2012-07-03 22:17:14 -07:00
|
|
|
AT_BANNER([OpenFlow actions])
|
|
|
|
|
|
|
|
AT_SETUP([OpenFlow 1.0 action translation])
|
2012-10-19 02:37:37 +09:00
|
|
|
AT_KEYWORDS([ofp-actions OF1.0])
|
2012-07-03 22:17:14 -07:00
|
|
|
AT_DATA([test-data], [dnl
|
|
|
|
# actions=LOCAL
|
|
|
|
0000 0008 fffe 04d2
|
|
|
|
|
|
|
|
# actions=CONTROLLER:1234
|
|
|
|
0000 0008 fffd 04d2
|
|
|
|
|
|
|
|
# actions=mod_vlan_vid:9
|
|
|
|
0001 0008 0009 0000
|
|
|
|
|
|
|
|
# actions=mod_vlan_pcp:6
|
|
|
|
0002 0008 06 000000
|
|
|
|
|
|
|
|
# actions=strip_vlan
|
|
|
|
0003 0008 00000000
|
|
|
|
|
|
|
|
# actions=mod_dl_src:00:11:22:33:44:55
|
|
|
|
0004 0010 001122334455 000000000000
|
|
|
|
|
|
|
|
# actions=mod_dl_dst:10:20:30:40:50:60
|
|
|
|
0005 0010 102030405060 000000000000
|
|
|
|
|
|
|
|
# actions=mod_nw_src:1.2.3.4
|
|
|
|
0006 0008 01020304
|
|
|
|
|
|
|
|
# actions=mod_nw_dst:192.168.0.1
|
|
|
|
0007 0008 c0a80001
|
|
|
|
|
|
|
|
# actions=mod_nw_tos:48
|
|
|
|
0008 0008 30 000000
|
|
|
|
|
|
|
|
# actions=mod_tp_src:80
|
|
|
|
0009 0008 0050 0000
|
|
|
|
|
|
|
|
# actions=mod_tp_dst:443
|
|
|
|
000a 0008 01bb 0000
|
|
|
|
|
2013-05-06 10:55:06 -07:00
|
|
|
# actions=enqueue:10:55
|
2012-07-03 22:17:14 -07:00
|
|
|
000b 0010 000a 000000000000 00000037
|
|
|
|
|
|
|
|
# actions=resubmit:5
|
|
|
|
ffff 0010 00002320 0001 0005 00000000
|
|
|
|
|
|
|
|
# actions=set_tunnel:0x12345678
|
|
|
|
ffff 0010 00002320 0002 0000 12345678
|
|
|
|
|
|
|
|
# actions=set_queue:2309737729
|
|
|
|
ffff 0010 00002320 0004 0000 89abcd01
|
|
|
|
|
|
|
|
# actions=pop_queue
|
|
|
|
ffff 0010 00002320 0005 000000000000
|
|
|
|
|
|
|
|
# actions=move:NXM_OF_IN_PORT[]->NXM_OF_VLAN_TCI[]
|
|
|
|
ffff 0018 00002320 0006 0010 0000 0000 00000002 00000802
|
|
|
|
|
|
|
|
# actions=load:0xf009->NXM_OF_VLAN_TCI[]
|
|
|
|
ffff 0018 00002320 0007 000f 00000802 000000000000f009
|
|
|
|
|
|
|
|
# actions=note:11.e9.9a.ad.67.f3
|
|
|
|
ffff 0010 00002320 0008 11e99aad67f3
|
|
|
|
|
|
|
|
# actions=set_tunnel64:0xc426384d49c53d60
|
|
|
|
ffff 0018 00002320 0009 000000000000 c426384d49c53d60
|
|
|
|
|
|
|
|
# actions=set_tunnel64:0x885f3298
|
|
|
|
ffff 0018 00002320 0009 000000000000 00000000885f3298
|
|
|
|
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow10 actions: OFPBIC_UNSUP_INST
|
2014-08-07 16:09:07 -07:00
|
|
|
& ofp_actions|WARN|write_metadata instruction not allowed here
|
2012-10-19 02:37:37 +09:00
|
|
|
ffff 0020 00002320 0016 000000000000 fedcba9876543210 ffffffffffffffff
|
|
|
|
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow10 actions: OFPBIC_UNSUP_INST
|
2014-08-07 16:09:07 -07:00
|
|
|
& ofp_actions|WARN|write_metadata instruction not allowed here
|
2012-10-19 02:37:37 +09:00
|
|
|
ffff 0020 00002320 0016 000000000000 fedcba9876543210 ffff0000ffff0000
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
# actions=multipath(eth_src,50,modulo_n,1,0,NXM_NX_REG0[])
|
|
|
|
ffff 0020 00002320 000a 0000 0032 0000 0000 0000 0000 0000 0000 001f 00010004
|
|
|
|
|
|
|
|
# actions=bundle(eth_src,0,hrw,ofport,slaves:4,8)
|
|
|
|
ffff 0028 00002320 000c 0001 0000 0000 00000002 0002 0000 00000000 00000000 dnl
