3 AT_SETUP([ofproto - echo request])
5 AT_CHECK([ovs-ofctl -vwarn probe br0])
9 AT_SETUP([ofproto - handling messages with bad version])
12 # Start a monitor running OpenFlow 1.0, then send the switch an OF1.1 features
14 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
15 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
16 AT_CAPTURE_FILE([monitor.log])
17 ovs-appctl -t ovs-ofctl ofctl/send 0205000801234567
18 ovs-appctl -t ovs-ofctl ofctl/barrier
19 ovs-appctl -t ovs-ofctl exit
21 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//
22 /ECHO/d' monitor.log], [0], [dnl
23 send: OFPT_FEATURES_REQUEST (OF1.1):
24 OFPT_ERROR (OF1.1): OFPBRC_BAD_VERSION
25 OFPT_FEATURES_REQUEST (OF1.1):
29 OVS_VSWITCHD_STOP(["/received OpenFlow version 0x02 != expected 01/d"])
32 AT_SETUP([ofproto - feature request, config request])
34 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
35 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
36 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
37 n_tables:254, n_buffers:256
38 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
39 actions: output enqueue set_vlan_vid set_vlan_pcp strip_vlan mod_dl_src mod_dl_dst mod_nw_src mod_nw_dst mod_nw_tos mod_tp_src mod_tp_dst
40 LOCAL(br0): addr:aa:55:aa:55:00:00
43 speed: 0 Mbps now, 0 Mbps max
44 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
49 AT_SETUP([ofproto - set OpenFlow port number])
51 [add-port br0 p1 -- set Interface p1 type=dummy --\
52 add-port br0 p2 -- set Interface p2 type=dummy ofport_request=99])
53 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
55 s/ (xid=0x[0-9a-fA-F]*)//
56 s/00:0.$/00:0x/' < stdout]],
58 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
59 n_tables:254, n_buffers:256
60 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
61 actions: output enqueue set_vlan_vid set_vlan_pcp strip_vlan mod_dl_src mod_dl_dst mod_nw_src mod_nw_dst mod_nw_tos mod_tp_src mod_tp_dst
62 1(p1): addr:aa:55:aa:55:00:0x
65 speed: 0 Mbps now, 0 Mbps max
66 99(p2): addr:aa:55:aa:55:00:0x
69 speed: 0 Mbps now, 0 Mbps max
70 LOCAL(br0): addr:aa:55:aa:55:00:0x
73 speed: 0 Mbps now, 0 Mbps max
74 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
80 dnl This is really bare-bones.
81 dnl It at least checks request and reply serialization and deserialization.
82 AT_SETUP([ofproto - port stats - (OpenFlow 1.0)])
84 AT_CHECK([ovs-ofctl -vwarn dump-ports br0], [0], [stdout])
85 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
86 OFPST_PORT reply: 1 ports
87 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
88 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
93 AT_SETUP([ofproto - port stats - (OpenFlow 1.2)])
95 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-ports br0], [0], [stdout])
96 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
97 OFPST_PORT reply (OF1.2): 1 ports
98 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
99 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
104 AT_SETUP([ofproto - port stats - (OpenFlow 1.4)])
106 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn dump-ports br0], [0], [stdout])
107 AT_CHECK([STRIP_XIDS stdout | sed 's/duration=[[0-9.]]*s/duration=?s/'],
109 OFPST_PORT reply (OF1.4): 1 ports
110 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
111 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
117 dnl This is really bare-bones.
118 dnl It at least checks request and reply serialization and deserialization.
119 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.0)])
121 AT_CHECK([ovs-ofctl -vwarn dump-ports-desc br0], [0], [stdout])
122 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
123 OFPST_PORT_DESC reply:
124 LOCAL(br0): addr:aa:55:aa:55:00:00
127 speed: 0 Mbps now, 0 Mbps max
132 dnl This is really bare-bones.
133 dnl It at least checks request and reply serialization and deserialization.
134 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.2)])
136 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-ports-desc br0], [0], [stdout])
137 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
138 OFPST_PORT_DESC reply (OF1.2):
139 LOCAL(br0): addr:aa:55:aa:55:00:00
142 speed: 0 Mbps now, 0 Mbps max
147 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.5)])
149 ADD_OF_PORTS([br0], 1, 2, 3)
150 AT_CHECK([ovs-ofctl -F OXM-OpenFlow15 -O OpenFlow15 -vwarn dump-ports-desc br0], [0], [stdout])
151 AT_CHECK([STRIP_XIDS stdout | sed 's/00:0./00:0x/'], [0], [dnl
152 OFPST_PORT_DESC reply (OF1.5):
153 1(p1): addr:aa:55:aa:55:00:0x
156 speed: 0 Mbps now, 0 Mbps max
157 2(p2): addr:aa:55:aa:55:00:0x
160 speed: 0 Mbps now, 0 Mbps max
161 3(p3): addr:aa:55:aa:55:00:0x
164 speed: 0 Mbps now, 0 Mbps max
165 LOCAL(br0): addr:aa:55:aa:55:00:0x
168 speed: 0 Mbps now, 0 Mbps max
170 AT_CHECK([ovs-ofctl -F OXM-OpenFlow15 -O OpenFlow15 -vwarn dump-ports-desc br0 2], [0], [stdout])
171 AT_CHECK([STRIP_XIDS stdout | sed 's/00:0./00:0x/'], [0], [dnl
172 OFPST_PORT_DESC reply (OF1.5):
173 2(p2): addr:aa:55:aa:55:00:0x
176 speed: 0 Mbps now, 0 Mbps max
181 dnl This is really bare-bones.
182 dnl It at least checks request and reply serialization and deserialization.
183 AT_SETUP([ofproto - queue stats - (OpenFlow 1.0)])
185 AT_CHECK([ovs-ofctl -vwarn queue-stats br0], [0], [stdout])
186 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
187 OFPST_QUEUE reply: 0 queues
189 AT_CHECK([ovs-ofctl -vwarn queue-stats br0 ANY 5], [0],
190 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_QUEUE
191 OFPST_QUEUE request (xid=0x2):port=ANY queue=5
193 AT_CHECK([ovs-ofctl -vwarn queue-stats br0 10], [0],
194 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_PORT
195 OFPST_QUEUE request (xid=0x2):port=10 queue=ALL
200 AT_SETUP([ofproto - queue stats - (OpenFlow 1.2)])
202 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0], [0], [stdout])
203 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
204 OFPST_QUEUE reply (OF1.2): 0 queues
206 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0 ALL 5], [0],
207 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_QUEUE
208 OFPST_QUEUE request (OF1.2) (xid=0x2):port=ANY queue=5
210 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0 10], [0],
211 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_PORT
212 OFPST_QUEUE request (OF1.2) (xid=0x2):port=10 queue=ALL
217 AT_SETUP([ofproto - queue stats - (OpenFlow 1.4)])
219 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn queue-stats br0], [0], [stdout])
220 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
221 OFPST_QUEUE reply (OF1.4): 0 queues
223 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn queue-stats br0 ALL 5], [0],
224 [OFPT_ERROR (OF1.4) (xid=0x2): OFPQOFC_BAD_QUEUE
225 OFPST_QUEUE request (OF1.4) (xid=0x2):port=ANY queue=5
227 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn queue-stats br0 10], [0],
228 [OFPT_ERROR (OF1.4) (xid=0x2): OFPQOFC_BAD_PORT
229 OFPST_QUEUE request (OF1.4) (xid=0x2):port=10 queue=ALL
234 dnl This is really bare-bones.
235 dnl It at least checks request and reply serialization and deserialization.
236 AT_SETUP([ofproto - queue configuration - (OpenFlow 1.0)])
238 ADD_OF_PORTS([br0], [1], [2])
239 AT_CHECK([ovs-ofctl queue-get-config br0 1], [0], [stdout])
240 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
241 OFPT_QUEUE_GET_CONFIG_REPLY: port=1
243 AT_CHECK([ovs-ofctl queue-get-config br0 10], [0],
244 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_PORT
245 OFPT_QUEUE_GET_CONFIG_REQUEST (xid=0x2): port=10
250 AT_SETUP([ofproto - queue configuration - (OpenFlow 1.2)])
252 ADD_OF_PORTS([br0], [1], [2])
253 AT_CHECK([ovs-ofctl -O OpenFlow12 queue-get-config br0 1], [0], [stdout])
254 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
255 OFPT_QUEUE_GET_CONFIG_REPLY (OF1.2): port=1
257 AT_CHECK([ovs-ofctl -O OpenFlow12 queue-get-config br0 10], [0],
258 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_PORT
259 OFPT_QUEUE_GET_CONFIG_REQUEST (OF1.2) (xid=0x2): port=10
264 dnl This is really bare-bones.
265 dnl It at least checks request and reply serialization and deserialization.
266 dnl Actions definition listed in both supported formats (w/ actions=)
267 AT_SETUP([ofproto - del group])
269 AT_DATA([groups.txt], [dnl
270 group_id=1234,type=all,bucket=output:10
271 group_id=1235,type=all,bucket=actions=output:10
273 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
274 AT_CHECK([ovs-ofctl -F OXM-OpenFlow15 -O OpenFlow15 -vwarn dump-groups br0 1234], [0], [stdout])
275 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
276 OFPST_GROUP_DESC reply (OF1.5):
277 group_id=1234,type=all,bucket=actions=output:10
279 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
280 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
281 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
282 OFPST_GROUP_DESC reply (OF1.1):
283 group_id=1235,type=all,bucket=actions=output:10
285 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
286 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
287 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
288 OFPST_GROUP_DESC reply (OF1.1):
289 group_id=1235,type=all,bucket=actions=output:10
291 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0], [0])
292 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
293 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
294 OFPST_GROUP_DESC reply (OF1.1):
299 dnl This is really bare-bones.
300 dnl It at least checks request and reply serialization and deserialization.
301 AT_SETUP([ofproto - del group deletes flows])
303 AT_DATA([groups.txt], [dnl
304 group_id=1234,type=all,bucket=output:10
305 group_id=1235,type=all,bucket=output:10
307 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
308 AT_DATA([flows.txt], [dnl
309 tcp actions=group:1234
310 udp actions=group:1235
312 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flows br0 flows.txt])
313 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
315 tcp actions=group:1234
316 udp actions=group:1235
317 OFPST_FLOW reply (OF1.1):
319 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
320 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
322 udp actions=group:1235
323 OFPST_FLOW reply (OF1.1):
325 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
326 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
328 udp actions=group:1235
329 OFPST_FLOW reply (OF1.1):
331 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0])
332 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
334 OFPST_FLOW reply (OF1.1):
339 dnl This is really bare-bones.
340 dnl It at least checks request and reply serialization and deserialization.
341 AT_SETUP([ofproto - flow mod checks group availability])
343 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10])
344 AT_DATA([flows.txt], [dnl
345 tcp actions=group:1234
346 udp actions=group:1235
348 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1234'])
349 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1235'], [1], [], [stderr])
351 # The output should look like this:
353 # 00000000 02 0e 00 98 00 00 00 02-00 00 00 00 00 00 00 00 |................|
354 # 00000010 00 00 00 00 00 00 00 00-ff 00 00 00 00 00 80 00 |................|
355 # 00000020 ff ff ff ff ff ff ff ff-ff ff ff ff 00 00 00 00 |................|
356 # 00000030 00 00 00 58 00 00 00 00-00 00 03 d7 00 00 00 00 |...X............|
358 # This 'sed' command captures the error message but drops details.
359 AT_CHECK([sed '/truncated/d
360 /^000000.0/d' stderr | STRIP_XIDS], [0],
361 [OFPT_ERROR (OF1.1): OFPBAC_BAD_OUT_GROUP
362 OFPT_FLOW_MOD (OF1.1):
367 dnl This is really bare-bones.
368 dnl It at least checks request and reply serialization and deserialization.
369 AT_SETUP([ofproto - group description])
371 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10], [0], [stdout])
372 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
373 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
374 OFPST_GROUP_DESC reply (OF1.1):
375 group_id=1234,type=all,bucket=actions=output:10
380 dnl This is really bare-bones.
381 dnl It at least checks request and reply serialization and deserialization.
382 AT_SETUP([ofproto - group description])
384 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10])
385 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
386 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
387 OFPST_GROUP_DESC reply (OF1.1):
388 group_id=1234,type=all,bucket=actions=output:10
393 dnl This is really bare-bones.
