable protocols: none + [dnl ], - [ovs-ofctl: no usable protocol + [ovs-ofctl: actions are invalid with specified match (OFPBAC_MATCH_INCONSISTENT) ]) else AT_CHECK_UNQUOTED([ovs-ofctl parse-flow "$1,actions=drop" | sed 1q], [0], @@ -136,7 +148,7 @@ AT_CLEANUP AT_SETUP([ovs-ofctl parse-flows (OpenFlow 1.0)]) AT_DATA([flows.txt], [[ # comment -tcp,tp_src=123,out_port=5,actions=flood +tcp,tp_src=123,actions=flood in_port=LOCAL dl_vlan=9 dl_src=00:0A:E4:25:6B:B0 actions=drop udp dl_vlan_pcp=7 idle_timeout=5 actions=strip_vlan output:0 tcp,nw_src=192.168.0.3,tp_dst=80 actions=set_queue:37,output:1 @@ -148,14 +160,25 @@ sctp actions=drop sctp actions=drop in_port=0 actions=resubmit:0 actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678) +actions=ct(nat) +actions=ct(commit,nat(dst)) +actions=ct(commit,nat(src)) +actions=ct(commit,nat(src=10.0.0.240,random)) +actions=ct(commit,nat(src=10.0.0.240:32768-65535,random)) +actions=ct(commit,nat(dst=10.0.0.128-10.0.0.254,hash)) +actions=ct(commit,nat(src=10.0.0.240-10.0.0.254:32768-65535,persistent)) +actions=ct(commit,nat(src=fe80::20c:29ff:fe88:a18b,random)) +actions=ct(commit,nat(src=fe80::20c:29ff:fe88:1-fe80::20c:29ff:fe88:a18b,random)) +actions=ct(commit,nat(src=[fe80::20c:29ff:fe88:1]-[fe80::20c:29ff:fe88:a18b]:255-4096,random)) +actions=ct(commit,nat(src=10.1.1.240-10.1.1.255),alg=ftp) ]]) AT_CHECK([ovs-ofctl parse-flows flows.txt ], [0], [stdout]) AT_CHECK([[sed 's/ (xid=0x[0-9a-fA-F]*)//' stdout]], [0], -[[usable protocols: any +[[usable protocols: OpenFlow10,NXM chosen protocol: OpenFlow10-table_id -OFPT_FLOW_MOD: ADD tcp,tp_src=123 out_port:5 actions=FLOOD +OFPT_FLOW_MOD: ADD tcp,tp_src=123 actions=FLOOD OFPT_FLOW_MOD: ADD in_port=LOCAL,dl_vlan=9,dl_src=00:0a:e4:25:6b:b0 actions=drop OFPT_FLOW_MOD: ADD udp,dl_vlan_pcp=7 idle:5 actions=strip_vlan,output:0 OFPT_FLOW_MOD: ADD tcp,nw_src=192.168.0.3,tp_dst=80 actions=set_queue:37,output:1 @@ -167,13 +190,24 @@ OFPT_FLOW_MOD: ADD sctp actions=drop OFPT_FLOW_MOD: ADD sctp actions=drop OFPT_FLOW_MOD: ADD in_port=0 actions=resubmit:0 OFPT_FLOW_MOD: ADD actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678) +OFPT_FLOW_MOD: ADD actions=ct(nat) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(dst)) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(src)) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(src=10.0.0.240,random)) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(src=10.0.0.240:32768-65535,random)) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(dst=10.0.0.128-10.0.0.254,hash)) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(src=10.0.0.240-10.0.0.254:32768-65535,persistent)) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(src=fe80::20c:29ff:fe88:a18b,random)) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(src=fe80::20c:29ff:fe88:1-fe80::20c:29ff:fe88:a18b,random)) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(src=[fe80::20c:29ff:fe88:1]-[fe80::20c:29ff:fe88:a18b]:255-4096,random)) +OFPT_FLOW_MOD: ADD actions=ct(commit,nat(src=10.1.1.240-10.1.1.255),alg=ftp) ]]) AT_CLEANUP AT_SETUP([ovs-ofctl parse-flows (OpenFlow 1.1)]) AT_DATA([flows.txt], [[ # comment -tcp,tp_src=123,out_port=5,actions=flood +tcp,tp_src=123,actions=flood in_port=LOCAL dl_vlan=9 dl_src=00:0A:E4:25:6B:B0 actions=drop udp dl_vlan_pcp=7 idle_timeout=5 actions=strip_vlan output:0 tcp,nw_src=192.168.0.3,tp_dst=80 actions=set_queue:37,output:1 @@ -192,7 +226,7 @@ AT_CHECK([ovs-ofctl --protocols OpenFlow11 parse-flows flows.txt AT_CHECK([[sed 's/ (xid=0x[0-9a-fA-F]*)//' stdout]], [0], [[usable protocols: any chosen protocol: OpenFlow11 -OFPT_FLOW_MOD (OF1.1): ADD tcp,tp_src=123 out_port:5 actions=FLOOD +OFPT_FLOW_MOD (OF1.1): ADD tcp,tp_src=123 actions=FLOOD OFPT_FLOW_MOD (OF1.1): ADD in_port=LOCAL,dl_vlan=9,dl_src=00:0a:e4:25:6b:b0 actions=drop OFPT_FLOW_MOD (OF1.1): ADD udp,dl_vlan_pcp=7 idle:5 actions=pop_vlan,output:0 OFPT_FLOW_MOD (OF1.1): ADD tcp,nw_src=192.168.0.3,tp_dst=80 