|
|
|
|
0004 0008 00000000
|
|
|
|
|
|
|
|
# actions=bundle_load(eth_src,0,hrw,ofport,NXM_NX_REG0[],slaves:4,8)
|
|
|
|
ffff 0028 00002320 000d 0001 0000 0000 00000002 0002 001f 00010004 00000000 dnl
|
|
|
|
0004 0008 00000000
|
|
|
|
|
|
|
|
# actions=resubmit(10,5)
|
|
|
|
ffff 0010 00002320 000e 000a 05 000000
|
|
|
|
|
|
|
|
# actions=output:NXM_NX_REG1[5..10]
|
|
|
|
ffff 0018 00002320 000f 0145 00010204 ffff 000000000000
|
|
|
|
|
|
|
|
# actions=learn(table=2,idle_timeout=10,hard_timeout=20,fin_idle_timeout=2,fin_hard_timeout=4,priority=80,cookie=0x123456789abcdef0,NXM_OF_VLAN_TCI[0..11],NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],output:NXM_OF_IN_PORT[])
|
|
|
|
ffff 0048 00002320 0010 000a 0014 0050 123456789abcdef0 0000 02 00 0002 0004 dnl
|
|
|
|
000c 00000802 0000 00000802 0000 dnl
|
|
|
|
0030 00000406 0000 00000206 0000 dnl
|
|
|
|
1010 00000002 0000 dnl
|
|
|
|
00000000
|
|
|
|
|
|
|
|
# actions=exit
|
|
|
|
ffff 0010 00002320 0011 000000000000
|
|
|
|
|
|
|
|
# actions=dec_ttl
|
|
|
|
ffff 0010 00002320 0012 000000000000
|
|
|
|
|
|
|
|
# actions=fin_timeout(idle_timeout=10,hard_timeout=20)
|
|
|
|
ffff 0010 00002320 0013 000a 0014 0000
|
|
|
|
|
|
|
|
# actions=controller(reason=invalid_ttl,max_len=1234,id=5678)
|
|
|
|
ffff 0010 00002320 0014 04d2 162e 02 00
|
|
|
|
|
Implement serializing the state of packet traversal in "continuations".
One purpose of OpenFlow packet-in messages is to allow a controller to
interpose on the path of a packet through the flow tables. If, for
example, the controller needs to modify a packet in some way that the
switch doesn't directly support, the controller should be able to
program the switch to send it the packet, then modify the packet and
send it back to the switch to continue through the flow table.
That's the theory. In practice, this doesn't work with any but the
simplest flow tables. Packet-in messages simply don't include enough
context to allow the flow table traversal to continue. For example:
* Via "resubmit" actions, an Open vSwitch packet can have an
effective "call stack", but a packet-in can't describe it, and
so it would be lost.
* A packet-in can't preserve the stack used by NXAST_PUSH and
NXAST_POP actions.
* A packet-in can't preserve the OpenFlow 1.1+ action set.
* A packet-in can't preserve the state of Open vSwitch mirroring
or connection tracking.
This commit introduces a solution called "continuations". A continuation
is the state of a packet's traversal through OpenFlow flow tables. A
"controller" action with the "pause" flag, which is newly implemented in
this commit, generates a continuation and sends it to the OpenFlow
controller in a packet-in asynchronous message (only NXT_PACKET_IN2
supports continuations, so the controller must configure them with
NXT_SET_PACKET_IN_FORMAT). The controller processes the packet-in,
possibly modifying some of its data, and sends it back to the switch with
an NXT_RESUME request, which causes flow table traversal to continue. In
principle, a single packet can be paused and resumed multiple times.