394 dnl It at least checks request and reply serialization and deserialization.
395 AT_SETUP([ofproto - group features])
397 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-group-features br0], [0], [stdout])
398 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
399 OFPST_GROUP_FEATURES reply (OF1.2):
407 dnl This is really bare-bones.
408 dnl It at least checks request and reply serialization and deserialization.
409 AT_SETUP([ofproto - group stats])
411 AT_DATA([groups.txt], [dnl
412 group_id=1234,type=all,bucket=output:10
413 group_id=1235,type=all,bucket=output:10
415 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
416 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1234'])
417 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-group-stats br0 group_id=1234], [0], [stdout])
418 AT_CHECK([STRIP_XIDS stdout | sort], [0], [dnl
419 group_id=1234,ref_count=1,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
420 OFPST_GROUP reply (OF1.1):
422 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-group-stats br0], [0], [stdout])
423 AT_CHECK([STRIP_XIDS stdout | sort], [0], [dnl
424 group_id=1234,ref_count=1,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
425 group_id=1235,ref_count=0,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
426 OFPST_GROUP reply (OF1.1):
431 AT_SETUP([ofproto - mod-port (OpenFlow 1.0)])
433 for command_config_state in \
435 'noflood NO_FLOOD 0' \
436 'down PORT_DOWN,NO_FLOOD LINK_DOWN' \
437 'flood PORT_DOWN LINK_DOWN' \
438 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
439 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
440 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
441 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
442 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
446 set $command_config_state
447 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
448 AT_CHECK([ovs-ofctl -vwarn mod-port br0 br0 $command])
449 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
450 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
451 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
452 n_tables:254, n_buffers:256
453 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
454 actions: output enqueue set_vlan_vid set_vlan_pcp strip_vlan mod_dl_src mod_dl_dst mod_nw_src mod_nw_dst mod_nw_tos mod_tp_src mod_tp_dst
455 LOCAL(br0): addr:aa:55:aa:55:00:00
458 speed: 0 Mbps now, 0 Mbps max
459 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
465 AT_SETUP([ofproto - mod-port (OpenFlow 1.2)])
467 for command_config_state in \
469 'down PORT_DOWN LINK_DOWN' \
470 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
471 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
472 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
473 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
474 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
478 set $command_config_state
479 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
480 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn mod-port br0 br0 $command])
481 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn show br0], [0], [stdout])
482 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
483 OFPT_FEATURES_REPLY (OF1.2): dpid:fedcba9876543210
484 n_tables:254, n_buffers:256
485 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS
486 LOCAL(br0): addr:aa:55:aa:55:00:00
489 speed: 0 Mbps now, 0 Mbps max
490 OFPT_GET_CONFIG_REPLY (OF1.2): frags=normal miss_send_len=0
496 AT_SETUP([ofproto - mod-port (OpenFlow 1.4)])
498 for command_config_state in \
500 'down PORT_DOWN LINK_DOWN' \
501 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
502 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
503 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
504 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
505 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
509 set $command_config_state
510 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
511 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn mod-port br0 br0 $command])
512 AT_CHECK([ovs-ofctl -O OpenFlow14 -vwarn show br0], [0], [stdout])
513 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
514 OFPT_FEATURES_REPLY (OF1.4): dpid:fedcba9876543210
515 n_tables:254, n_buffers:256
516 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS
517 OFPST_PORT_DESC reply (OF1.4):
518 LOCAL(br0): addr:aa:55:aa:55:00:00
521 speed: 0 Mbps now, 0 Mbps max
522 OFPT_GET_CONFIG_REPLY (OF1.4): frags=normal miss_send_len=0
528 AT_SETUP([ofproto - basic flow_mod commands (NXM)])
530 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
532 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl add-flows br0 -])
533 AT_CHECK([ovs-ofctl add-flow br0 in_port=1,actions=2])
534 AT_CHECK([ovs-ofctl -F nxm add-flow br0 table=1,in_port=4,actions=3])
535 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
536 in_port=1 actions=output:2
537 in_port=2 actions=output:1
538 table=1, in_port=4 actions=output:3
541 AT_CHECK([ovs-ofctl dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
542 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=2
544 AT_CHECK([ovs-ofctl del-flows br0])
545 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
550 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.0)])
552 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply:
554 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -F openflow10 add-flows br0 -])
555 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 in_port=1,actions=2])
556 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 table=1,in_port=4,actions=3])
557 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
558 in_port=1 actions=output:2
559 in_port=2 actions=output:1
560 table=1, in_port=4 actions=output:3
563 AT_CHECK([ovs-ofctl -F openflow10 dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
564 OFPST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=2
566 AT_CHECK([ovs-ofctl -F openflow10 del-flows br0])
567 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply:
572 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.1)])
574 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.1):
576 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -O OpenFlow11 add-flows br0 -])
577 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 in_port=1,actions=2])
578 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 table=1,in_port=4,actions=3])
579 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
580 in_port=1 actions=output:2
581 in_port=2 actions=output:1
582 table=1, in_port=4 actions=output:3
583 OFPST_FLOW reply (OF1.1):
585 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
586 OFPST_AGGREGATE reply (OF1.1): packet_count=0 byte_count=0 flow_count=2
588 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0])
589 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.1):
590 table=1, in_port=4 actions=output:3
595 AT_SETUP([ofproto - flow_mod negative test (OpenFlow 1.1)])
597 [set bridge br0 protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13])
598 AT_CHECK([ovs-ofctl add-flow -O OpenFlow11 br0 table=1,action=goto_table:2])
600 # The error message here actually comes from ovs-ofctl, not from ovs-vswitchd,
601 # but at least it's the same code in ofpacts_check() that issues the error.
602 AT_CHECK([ovs-ofctl add-flow -O OpenFlow11 br0 table=1,action=goto_table:1],
604 [ovs-ofctl: actions are invalid with specified match (OFPBRC_BAD_TABLE_ID)
609 AT_SETUP([ofproto - set-field flow_mod commands (NXM)])
611 AT_CHECK([ovs-ofctl add-flow br0 ipv6,table=1,in_port=3,actions=drop])
612 AT_CHECK([ovs-ofctl add-flow br0 ipv6,table=1,in_port=3,actions=set_field:fe80:0123:4567:890a:a6ba:dbff:fefe:59fa-\>ipv6_src])
613 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
614 table=1, ipv6,in_port=3 actions=load:0xa6badbfffefe59fa->NXM_NX_IPV6_SRC[[0..63]],load:0xfe8001234567890a->NXM_NX_IPV6_SRC[[64..127]]
620 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.2)])
622 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.2):
624 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -O OpenFlow12 add-flows br0 -])
625 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=1,actions=2])
626 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 table=1,in_port=4,actions=3])
627 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
628 in_port=1 actions=output:2
629 in_port=2 actions=output:1
630 table=1, in_port=4 actions=output:3
631 OFPST_FLOW reply (OF1.2):
633 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0])
634 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.2):
639 AT_SETUP([ofproto - dump flows with cookie])
641 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
642 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
643 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
644 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
645 cookie=0x1, in_port=1 actions=output:1
646 cookie=0x2, in_port=2 actions=output:1
647 cookie=0x3, in_port=3 actions=output:1
650 AT_CHECK([ovs-ofctl dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
651 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=3
653 AT_CHECK([ovs-ofctl dump-flows br0 cookie=0x3/-1 | ofctl_strip | sort], [0], [dnl
654 cookie=0x3, in_port=3 actions=output:1
657 AT_CHECK([ovs-ofctl dump-aggregate br0 cookie=0x3/-1 | STRIP_XIDS], [0], [dnl
658 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=1
663 AT_SETUP([ofproto - mod flow with cookie change (OpenFlow 1.0)])
665 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 cookie=0x1,in_port=1,actions=1])
666 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
667 cookie=0x1, in_port=1 actions=output:1
671 AT_CHECK([ovs-ofctl -F openflow10 mod-flows br0 cookie=0x2,in_port=1,actions=1])
672 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
673 cookie=0x2, in_port=1 actions=output:1
679 AT_SETUP([ofproto - mod flow with cookie change (NXM)])
681 AT_CHECK([ovs-ofctl -F nxm add-flow br0 cookie=0x1,in_port=1,actions=1])
682 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
683 cookie=0x1, in_port=1 actions=output:1
687 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=0x2,in_port=1,actions=1])
688 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
689 cookie=0x2, in_port=1 actions=output:1
695 AT_SETUP([ofproto - no mod flow with cookie change (OpenFlow 1.1)])
697 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
698 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
699 cookie=0x1, in_port=1 actions=output:1
700 OFPST_FLOW reply (OF1.1):
702 AT_CHECK([ovs-ofctl -O OpenFlow11 mod-flows br0 cookie=0x2,in_port=1,actions=1])
703 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
704 cookie=0x1, in_port=1 actions=output:1
705 OFPST_FLOW reply (OF1.1):
710 dnl The OpenFlow 1.2 spec states that the cookie may not be modified
711 AT_SETUP([ofproto - no mod flow with cookie change (OpenFlow 1.2)])
713 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
714 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
715 cookie=0x1, in_port=1 actions=output:1
716 OFPST_FLOW reply (OF1.2):
719 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 cookie=0x2,in_port=1,actions=1])
720 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
721 cookie=0x1, in_port=1 actions=output:1
722 OFPST_FLOW reply (OF1.2):
727 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.0)])
729 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
730 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=2,actions=1])
731 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=3,actions=1])
732 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
733 cookie=0x1, in_port=1 actions=output:1
734 cookie=0x1, in_port=2 actions=output:1
735 cookie=0x2, in_port=3 actions=output:1
739 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=0x1/0xff,actions=4])
740 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
741 cookie=0x1, in_port=1 actions=output:4
742 cookie=0x1, in_port=2 actions=output:4
743 cookie=0x2, in_port=3 actions=output:1
749 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.1)])
751 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
752 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=2,actions=1])
753 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=3,actions=1])
754 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
755 cookie=0x1, in_port=1 actions=output:1
756 cookie=0x1, in_port=2 actions=output:1
757 cookie=0x2, in_port=3 actions=output:1
758 OFPST_FLOW reply (OF1.1):
761 AT_CHECK([ovs-ofctl -O OpenFlow11 mod-flows br0 cookie=0x1/0xff,actions=4])
762 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
763 cookie=0x1, in_port=1 actions=output:4
764 cookie=0x1, in_port=2 actions=output:4
765 cookie=0x2, in_port=3 actions=output:1
766 OFPST_FLOW reply (OF1.1):
771 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.2)])
773 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
774 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=2,actions=1])
775 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=3,actions=1])
776 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
777 cookie=0x1, in_port=1 actions=output:1
778 cookie=0x1, in_port=2 actions=output:1
779 cookie=0x2, in_port=3 actions=output:1
780 OFPST_FLOW reply (OF1.2):
783 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 cookie=0x1/0xff,actions=4])
784 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
785 cookie=0x1, in_port=1 actions=output:4
786 cookie=0x1, in_port=2 actions=output:4
787 cookie=0x2, in_port=3 actions=output:1
788 OFPST_FLOW reply (OF1.2):
793 dnl The OpenFlow 1.2 spec states that the cookie may not be modified
794 AT_SETUP([ofproto - mod flows based on cookie mask with cookie change])
796 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
797 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=2,actions=1])
798 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=3,actions=1])
799 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
800 cookie=0x1, in_port=1 actions=output:1
801 cookie=0x1, in_port=2 actions=output:1
802 cookie=0x2, in_port=3 actions=output:1
806 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=1/-1,cookie=4,actions=4])
807 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
