mirror of
https://github.com/openvswitch/ovs
synced 2025-10-13 14:07:02 +00:00
Previously, '--disable-system' disables both system dp and the system
routing table. The patch makes '--disable-system' only disable system
dp and adds '--disable-system-route' for disabling the route table.
This fixes failures when 'make check-system-userspace' for tunnel cases.
As a consequence, hitting errors due to OVS userspace parses the IGMP packet
but its datapaths do not, so odp_flow_key_to_flow() return ODP_FIT_TOO_LITTLE.
commit c645550bb2
("odp-util: Always report ODP_FIT_TOO_LITTLE for IGMP.")
Fix it by filtering out the IGMP-related error message.
Signed-off-by: William Tu <u9012063@gmail.com>
Signed-off-by: Yi-Hung Wei <yihung.wei@gmail.com>
Co-authored-by: Yi-Hung Wei <yihung.wei@gmail.com>
Signed-off-by: Ben Pfaff <blp@ovn.org>
298 lines
9.9 KiB
Plaintext
298 lines
9.9 KiB
Plaintext
# _ADD_BR([name])
|
|
#
|
|
# Expands into the proper ovs-vsctl commands to create a bridge with the
|
|
# appropriate type and properties
|
|
m4_define([_ADD_BR], [[add-br $1 -- set Bridge $1 datapath_type="netdev" protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13,OpenFlow14,OpenFlow15 fail-mode=secure ]])
|
|
|
|
# OVS_TRAFFIC_VSWITCHD_START([vsctl-args], [vsctl-output], [=override])
|
|
#
|
|
# Creates a database and starts ovsdb-server, starts ovs-vswitchd
|
|
# connected to that database, calls ovs-vsctl to create a bridge named
|
|
# br0 with predictable settings, passing 'vsctl-args' as additional
|
|
# commands to ovs-vsctl. If 'vsctl-args' causes ovs-vsctl to provide
|
|
# output (e.g. because it includes "create" commands) then 'vsctl-output'
|
|
# specifies the expected output after filtering through uuidfilt.
|
|
m4_define([OVS_TRAFFIC_VSWITCHD_START],
|
|
[
|
|
OVS_WAIT_WHILE([ip link show ovs-netdev])
|
|
_OVS_VSWITCHD_START([--disable-system])
|
|
dnl Add bridges, ports, etc.
|
|
OVS_WAIT_WHILE([ip link show br0])
|
|
AT_CHECK([ovs-vsctl -- _ADD_BR([br0]) -- $1 m4_if([$2], [], [], [| uuidfilt])], [0], [$2])
|
|
])
|
|
|
|
# OVS_TRAFFIC_VSWITCHD_STOP([WHITELIST], [extra_cmds])
|
|
#
|
|
# Gracefully stops ovs-vswitchd and ovsdb-server, checking their log files
|
|
# for messages with severity WARN or higher and signaling an error if any
|
|
# is present. The optional WHITELIST may contain shell-quoted "sed"
|
|
# commands to delete any warnings that are actually expected, e.g.:
|
|
#
|
|
# OVS_TRAFFIC_VSWITCHD_STOP(["/expected error/d"])
|
|
#
|
|
# 'extra_cmds' are shell commands to be executed afte OVS_VSWITCHD_STOP() is
|
|
# invoked. They can be used to perform additional cleanups such as name space
|
|
# removal.
|
|
m4_define([OVS_TRAFFIC_VSWITCHD_STOP],
|
|
[OVS_VSWITCHD_STOP([dnl
|
|
$1";/netdev_linux.*obtaining netdev stats via vport failed/d
|
|
/dpif_netlink.*Generic Netlink family 'ovs_datapath' does not exist. The Open vSwitch kernel module is probably not loaded./d
|
|
/dpif_netdev(revalidator.*)|ERR|internal error parsing flow key.*proto=2.*/d
|
|
/dpif(revalidator.*)|WARN|netdev@ovs-netdev: failed to.*proto=2.*/d"])
|
|
AT_CHECK([:; $2])
|
|
])
|
|
|
|
# CONFIGURE_VETH_OFFLOADS([VETH])
|
|
#
|
|
# Disable TX offloads for veths. The userspace datapath uses the AF_PACKET
|
|
# socket to receive packets for veths. Unfortunately, the AF_PACKET socket
|
|
# doesn't play well with offloads:
|
|
# 1. GSO packets are received without segmentation and therefore discarded.
|
|
# 2. Packets with offloaded partial checksum are received with the wrong
|
|
# checksum, therefore discarded by the receiver.
|
|
#
|
|
# By disabling tx offloads in the non-OVS side of the veth peer we make sure
|
|
# that the AF_PACKET socket will not receive bad packets.
|
|
#
|
|
# This is a workaround, and should be removed when offloads are properly
|
|
# supported in netdev-linux.
|
|
m4_define([CONFIGURE_VETH_OFFLOADS],
|
|
[AT_CHECK([ethtool -K $1 tx off], [0], [ignore], [ignore])]
|
|
)