actions=set_queue:37,output:1 @@ -297,25 +331,13 @@ AT_CHECK([ovs-ofctl --protocols OpenFlow11 add-flow br0 'ip actions=mod_tp_dst:1 ]) AT_CLEANUP -AT_SETUP([ovs-ofctl parse-flows (With Tunnel-Parameters)]) -AT_DATA([flows.txt], [[ -tun_id=0x1234000056780000/0xffff0000ffff0000,tun_src=1.1.1.1,tun_dst=2.2.2.2,tun_tos=0x3,tun_ttl=20,tun_flags=key|csum actions=drop -]]) - -AT_CHECK([ovs-ofctl parse-flows flows.txt -], [1], [usable protocols: none -], [stderr]) - -AT_CLEANUP - - AT_SETUP([ovs-ofctl parse-flows (skb_priority)]) AT_DATA([flows.txt], [[ skb_priority=0x12341234,tcp,tp_src=123,actions=flood ]]) AT_CHECK([ovs-ofctl parse-flows flows.txt -], [1], [usable protocols: none +], [1], [dnl ], [stderr]) AT_CLEANUP @@ -353,6 +375,12 @@ check_overlap,actions=output:1,exit,output:2 tcp,actions=fin_timeout(idle_timeout=5,hard_timeout=15) actions=controller(max_len=123,reason=invalid_ttl,id=555) actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678) +ip,actions=ct(commit,zone=5) +ip,actions=ct(commit,exec(load(1->NXM_NX_CT_MARK[]))) +ip,actions=ct(commit,exec(load(0x1->NXM_NX_CT_LABEL[]))) +ip,actions=ct(commit,exec(load(0x1234567890ABCDEF->NXM_NX_CT_LABEL[32..95]))) +ip,actions=ct(commit,exec(set_field(0x1->ct_label))) +ip,ct_state=+trk,ct_label=0x1234567890abcdef12345678,actions=ct(commit) ]]) AT_CHECK([ovs-ofctl parse-flows flows.txt @@ -389,6 +417,12 @@ NXT_FLOW_MOD: ADD table:255 check_overlap actions=output:1,exit,output:2 NXT_FLOW_MOD: ADD table:255 tcp actions=fin_timeout(idle_timeout=5,hard_timeout=15) NXT_FLOW_MOD: ADD table:255 actions=controller(reason=invalid_ttl,max_len=123,id=555) NXT_FLOW_MOD: ADD table:255 actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678) +NXT_FLOW_MOD: ADD table:255 ip actions=ct(commit,zone=5) +NXT_FLOW_MOD: ADD table:255 ip actions=ct(commit,exec(load:0x1->NXM_NX_CT_MARK[])) +NXT_FLOW_MOD: ADD table:255 ip actions=ct(commit,exec(load:0x1->NXM_NX_CT_LABEL[0..63],load:0->NXM_NX_CT_LABEL[64..127])) +NXT_FLOW_MOD: ADD table:255 ip actions=ct(commit,exec(load:0x1234567890abcdef->NXM_NX_CT_LABEL[32..95])) +NXT_FLOW_MOD: ADD table:255 ip actions=ct(commit,exec(load:0x1->NXM_NX_CT_LABEL[0..63],load:0->NXM_NX_CT_LABEL[64..127])) +NXT_FLOW_MOD: ADD table:255 ct_state=+trk,ct_label=0x1234567890abcdef12345678,ip actions=ct(commit) ]]) AT_CLEANUP @@ -423,6 +457,9 @@ dl_dst=00:00:00:00:00:00/01:00:00:00:00:00,actions=drop dl_dst=aa:bb:cc:dd:ee:ff/fe:ff:ff:ff:ff:ff,actions=drop dl_dst=aa:bb:cc:dd:ee:ff/00:00:00:00:00:00,actions=drop actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678) +ip,actions=ct(commit,zone=5) +ip,actions=ct(commit,exec(load(1->NXM_NX_CT_MARK[[]]))) +ip,actions=ct(commit,exec(load(0x1->NXM_NX_CT_LABEL[[]]))) ]) AT_CHECK([ovs-ofctl -F nxm parse-flows flows.txt], [0], [stdout]) AT_CHECK([[sed 's/ (xid=0x[0-9a-fA-F]*)//' stdout]], [0], [dnl @@ -456,6 +493,9 @@ NXT_FLOW_MOD: ADD dl_dst=00:00:00:00:00:00/01:00:00:00:00:00 actions=drop NXT_FLOW_MOD: ADD dl_dst=aa:bb:cc:dd:ee:ff/fe:ff:ff:ff:ff:ff actions=drop NXT_FLOW_MOD: ADD actions=drop NXT_FLOW_MOD: ADD actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678) +NXT_FLOW_MOD: ADD ip actions=ct(commit,zone=5) +NXT_FLOW_MOD: ADD ip actions=ct(commit,exec(load:0x1->NXM_NX_CT_MARK[[]])) +NXT_FLOW_MOD: ADD ip actions=ct(commit,exec(load:0x1->NXM_NX_CT_LABEL[[0..63]],load:0->NXM_NX_CT_LABEL[[64..127]])) ]) AT_CLEANUP @@ -489,6 +529,10 @@ actions=move:OXM_OF_ETH_DST[]->OXM_OF_ETH_SRC[] actions=push:NXM_NX_REG0[0..31],pop:NXM_NX_REG0[] vlan_tci=0x1123/0x1fff,actions=drop actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678) +ip,actions=ct(commit,zone=5) +ip,actions=ct(commit,exec(load(1->NXM_NX_CT_MARK[]))) +ip,actions=ct(commit,exec(load(1->NXM_NX_CT_LABEL[]))) +ip,actions=ct(commit,exec(set_field(1->ct_label))) ]]) AT_CHECK([ovs-ofctl -F nxm -mmm parse-flows flows.txt], [0], [stdout], [stderr]) AT_CHECK([[sed 's/ (xid=0x[0-9a-fA-F]*)//' stdout]], [0], @@ -521,6 +565,10 @@ NXT_FLOW_MOD: ADD actions=move:NXM_OF_ETH_DST[]->NXM_OF_ETH_SRC[] NXT_FLOW_MOD: ADD actions=push:NXM_NX_REG0[],pop:NXM_NX_REG0[] NXT_FLOW_MOD: ADD NXM_OF_VLAN_TCI_W(1123/1fff) actions=drop NXT_FLOW_MOD: ADD actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678) +NXT_FLOW_MOD: ADD NXM_OF_ETH_TYPE(0800) actions=ct(commit,zone=5) +NXT_FLOW_MOD: ADD NXM_OF_ETH_TYPE(0800) actions=ct(commit,exec(load:0x1->NXM_NX_CT_MARK[])) +NXT_FLOW_MOD: ADD NXM_OF_ETH_TYPE(0800) actions=ct(commit,exec(load:0x1->NXM_NX_CT_LABEL[0..63],load:0->NXM_NX_CT_LABEL[64..127])) +NXT_FLOW_MOD: ADD NXM_OF_ETH_TYPE(0800) actions=ct(commit,exec(load:0x1->NXM_NX_CT_LABEL[0..63],load:0->NXM_NX_CT_LABEL[64..127])) ]]) AT_CLEANUP @@ -617,7 +665,7 @@ NXM_OF_ETH_TYPE(0800) NXM_OF_IP_PROTO(07) NXM_OF_TCP_DST(4231) NXM_OF_ETH_TYPE(0800) NXM_OF_IP_PROTO(06) NXM_NX_TCP_FLAGS(0131) NXM_OF_ETH_TYPE(0800) NXM_OF_IP_PROTO(06) NXM_NX_TCP_FLAGS_W(00F0/0FF0) NXM_OF_ETH_TYPE(0800) NXM_OF_IP_PROTO(06) NXM_NX_TCP_FLAGS_W(01E2/ffff) -NXM_OF_ETH_TYPE(0800) NXM_OF_IP_PROTO(07) NXM_NX_TCP_FLAGS(4321) +NXM_OF_ETH_TYPE(0800) NXM_OF_IP_PROTO(07) NXM_NX_TCP_FLAGS(0fff) # UDP source port NXM_OF_ETH_TYPE(0800) NXM_OF_IP_PROTO(11) NXM_OF_UDP_SRC(8732) @@ -654,7 +702,7 @@ NXM_OF_ETH_TYPE(0806) NXM_OF_ARP_SPA_W(C0a81234/FFFFFF00) NXM_OF_ETH_TYPE(0806) NXM_OF_ARP_SPA_W(C0a81234/aaaaaa00) NXM_OF_ETH_TYPE(0806) NXM_OF_ARP_SPA_W(C0a81234/ffffffff) NXM_OF_ETH_TYPE(0800) NXM_OF_ARP_SPA(ac100014) -NXM_OF_ARP_SPA_W(C0D8fedc/FFFF0000) +NXM_OF_ARP_SPA_W(C0D80000/FFFF0000) # ARP destination protocol address NXM_OF_ETH_TYPE(0806) NXM_OF_ARP_TPA(ac100014) @@ -687,7 +735,7 @@ NXM_OF_ETH_TYPE(8035) NXM_OF_ARP_SPA_W(C0a81200/FFFFFF00) NXM_OF_ETH_TYPE(8035) NXM_OF_ARP_SPA_W(C0a81234/aaaaaa00) NXM_OF_ETH_TYPE(8035) NXM_OF_ARP_SPA_W(C0a81234/ffffffff) NXM_OF_ETH_TYPE(0800) NXM_OF_ARP_SPA(ac100014) -NXM_OF_ARP_SPA_W(C0D8fedc/FFFF0000) +NXM_OF_ARP_SPA_W(C0D80000/FFFF0000) # RARP destination protocol address NXM_OF_ETH_TYPE(8035) NXM_OF_ARP_TPA(ac100014) @@ -714,7 +762,7 @@ NXM_OF_ETH_TYPE(86dd) NXM_NX_IPV6_SRC_W(20010db83c4d00010000000000000000/fffffff NXM_OF_ETH_TYPE(86dd) NXM_NX_IPV6_SRC_W(20010db83c4d00010000000000000000/5a5a5a5a5a5a5a5a0000000000000000) NXM_OF_ETH_TYPE(86dd) NXM_NX_IPV6_SRC_W(20010db83c4d00010000000000000000/ffffffffffffffffffffffffffffffff) NXM_OF_ETH_TYPE(86dd) NXM_NX_IPV6_SRC_W(20010db83c4d00010000000000000000/00000000000000000000000000000000) -NXM_OF_ETH_TYPE(0800) NXM_NX_IPV6_SRC_W(20010db83c4d00010000000000000000/00000000000000000000000000000000) +NXM_OF_ETH_TYPE(0800) NXM_NX_IPV6_SRC_W(20010db83c4d00010000000000000000/ffffffffffffffffffff000000000000) # IPv6 destination NXM_OF_ETH_TYPE(86dd) NXM_NX_IPV6_DST(20010db83c4d00010002000300040005) @@ -783,7 +831,7 @@ NXM_OF_ETH_TYPE(86dd) NXM_NX_IP_FRAG(f3) NXM_NX_COOKIE(00000000abcdef01) NXM_NX_COOKIE_W(84200000abcdef01/84200000FFFFFFFF) NXM_NX_COOKIE_W(84200000abcdef01/ffffffffffffffff) -NXM_NX_COOKIE_W(84200000abcdef01/0000000000000000) +NXM_NX_COOKIE_W(0000000000000000/0000000000000000) # Tunnel ID. NXM_NX_TUN_ID(00000000abcdef01) @@ -797,8 +845,27 @@ NXM_NX_REG0_W(a0e0d050/f0f0f0f0) NXM_NX_REG0_W(a0e0d050/ffffffff) NXM_NX_REG0_W(00000000/00000000) +# Connection tracking fields, +NXM_OF_ETH_TYPE(0800) NXM_NX_CT_STATE(00000020) +NXM_OF_ETH_TYPE(0800) NXM_NX_CT_STATE(00001080) +NXM_OF_ETH_TYPE(0800) NXM_NX_CT_STATE_W(00000020/00000020) +NXM_OF_ETH_TYPE(0800) NXM_NX_CT_STATE_W(00000020/000000F0) +NXM_OF_ETH_TYPE(0800) NXM_NX_CT_ZONE(5a5a) +NXM_OF_ETH_TYPE(0800) NXM_NX_CT_MARK(5a5a5a5a) +NXM_OF_ETH_TYPE(0800) NXM_NX_CT_MARK_W(5a5a5a5a/fefefefe) +NXM_OF_ETH_TYPE(0800) NXM_NX_CT_LABEL(1234567890abcdef1234567890abcdef) +NXM_OF_ETH_TYPE(0800) NXM_NX_CT_LABEL_W(10203040506070809000a0b0c0d0e0f0/f1f2f3f4f5f6f7f8f9f0fafbfcfdfeff) + +# dp_hash (testing experimenter OXM). +NXM_NX_DP_HASH(01234567) +NXOXM_ET_DP_HASH(01234567) + # Invalid field number. -01020304(1111/2222) +01020304(1111/3333) + +# Invalid field numbers (experimenter OXM). +ffff020800002320(11112222) +ffff030800002320(1111/3333) # Unimplemented registers. # @@ -1080,9 +1147,31 @@ NXM_NX_REG0_W(a0e0d050/f0f0f0f0) NXM_NX_REG0(a0e0d050) +# Connection tracking fields, +dnl +dnl When re-serialising, bits 16-31 are wildcarded, because current OVS userspace +dnl doesn't understand (or store) those bits. +NXM_OF_ETH_TYPE(0800), NXM_NX_CT_STATE_W(00000020/0000ffff) +nx_pull_match() returned error OFPBMC_BAD_VALUE +NXM_OF_ETH_TYPE(0800), NXM_NX_CT_STATE_W(00000020/00000020) +NXM_OF_ETH_TYPE(0800), NXM_NX_CT_STATE_W(00000020/000000f0) +NXM_OF_ETH_TYPE(0800), NXM_NX_CT_ZONE(5a5a) +NXM_OF_ETH_TYPE(0800), NXM_NX_CT_MARK(5a5a5a5a) +NXM_OF_ETH_TYPE(0800), NXM_NX_CT_MARK_W(5a5a5a5a/fefefefe) +NXM_OF_ETH_TYPE(0800), NXM_NX_CT_LABEL(1234567890abcdef1234567890abcdef) +NXM_OF_ETH_TYPE(0800), NXM_NX_CT_LABEL_W(10203040506070809000a0b0c0d0e0f0/f1f2f3f4f5f6f7f8f9f0fafbfcfdfeff) + +# dp_hash (testing experimenter OXM). +NXM_NX_DP_HASH(01234567) +NXM_NX_DP_HASH(01234567) + # Invalid field number. nx_pull_match() returned error OFPBMC_BAD_FIELD +# Invalid field numbers (experimenter OXM). +nx_pull_match() returned error OFPBMC_BAD_FIELD +nx_pull_match() returned error OFPBMC_BAD_FIELD + # Unimplemented registers. # # This test assumes that at least two registers, but fewer than 16, @@ -1096,7 +1185,7 @@ nx_pull_match() returned error OFPBMC_BAD_FIELD # Check that at least the first warning made it. (It's rate-limited # so a variable number could show up, especially under valgrind etc.) AT_CHECK([grep '1-bits in value' stderr | sed 1q], [0], [dnl -nx_match|WARN|Rejecting NXM/OXM entry NXM_OF_ETH_DST_W(ffffffffffff/010000000000) with 1-bits in value for bits wildcarded by the mask. +nx_match|WARN|Rejecting NXM/OXM entry 0:0:1:1:12 with 1-bits in value for bits wildcarded by the mask. ]) # Check that there wasn't any other stderr output. @@ -1130,14 +1219,16 @@ xxxxxxxx xxxxxxxx xxxx xxxx 002820fd xxxx xxxxxxxxxxxx xxxxxxxxxxxx 0123 04 xx xxxx xx xx xxxx dnl xxxxxxxx xxxxxxxx xxxx xxxx +dnl dl_vlan_pcp doesn't make sense when 802.1Q is not present, so +dnl OVS ignores it and drops it on output. # vlan_tci=0x0000 +# 1: 38 -> 28 003820fd xxxx xxxxxxxxxxxx xxxxxxxxxxxx ffff xx xx xxxx xx xx xxxx dnl xxxxxxxx xxxxxxxx xxxx xxxx -dnl dl_vlan_pcp doesn't make sense when dl_vlan is "none", so +dnl dl_vlan_pcp doesn't make sense when 802.1Q is not present, so dnl OVS ignores it and drops it on output. # vlan_tci=0x0000 -# 1: 28 -> 38 # 20: 05 -> 00 002820fd xxxx xxxxxxxxxxxx xxxxxxxxxxxx ffff 05 xx xxxx xx xx xxxx dnl xxxxxxxx xxxxxxxx xxxx xxxx @@ -1647,19 +1738,25 @@ AT_CLEANUP AT_SETUP([ovs-ofctl parse-nx-match loose]) AT_KEYWORDS([nx-match]) AT_DATA([nx-match.txt], [dnl -NXM_OF_IN_PORT(0001), 01020304(1111/2222), NXM_OF_ETH_TYPE(0800) +NXM_OF_IN_PORT(0001), 01020304(1111/3333), NXM_OF_ETH_TYPE(0800) +NXM_OF_IN_PORT(0001), ffff020800002320(11112222), NXM_OF_ETH_TYPE(0800) +NXM_OF_IN_PORT(0001), ffff030800002320(1111/3333), NXM_OF_ETH_TYPE(0800) ]) AT_CHECK([ovs-ofctl --strict parse-nx-match < nx-match.txt], [0], [dnl nx_pull_match() returned error OFPBMC_BAD_FIELD +nx_pull_match() returned error OFPBMC_BAD_FIELD +nx_pull_match() returned error OFPBMC_BAD_FIELD ]) AT_CHECK([ovs-ofctl parse-nx-match < nx-match.txt], [0], [dnl NXM_OF_IN_PORT(0001), NXM_OF_ETH_TYPE(0800) +NXM_OF_IN_PORT(0001), NXM_OF_ETH_TYPE(0800) +NXM_OF_IN_PORT(0001), NXM_OF_ETH_TYPE(0800) ]) AT_CLEANUP -AT_SETUP([ovs-ofctl parse-oxm (OpenFlow 1.5)]) +AT_SETUP([ovs-ofctl parse-oxm (OpenFlow 1.2)]) AT_KEYWORDS([oxm]) AT_DATA([oxm.txt], [dnl @@ -1715,7 +1812,7 @@ OXM_OF_VLAN_VID_W(1000/1000), OXM_OF_VLAN_PCP(01) # Packets with any VID, PCP=1 OXM_OF_ETH_TYPE(0800) OXM_OF_IP_DSCP(f0) OXM_OF_ETH_TYPE(0800) OXM_OF_IP_DSCP(41) OXM_OF_ETH_TYPE(0800) OXM_OF_IP_DSCP(3f) -OXM_OF_IP_DSCP(f0) +OXM_OF_IP_DSCP(3f) # IP ECN OXM_OF_ETH_TYPE(0800) OXM_OF_IP_ECN(03) @@ -1808,7 +1905,7 @@ OXM_OF_ETH_TYPE(0806) OXM_OF_ARP_SPA_W(C0a81200/FFFFFF00) OXM_OF_ETH_TYPE(0806) OXM_OF_ARP_SPA_W(C0a81234/FFFFFFFF) OXM_OF_ETH_TYPE(0806) OXM_OF_ARP_SPA_W(00000000/00000000) OXM_OF_ETH_TYPE(0800) OXM_OF_ARP_SPA(ac100014) -OXM_OF_ARP_SPA_W(C0D8fedc/FFFF0000) +OXM_OF_ARP_SPA_W(C0D80000/FFFF0000) # ARP destination protocol address OXM_OF_ETH_TYPE(0806) OXM_OF_ARP_TPA(ac100014) @@ -1895,7 +1992,11 @@ OXM_OF_PKT_REG0_W(00000000a0e0d050/00000000f0f0f0f0), OXM_OF_PKT_REG1_W(a0e0d050 OXM_OF_PKT_REG0_W(00000000a0e0d050/00000000f0f0f0f0), OXM_OF_PKT_REG1_W(a0e0d05000000000/ffffffff00000000) # Invalid field number. -01020304(1111/2222) +01020304(1111/3333) + +# Invalid field numbers (experimenter OXM). +ffff020800002320(11112222) +ffff030800002320(1111/3333) ]) AT_CHECK([ovs-ofctl '-vPATTERN:console:%c|%p|%m' --strict parse-oxm OpenFlow12 < oxm.txt], [0], [dnl @@ -2133,18 +2234,45 @@ NXM_NX_REG1_W(a0e0d050/f0f0f0f0), NXM_NX_REG2(a0e0d050) # Invalid field number. nx_pull_match() returned error OFPBMC_BAD_FIELD + +# Invalid field numbers (experimenter OXM). +nx_pull_match() returned error OFPBMC_BAD_FIELD +nx_pull_match() returned error OFPBMC_BAD_FIELD ], [stderr]) # Check that at least the first warning made it. (It's rate-limited # so a variable number could show up, especially under valgrind etc.) AT_CHECK([grep '1-bits in value' stderr | sed 1q], [0], [dnl -nx_match|WARN|Rejecting NXM/OXM entry OXM_OF_METADATA_W(1234567890abcdef/ffff0000ffff0000) with 1-bits in value for bits wildcarded by the mask. +nx_match|WARN|Rejecting NXM/OXM entry 0:32768:2:1:16 with 1-bits in value for bits wildcarded by the mask. ]) # Check that there wasn't any other stderr output. AT_CHECK([grep -v '1-bits in value' stderr], [1]) AT_CLEANUP +AT_SETUP([ovs-ofctl parse-oxm (OpenFlow 1.3)]) +AT_KEYWORDS([oxm]) +AT_DATA([oxm.txt], [dnl +# actset_output +ONFOXM_ET_ACTSET_OUTPUT(00000000) +ONFOXM_ET_ACTSET_OUTPUT(fffffffe) +ONFOXM_ET_ACTSET_OUTPUT(fffffff7) +OXM_OF_ACTSET_OUTPUT(00000000) +OXM_OF_ACTSET_OUTPUT(fffffffe) +OXM_OF_ACTSET_OUTPUT(fffffff7) +]) +AT_CHECK([ovs-ofctl '-vPATTERN:console:%c|%p|%m' --strict parse-oxm OpenFlow13 < oxm.txt], + [0], [dnl +# actset_output +ONFOXM_ET_ACTSET_OUTPUT(00000000) +ONFOXM_ET_ACTSET_OUTPUT(fffffffe) +ONFOXM_ET_ACTSET_OUTPUT(fffffff7) +ONFOXM_ET_ACTSET_OUTPUT(00000000) +ONFOXM_ET_ACTSET_OUTPUT(fffffffe) +ONFOXM_ET_ACTSET_OUTPUT(fffffff7) +], []) +AT_CLEANUP + AT_SETUP([ovs-ofctl parse-oxm (OpenFlow 1.5)]) AT_KEYWORDS([oxm]) AT_DATA([oxm.txt], [dnl @@ -2168,6 +2296,14 @@ NXM_NX_REG0_W(a0e0d050/f0f0f0f0), NXM_NX_REG1_W(a0e0d050/f0f0f0f0) NXM_NX_REG0_W(a0e0d050/f0f0f0f0), NXM_NX_REG1(a0e0d050) NXM_NX_REG1_W(a0e0d050/f0f0f0f0), NXM_NX_REG2_W(a0e0d050/f0f0f0f0) NXM_NX_REG1_W(a0e0d050/f0f0f0f0), NXM_NX_REG2(a0e0d050) + +# actset_output +ONFOXM_ET_ACTSET_OUTPUT(00000000) +ONFOXM_ET_ACTSET_OUTPUT(fffffffe) +ONFOXM_ET_ACTSET_OUTPUT(fffffff7) +OXM_OF_ACTSET_OUTPUT(00000000) +OXM_OF_ACTSET_OUTPUT(fffffffe) +OXM_OF_ACTSET_OUTPUT(fffffff7) ]) AT_CHECK([ovs-ofctl '-vPATTERN:console:%c|%p|%m' --strict parse-oxm OpenFlow15 < oxm.txt], [0], [dnl @@ -2191,21 +2327,82 @@ OXM_OF_PKT_REG0_W(a0e0d050a0e0d050/f0f0f0f0f0f0f0f0) OXM_OF_PKT_REG0_W(a0e0d050a0e0d050/f0f0f0f0ffffffff) OXM_OF_PKT_REG0_W(00000000a0e0d050/00000000f0f0f0f0), OXM_OF_PKT_REG1_W(a0e0d05000000000/f0f0f0f000000000) OXM_OF_PKT_REG0_W(00000000a0e0d050/00000000f0f0f0f0), OXM_OF_PKT_REG1_W(a0e0d05000000000/ffffffff00000000) + +# actset_output +OXM_OF_ACTSET_OUTPUT(00000000) +OXM_OF_ACTSET_OUTPUT(fffffffe) +OXM_OF_ACTSET_OUTPUT(fffffff7) +OXM_OF_ACTSET_OUTPUT(00000000) +OXM_OF_ACTSET_OUTPUT(fffffffe) +OXM_OF_ACTSET_OUTPUT(fffffff7) ], []) AT_CLEANUP AT_SETUP([ovs-ofctl parse-oxm loose]) AT_KEYWORDS([oxm]) AT_DATA([oxm.txt], [dnl -OXM_OF_IN_PORT(00000001), 01020304(1111/2222), OXM_OF_ETH_TYPE(0800) +OXM_OF_IN_PORT(00000001), 01020304(1111/3333), OXM_OF_ETH_TYPE(0800) +OXM_OF_IN_PORT(00000001), ffff020800002320(11112222), OXM_OF_ETH_TYPE(0800) +OXM_OF_IN_PORT(00000001), ffff030800002320(1111/3333), OXM_OF_ETH_TYPE(0800) ]) AT_CHECK([ovs-ofctl --strict parse-oxm OpenFlow12 < oxm.txt], [0], [dnl nx_pull_match() returned error OFPBMC_BAD_FIELD +nx_pull_match() returned error OFPBMC_BAD_FIELD +nx_pull_match() returned error OFPBMC_BAD_FIELD ]) AT_CHECK([ovs-ofctl parse-oxm OpenFlow12 < oxm.txt], [0], [dnl OXM_OF_IN_PORT(00000001), OXM_OF_ETH_TYPE(0800) +OXM_OF_IN_PORT(00000001), OXM_OF_ETH_TYPE(0800) +OXM_OF_IN_PORT(00000001), OXM_OF_ETH_TYPE(0800) +]) +AT_CLEANUP + +AT_SETUP([experimenter OXM encoding]) +AT_DATA([oxm.txt], [dnl +NXM_NX_DP_HASH(01234567) +NXOXM_ET_DP_HASH(01234567) + +NXM_NX_DP_HASH_W(01234567/0fffffff) +NXOXM_ET_DP_HASH_W(01234567/0fffffff) +]) + +# To allow for testing experimenter OXM, which doesn't really have many +# examples in the wild, we've defined a variant of NXM_NX_DP_HASH that uses +# the experimenter OXM mechanism, called NXOXM_ET_DP_HASH. We've defined +# it as if it were introduced with OpenFlow 1.5, which gives us the +# opportunity to see that both forms are accepted in all OpenFlow versions +# but the experimenter form is used for encoding in OF1.5+. +# +# First verify that both forms are accepted and NXOXM_ET_DP_HASH is encoded +# in OF1.5. +AT_CHECK([ovs-ofctl -m --strict parse-oxm OpenFlow15 < oxm.txt], [0], [dnl +NXOXM_ET_DP_HASH(01234567) +00000000 00 01 00 10 ff ff 00 08-00 00 23 20 01 23 45 67 @&t@ +NXOXM_ET_DP_HASH(01234567) +00000000 00 01 00 10 ff ff 00 08-00 00 23 20 01 23 45 67 @&t@ + +NXOXM_ET_DP_HASH_W(01234567/0fffffff) +00000000 00 01 00 14 ff ff 01 0c-00 00 23 20 01 23 45 67 @&t@ +00000010 0f ff ff ff 00 00 00 00- +NXOXM_ET_DP_HASH_W(01234567/0fffffff) +00000000 00 01 00 14 ff ff 01 0c-00 00 23 20 01 23 45 67 @&t@ +00000010 0f ff ff ff 00 00 00 00- +]) + +# Then verify that both forms are accepted and NXM_NX_DP_HASH is encoded +# in OF1.2. +AT_CHECK([ovs-ofctl -m --strict parse-oxm OpenFlow12 < oxm.txt], [0], [dnl +NXM_NX_DP_HASH(01234567) +00000000 00 01 00 0c 00 01 46 04-01 23 45 67 00 00 00 00 @&t@ +NXM_NX_DP_HASH(01234567) +00000000 00 01 00 0c 00 01 46 04-01 23 45 67 00 00 00 00 @&t@ + +NXM_NX_DP_HASH_W(01234567/0fffffff) +00000000 00 01 00 10 00 01 47 08-01 23 45 67 0f ff ff ff @&t@ +NXM_NX_DP_HASH_W(01234567/0fffffff) +00000000 00 01 00 10 00 01 47 08-01 23 45 67 0f ff ff ff @&t@ ]) AT_CLEANUP @@ -2218,14 +2415,20 @@ AT_CHECK([echo "$tcp_flags" | ovs-ofctl parse-nxm], [0], [NXM_OF_ETH_TYPE(0800), NXM_OF_IP_PROTO(06), NXM_NX_TCP_FLAGS(0fff) ]) -# Check that marshaling in OXM for OF1.2 through OF1.4 gives OXM -# headers except for TCP flags, which didn't have an OXM definition until -# OF1.5. -for version in OpenFlow12 OpenFlow13 OpenFlow14; do - AT_CHECK([echo "$tcp_flags" | ovs-ofctl parse-oxm $version], [0], - [OXM_OF_ETH_TYPE(0800), OXM_OF_IP_PROTO(06), NXM_NX_TCP_FLAGS(0fff) +# Check that marshaling in OXM for OF1.2 gives OXM headers except for +# TCP flags, which didn't have an OXM definition. +AT_CHECK([echo "$tcp_flags" | ovs-ofctl parse-oxm OpenFlow12], [0], + [OXM_OF_ETH_TYPE(0800), OXM_OF_IP_PROTO(06), NXM_NX_TCP_FLAGS(0fff) +]) + +# Check that marshaling in OXM for OF1.3 and OF1.4 gives OXM headers, +# including the ONF extension for TCP flags introduced in OF1.3. +AT_CHECK([echo "$tcp_flags" | ovs-ofctl parse-oxm OpenFlow13], [0], + [OXM_OF_ETH_TYPE(0800), OXM_OF_IP_PROTO(06), ONFOXM_ET_TCP_FLAGS(0fff) +]) +AT_CHECK([echo "$tcp_flags" | ovs-ofctl parse-oxm OpenFlow14], [0], + [OXM_OF_ETH_TYPE(0800), OXM_OF_IP_PROTO(06), ONFOXM_ET_TCP_FLAGS(0fff) ]) -done # OpenFlow 1.5 added an OXM header for TCP flags: AT_CHECK([echo "$tcp_flags" | ovs-ofctl parse-oxm OpenFlow15], [0], @@ -2252,7 +2455,7 @@ AT_CHECK([ovs-ofctl check-vlan 0000 ffff], [0], [dnl vlan_tci=0x0000 -> 0000/ffff NXM: NXM_OF_VLAN_TCI(0000) -> 0000/ffff OXM: OXM_OF_VLAN_VID(0000) -> 0000/1fff,-- -OF1.0: ffff/0,00/1 -> 0000/ffff +OF1.0: ffff/0,00/0 -> 0000/ffff OF1.1: ffff/0,00/1 -> 0000/ffff ]) @@ -2297,7 +2500,7 @@ AT_CHECK([ovs-ofctl check-vlan 0000 