808 cookie=0x2, in_port=3 actions=output:1
809 cookie=0x4, in_port=1 actions=output:4
810 cookie=0x4, in_port=2 actions=output:4
816 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - NXM])
818 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 in_port=1,actions=1])
819 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
820 in_port=1 actions=output:1
826 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - OF1.1])
828 AT_CHECK([ovs-ofctl -O openflow11 mod-flows br0 in_port=1,actions=1])
829 AT_CHECK([ovs-ofctl -O openflow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
830 in_port=1 actions=output:1
831 OFPST_FLOW reply (OF1.1):
836 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - OF1.2])
838 AT_CHECK([ovs-ofctl -O openflow12 mod-flows br0 in_port=1,actions=1])
839 AT_CHECK([ovs-ofctl -O openflow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
840 OFPST_FLOW reply (OF1.2):
845 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - NXM])
847 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=1/1,in_port=1,actions=1])
848 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
854 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - OF1.1])
856 AT_CHECK([ovs-ofctl -O openflow11 mod-flows br0 cookie=1/1,in_port=1,actions=1])
857 AT_CHECK([ovs-ofctl -O openflow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
858 OFPST_FLOW reply (OF1.1):
863 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - OF1.2])
865 AT_CHECK([ovs-ofctl -O openflow12 mod-flows br0 cookie=1/1,in_port=1,actions=1])
866 AT_CHECK([ovs-ofctl -O openflow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
867 OFPST_FLOW reply (OF1.2):
872 AT_SETUP([ofproto - del flows with cookies])
874 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
875 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
876 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
877 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
878 cookie=0x1, in_port=1 actions=output:1
879 cookie=0x2, in_port=2 actions=output:1
880 cookie=0x3, in_port=3 actions=output:1
884 AT_CHECK([ovs-ofctl del-flows br0])
885 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
891 AT_SETUP([ofproto - del flows based on cookie])
893 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
894 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
895 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
896 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
897 cookie=0x1, in_port=1 actions=output:1
898 cookie=0x2, in_port=2 actions=output:1
899 cookie=0x3, in_port=3 actions=output:1
903 AT_CHECK([ovs-ofctl del-flows br0 cookie=0x3/-1])
904 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
905 cookie=0x1, in_port=1 actions=output:1
906 cookie=0x2, in_port=2 actions=output:1
912 AT_SETUP([ofproto - del flows based on cookie mask])
914 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
915 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
916 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
917 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
918 cookie=0x1, in_port=1 actions=output:1
919 cookie=0x2, in_port=2 actions=output:1
920 cookie=0x3, in_port=3 actions=output:1
923 AT_CHECK([ovs-ofctl del-flows br0 cookie=0x3/0x1])
924 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
925 cookie=0x2, in_port=2 actions=output:1
931 AT_SETUP([ofproto - del flows based on table id (NXM)])
933 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
934 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
935 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
936 cookie=0x1, in_port=1 actions=output:1
937 cookie=0x2, table=1, in_port=2 actions=output:1
940 AT_CHECK([ovs-ofctl del-flows br0 table=0])
941 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
942 cookie=0x2, table=1, in_port=2 actions=output:1
945 AT_CHECK([ovs-ofctl del-flows br0 table=1])
946 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
949 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
950 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
951 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
952 cookie=0x1, in_port=1 actions=output:1
953 cookie=0x2, table=1, in_port=2 actions=output:1
956 AT_CHECK([ovs-ofctl del-flows br0])
957 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
963 AT_SETUP([ofproto - del flows based on table id (OpenFlow 1.1)])
965 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
966 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
967 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
968 cookie=0x1, in_port=1 actions=output:1
969 cookie=0x2, table=1, in_port=2 actions=output:1
970 OFPST_FLOW reply (OF1.1):
972 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0 table=0])
973 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
974 cookie=0x2, table=1, in_port=2 actions=output:1
975 OFPST_FLOW reply (OF1.1):
977 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0 table=1])
978 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
979 OFPST_FLOW reply (OF1.1):
981 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
982 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
983 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
984 cookie=0x1, in_port=1 actions=output:1
985 cookie=0x2, table=1, in_port=2 actions=output:1
986 OFPST_FLOW reply (OF1.1):
988 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0])
989 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [dnl
990 OFPST_FLOW reply (OF1.1):
991 cookie=0x2, table=1, in_port=2 actions=output:1
996 AT_SETUP([ofproto - del flows based on table id (OpenFlow 1.2)])
998 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
999 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
1000 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1001 cookie=0x1, in_port=1 actions=output:1
1002 cookie=0x2, table=1, in_port=2 actions=output:1
1003 OFPST_FLOW reply (OF1.2):
1005 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0 table=0])
1006 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1007 cookie=0x2, table=1, in_port=2 actions=output:1
1008 OFPST_FLOW reply (OF1.2):
1010 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0 table=1])
1011 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1012 OFPST_FLOW reply (OF1.2):
1014 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
1015 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
1016 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1017 cookie=0x1, in_port=1 actions=output:1
1018 cookie=0x2, table=1, in_port=2 actions=output:1
1019 OFPST_FLOW reply (OF1.2):
1021 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0])
1022 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1023 OFPST_FLOW reply (OF1.2):
1028 AT_SETUP([ofproto - flow table configuration (OpenFlow 1.0)])
1030 # Check the default configuration.
1031 (echo "OFPST_TABLE reply (xid=0x2): 254 tables
1032 0: classifier: wild=0x3fffff, max=1000000, active=0
1033 lookup=0, matched=0"
1035 while test $x -lt 254; do
1036 printf " %d: %-8s: wild=0x3fffff, max=1000000, active=0
1041 AT_CHECK([ovs-ofctl dump-tables br0], [0], [expout])
1042 # Change the configuration.
1045 -- --id=@t0 create Flow_Table name=main \
1046 -- --id=@t1 create Flow_Table flow-limit=1024 \
1047 -- set bridge br0 'flow_tables={1=@t1,0=@t0}' \
1048 | ${PERL} $srcdir/uuidfilt.pl],
1052 # Check that the configuration was updated.
1053 mv expout orig-expout
1054 (echo "OFPST_TABLE reply (xid=0x2): 254 tables
1055 0: main : wild=0x3fffff, max=1000000, active=0
1057 1: table1 : wild=0x3fffff, max= 1024, active=0
1058 lookup=0, matched=0"
1059 tail -n +6 orig-expout) > expout
1060 AT_CHECK([ovs-ofctl dump-tables br0], [0], [expout])
1064 AT_SETUP([ofproto - flow table configuration (OpenFlow 1.2)])
1066 # Check the default configuration.
1067 (mid="wild=0x1ffffffffd, max=1000000,"
1070 match=0x1ffffffffd, instructions=0x0000003e, config=0x00000003
1071 write_actions=0x03ff8001, apply_actions=0x03ff8001
1072 write_setfields=0x0000000c0fe7fbdd
1073 apply_setfields=0x0000000c0fe7fbdd
1074 metadata_match=0xffffffffffffffff
1075 metadata_write=0xffffffffffffffff"
1076 echo "OFPST_TABLE reply (OF1.2) (xid=0x2): 254 tables
1077 0: classifier: $mid active=0$tail"
1079 while test $x -lt 254; do
1080 printf " %d: %-8s: $mid active=0$tail
1084 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-tables br0], [0], [expout])
1085 # Change the configuration.
1088 -- --id=@t0 create Flow_Table name=main \
1089 -- --id=@t1 create Flow_Table flow-limit=1024 \
1090 -- set bridge br0 'flow_tables={1=@t1,0=@t0}' \
1091 | ${PERL} $srcdir/uuidfilt.pl],
1095 # Check that the configuration was updated.
1096 mv expout orig-expout
1097 (echo "OFPST_TABLE reply (OF1.2) (xid=0x2): 254 tables
1098 0: main : wild=0x1ffffffffd, max=1000000, active=0"
1099 tail -n +3 orig-expout | head -7
1100 echo " 1: table1 : wild=0x1ffffffffd, max= 1024, active=0"
1101 tail -n +11 orig-expout) > expout
1102 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-tables br0], [0], [expout])
1106 AT_SETUP([ofproto - hard limits on flow table size (OpenFlow 1.0)])
1108 # Configure a maximum of 4 flows.
1111 -- --id=@t0 create Flow_Table flow-limit=4 \
1112 -- set bridge br0 flow_tables:0=@t0 \
1113 | ${PERL} $srcdir/uuidfilt.pl],
1117 for in_port in 1 2 3 4; do
1118 ovs-ofctl add-flow br0 in_port=$in_port,actions=drop
1120 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1121 in_port=1 actions=drop
1122 in_port=2 actions=drop
1123 in_port=3 actions=drop
1124 in_port=4 actions=drop
1127 # Adding another flow will be refused.
1128 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop], [1], [], [stderr])
1129 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1130 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1132 # Also a mod-flow that would add a flow will be refused.
1133 AT_CHECK([ovs-ofctl mod-flows br0 in_port=5,actions=drop], [1], [], [stderr])
1134 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1135 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1137 # Replacing or modifying an existing flow is allowed.
1138 AT_CHECK([ovs-ofctl add-flow br0 in_port=4,actions=normal])
1139 AT_CHECK([ovs-ofctl mod-flows br0 in_port=3,actions=output:1])
1140 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1141 in_port=1 actions=drop
1142 in_port=2 actions=drop
1143 in_port=3 actions=output:1
1144 in_port=4 actions=NORMAL
1150 AT_SETUP([ofproto - hard limits on flow table size (OpenFlow 1.2)])
1152 # Configure a maximum of 4 flows.
1155 -- --id=@t0 create Flow_Table flow-limit=4 \
1156 -- set bridge br0 flow_tables:0=@t0 \
1157 | ${PERL} $srcdir/uuidfilt.pl],
1161 for in_port in 1 2 3 4; do
1162 ovs-ofctl -O OpenFlow12 add-flow br0 in_port=$in_port,actions=drop
1164 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1165 in_port=1 actions=drop
1166 in_port=2 actions=drop
1167 in_port=3 actions=drop
1168 in_port=4 actions=drop
1169 OFPST_FLOW reply (OF1.2):
1171 # Adding another flow will be refused.
1172 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=5,actions=drop], [1], [], [stderr])
1173 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1174 [OFPT_ERROR (OF1.2): OFPFMFC_TABLE_FULL
1176 # Replacing or modifying an existing flow is allowed.
1177 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=4,actions=normal])
1178 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=3,actions=output:1])
1179 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1180 in_port=1 actions=drop
1181 in_port=2 actions=drop
1182 in_port=3 actions=output:1
1183 in_port=4 actions=NORMAL
1184 OFPST_FLOW reply (OF1.2):
1189 AT_SETUP([ofproto - eviction upon table overflow (OpenFlow 1.0)])
1191 # Configure a maximum of 4 flows.
1194 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1195 -- set bridge br0 flow_tables:0=@t0 \
1196 | ${PERL} $srcdir/uuidfilt.pl],
1200 for in_port in 4 3 2 1; do
1201 ovs-ofctl add-flow br0 idle_timeout=${in_port}0,in_port=$in_port,actions=drop
1203 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1204 idle_timeout=10, in_port=1 actions=drop
1205 idle_timeout=20, in_port=2 actions=drop
1206 idle_timeout=30, in_port=3 actions=drop
1207 idle_timeout=40, in_port=4 actions=drop
1210 # Adding another flow will cause the one that expires soonest to be evicted.
1211 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1212 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1213 idle_timeout=20, in_port=2 actions=drop
1214 idle_timeout=30, in_port=3 actions=drop
1215 idle_timeout=40, in_port=4 actions=drop
1216 in_port=5 actions=drop
1219 # A mod-flow that adds a flow also causes eviction, but replacing or
1220 # modifying an existing flow doesn't.
1221 AT_CHECK([ovs-ofctl mod-flows br0 in_port=6,actions=drop])
1222 AT_CHECK([ovs-ofctl add-flow br0 in_port=4,actions=normal])
1223 AT_CHECK([ovs-ofctl mod-flows br0 in_port=3,actions=output:1])
1224 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1225 idle_timeout=30, in_port=3 actions=output:1
1226 in_port=4 actions=NORMAL
1227 in_port=5 actions=drop
1228 in_port=6 actions=drop
1231 # Flows with no timeouts at all cannot be evicted.
1232 AT_CHECK([ovs-ofctl add-flow br0 in_port=7,actions=normal])
1233 AT_CHECK([ovs-ofctl add-flow br0 in_port=8,actions=drop], [1], [], [stderr])
1234 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1235 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1237 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1238 in_port=4 actions=NORMAL
1239 in_port=5 actions=drop
1240 in_port=6 actions=drop
1241 in_port=7 actions=NORMAL
1247 AT_SETUP([ofproto - eviction upon table overflow (OpenFlow 1.2)])
1249 # Configure a maximum of 4 flows.
1252 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1253 -- set bridge br0 flow_tables:0=@t0 \
1254 | ${PERL} $srcdir/uuidfilt.pl],
1258 for in_port in 4 3 2 1; do
1259 ovs-ofctl -O OpenFlow12 add-flow br0 idle_timeout=${in_port}0,in_port=$in_port,actions=drop
1261 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1262 idle_timeout=10, in_port=1 actions=drop
1263 idle_timeout=20, in_port=2 actions=drop
1264 idle_timeout=30, in_port=3 actions=drop
1265 idle_timeout=40, in_port=4 actions=drop
1266 OFPST_FLOW reply (OF1.2):
1268 # Adding another flow will cause the one that expires soonest to be evicted.