|
|
|
|
# CHECK_CONNTRACK()
|
|
#
|
|
# Perform requirements checks for running conntrack tests.
|
|
#
|
|
m4_define([CHECK_CONNTRACK],
|
|
[AT_SKIP_IF([test $HAVE_PYTHON2 = no])]
|
|
)
|
|
|
|
# CHECK_CONNTRACK_ALG()
|
|
#
|
|
# Perform requirements checks for running conntrack ALG tests. The userspace
|
|
# supports FTP and TFTP.
|
|
#
|
|
m4_define([CHECK_CONNTRACK_ALG])
|
|
|
|
# CHECK_CONNTRACK_LOCAL_STACK()
|
|
#
|
|
# Perform requirements checks for running conntrack tests with local stack.
|
|
# While the kernel connection tracker automatically passes all the connection
|
|
# tracking state from an internal port to the OpenvSwitch kernel module, there
|
|
# is simply no way of doing that with the userspace, so skip the tests.
|
|
m4_define([CHECK_CONNTRACK_LOCAL_STACK],
|
|
[
|
|
AT_SKIP_IF([:])
|
|
])
|
|
|
|
# CHECK_CONNTRACK_FRAG_OVERLAP()
|
|
#
|
|
# The userspace datapath supports fragment overlap check.
|
|
m4_define([CHECK_CONNTRACK_FRAG_OVERLAP])
|
|
|
|
# CHECK_CONNTRACK_NAT()
|
|
#
|
|
# Perform requirements checks for running conntrack NAT tests. The userspace
|
|
# datapath supports NAT.
|
|
#
|
|
m4_define([CHECK_CONNTRACK_NAT])
|
|
|
|
# CHECK_CT_DPIF_PER_ZONE_LIMIT()
|
|
#
|
|
# Perform requirements checks for running ovs-dpctl ct-[set|get|del]-limits per
|
|
# zone. The userspace datapath does not support this feature yet.
|
|
m4_define([CHECK_CT_DPIF_PER_ZONE_LIMIT],
|
|
[
|
|
AT_SKIP_IF([:])
|
|
])
|
|
|
|
# CHECK_CT_DPIF_SET_GET_MAXCONNS()
|
|
#
|
|
# Perform requirements checks for running ovs-dpctl ct-set-maxconns or
|
|
# ovs-dpctl ct-get-maxconns. The userspace datapath does support this feature.
|
|
m4_define([CHECK_CT_DPIF_SET_GET_MAXCONNS])
|
|
|
|
# CHECK_CT_DPIF_GET_NCONNS()
|
|
#
|
|
# Perform requirements checks for running ovs-dpctl ct-get-nconns. The
|
|
# userspace datapath does support this feature.
|
|
m4_define([CHECK_CT_DPIF_GET_NCONNS])
|
|
|
|
# DPCTL_SET_MIN_FRAG_SIZE()
|
|
#
|
|
# The userspace datapath supports this command.
|
|
m4_define([DPCTL_SET_MIN_FRAG_SIZE],
|
|
[
|
|
AT_CHECK([ovs-appctl dpctl/ipf-set-min-frag v4 400], [], [dnl
|
|
setting minimum fragment size successful
|
|
])
|
|
AT_CHECK([ovs-appctl dpctl/ipf-set-min-frag v6 400], [], [dnl
|
|
setting minimum fragment size successful
|
|
])
|
|
])
|
|
|
|
# DPCTL_MODIFY_FRAGMENTATION()
|
|
#
|
|
# The userspace datapath supports this command.
|
|
m4_define([DPCTL_MODIFY_FRAGMENTATION],
|
|
[
|
|
AT_CHECK([ovs-appctl dpctl/ipf-set-min-frag v4 1000], [], [dnl
|
|
setting minimum fragment size successful
|
|
])
|
|
AT_CHECK([ovs-appctl dpctl/ipf-set-max-nfrags 500], [], [dnl
|
|
setting maximum fragments successful
|
|
])
|
|
AT_CHECK([ovs-appctl dpctl/ipf-get-status], [], [dnl
|
|
Fragmentation Module Status
|
|
---------------------------
|
|
v4 enabled: 1
|
|
v6 enabled: 1
|
|
max num frags (v4/v6): 500
|
|
num frag: 0
|
|
min v4 frag size: 1000
|
|
v4 frags accepted: 0
|
|
v4 frags completed: 0
|
|
v4 frags expired: 0
|
|
v4 frags too small: 0
|
|
v4 frags overlapped: 0
|
|
v4 frags purged: 0
|
|
min v6 frag size: 1280
|
|
v6 frags accepted: 0
|
|
v6 frags completed: 0
|
|
v6 frags expired: 0
|
|
v6 frags too small: 0
|
|
v6 frags overlapped: 0
|
|
v6 frags purged: 0
|
|
])
|
|
])