f000], [0], [dnl vlan_tci=0x0000/0xf000 -> 0000/f000 NXM: NXM_OF_VLAN_TCI_W(0000/f000) -> 0000/f000 OXM: OXM_OF_VLAN_VID_W(0000/1000) -> 0000/1000,-- -OF1.0: ffff/0,00/1 -> 0000/ffff +OF1.0: ffff/0,00/0 -> 0000/ffff OF1.1: ffff/0,00/1 -> 0000/ffff ]) @@ -2629,3 +2832,178 @@ AT_CHECK([tail -1 stdout], [0], OVS_VSWITCHD_STOP AT_CLEANUP + +dnl Check importance parameter added in OF1.4. +dnl It validates whether importance set via add-flow via OpenFlow1.4+ gets +dnl set or not by validating it against the dump-flows output via OpenFlow1.4+ +dnl If add-flow or dump-flows is used with later version of OpenFlow prior to 1.4+ +dnl then the importance will be considered zero whether provided as an argument. + +AT_SETUP([ovs-ofctl rule with importance]) +OVS_VSWITCHD_START +dnl Flow with importance parameter added via OF1.4+ and later version +AT_CHECK([ovs-ofctl -O OpenFlow14 add-flow br0 priority=21,importance=21,actions=normal]) +AT_CHECK([ovs-ofctl add-flow br0 priority=22,importance=22,actions=normal]) + +dnl Importance parameter will only be visible of flows that are added via OF1.4+ if dumped via OF1.4+ +AT_CHECK([ovs-ofctl -O OpenFlow14 dump-flows br0 | ofctl_strip | sed '/ST_FLOW reply/d' | sort], [0], [dnl + importance=21, priority=21 actions=NORMAL + reset_counts priority=22 actions=NORMAL +]) + +dnl Importance parameter will not be visible if flow is dumped with previous version prior to OF1.4+ whether added via OF1.4+ +AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sed '/ST_FLOW reply/d' | sort], [0], [dnl + priority=21 actions=NORMAL + priority=22 actions=NORMAL +]) + +OVS_VSWITCHD_STOP +AT_CLEANUP + + +dnl Importance parameter added in OF1.4. +dnl This validates whether flows with importance +dnl parameter are getting replaced with "replace-flows" or +dnl not by validating dump-flows output after replace with the expected output. + +AT_SETUP([ovs-ofctl replace-flows with importance]) +OVS_VSWITCHD_START + +dnl Add flows to br0 with importance via OF1.4+. For more details refer "ovs-ofctl rule with importance" test case. +for i in 1 2 3 4 5 6 7 8; do echo "dl_vlan=$i,importance=$i,actions=drop"; done > add-flows.txt +AT_CHECK([ovs-ofctl -O OpenFlow14 add-flows br0 add-flows.txt]) + +dnl Replace the flows in the bridge. +for i in 1 3 5 7; do echo " importance=`expr $i + 10`, dl_vlan=$i actions=drop"; done > replace-flows.txt +AT_CHECK([ovs-ofctl -O OpenFlow14 replace-flows br0 replace-flows.txt]) + +dnl Dump them and compare the dump flows output against the expected output. +cat replace-flows.txt > expout +AT_CHECK([ovs-ofctl -O OpenFlow14 dump-flows br0 | ofctl_strip | sed '/OFPST_FLOW/d' | sort], + [0], [expout]) + +OVS_VSWITCHD_STOP +AT_CLEANUP + +AT_SETUP([ovs-ofctl replace-flows with --bundle]) +OVS_VSWITCHD_START + +AT_CHECK([ovs-appctl vlog/set vconn:dbg]) + +dnl Add flows to br0 with importance via OF1.4+, using an OF1.4+ bundle. For more details refer "ovs-ofctl rule with importance" test case. +for i in 1 2 3 4 5 6 7 8; do echo "table=$i,dl_vlan=$i,importance=$i,actions=drop"; done > add-flows.txt +AT_CHECK([ovs-ofctl --bundle add-flows br0 add-flows.txt]) + +dnl Replace some flows in the bridge. +for i in 1 3 5 7; do echo " table=$i, importance=`expr $i + 10`, dl_vlan=$i actions=drop"; done > replace-flows.txt +AT_CHECK([ovs-ofctl --bundle replace-flows br0 replace-flows.txt]) + +dnl Dump them and compare the dump flows output against the expected output. +cat replace-flows.txt > expout +AT_CHECK([ovs-ofctl -O OpenFlow14 dump-flows br0 | ofctl_strip | sed '/OFPST_FLOW/d' | sort], + [0], [expout]) + +dnl Check logs for OpenFlow trace +# Prevent race. +OVS_WAIT_UNTIL([vconn_sub < ovs-vswitchd.log | test `grep -- "|vconn|DBG|unix: sent (Success): OFPST_FLOW reply" | wc -l` -ge 2]) +# AT_CHECK([sed -n "s/^.*\(|vconn|DBG|.*xid=.*:\).