1269 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=5,actions=drop])
1270 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1271 idle_timeout=20, in_port=2 actions=drop
1272 idle_timeout=30, in_port=3 actions=drop
1273 idle_timeout=40, in_port=4 actions=drop
1274 in_port=5 actions=drop
1275 OFPST_FLOW reply (OF1.2):
1277 # In Open Flow 1.2 a mod-flow does not ever add a flow and thus
1278 # has no effect on eviction
1279 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=6,actions=drop])
1280 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=4,actions=normal])
1281 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=3,actions=output:1])
1282 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1283 idle_timeout=20, in_port=2 actions=drop
1284 idle_timeout=30, in_port=3 actions=output:1
1285 in_port=4 actions=NORMAL
1286 in_port=5 actions=drop
1287 OFPST_FLOW reply (OF1.2):
1289 # Flows with no timeouts at all cannot be evicted.
1290 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=6,actions=drop])
1291 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=7,actions=normal])
1292 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=8,actions=drop], [1], [], [stderr])
1293 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1294 [OFPT_ERROR (OF1.2): OFPFMFC_TABLE_FULL
1296 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1297 in_port=4 actions=NORMAL
1298 in_port=5 actions=drop
1299 in_port=6 actions=drop
1300 in_port=7 actions=NORMAL
1301 OFPST_FLOW reply (OF1.2):
1306 AT_SETUP([ofproto - eviction upon table overflow, with fairness (OpenFlow 1.0)])
1308 # Configure a maximum of 4 flows.
1311 -- --id=@t0 create Flow_Table name=evict flow-limit=4 \
1312 overflow-policy=evict \
1313 groups='"NXM_OF_IN_PORT[[]]"' \
1314 -- set bridge br0 flow_tables:0=@t0 \
1315 | ${PERL} $srcdir/uuidfilt.pl],
1319 ovs-ofctl add-flows br0 - <<EOF
1320 idle_timeout=10 in_port=2 dl_src=00:44:55:66:77:88 actions=drop
1321 idle_timeout=20 in_port=1 dl_src=00:11:22:33:44:55 actions=drop
1322 idle_timeout=30 in_port=1 dl_src=00:22:33:44:55:66 actions=drop
1323 idle_timeout=40 in_port=1 dl_src=00:33:44:55:66:77 actions=drop
1325 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1326 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1327 idle_timeout=20, in_port=1,dl_src=00:11:22:33:44:55 actions=drop
1328 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1329 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1332 # Adding another flow will cause the one that expires soonest within
1333 # the largest group (those with in_port=1) to be evicted. In this
1334 # case this is not the same as the one that expires soonest overall
1335 # (which is what makes the test interesting):
1336 AT_CHECK([ovs-ofctl add-flow br0 in_port=2,dl_src=00:55:66:77:88:99,actions=drop])
1337 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1338 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1339 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1340 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1341 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1344 # Enlarge the flow limit, change the eviction policy back to strictly
1345 # based on expiration, and and add some flows.
1346 AT_CHECK([ovs-vsctl set Flow_Table evict groups='[[]]' flow-limit=7])
1347 ovs-ofctl add-flows br0 - <<EOF
1348 idle_timeout=50 in_port=2 dl_src=00:66:77:88:99:aa actions=drop
1349 idle_timeout=60 in_port=2 dl_src=00:77:88:99:aa:bb actions=drop
1350 idle_timeout=70 in_port=2 dl_src=00:88:99:aa:bb:cc actions=drop
1352 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1353 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1354 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1355 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1356 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1357 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1358 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1359 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1362 # Adding another flow will cause the one that expires soonest overall
1364 AT_CHECK([ovs-ofctl add-flow br0 'idle_timeout=80 in_port=2 dl_src=00:99:aa:bb:cc:dd actions=drop'])
1365 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1366 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1367 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1368 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1369 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1370 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1371 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1372 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1375 # Reducing the flow limit also causes the flows that expire soonest
1376 # overall to be evicted.
1377 AT_CHECK([ovs-vsctl set Flow_Table evict flow-limit=4])
1378 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1379 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1380 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1381 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1382 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1388 AT_SETUP([ofproto - eviction upon table overflow, with fairness (OpenFlow 1.2)])
1390 # Configure a maximum of 4 flows.
1393 -- --id=@t0 create Flow_Table name=evict flow-limit=4 \
1394 overflow-policy=evict \
1395 groups='"NXM_OF_IN_PORT[[]]"' \
1396 -- set bridge br0 flow_tables:0=@t0 \
1397 | ${PERL} $srcdir/uuidfilt.pl],
1401 ovs-ofctl -O OpenFlow12 add-flows br0 - <<EOF
1402 idle_timeout=10 in_port=2 dl_src=00:44:55:66:77:88 actions=drop
1403 idle_timeout=20 in_port=1 dl_src=00:11:22:33:44:55 actions=drop
1404 idle_timeout=30 in_port=1 dl_src=00:22:33:44:55:66 actions=drop
1405 idle_timeout=40 in_port=1 dl_src=00:33:44:55:66:77 actions=drop
1407 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1408 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1409 idle_timeout=20, in_port=1,dl_src=00:11:22:33:44:55 actions=drop
1410 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1411 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1412 OFPST_FLOW reply (OF1.2):
1414 # Adding another flow will cause the one that expires soonest within
1415 # the largest group (those with in_port=1) to be evicted. In this
1416 # case this is not the same as the one that expires soonest overall
1417 # (which is what makes the test interesting):
1418 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=2,dl_src=00:55:66:77:88:99,actions=drop])
1419 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1420 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1421 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1422 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1423 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1424 OFPST_FLOW reply (OF1.2):
1426 # Enlarge the flow limit, change the eviction policy back to strictly
1427 # based on expiration, and and add some flows.
1428 AT_CHECK([ovs-vsctl set Flow_Table evict groups='[[]]' flow-limit=7])
1429 ovs-ofctl -O OpenFlow12 add-flows br0 - <<EOF
1430 idle_timeout=50 in_port=2 dl_src=00:66:77:88:99:aa actions=drop
1431 idle_timeout=60 in_port=2 dl_src=00:77:88:99:aa:bb actions=drop
1432 idle_timeout=70 in_port=2 dl_src=00:88:99:aa:bb:cc actions=drop
1434 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1435 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1436 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1437 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1438 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1439 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1440 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1441 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1442 OFPST_FLOW reply (OF1.2):
1444 # Adding another flow will cause the one that expires soonest overall
1446 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 'idle_timeout=80 in_port=2 dl_src=00:99:aa:bb:cc:dd actions=drop'])
1447 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1448 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1449 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1450 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1451 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1452 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1453 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1454 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1455 OFPST_FLOW reply (OF1.2):
1457 # Reducing the flow limit also causes the flows that expire soonest
1458 # overall to be evicted.
1459 AT_CHECK([ovs-vsctl set Flow_Table evict flow-limit=4])
1460 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1461 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1462 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1463 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1464 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1465 OFPST_FLOW reply (OF1.2):
1470 AT_SETUP([ofproto - eviction upon table overflow, with modified hard timeout])
1472 # Configure a maximum of 4 flows.
1475 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1476 -- set bridge br0 flow_tables:0=@t0 \
1477 | ${PERL} $srcdir/uuidfilt.pl],
1480 ovs-appctl time/stop
1482 for in_port in 4 3 2 1; do
1483 ovs-ofctl add-flow br0 hard_timeout=$((10 + in_port * 3)),in_port=$in_port,actions=drop
1485 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1486 hard_timeout=13, in_port=1 actions=drop
1487 hard_timeout=16, in_port=2 actions=drop
1488 hard_timeout=19, in_port=3 actions=drop
1489 hard_timeout=22, in_port=4 actions=drop
1492 # Sleep and modify the one that expires soonest
1493 ovs-appctl time/warp 5000
1494 AT_CHECK([ovs-ofctl mod-flows br0 in_port=1,actions=drop])
1495 # At this point the table would looks like:
1496 # in_port seconds to expire
1501 ovs-appctl time/warp 2000
1502 # Adding another flow will cause the one that expires soonest to be evicted.
1503 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1504 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1505 hard_timeout=13, in_port=1 actions=drop
1506 hard_timeout=19, in_port=3 actions=drop
1507 hard_timeout=22, in_port=4 actions=drop
1508 in_port=5 actions=drop
1514 AT_SETUP([ofproto - eviction upon table overflow, with modified idle timeout])
1515 OVS_VSWITCHD_START([add-port br0 p1 -- set interface p1 type=dummy ofport_request=1])
1516 # Configure a maximum of 4 flows.
1519 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1520 -- set bridge br0 flow_tables:0=@t0 \
1521 | ${PERL} $srcdir/uuidfilt.pl],
1525 for in_port in 4 3 2 1; do
1526 ovs-ofctl add-flow br0 idle_timeout=$((10 + in_port * 3)),in_port=$in_port,actions=drop
1528 ovs-appctl time/stop
1529 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1530 idle_timeout=13, in_port=1 actions=drop
1531 idle_timeout=16, in_port=2 actions=drop
1532 idle_timeout=19, in_port=3 actions=drop
1533 idle_timeout=22, in_port=4 actions=drop
1536 # Sleep and receive on the flow that expires soonest
1537 ovs-appctl time/warp 5000
1538 AT_CHECK([ovs-appctl netdev-dummy/receive p1 'in_port(1)'])
1539 # At this point the table would looks like:
1540 # in_port seconds to expire
1545 ovs-appctl time/warp 2000
1546 # Adding another flow will cause the one that expires soonest to be evicted.
1547 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1548 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1549 idle_timeout=19, in_port=3 actions=drop
1550 idle_timeout=22, in_port=4 actions=drop
1551 in_port=5 actions=drop
1552 n_packets=1, n_bytes=60, idle_timeout=13, in_port=1 actions=drop
1558 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.0)])
1560 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
1562 printf '\n\n--- check_async %d ---\n\n\n' $1
1565 ovs-appctl -t ovs-ofctl ofctl/barrier
1566 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1569 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1570 ovs-ofctl -v packet-out br0 controller controller '0001020304050010203040501234'
1571 if test X"$1" = X"OFPR_ACTION"; then shift;
1572 echo >>expout "OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1573 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1576 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1577 ovs-ofctl -v packet-out br0 controller 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1578 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1579 echo >>expout "OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via no_match) data_len=14 (unbuffered)
1580 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1583 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1584 ovs-ofctl packet-out br0 controller dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1585 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1586 echo >>expout "OFPT_PACKET_IN: total_len=76 in_port=CONTROLLER (via invalid_ttl) data_len=76 (unbuffered)
1587 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1590 # OFPT_PORT_STATUS, OFPPR_ADD
1591 ovs-vsctl add-port br0 test -- set Interface test type=dummy ofport_request=1
1592 if test X"$1" = X"OFPPR_ADD"; then shift;
1593 echo >>expout "OFPT_PORT_STATUS: ADD: 1(test): addr:aa:55:aa:55:00:0x
1596 speed: 0 Mbps now, 0 Mbps max"
1599 # OFPT_PORT_STATUS, OFPPR_DELETE
1600 ovs-vsctl del-port br0 test
1601 if test X"$1" = X"OFPPR_DELETE"; then shift;
1602 echo >>expout "OFPT_PORT_STATUS: DEL: 1(test): addr:aa:55:aa:55:00:0x
1605 speed: 0 Mbps now, 0 Mbps max"
1608 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1609 ovs-ofctl add-flow br0 send_flow_rem,actions=drop
1610 ovs-ofctl --strict del-flows br0 ''
1611 if test X"$1" = X"OFPRR_DELETE"; then shift;
1612 echo >>expout "OFPT_FLOW_REMOVED: reason=delete"
1614 AT_FAIL_IF([test X"$1" != X])
1616 ovs-appctl -t ovs-ofctl ofctl/barrier
1617 echo >>expout "OFPT_BARRIER_REPLY:"
1621 s/ (xid=0x[0-9a-fA-F]*)//
1623 s/00:0.$/00:0x/' < monitor.log]],
1627 # It's a service connection so initially there should be no async messages.
