mirror of
https://github.com/openvswitch/ovs
synced 2025-10-27 15:18:06 +00:00
Commit3f1087cadded a per zone limit test which relied on the CHECK_CT_DPIF_FLUSH_BY_CT_TUPLE m4 macro to skip the test when executing in a userspace datapath (since the per zone limit feature is not yet implemented in userspace). That macro, however, has been removed in commit271e48a("conntrack: Support conntrack flush by ct 5-tuple") which was causing the test to fail when executing in userspace. Instead, a new m4 macro, CHECK_CT_DPIF_PER_ZONE_LIMIT, is introduced to make the same differentiation, until userspace doesn't support the per zone limit. CC: Yi-Hung Wei <yihung.wei@gmail.com> Fixes:3f1087c("system-traffic: Add conntrack per zone limit test case") Signed-off-by: Tiago Lam <tiago.lam@intel.com> Signed-off-by: Ben Pfaff <blp@ovn.org> Acked-by: Yi-Hung Wei <yihung.wei@gmail.com>
164 lines
5.8 KiB
Plaintext
164 lines
5.8 KiB
Plaintext
# _ADD_BR([name])
|
|
#
|
|
# Expands into the proper ovs-vsctl commands to create a bridge with the
|
|
# appropriate type and properties
|
|
m4_define([_ADD_BR], [[add-br $1 -- set Bridge $1 protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13,OpenFlow14,OpenFlow15 fail-mode=secure ]])
|
|
|
|
# OVS_TRAFFIC_VSWITCHD_START([vsctl-args], [vsctl-output], [=override])
|
|
#
|
|
# Creates a database and starts ovsdb-server, starts ovs-vswitchd
|
|
# connected to that database, calls ovs-vsctl to create a bridge named
|
|
# br0 with predictable settings, passing 'vsctl-args' as additional
|
|
# commands to ovs-vsctl. If 'vsctl-args' causes ovs-vsctl to provide
|
|
# output (e.g. because it includes "create" commands) then 'vsctl-output'
|
|
# specifies the expected output after filtering through uuidfilt.
|
|
#
|
|
# Best-effort loading of all available vport modules is performed.
|
|
#
|
|
m4_define([OVS_TRAFFIC_VSWITCHD_START],
|
|
[AT_CHECK([modprobe openvswitch])
|
|
on_exit 'modprobe -r openvswitch'
|
|
m4_foreach([mod], [[vport_geneve], [vport_gre], [vport_lisp], [vport_stt], [vport_vxlan]],
|
|
[modprobe -q mod || echo "Module mod not loaded."
|
|
on_exit 'modprobe -q -r mod'
|
|
])
|
|
on_exit 'ovs-dpctl del-dp ovs-system'
|
|
on_exit 'ovs-appctl dpctl/flush-conntrack'
|
|
_OVS_VSWITCHD_START([])
|
|
dnl Add bridges, ports, etc.
|
|
AT_CHECK([ovs-vsctl -- _ADD_BR([br0]) -- $1 m4_if([$2], [], [], [| uuidfilt])], [0], [$2])
|
|
])
|
|
|
|
# OVS_TRAFFIC_VSWITCHD_STOP([WHITELIST], [extra_cmds])
|
|
#
|
|
# Gracefully stops ovs-vswitchd and ovsdb-server, checking their log files
|
|
# for messages with severity WARN or higher and signaling an error if any
|
|
# is present. The optional WHITELIST may contain shell-quoted "sed"
|
|
# commands to delete any warnings that are actually expected, e.g.:
|
|
#
|
|
# OVS_TRAFFIC_VSWITCHD_STOP(["/expected error/d"])
|
|
#
|
|
# 'extra_cmds' are shell commands to be executed afte OVS_VSWITCHD_STOP() is
|
|
# invoked. They can be used to perform additional cleanups such as name space
|
|
# removal.
|
|
m4_define([OVS_TRAFFIC_VSWITCHD_STOP],
|
|
[OVS_VSWITCHD_STOP([$1])
|
|
AT_CHECK([:; $2])
|
|
])
|
|
|
|
# CONFIGURE_VETH_OFFLOADS([VETH])
|
|
#
|
|
# The kernel datapath has no problem with offloads and veths. Nothing
|
|
# to do here.
|
|
m4_define([CONFIGURE_VETH_OFFLOADS],
|
|
)
|
|
|
|
# CHECK_CONNTRACK()
|
|
#
|
|
# Perform requirements checks for running conntrack tests, and flush the
|
|
# kernel conntrack tables when the test is finished.
|
|
#
|
|
m4_define([CHECK_CONNTRACK],
|
|
[AT_SKIP_IF([test $HAVE_PYTHON2 = no])
|
|
m4_foreach([mod], [[nf_conntrack_ipv4], [nf_conntrack_ipv6], [nf_nat_ftp],
|
|
[nf_nat_tftp]],
|
|
[modprobe mod || echo "Module mod not loaded."