|
|
|
|
# DPCTL_CHECK_FRAGMENTATION_PASS()
|
|
#
|
|
# Used to check fragmentation counters for some fragmentation tests using
|
|
# the userspace datapath.
|
|
m4_define([DPCTL_CHECK_FRAGMENTATION_PASS],
|
|
[
|
|
AT_CHECK([ovs-appctl dpctl/ipf-get-status --more], [], [dnl
|
|
Fragmentation Module Status
|
|
---------------------------
|
|
v4 enabled: 1
|
|
v6 enabled: 1
|
|
max num frags (v4/v6): 500
|
|
num frag: 0
|
|
min v4 frag size: 1000
|
|
v4 frags accepted: 30
|
|
v4 frags completed: 30
|
|
v4 frags expired: 0
|
|
v4 frags too small: 0
|
|
v4 frags overlapped: 0
|
|
v4 frags purged: 0
|
|
min v6 frag size: 1280
|
|
v6 frags accepted: 0
|
|
v6 frags completed: 0
|
|
v6 frags expired: 0
|
|
v6 frags too small: 0
|
|
v6 frags overlapped: 0
|
|
v6 frags purged: 0
|
|
|
|
Fragment Lists:
|
|
|
|
])
|
|
])
|
|
|
|
# DPCTL_CHECK_V6_FRAGMENTATION_PASS()
|
|
#
|
|
# Used to check fragmentation counters for some fragmentation tests using
|
|
# the userspace datapath.
|
|
m4_define([DPCTL_CHECK_V6_FRAGMENTATION_PASS],
|
|
[
|
|
AT_CHECK([ovs-appctl dpctl/ipf-get-status --more], [], [dnl
|
|
Fragmentation Module Status
|
|
---------------------------
|
|
v4 enabled: 1
|
|
v6 enabled: 1
|
|
max num frags (v4/v6): 1000
|
|
num frag: 0
|
|
min v4 frag size: 1200
|
|
v4 frags accepted: 0
|
|
v4 frags completed: 0
|
|
v4 frags expired: 0
|
|
v4 frags too small: 0
|
|
v4 frags overlapped: 0
|
|
v4 frags purged: 0
|
|
min v6 frag size: 1280
|
|
v6 frags accepted: 30
|
|
v6 frags completed: 30
|
|
v6 frags expired: 0
|
|
v6 frags too small: 0
|
|
v6 frags overlapped: 0
|
|
v6 frags purged: 0
|
|
|
|
Fragment Lists:
|
|
|
|
])
|
|
])
|
|
|
|
# FORMAT_FRAG_LIST([])
|
|
#
|
|
# Strip content from the piped input which can differ from test to test; recirc_id
|
|
# and ip_id fields in an ipf_list vary from test to test and hence are cleared.
|
|
m4_define([FORMAT_FRAG_LIST],
|
|
[[sed -e 's/ip_id=[0-9]*/ip_id=<cleared>/g' -e 's/recirc_id=[0-9]*/recirc_id=<cleared>/g']])
|
|
|
|
# DPCTL_CHECK_FRAGMENTATION_FAIL()
|
|
#
|
|
# Used to check fragmentation counters for some fragmentation tests using
|
|
# the userspace datapath, when failure to transmit fragments is expected.
|
|
m4_define([DPCTL_CHECK_FRAGMENTATION_FAIL],
|
|
[
|
|
AT_CHECK([ovs-appctl dpctl/ipf-get-status -m | FORMAT_FRAG_LIST()], [], [dnl
|
|
Fragmentation Module Status
|
|
---------------------------
|
|
v4 enabled: 1
|
|
v6 enabled: 1
|
|
max num frags (v4/v6): 500
|
|
num frag: 7
|
|
min v4 frag size: 1000
|
|
v4 frags accepted: 7
|
|
v4 frags completed: 0
|
|
v4 frags expired: 0
|
|
v4 frags too small: 0
|
|
v4 frags overlapped: 0
|
|
v4 frags purged: 0
|
|
min v6 frag size: 1280
|
|
v6 frags accepted: 0
|
|
v6 frags completed: 0
|
|
v6 frags expired: 0
|
|
v6 frags too small: 0
|
|
v6 frags overlapped: 0
|
|
v6 frags purged: 0
|
|
|
|
Fragment Lists:
|
|
|
|
(src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
|
|
(src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
|
|
(src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
|
|
(src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
|
|
(src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
|
|
(src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
|
|
(src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
|
|
])
|
|
])
|
|
|
|
# OVS_CHECK_MIN_KERNEL([minversion], [maxversion])
|
|
#
|
|
# The userspace skips all tests that check kernel version.
|
|
m4_define([OVS_CHECK_MIN_KERNEL],
|
|
[
|
|
AT_SKIP_IF([:])
|
|
])
|
|
|
|
# OVS_CHECK_KERNEL_EXCL([minversion], [maxversion], [minsublevel], [maxsublevel])
|
|
#
|
|
# The userspace skips all tests that check kernel version.
|
|
m4_define([OVS_CHECK_KERNEL_EXCL],
|
|
[
|
|
AT_SKIP_IF([:])
|
|
])
|