1630 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1631 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
1632 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1634 # Set miss_send_len to 128 and enable invalid_ttl.
1635 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700040080
1636 check_async 3 OFPR_ACTION OFPR_INVALID_TTL OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1638 # Become slave, which should disable everything except port status.
1639 ovs-appctl -t ovs-ofctl ofctl/send 0104001400000002000023200000000a00000002
1640 check_async 4 OFPPR_ADD OFPPR_DELETE
1642 # Use NXT_SET_ASYNC_CONFIG to enable a patchwork of asynchronous messages.
1643 ovs-appctl -t ovs-ofctl ofctl/send 01040028000000020000232000000013000000020000000500000005000000020000000200000005
1644 check_async 5 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1646 # Set controller ID 123.
1647 ovs-appctl -t ovs-ofctl ofctl/send 01040018000000030000232000000014000000000000007b
1648 check_async 6 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1650 # Restore controller ID 0.
1651 ovs-appctl -t ovs-ofctl ofctl/send 010400180000000300002320000000140000000000000000
1654 ovs-appctl -t ovs-ofctl ofctl/send 0104001400000002000023200000000a00000001
1655 check_async 7 OFPR_ACTION OFPPR_ADD
1657 ovs-appctl -t ovs-ofctl exit
1661 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.2)])
1663 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1665 printf '\n\n--- check_async %d ---\n\n\n' $1
1669 ovs-appctl -t ovs-ofctl ofctl/barrier
1670 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1673 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1674 ovs-ofctl -O OpenFlow12 -v packet-out br0 none controller '0001020304050010203040501234'
1675 if test X"$1" = X"OFPR_ACTION"; then shift;
1676 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1677 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1680 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1681 ovs-ofctl -O OpenFlow12 -v packet-out br0 none 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1682 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1683 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via no_match) data_len=14 (unbuffered)
1684 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1687 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1688 ovs-ofctl -O OpenFlow12 packet-out br0 none dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1689 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1690 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=76 in_port=ANY (via invalid_ttl) data_len=76 (unbuffered)
1691 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1694 # OFPT_PORT_STATUS, OFPPR_ADD
1695 ovs-vsctl add-port br0 test -- set Interface test type=dummy
1696 if test X"$1" = X"OFPPR_ADD"; then shift;
1697 echo >>expout "OFPT_PORT_STATUS (OF1.2): ADD: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1700 speed: 0 Mbps now, 0 Mbps max"
1703 # OFPT_PORT_STATUS, OFPPR_DELETE
1704 ovs-vsctl del-port br0 test
1705 if test X"$1" = X"OFPPR_DELETE"; then shift;
1706 echo >>expout "OFPT_PORT_STATUS (OF1.2): DEL: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1709 speed: 0 Mbps now, 0 Mbps max"
1712 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1713 ovs-ofctl -O OpenFlow12 add-flow br0 send_flow_rem,actions=drop
1714 ovs-ofctl -O OpenFlow12 --strict del-flows br0 ''
1715 if test X"$1" = X"OFPRR_DELETE"; then shift;
1716 echo >>expout "OFPT_FLOW_REMOVED (OF1.2): reason=delete table_id=0"
1718 AT_FAIL_IF([test X"$1" != X])
1720 ovs-appctl -t ovs-ofctl ofctl/barrier
1721 echo >>expout "OFPT_BARRIER_REPLY (OF1.2):"
1725 s/ (xid=0x[0-9a-fA-F]*)//
1727 s/00:0.$/00:0x/' < monitor.log]],
1731 # It's a service connection so initially there should be no async messages.
1734 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1735 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
1736 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1738 # Set miss_send_len to 128 and enable invalid_ttl.
1739 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700040080
1740 check_async 3 OFPR_ACTION OFPR_INVALID_TTL OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1742 # Become slave (OF 1.2), which should disable everything except port status.
1743 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000200000003000000000000000000000001
1744 check_async 4 OFPPR_ADD OFPPR_DELETE
1746 # Use NXT_SET_ASYNC_CONFIG to enable a patchwork of asynchronous messages.
1747 ovs-appctl -t ovs-ofctl ofctl/send 03040028000000020000232000000013000000020000000500000005000000020000000200000005
1748 check_async 5 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1750 # Set controller ID 123.
1751 ovs-appctl -t ovs-ofctl ofctl/send 03040018000000030000232000000014000000000000007b
1752 check_async 6 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1754 # Restore controller ID 0.
1755 ovs-appctl -t ovs-ofctl ofctl/send 030400180000000300002320000000140000000000000000
1757 # Become master (OF 1.2).
1758 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000400000002000000000000000000000002
1759 check_async 7 OFPR_ACTION OFPPR_ADD
1761 ovs-appctl -t ovs-ofctl exit
1765 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.3)])
1767 AT_CHECK([ovs-ofctl -O OpenFlow13 monitor br0 --detach --no-chdir --pidfile])
1769 printf '\n\n--- check_async %d ---\n\n\n' $1
1773 ovs-appctl -t ovs-ofctl ofctl/barrier
1774 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1777 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1778 ovs-ofctl -O OpenFlow13 -v packet-out br0 none controller '0001020304050010203040501234'
1779 if test X"$1" = X"OFPR_ACTION"; then shift;
1780 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1781 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1784 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1785 ovs-ofctl -O OpenFlow13 -v packet-out br0 none 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1786 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1787 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=14 in_port=ANY (via no_match) data_len=14 (unbuffered)
1788 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1791 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1792 ovs-ofctl -O OpenFlow13 packet-out br0 none dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1793 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1794 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=76 in_port=ANY (via invalid_ttl) data_len=76 (unbuffered)
1795 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1798 # OFPT_PORT_STATUS, OFPPR_ADD
1799 ovs-vsctl add-port br0 test -- set Interface test type=dummy
1800 if test X"$1" = X"OFPPR_ADD"; then shift;
1801 echo >>expout "OFPT_PORT_STATUS (OF1.3): ADD: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1804 speed: 0 Mbps now, 0 Mbps max"
1807 # OFPT_PORT_STATUS, OFPPR_DELETE
1808 ovs-vsctl del-port br0 test
1809 if test X"$1" = X"OFPPR_DELETE"; then shift;
1810 echo >>expout "OFPT_PORT_STATUS (OF1.3): DEL: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1813 speed: 0 Mbps now, 0 Mbps max"
1816 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1817 ovs-ofctl -O OpenFlow13 add-flow br0 send_flow_rem,actions=drop
1818 ovs-ofctl -O OpenFlow13 --strict del-flows br0 ''
1819 if test X"$1" = X"OFPRR_DELETE"; then shift;
1820 echo >>expout "OFPT_FLOW_REMOVED (OF1.3): reason=delete table_id=0"
1823 # OFPT_FLOW_REMOVED, OFPRR_GROUP_DELETE
1824 ovs-ofctl -O OpenFlow13 add-group br0 group_id=1234,type=all,bucket=output:10
1825 ovs-ofctl -O OpenFlow13 add-flow br0 send_flow_rem,actions=group:1234
1826 ovs-ofctl -O OpenFlow13 --strict del-groups br0 group_id=1234
1827 if test X"$1" = X"OFPRR_DELETE"; then shift;
1828 echo >>expout "OFPT_FLOW_REMOVED (OF1.3): reason=gropu_delete table_id=0"
1831 AT_FAIL_IF([test X"$1" != X])
1833 ovs-appctl -t ovs-ofctl ofctl/barrier
1834 echo >>expout "OFPT_BARRIER_REPLY (OF1.3):"
1838 s/ (xid=0x[0-9a-fA-F]*)//
1840 s/00:0.$/00:0x/' < monitor.log]],
1844 # It's a service connection so initially there should be no async messages.
1847 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1848 ovs-appctl -t ovs-ofctl ofctl/send 0409000c0123456700000080
1849 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1851 # Become slave (OF 1.3), which should disable everything except port status.
1852 ovs-appctl -t ovs-ofctl ofctl/send 041800180000000200000003000000000000000000000001
1853 check_async 3 OFPPR_ADD OFPPR_DELETE
1855 # Use OF 1.3 OFPT_SET_ASYNC to enable a patchwork of asynchronous messages.
1856 ovs-appctl -t ovs-ofctl ofctl/send 041c002000000002000000020000000500000005000000020000000200000005
1857 check_async 4 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1859 # Set controller ID 123.
1860 ovs-appctl -t ovs-ofctl ofctl/send 04040018000000030000232000000014000000000000007b
1861 check_async 5 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1863 # Restore controller ID 0.
1864 ovs-appctl -t ovs-ofctl ofctl/send 040400180000000300002320000000140000000000000000
1866 # Become master (OF 1.3).
1867 ovs-appctl -t ovs-ofctl ofctl/send 041800180000000400000002000000000000000000000002
1868 check_async 6 OFPR_ACTION OFPPR_ADD
1870 ovs-appctl -t ovs-ofctl exit
1874 dnl This test checks that the role request/response messaging works
1875 dnl and that generation_id is handled properly.
1876 AT_SETUP([ofproto - controller role (OpenFlow 1.2)])
1878 ON_EXIT([kill `cat c1.pid c2.pid`])
1880 # Start two ovs-ofctl controller processes.
1881 AT_CAPTURE_FILE([monitor1.log])
1882 AT_CAPTURE_FILE([expout1])
1883 AT_CAPTURE_FILE([experr1])
1884 AT_CAPTURE_FILE([monitor2.log])
1885 AT_CAPTURE_FILE([expout2])
1886 AT_CAPTURE_FILE([experr2])
1888 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile=`pwd`/c$i.pid --unixctl=`pwd`/c$i])
1889 ovs-appctl -t `pwd`/c$i ofctl/barrier
1890 ovs-appctl -t `pwd`/c$i ofctl/set-output-file monitor$i.log
1894 # find out current role
1895 ovs-appctl -t `pwd`/c$i ofctl/send 031800180000000200000000000000000000000000000000
1896 echo >>experr$i "send: OFPT_ROLE_REQUEST (OF1.2): role=nochange"
1897 echo >>expout$i "OFPT_ROLE_REPLY (OF1.2): role=equal"
1900 # controller 1: Become slave (generation_id is initially undefined, so
1901 # 2^63+2 should not be stale)
1902 ovs-appctl -t `pwd`/c1 ofctl/send 031800180000000300000003000000008000000000000002
1903 echo >>experr1 "send: OFPT_ROLE_REQUEST (OF1.2): role=slave generation_id=9223372036854775810"
1904 echo >>expout1 "OFPT_ROLE_REPLY (OF1.2): role=slave generation_id=9223372036854775810"
1906 # controller 2: Become master.
1907 ovs-appctl -t `pwd`/c2 ofctl/send 031800180000000300000002000000008000000000000003
1908 echo >>experr2 "send: OFPT_ROLE_REQUEST (OF1.2): role=master generation_id=9223372036854775811"
1909 echo >>expout2 "OFPT_ROLE_REPLY (OF1.2): role=master generation_id=9223372036854775811"
1911 # controller 1: Try to become the master using a stale generation ID
1912 ovs-appctl -t `pwd`/c1 ofctl/send 031800180000000400000002000000000000000000000003
1913 echo >>experr1 "send: OFPT_ROLE_REQUEST (OF1.2): role=master generation_id=3"
1914 echo >>expout1 "OFPT_ERROR (OF1.2): OFPRRFC_STALE"
1915 echo >>expout1 "OFPT_ROLE_REQUEST (OF1.2): role=master generation_id=3"
1917 # controller 1: Become master using a valid generation ID
1918 ovs-appctl -t `pwd`/c1 ofctl/send 031800180000000500000002000000000000000000000001
1919 echo >>experr1 "send: OFPT_ROLE_REQUEST (OF1.2): role=master generation_id=1"
1920 echo >>expout1 "OFPT_ROLE_REPLY (OF1.2): role=master generation_id=1"
1923 ovs-appctl -t `pwd`/c$i ofctl/barrier
1924 echo >>expout$i "OFPT_BARRIER_REPLY (OF1.2):"
1930 AT_CHECK([grep -v '^send:' monitor$i.log | STRIP_XIDS], [0], [expout])
1932 AT_CHECK([grep '^send:' monitor$i.log | STRIP_XIDS], [0], [expout])
1937 dnl This test checks that the role request/response messaging works,
1938 dnl that generation_id is handled properly, and that role status update
1939 dnl messages are sent when a controller's role gets changed from master
1941 AT_SETUP([ofproto - controller role (OpenFlow 1.4)])
1943 ON_EXIT([kill `cat c1.pid c2.pid`])
1945 # Start two ovs-ofctl controller processes.