|
|
on_exit 'modprobe -r mod'
|
|
])
|
|
sysctl -w net.netfilter.nf_conntrack_helper=0
|
|
on_exit 'ovstest test-netlink-conntrack flush'
|
|
]
|
|
)
|
|
|
|
# CHECK_CONNTRACK_ALG()
|
|
#
|
|
# Perform requirements checks for running conntrack ALG tests. The kernel
|
|
# supports ALG, so no check is needed.
|
|
#
|
|
m4_define([CHECK_CONNTRACK_ALG])
|
|
|
|
# CHECK_CONNTRACK_FRAG()
|
|
#
|
|
# Perform requirements checks for running conntrack fragmentations tests.
|
|
# The kernel always supports fragmentation, so no check is needed.
|
|
m4_define([CHECK_CONNTRACK_FRAG])
|
|
|
|
# CHECK_CONNTRACK_LOCAL_STACK()
|
|
#
|
|
# Perform requirements checks for running conntrack tests with local stack.
|
|
# The kernel always supports reading the connection state of an skb coming
|
|
# from an internal port, without an explicit ct() action, so no check is
|
|
# needed.
|
|
m4_define([CHECK_CONNTRACK_LOCAL_STACK])
|
|
|
|
# CHECK_CONNTRACK_FRAG_OVERLAP()
|
|
#
|
|
# The kernel does not support overlapping fragments checking.
|
|
m4_define([CHECK_CONNTRACK_FRAG_OVERLAP],
|
|
[
|
|
AT_SKIP_IF([:])
|
|
])
|
|
|
|
# CHECK_CONNTRACK_FRAG_IPV6_MULT_EXTEN()
|
|
#
|
|
# The kernel does not support fragments with multiple extension headers.
|
|
m4_define([CHECK_CONNTRACK_FRAG_IPV6_MULT_EXTEN],
|
|
[
|
|
AT_SKIP_IF([:])
|
|
])
|
|
|
|
# CHECK_CONNTRACK_NAT()
|
|
#
|
|
# Perform requirements checks for running conntrack NAT tests. The kernel
|
|
# always supports NAT, so no check is needed.
|
|
#
|
|
m4_define([CHECK_CONNTRACK_NAT])
|
|
|
|
# CHECK_CT_DPIF_PER_ZONE_LIMIT()
|
|
#
|
|
# Perform requirements checks for running ovs-dpctl ct-[set|get|del]-limits per
|
|
# zone. The kernel datapath does support this feature. Will remove this check
|
|
# after both kernel and userspace datapath support it.
|
|
m4_define([CHECK_CT_DPIF_PER_ZONE_LIMIT])
|
|
|
|
# CHECK_CT_DPIF_SET_GET_MAXCONNS()
|
|
#
|
|
# Perform requirements checks for running ovs-dpctl ct-set-maxconns or
|
|
# ovs-dpctl ct-get-maxconns. The kernel datapath does not support this
|
|
# feature.
|
|
m4_define([CHECK_CT_DPIF_SET_GET_MAXCONNS],
|
|
[
|
|
AT_SKIP_IF([:])
|
|
])
|
|
|
|
# CHECK_CT_DPIF_GET_NCONNS()
|
|
#
|
|
# Perform requirements checks for running ovs-dpctl ct-get-nconns. The
|
|
# kernel datapath does not support this feature.
|
|
m4_define([CHECK_CT_DPIF_GET_NCONNS],
|
|
[
|
|
AT_SKIP_IF([:])
|
|
])
|
|
|
|
# OVS_CHECK_KERNEL([minversion], [minsublevel], [maxversion], [maxsublevel])
|
|
#
|
|
# Check if kernel version falls between minversion.minsublevel and
|
|
# maxversion.maxsublevel, skip this test if it is not.
|
|
m4_define([OVS_CHECK_KERNEL],
|
|
[
|
|
version=$(uname -r | sed -e 's/\./ /g' | awk '{print $ 1}')
|
|
sublevel=$(uname -r | sed -e 's/\./ /g' | awk '{print $ 2}')
|
|
AT_SKIP_IF([test $version -lt $1 || ( test $version -eq $1 && test $sublevel -lt $2 ) || test $version -gt $3 || ( test $version -eq $3 && test $sublevel -gt $4 )])
|
|
])
|
|
|
|
# OVS_CHECK_KERNEL_EXCL([minversion], [minsublevel], [maxversion], [maxsublevel])
|
|
#
|
|
# Check that kernel version doesn't fall between minversion.minsublevel and
|
|
# maxversion.maxsublevel, skip this test if it is.
|
|
m4_define([OVS_CHECK_KERNEL_EXCL],
|
|
[
|
|
version=$(uname -r | sed -e 's/\./ /g' | awk '{print $ 1}')
|
|
sublevel=$(uname -r | sed -e 's/\./ /g' | awk '{print $ 2}')
|
|
AT_SKIP_IF([ ! ( test $version -lt $1 || ( test $version -eq $1 && test $sublevel -lt $2 ) || test $version -gt $3 || ( test $version -eq $3 && test $sublevel -gt $4 ) ) ])
|
|
])
|