*$/\1/p" ovs-vswitchd.log], [0], [dnl +AT_CHECK([print_vconn_debug | vconn_sub | ofctl_strip], [0], [dnl +vconn|DBG|unix: sent (Success): OFPT_HELLO (OF1.5): + version bitmap: 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 +vconn|DBG|unix: received: OFPT_HELLO (OF1.4): + version bitmap: 0x05 +vconn|DBG|unix: negotiated OpenFlow version 0x05 (we support version 0x06 and earlier, peer supports version 0x05) +vconn|DBG|unix: received: OFPT_BUNDLE_CONTROL (OF1.4): + bundle_id=0 type=OPEN_REQUEST flags=atomic ordered +vconn|DBG|unix: sent (Success): OFPT_BUNDLE_CONTROL (OF1.4): + bundle_id=0 type=OPEN_REPLY flags=0 +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:1 dl_vlan=1 importance:1 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:2 dl_vlan=2 importance:2 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:3 dl_vlan=3 importance:3 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:4 dl_vlan=4 importance:4 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:5 dl_vlan=5 importance:5 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:6 dl_vlan=6 importance:6 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:7 dl_vlan=7 importance:7 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:8 dl_vlan=8 importance:8 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_CONTROL (OF1.4): + bundle_id=0 type=COMMIT_REQUEST flags=atomic ordered +vconn|DBG|unix: sent (Success): OFPT_BUNDLE_CONTROL (OF1.4): + bundle_id=0 type=COMMIT_REPLY flags=0 +vconn|DBG|unix: sent (Success): OFPT_HELLO (OF1.5): + version bitmap: 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 +vconn|DBG|unix: received: OFPT_HELLO (OF1.4): + version bitmap: 0x05 +vconn|DBG|unix: negotiated OpenFlow version 0x05 (we support version 0x06 and earlier, peer supports version 0x05) +vconn|DBG|unix: received: OFPST_FLOW request (OF1.4): +vconn|DBG|unix: sent (Success): OFPST_FLOW reply (OF1.4): + table=1, importance=1, dl_vlan=1 actions=drop + table=2, importance=2, dl_vlan=2 actions=drop + table=3, importance=3, dl_vlan=3 actions=drop + table=4, importance=4, dl_vlan=4 actions=drop + table=5, importance=5, dl_vlan=5 actions=drop + table=6, importance=6, dl_vlan=6 actions=drop + table=7, importance=7, dl_vlan=7 actions=drop + table=8, importance=8, dl_vlan=8 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_CONTROL (OF1.4): + bundle_id=0 type=OPEN_REQUEST flags=atomic ordered +vconn|DBG|unix: sent (Success): OFPT_BUNDLE_CONTROL (OF1.4): + bundle_id=0 type=OPEN_REPLY flags=0 +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:1 dl_vlan=1 importance:11 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): DEL_STRICT table:2 dl_vlan=2 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:3 dl_vlan=3 importance:13 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): DEL_STRICT table:4 dl_vlan=4 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:5 dl_vlan=5 importance:15 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): DEL_STRICT table:6 dl_vlan=6 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): ADD table:7 dl_vlan=7 importance:17 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_ADD_MESSAGE (OF1.4): + bundle_id=0 flags=atomic ordered +OFPT_FLOW_MOD (OF1.4): DEL_STRICT table:8 dl_vlan=8 actions=drop +vconn|DBG|unix: received: OFPT_BUNDLE_CONTROL (OF1.4): + bundle_id=0 type=COMMIT_REQUEST flags=atomic ordered +vconn|DBG|unix: sent (Success): OFPT_BUNDLE_CONTROL (OF1.4): + bundle_id=0 type=COMMIT_REPLY flags=0 +vconn|DBG|unix: sent (Success): OFPT_HELLO (OF1.5): + version bitmap: 0x01, 0x02, 0x03, 0x04, 0x05, 0x06 +vconn|DBG|unix: received: OFPT_HELLO (OF1.4): + version bitmap: 0x05 +vconn|DBG|unix: negotiated OpenFlow version 0x05 (we support version 0x06 and earlier, peer supports version 0x05) +vconn|DBG|unix: received: OFPST_FLOW request (OF1.4): +vconn|DBG|unix: sent (Success): OFPST_FLOW reply (OF1.4): + table=1, importance=11, dl_vlan=1 actions=drop + table=3, importance=13, dl_vlan=3 actions=drop + table=5, importance=15, dl_vlan=5 actions=drop + table=7, importance=17, dl_vlan=7 actions=drop +]) + +OVS_VSWITCHD_STOP +AT_CLEANUP