1946 AT_CAPTURE_FILE([monitor1.log])
1947 AT_CAPTURE_FILE([expout1])
1948 AT_CAPTURE_FILE([experr1])
1949 AT_CAPTURE_FILE([monitor2.log])
1950 AT_CAPTURE_FILE([expout2])
1951 AT_CAPTURE_FILE([experr2])
1953 AT_CHECK([ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile=`pwd`/c$i.pid --unixctl=`pwd`/c$i])
1954 ovs-appctl -t `pwd`/c$i ofctl/barrier
1955 ovs-appctl -t `pwd`/c$i ofctl/set-output-file monitor$i.log
1959 # find out current role
1960 ovs-appctl -t `pwd`/c$i ofctl/send 051800180000000200000000000000000000000000000000
1961 echo >>experr$i "send: OFPT_ROLE_REQUEST (OF1.4): role=nochange"
1962 echo >>expout$i "OFPT_ROLE_REPLY (OF1.4): role=equal"
1965 # controller 1: Become slave (generation_id is initially undefined, so
1966 # 2^63+2 should not be stale)
1967 ovs-appctl -t `pwd`/c1 ofctl/send 051800180000000300000003000000008000000000000002
1968 echo >>experr1 "send: OFPT_ROLE_REQUEST (OF1.4): role=slave generation_id=9223372036854775810"
1969 echo >>expout1 "OFPT_ROLE_REPLY (OF1.4): role=slave generation_id=9223372036854775810"
1971 # controller 2: Become master.
1972 ovs-appctl -t `pwd`/c2 ofctl/send 051800180000000300000002000000008000000000000003
1973 echo >>experr2 "send: OFPT_ROLE_REQUEST (OF1.4): role=master generation_id=9223372036854775811"
1974 echo >>expout2 "OFPT_ROLE_REPLY (OF1.4): role=master generation_id=9223372036854775811"
1976 # controller 1: Try to become the master using a stale generation ID
1977 ovs-appctl -t `pwd`/c1 ofctl/send 051800180000000400000002000000000000000000000003
1978 echo >>experr1 "send: OFPT_ROLE_REQUEST (OF1.4): role=master generation_id=3"
1979 echo >>expout1 "OFPT_ERROR (OF1.4): OFPRRFC_STALE"
1980 echo >>expout1 "OFPT_ROLE_REQUEST (OF1.4): role=master generation_id=3"
1982 # controller 1: Become master using a valid generation ID
1983 ovs-appctl -t `pwd`/c1 ofctl/send 051800180000000500000002000000000000000000000001
1984 echo >>experr1 "send: OFPT_ROLE_REQUEST (OF1.4): role=master generation_id=1"
1985 echo >>expout1 "OFPT_ROLE_REPLY (OF1.4): role=master generation_id=1"
1986 echo >>expout2 "OFPT_ROLE_STATUS (OF1.4): role=slave generation_id=1 reason=master_request"
1989 ovs-appctl -t `pwd`/c$i ofctl/barrier
1990 echo >>expout$i "OFPT_BARRIER_REPLY (OF1.4):"
1996 AT_CHECK([grep -v '^send:' monitor$i.log | STRIP_XIDS], [0], [expout])
1998 AT_CHECK([grep '^send:' monitor$i.log | STRIP_XIDS], [0], [expout])
2003 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
2004 dnl specified by OpenFlow 1.0) and OFPP_CONTROLLER (used by some
2005 dnl controllers despite the spec) as meaning a packet that was generated
2006 dnl by the controller.
2007 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.0)])
2009 ADD_OF_PORTS([br0], [1])
2011 # Start a monitor listening for packet-ins.
2012 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
2013 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
2014 ovs-appctl -t ovs-ofctl ofctl/barrier
2015 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2016 AT_CAPTURE_FILE([monitor.log])
2018 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
2019 AT_CHECK([ovs-ofctl packet-out br0 none controller,1 '0001020304050010203040501234'])
2020 AT_CHECK([ovs-ofctl packet-out br0 controller controller,1 '0001020304050010203040505678'])
2022 # Stop the monitor and check its output.
2023 ovs-appctl -t ovs-ofctl ofctl/barrier
2024 ovs-appctl -t ovs-ofctl exit
2026 ovs-ofctl dump-ports br0
2028 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2029 OFPT_PACKET_IN: total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
2030 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2031 OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
2032 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
2039 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
2040 dnl specified by OpenFlow 1.2) and OFPP_CONTROLLER (used by some
2041 dnl controllers despite the spec) as meaning a packet that was generated
2042 dnl by the controller.
2043 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.2)])
2046 # Start a monitor listening for packet-ins.
2047 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
2048 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
2049 ovs-appctl -t ovs-ofctl ofctl/barrier
2050 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2051 AT_CAPTURE_FILE([monitor.log])
2053 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
2054 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none controller '0001020304050010203040501234'])
2055 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 4294967293 controller '0001020304050010203040505678'])
2057 # Stop the monitor and check its output.
2058 ovs-appctl -t ovs-ofctl ofctl/barrier
2059 ovs-appctl -t ovs-ofctl exit
2061 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2062 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
2063 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2064 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
2065 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
2066 OFPT_BARRIER_REPLY (OF1.2):
2072 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
2073 dnl specified by OpenFlow 1.1) and OFPP_CONTROLLER (used by some
2074 dnl controllers despite the spec) as meaning a packet that was generated
2075 dnl by the controller.
2076 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.1)])
2079 # Start a monitor listening for packet-ins.
2080 AT_CHECK([ovs-ofctl -O OpenFlow11 monitor br0 --detach --no-chdir --pidfile])
2081 ovs-appctl -t ovs-ofctl ofctl/send 0209000c0123456700000080
2082 ovs-appctl -t ovs-ofctl ofctl/barrier
2083 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2084 AT_CAPTURE_FILE([monitor.log])
2086 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
2087 AT_CHECK([ovs-ofctl -O OpenFlow11 packet-out br0 none controller '0001020304050010203040501234'])
2088 AT_CHECK([ovs-ofctl -O OpenFlow11 packet-out br0 4294967293 controller '0001020304050010203040505678'])
2090 # Stop the monitor and check its output.
2091 ovs-appctl -t ovs-ofctl ofctl/barrier
2092 ovs-appctl -t ovs-ofctl exit
2094 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2095 OFPT_PACKET_IN (OF1.1): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
2096 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2097 OFPT_PACKET_IN (OF1.1): total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
2098 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
2099 OFPT_BARRIER_REPLY (OF1.1):
2105 dnl This test checks that metadata is encoded in packet_in structures,
2106 dnl supported by NXAST.
2107 AT_SETUP([ofproto - packet-out with metadata (NXM)])
2110 # Start a monitor listening for packet-ins.
2111 AT_CHECK([ovs-ofctl -P nxm monitor br0 --detach --no-chdir --pidfile])
2112 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
2113 ovs-appctl -t ovs-ofctl ofctl/barrier
2114 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2115 AT_CAPTURE_FILE([monitor.log])
2117 # Send a packet-out with a load action to set some metadata, and forward to controller
2118 AT_CHECK([ovs-ofctl packet-out br0 controller 'load(0xfafafafa5a5a5a5a->OXM_OF_METADATA[[0..63]]), load(0xaa->NXM_NX_PKT_MARK[[]]), controller' '0001020304050010203040501234'])
2120 # Stop the monitor and check its output.
2121 ovs-appctl -t ovs-ofctl ofctl/barrier
2122 ovs-appctl -t ovs-ofctl exit
2124 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2125 NXT_PACKET_IN: total_len=14 in_port=CONTROLLER metadata=0xfafafafa5a5a5a5a pkt_mark=0xaa (via action) data_len=14 (unbuffered)
2126 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2133 dnl This test checks that metadata is encoded in packet_in structures,
2134 dnl supported by NXAST.
2135 AT_SETUP([ofproto - packet-out with metadata (OpenFlow 1.2)])
2138 # Start a monitor listening for packet-ins.
2139 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
2140 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
2141 ovs-appctl -t ovs-ofctl ofctl/barrier
2142 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2143 AT_CAPTURE_FILE([monitor.log])
2145 # Send a packet-out with a set-field action to set some metadata, and forward to controller
2146 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none 'set_field:0xfafafafa5a5a5a5a->metadata, controller' '0001020304050010203040501234'])
2148 # Stop the monitor and check its output.
2149 ovs-appctl -t ovs-ofctl ofctl/barrier
2150 ovs-appctl -t ovs-ofctl exit
2152 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2153 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY metadata=0xfafafafa5a5a5a5a (via action) data_len=14 (unbuffered)
2154 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2155 OFPT_BARRIER_REPLY (OF1.2):
2161 dnl This test checks that tunnel metadata is encoded in packet_in structures.
2162 AT_SETUP([ofproto - packet-out with tunnel metadata (OpenFlow 1.2)])
2165 # Start a monitor listening for packet-ins.
2166 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
2167 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
2168 ovs-appctl -t ovs-ofctl ofctl/barrier
2169 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2170 AT_CAPTURE_FILE([monitor.log])
2172 # Send a packet-out with set field actions to set some tunnel metadata, and forward to controller
2173 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none 'set_field:127.0.0.1->tun_src,set_field:0x01020304->tun_id,set_field:192.168.0.1->tun_dst, controller' '0001020304050010203040501234'])
2175 # Stop the monitor and check its output.
2176 ovs-appctl -t ovs-ofctl ofctl/barrier
2177 ovs-appctl -t ovs-ofctl exit
2179 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
2180 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY tun_id=0x1020304 tun_src=127.0.0.1 tun_dst=192.168.0.1 (via action) data_len=14 (unbuffered)
2181 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
2182 OFPT_BARRIER_REPLY (OF1.2):
2188 m4_divert_push([PREPARE_TESTS])
2189 # Sorts groups of lines that start with a space, without moving them
2190 # past the nearest line that does not start with a space.
2200 print $_ foreach sort(@buffer);
2205 print $_ foreach sort(@buffer);
2208 m4_divert_pop([PREPARE_TESTS])
2210 AT_SETUP([ofproto - flow monitoring])
2211 AT_KEYWORDS([monitor])
2214 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:1
2216 # Start a monitor watching the flow table and check the initial reply.
2217 ovs-ofctl monitor br0 watch: --detach --no-chdir --pidfile >monitor.log 2>&1
2218 AT_CAPTURE_FILE([monitor.log])
2219 ovs-appctl -t ovs-ofctl ofctl/barrier
2220 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2221 [NXST_FLOW_MONITOR reply:
2222 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:1
2226 # Add, delete, and modify some flows and check the updates.
2227 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2228 ovs-ofctl add-flow br0 in_port=0,dl_vlan=124,actions=output:2
2229 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:5
2230 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,dl_vlan_pcp=0,actions=output:6
2231 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,dl_vlan_pcp=1,actions=output:7
2232 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:8
2233 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,dl_vlan_pcp=0,actions=output:9
2234 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,dl_vlan_pcp=1,actions=output:10
2235 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,actions=output:11
2236 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,dl_vlan_pcp=0,actions=output:12
2237 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,dl_vlan_pcp=1,actions=output:13
2238 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,actions=output:14
2239 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=0,actions=output:15
2240 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=1,actions=output:16
2241 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,actions=output:17
2242 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=0,actions=output:18
2243 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=1,actions=output:19
2244 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,actions=output:20
2245 ovs-ofctl add-flow br0 in_port=0,dl_vlan_pcp=0,actions=output:21
2246 ovs-ofctl add-flow br0 in_port=0,dl_vlan_pcp=1,actions=output:22
2247 ovs-ofctl add-flow br0 in_port=0,actions=output:23
2248 ovs-ofctl mod-flows br0 dl_vlan=123,actions=output:3
2249 ovs-ofctl mod-flows br0 cookie=5,dl_vlan=123,actions=output:3
2250 ovs-ofctl del-flows br0 dl_vlan=123
2251 ovs-ofctl del-flows br0
2252 ovs-appctl -t ovs-ofctl ofctl/barrier
2253 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log | multiline_sort], [0],
2254 [NXST_FLOW_MONITOR reply (xid=0x0):
2255 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=124 actions=output:2
2256 NXST_FLOW_MONITOR reply (xid=0x0):
2257 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:5
2258 NXST_FLOW_MONITOR reply (xid=0x0):
2259 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:6
2260 NXST_FLOW_MONITOR reply (xid=0x0):
2261 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:7
2262 NXST_FLOW_MONITOR reply (xid=0x0):
2263 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:8
2264 NXST_FLOW_MONITOR reply (xid=0x0):
2265 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:9
2266 NXST_FLOW_MONITOR reply (xid=0x0):
2267 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:10
2268 NXST_FLOW_MONITOR reply (xid=0x0):
2269 event=ADDED table=0 cookie=0 in_port=0,vlan_tci=0x0000 actions=output:11
2270 NXST_FLOW_MONITOR reply (xid=0x0):
2271 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=0 actions=output:12
2272 NXST_FLOW_MONITOR reply (xid=0x0):
2273 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=1 actions=output:13
2274 NXST_FLOW_MONITOR reply (xid=0x0):
2275 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095 actions=output:14
2276 NXST_FLOW_MONITOR reply (xid=0x0):
2277 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:15
2278 NXST_FLOW_MONITOR reply (xid=0x0):
2279 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:16
2280 NXST_FLOW_MONITOR reply (xid=0x0):
2281 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:17
2282 NXST_FLOW_MONITOR reply (xid=0x0):
2283 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:18
2284 NXST_FLOW_MONITOR reply (xid=0x0):
2285 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:19
2286 NXST_FLOW_MONITOR reply (xid=0x0):
2287 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:20
2288 NXST_FLOW_MONITOR reply (xid=0x0):
2289 event=ADDED table=0 cookie=0 in_port=0,dl_vlan_pcp=0 actions=output:21
2290 NXST_FLOW_MONITOR reply (xid=0x0):
2291 event=ADDED table=0 cookie=0 in_port=0,dl_vlan_pcp=1 actions=output:22
2292 NXST_FLOW_MONITOR reply (xid=0x0):
2293 event=ADDED table=0 cookie=0 in_port=0 actions=output:23
2294 NXST_FLOW_MONITOR reply (xid=0x0):
2295 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:3
2296 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2297 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2298 NXST_FLOW_MONITOR reply (xid=0x0):
2299 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123 actions=output:3
2300 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2301 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2302 NXST_FLOW_MONITOR reply (xid=0x0):
2303 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123 actions=output:3
2304 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2305 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2306 NXST_FLOW_MONITOR reply (xid=0x0):
2307 event=DELETED reason=delete table=0 cookie=0 in_port=0 actions=output:23
2308 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:20
2309 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:18
2310 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:19
2311 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=124 actions=output:2
2312 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095 actions=output:14
2313 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=0 actions=output:12
2314 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=1 actions=output:13
2315 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan_pcp=0 actions=output:21
2316 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan_pcp=1 actions=output:22
2317 event=DELETED reason=delete table=0 cookie=0 in_port=0,vlan_tci=0x0000 actions=output:11
2321 # Check that our own changes are reported as full updates.
2322 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2323 ovs-ofctl add-flow br0 in_port=1,actions=output:2
2324 ovs-ofctl add-flow br0 in_port=2,actions=output:1
2325 ovs-appctl -t ovs-ofctl ofctl/barrier
2326 ovs-appctl -t ovs-ofctl ofctl/send 010e004812345678003fffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000ffffffffffff0000
2327 ovs-appctl -t ovs-ofctl ofctl/barrier
2328 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
2330 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log | multiline_sort], [0],
2331 [NXST_FLOW_MONITOR reply (xid=0x0):
2332 event=ADDED table=0 cookie=0 in_port=1 actions=output:2
2333 NXST_FLOW_MONITOR reply (xid=0x0):
2334 event=ADDED table=0 cookie=0 in_port=2 actions=output:1
2336 send: OFPT_FLOW_MOD: DEL priority=0 actions=drop
2337 NXST_FLOW_MONITOR reply (xid=0x0):
2338 event=DELETED reason=delete table=0 cookie=0 in_port=1 actions=output:2
2339 event=DELETED reason=delete table=0 cookie=0 in_port=2 actions=output:1
2343 ovs-appctl -t ovs-ofctl exit
2347 AT_SETUP([ofproto - flow monitoring with !own])
2348 AT_KEYWORDS([monitor])
2351 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:1
2353 # Start a monitor watching the flow table and check the initial reply.
2354 ovs-ofctl monitor br0 watch:\!own --detach --no-chdir --pidfile >monitor.log 2>&1
2355 AT_CAPTURE_FILE([monitor.log])
2356 ovs-appctl -t ovs-ofctl ofctl/barrier
2357 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2358 [NXST_FLOW_MONITOR reply:
2359 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:1
2363 # Check that our own changes are reported as abbreviations.
2364 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2365 ovs-ofctl add-flow br0 in_port=1,actions=output:2
2366 ovs-ofctl add-flow br0 in_port=2,actions=output:1
2367 ovs-appctl -t ovs-ofctl ofctl/barrier
2368 ovs-appctl -t ovs-ofctl ofctl/send 010e004812345678003fffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000ffffffffffff0000
2369 ovs-appctl -t ovs-ofctl ofctl/barrier
2370 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
2372 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2373 [NXST_FLOW_MONITOR reply (xid=0x0):
2374 event=ADDED table=0 cookie=0 in_port=1 actions=output:2
2375 NXST_FLOW_MONITOR reply (xid=0x0):
2376 event=ADDED table=0 cookie=0 in_port=2 actions=output:1
2378 send: OFPT_FLOW_MOD: DEL priority=0 actions=drop
2379 NXST_FLOW_MONITOR reply (xid=0x0):
2380 event=ABBREV xid=0x12345678
2384 ovs-appctl -t ovs-ofctl exit
2388 AT_SETUP([ofproto - flow monitoring with out_port])
2389 AT_KEYWORDS([monitor])
2392 ovs-ofctl add-flow br0 in_port=0,dl_vlan=121,actions=output:1
2393 ovs-ofctl add-flow br0 in_port=0,dl_vlan=122,actions=output:1
2394 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:2
2396 # Start a monitor watching the flow table and check the initial reply.
2397 ovs-ofctl monitor br0 watch:out_port=2 --detach --no-chdir --pidfile >monitor.log 2>&1
2398 AT_CAPTURE_FILE([monitor.log])
2399 ovs-appctl -t ovs-ofctl ofctl/barrier
2400 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2401 [NXST_FLOW_MONITOR reply:
2402 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:2
2406 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2408 # Add, modify flows and check the updates.
2409 ovs-ofctl mod-flows br0 dl_vlan=121,actions=drop
2410 ovs-ofctl mod-flows br0 dl_vlan=122,actions=output:1,output:2
2411 ovs-appctl -t ovs-ofctl ofctl/barrier
2413 ovs-ofctl mod-flows br0 dl_vlan=123,actions=output:1,output:2
2414 ovs-appctl -t ovs-ofctl ofctl/barrier
2416 ovs-ofctl mod-flows br0 dl_vlan=122,actions=output:1
2417 ovs-appctl -t ovs-ofctl ofctl/barrier
2418 ovs-ofctl mod-flows br0 dl_vlan=123,actions=output:2
2419 ovs-appctl -t ovs-ofctl ofctl/barrier
2421 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2422 [NXST_FLOW_MONITOR reply (xid=0x0):
2423 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=122 actions=output:1,output:2
2425 NXST_FLOW_MONITOR reply (xid=0x0):
2426 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:1,output:2
2428 NXST_FLOW_MONITOR reply (xid=0x0):
2429 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=122 actions=output:1
2431 NXST_FLOW_MONITOR reply (xid=0x0):
2432 event=MODIFIED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:2
2436 ovs-appctl -t ovs-ofctl exit
2440 AT_SETUP([ofproto - flow monitoring pause and resume])
2441 AT_KEYWORDS([monitor])
2443 # The maximum socket receive buffer size is important for this test, which
2444 # tests behavior when the receive buffer overflows.
2445 if test -e /proc/sys/net/core/rmem_max; then
2447 rmem_max=`cat /proc/sys/net/core/rmem_max`
2448 elif rmem_max=`sysctl -n net.inet.tcp.recvbuf_max 2>/dev/null`; then
2451 # Don't know how to get maximum socket receive buffer on this OS
2454 # Calculate the total amount of queuing: rmem_max in the kernel, 128 kB
2455 # in ofproto sending userspace (see ofmonitor_flush() in connmgr.c).
2456 queue_size=`expr $rmem_max + 128 \* 1024`
2457 echo rmem_max=$rmem_max queue_size=$queue_size
2459 # If there's too much queuing skip the test to avoid timing out.
2460 AT_SKIP_IF([test $rmem_max -gt 1048576])
2462 # Each flow update message takes up at least 48 bytes of space in queues
2463 # and in practice more than that.
2464 n_msgs=`expr $queue_size / 48`
2469 # Start a monitor watching the flow table, then make it block.
2470 ON_EXIT([kill `cat ovs-ofctl.pid`])
2471 ovs-ofctl monitor br0 watch: --detach --no-chdir --pidfile >monitor.log 2>&1
2472 AT_CAPTURE_FILE([monitor.log])
2473 ovs-appctl -t ovs-ofctl ofctl/block
2475 # Add $n_msgs flows.
2476 (echo "in_port=2,actions=output:2"
2478 for ($i = 0; $i < '$n_msgs'; $i++) {
2479 print "cookie=1,reg1=$i,actions=drop\n";
2482 AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
2483 # Check that multipart flow dumps work properly:
2484 AT_CHECK([ovs-ofctl diff-flows br0 flows.txt])
2485 AT_CHECK([ovs-ofctl add-flow br0 in_port=1,cookie=3,actions=drop])
2486 AT_CHECK([ovs-ofctl mod-flows br0 in_port=2,cookie=2,actions=output:2])
2487 AT_CHECK([ovs-ofctl del-flows br0 cookie=1/-1])
2489 ovs-appctl -t ovs-ofctl ofctl/unblock
2491 # Wait for the connection resumed.
2492 # A barrier doesn't work for this purpose.
2493 # https://www.mail-archive.com/dev@openvswitch.org/msg27013.html
2494 # https://www.mail-archive.com/dev@openvswitch.org/msg27675.html
2495 OVS_WAIT_UNTIL([grep NXT_FLOW_MONITOR_RESUMED monitor.log])
2497 ovs-appctl -t ovs-ofctl exit
2499 # Check that the flow monitor reported the same number of flows
2500 # added and deleted, but fewer than we actually added and deleted.
2501 adds=`grep -c 'ADDED.*reg1=' monitor.log`
2502 deletes=`grep -c 'DELETED.*reg1=' monitor.log`
2503 echo adds=$adds deletes=$deletes
2504 AT_CHECK([test $adds -gt 100 && test $adds -lt $n_msgs])
2505 AT_CHECK([test $adds = $deletes])
2507 # Check that the flow monitor reported everything in the expected order:
2509 # event=ADDED table=0 cookie=0x1 reg1=0x22
2511 # NXT_FLOW_MONITOR_PAUSED:
2513 # event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2515 # event=ADDED table=0 cookie=0x3 in_port=1
2516 # event=MODIFIED table=0 cookie=0x2 in_port=2 actions=output:2
2517 # NXT_FLOW_MONITOR_RESUMED:
2519 # except that, between the PAUSED and RESUMED, the order of the ADDED
2520 # and MODIFIED lines lines depends on hash order, that is, it varies
2521 # as we change the hash function or change architecture. Therefore,
2522 # we use a couple of tests below to accept both orders.
2523 AT_CHECK([ofctl_strip < monitor.log | sed -n -e '
2526 /NXT_FLOW_MONITOR_PAUSED:/p
2527 /NXT_FLOW_MONITOR_RESUMED:/p
2528 ' > monitor.log.subset])
2529 AT_CHECK([grep -v MODIFIED monitor.log.subset], [0], [dnl
2530 event=ADDED table=0 cookie=0x1 reg1=0x22
2531 NXT_FLOW_MONITOR_PAUSED:
2532 event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2533 event=ADDED table=0 cookie=0x3 in_port=1
2534 NXT_FLOW_MONITOR_RESUMED:
2536 AT_CHECK([grep -v ADDED monitor.log.subset], [0], [dnl
2537 NXT_FLOW_MONITOR_PAUSED:
2538 event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2539 event=MODIFIED table=0 cookie=0x2 in_port=2 actions=output:2
2540 NXT_FLOW_MONITOR_RESUMED:
2546 AT_SETUP([ofproto - event filtering (OpenFlow 1.3)])
2547 AT_KEYWORDS([monitor])
2550 # Start a monitor, use the required protocol version
2551 ovs-ofctl -O OpenFlow13 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2552 AT_CAPTURE_FILE([monitor.log])
2554 # Send an OpenFlow13 message (04), OFPT_GET_ASYNC_REQUEST (1a), length (8), xid (0a)
2555 ovs-appctl -t ovs-ofctl ofctl/send 041a00080000000a
2556 ovs-appctl -t ovs-ofctl ofctl/barrier
2558 # Check default setting
2559 read -r -d '' expected <<'EOF'
2562 AT_CHECK([ofctl_strip < monitor.log], [], [dnl
2563 send: OFPT_GET_ASYNC_REQUEST (OF1.3):
2564 OFPT_GET_ASYNC_REPLY (OF1.3):
2566 PACKET_IN: no_match action
2567 PORT_STATUS: add delete modify
2568 FLOW_REMOVED: idle hard delete
2572 PORT_STATUS: add delete modify
2574 OFPT_BARRIER_REPLY (OF1.3):
2580 AT_SETUP([ofproto - ofport_request])
2582 ADD_OF_PORTS([br0], [1], [2], [3])
2584 set_and_check_specific_ofports () {
2585 ovs-vsctl set Interface p1 ofport_request="$1" -- \
2586 set Interface p2 ofport_request="$2" -- \
2587 set Interface p3 ofport_request="$3"
2588 ofports=`ovs-vsctl get Interface p1 ofport -- \
2589 get Interface p2 ofport -- \
2590 get Interface p3 ofport`
2591 AT_CHECK_UNQUOTED([echo $ofports], [0], [$1 $2 $3
2594 for pre in '1 2 3' '1 3 2' '2 1 3' '2 3 1' '3 1 2' '3 2 1'; do
2595 for post in '1 2 3' '1 3 2' '2 1 3' '2 3 1' '3 1 2' '3 2 1'; do
2596 echo -----------------------------------------------------------
2597 echo "Check changing port numbers from $pre to $post"
2598 set_and_check_specific_ofports $pre
2599 set_and_check_specific_ofports $post
2603 ovs-vsctl del-port p3
2605 set_and_check_poorly_specified_ofports () {
2606 ovs-vsctl set Interface p1 ofport_request="$1" -- \
2607 set Interface p2 ofport_request="$2"
2608 p1=`ovs-vsctl get Interface p1 ofport`
2609 p2=`ovs-vsctl get Interface p2 ofport`
2612 AT_CHECK([test "$p1" != "$p2"])
2613 if test "$1" = "$2" && test "$1" != '[[]]'; then
2614 # One port number must be the requested one.
2615 AT_CHECK([test "$p1" = "$1" || test "$p2" = "$1"])
2616 # The other port number must be different (already tested above).
2618 AT_CHECK([test "$1" = '[[]]' || test "$p1" == "$1"])
2619 AT_CHECK([test "$2" = '[[]]' || test "$p2" == "$2"])
2622 for pre in '1 2' '[[]] 2' '1 [[]]' '[[]] [[]]' '2 1' '[[]] 1' '2 [[]]' \
2624 for post in '1 2' '[[]] 2' '1 [[]]' '[[]] [[]]' '2 1' '[[]] 1' '2 [[]]' \
2626 echo -----------------------------------------------------------
2627 echo "Check changing port numbers from $pre to $post"
2628 set_and_check_poorly_specified_ofports $pre
2629 set_and_check_poorly_specified_ofports $post
2636 AT_SETUP([ofproto - bundles, open (OpenFlow 1.4)])
2637 AT_KEYWORDS([monitor])
2640 # Start a monitor, use the required protocol version
2641 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2642 AT_CAPTURE_FILE([monitor.log])
2644 # Send an OpenFlow14 message (05), OFPT_BUNDLE_CONTROL (21), length (10), xid (0a)
2645 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2646 ovs-appctl -t ovs-ofctl ofctl/barrier
2647 ovs-appctl -t ovs-ofctl exit
2649 AT_CHECK([ofctl_strip < monitor.log], [], [dnl
2650 send: OFPT_BUNDLE_CONTROL (OF1.4):
2651 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2652 OFPT_BUNDLE_CONTROL (OF1.4):
2653 bundle_id=0x1 type=OPEN_REPLY flags=0
2654 OFPT_BARRIER_REPLY (OF1.4):
2660 AT_SETUP([ofproto - bundles, double open (OpenFlow 1.4)])
2661 AT_KEYWORDS([monitor])
2664 # Start a monitor, use the required protocol version
2665 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2666 AT_CAPTURE_FILE([monitor.log])
2668 # Send twice an OpenFlow14 message (05), OFPT_BUNDLE_CONTROL (21), length (10), xid (0a)
2669 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2670 ovs-appctl -t ovs-ofctl ofctl/barrier
2671 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2672 ovs-appctl -t ovs-ofctl ofctl/barrier
2673 ovs-appctl -t ovs-ofctl exit
2675 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2676 send: OFPT_BUNDLE_CONTROL (OF1.4):
2677 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2678 OFPT_BUNDLE_CONTROL (OF1.4):
2679 bundle_id=0x1 type=OPEN_REPLY flags=0
2680 OFPT_BARRIER_REPLY (OF1.4):
2681 send: OFPT_BUNDLE_CONTROL (OF1.4):
2682 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2683 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2684 OFPT_BUNDLE_CONTROL (OF1.4):
2685 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2686 OFPT_BARRIER_REPLY (OF1.4):
2692 AT_SETUP([ofproto - bundle close without open (OpenFlow 1.4)])
2693 AT_KEYWORDS([monitor])
2696 # Start a monitor, use the required protocol version
2697 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2698 AT_CAPTURE_FILE([monitor.log])
2700 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 01"
2701 ovs-appctl -t ovs-ofctl ofctl/barrier
2702 ovs-appctl -t ovs-ofctl exit
2704 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2705 send: OFPT_BUNDLE_CONTROL (OF1.4):
2706 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2707 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2708 OFPT_BUNDLE_CONTROL (OF1.4):
2709 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2710 OFPT_BARRIER_REPLY (OF1.4):
2716 AT_SETUP([ofproto - bundle double close (OpenFlow 1.4)])
2717 AT_KEYWORDS([monitor])
2720 # Start a monitor, use the required protocol version
2721 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2722 AT_CAPTURE_FILE([monitor.log])
2724 # Open, Close, Close
2725 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2726 ovs-appctl -t ovs-ofctl ofctl/barrier
2727 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 01"
2728 ovs-appctl -t ovs-ofctl ofctl/barrier
2729 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 01"
2730 ovs-appctl -t ovs-ofctl ofctl/barrier
2731 ovs-appctl -t ovs-ofctl exit
2733 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2734 send: OFPT_BUNDLE_CONTROL (OF1.4):
2735 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2736 OFPT_BUNDLE_CONTROL (OF1.4):
2737 bundle_id=0x1 type=OPEN_REPLY flags=0
2738 OFPT_BARRIER_REPLY (OF1.4):
2739 send: OFPT_BUNDLE_CONTROL (OF1.4):
2740 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2741 OFPT_BUNDLE_CONTROL (OF1.4):
2742 bundle_id=0x1 type=CLOSE_REPLY flags=0
2743 OFPT_BARRIER_REPLY (OF1.4):
2744 send: OFPT_BUNDLE_CONTROL (OF1.4):
2745 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2746 OFPT_ERROR (OF1.4): OFPBFC_BUNDLE_CLOSED
2747 OFPT_BUNDLE_CONTROL (OF1.4):
2748 bundle_id=0x1 type=CLOSE_REQUEST flags=atomic
2749 OFPT_BARRIER_REPLY (OF1.4):
2755 AT_SETUP([ofproto - bundle close, different flags (OpenFlow 1.4)])
2756 AT_KEYWORDS([monitor])
2759 # Start a monitor, use the required protocol version
2760 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2761 AT_CAPTURE_FILE([monitor.log])
2763 # Open, Close, Close
2764 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2765 ovs-appctl -t ovs-ofctl ofctl/barrier
2766 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 02 00 02"
2767 ovs-appctl -t ovs-ofctl ofctl/barrier
2768 ovs-appctl -t ovs-ofctl exit
2770 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2771 send: OFPT_BUNDLE_CONTROL (OF1.4):
2772 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2773 OFPT_BUNDLE_CONTROL (OF1.4):
2774 bundle_id=0x1 type=OPEN_REPLY flags=0
2775 OFPT_BARRIER_REPLY (OF1.4):
2776 send: OFPT_BUNDLE_CONTROL (OF1.4):
2777 bundle_id=0x1 type=CLOSE_REQUEST flags=ordered
2778 OFPT_ERROR (OF1.4): OFPBFC_BAD_FLAGS
2779 OFPT_BUNDLE_CONTROL (OF1.4):
2780 bundle_id=0x1 type=CLOSE_REQUEST flags=ordered
2781 OFPT_BARRIER_REPLY (OF1.4):
2787 AT_SETUP([ofproto - bundle commit without open (OpenFlow 1.4)])
2788 AT_KEYWORDS([monitor])
2791 # Start a monitor, use the required protocol version
2792 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2793 AT_CAPTURE_FILE([monitor.log])
2795 # Open, Close, Close
2796 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 04 00 01"
2797 ovs-appctl -t ovs-ofctl ofctl/barrier
2798 ovs-appctl -t ovs-ofctl exit
2800 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2801 send: OFPT_BUNDLE_CONTROL (OF1.4):
2802 bundle_id=0x1 type=COMMIT_REQUEST flags=atomic
2803 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2804 OFPT_BUNDLE_CONTROL (OF1.4):
2805 bundle_id=0x1 type=COMMIT_REQUEST flags=atomic
2806 OFPT_BARRIER_REPLY (OF1.4):
2812 AT_SETUP([ofproto - bundle commit, different flags (OpenFlow 1.4)])
2813 AT_KEYWORDS([monitor])
2816 # Start a monitor, use the required protocol version
2817 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2818 AT_CAPTURE_FILE([monitor.log])
2820 # Open, Close, Close
2821 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 00 00 01"
2822 ovs-appctl -t ovs-ofctl ofctl/barrier
2823 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 04 00 02"
2824 ovs-appctl -t ovs-ofctl ofctl/barrier
2825 ovs-appctl -t ovs-ofctl exit
2827 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2828 send: OFPT_BUNDLE_CONTROL (OF1.4):
2829 bundle_id=0x1 type=OPEN_REQUEST flags=atomic
2830 OFPT_BUNDLE_CONTROL (OF1.4):
2831 bundle_id=0x1 type=OPEN_REPLY flags=0
2832 OFPT_BARRIER_REPLY (OF1.4):
2833 send: OFPT_BUNDLE_CONTROL (OF1.4):
2834 bundle_id=0x1 type=COMMIT_REQUEST flags=ordered
2835 OFPT_ERROR (OF1.4): OFPBFC_BAD_FLAGS
2836 OFPT_BUNDLE_CONTROL (OF1.4):
2837 bundle_id=0x1 type=COMMIT_REQUEST flags=ordered
2838 OFPT_BARRIER_REPLY (OF1.4):
2844 AT_SETUP([ofproto - bundle discard without open (OpenFlow 1.4)])
2845 AT_KEYWORDS([monitor])
2848 # Start a monitor, use the required protocol version
2849 ovs-ofctl -O OpenFlow14 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2850 AT_CAPTURE_FILE([monitor.log])
2852 # Open, Close, Close
2853 ovs-appctl -t ovs-ofctl ofctl/send "05 21 00 10 00 00 00 0a 00 00 00 01 00 06 00 01"
2854 ovs-appctl -t ovs-ofctl ofctl/barrier
2855 ovs-appctl -t ovs-ofctl exit
2857 AT_CHECK([ofctl_strip < monitor.log], [0], [dnl
2858 send: OFPT_BUNDLE_CONTROL (OF1.4):
2859 bundle_id=0x1 type=DISCARD_REQUEST flags=atomic
2860 OFPT_ERROR (OF1.4): OFPBFC_BAD_ID
2861 OFPT_BUNDLE_CONTROL (OF1.4):
2862 bundle_id=0x1 type=DISCARD_REQUEST flags=atomic
2863 OFPT_BARRIER_REPLY (OF1.4):