Another way to look at it is:
- "pause" is an extension of the existing OFPAT_CONTROLLER
action. It sends the packet to the controller, with full
pipeline context (some of which is switch implementation
dependent, and may thus vary from switch to switch).
- A continuation is an extension of OFPT_PACKET_IN, allowing for
implementation dependent metadata.
- NXT_RESUME is an extension of OFPT_PACKET_OUT, with the
semantics that the pipeline processing is continued with the
original translation context from where it was left at the time
it was paused.
Signed-off-by: Ben Pfaff <blp@ovn.org>
Acked-by: Jarno Rajahalme <jarno@ovn.org>
2016-02-19 16:10:06 -08:00
|
|
|
# actions=controller(reason=invalid_ttl,max_len=1234,id=5678,userdata=01.02.03.04.05,pause)
|
|
|
|
ffff 0040 00002320 0025 000000000000 dnl
|
2016-02-19 15:53:26 -08:00
|
|
|
0000 0008 04d2 0000 dnl
|
|
|
|
0001 0008 162e 0000 dnl
|
|
|
|
0002 0005 02 000000 dnl
|
Implement serializing the state of packet traversal in "continuations".
One purpose of OpenFlow packet-in messages is to allow a controller to
interpose on the path of a packet through the flow tables. If, for
example, the controller needs to modify a packet in some way that the
switch doesn't directly support, the controller should be able to
program the switch to send it the packet, then modify the packet and
send it back to the switch to continue through the flow table.
That's the theory. In practice, this doesn't work with any but the
simplest flow tables. Packet-in messages simply don't include enough
context to allow the flow table traversal to continue. For example:
* Via "resubmit" actions, an Open vSwitch packet can have an
effective "call stack", but a packet-in can't describe it, and
so it would be lost.
* A packet-in can't preserve the stack used by NXAST_PUSH and
NXAST_POP actions.
* A packet-in can't preserve the OpenFlow 1.1+ action set.
* A packet-in can't preserve the state of Open vSwitch mirroring
or connection tracking.
This commit introduces a solution called "continuations". A continuation
is the state of a packet's traversal through OpenFlow flow tables. A
"controller" action with the "pause" flag, which is newly implemented in
this commit, generates a continuation and sends it to the OpenFlow
controller in a packet-in asynchronous message (only NXT_PACKET_IN2
supports continuations, so the controller must configure them with
NXT_SET_PACKET_IN_FORMAT). The controller processes the packet-in,
possibly modifying some of its data, and sends it back to the switch with
an NXT_RESUME request, which causes flow table traversal to continue. In
principle, a single packet can be paused and resumed multiple times.
Another way to look at it is:
- "pause" is an extension of the existing OFPAT_CONTROLLER
action. It sends the packet to the controller, with full
pipeline context (some of which is switch implementation
dependent, and may thus vary from switch to switch).
- A continuation is an extension of OFPT_PACKET_IN, allowing for
implementation dependent metadata.
- NXT_RESUME is an extension of OFPT_PACKET_OUT, with the
semantics that the pipeline processing is continued with the
original translation context from where it was left at the time
it was paused.
Signed-off-by: Ben Pfaff <blp@ovn.org>
Acked-by: Jarno Rajahalme <jarno@ovn.org>
2016-02-19 16:10:06 -08:00
|
|
|
0003 0009 0102030405 00000000000000 dnl
|
|
|
|
0004 0004 00000000
|
2016-02-19 15:53:26 -08:00
|
|
|
|
2012-08-16 14:25:07 -07:00
|
|
|
# actions=dec_ttl(32768,12345,90,765,1024)
|
|
|
|
ffff 0020 00002320 0015 000500000000 80003039005A02fd 0400000000000000
|
|
|
|
|
2013-04-22 10:01:14 -07:00
|
|
|
# actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678)
|
|
|
|
ffff 0018 00002320 001d 3039 00005BA0 00008707 0000B26E
|
|
|
|
|
2014-10-23 14:34:04 -07:00
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_LEN
|
|
|
|
& ofp_actions|WARN|OpenFlow action OFPAT_OUTPUT length 240 exceeds action buffer length 8
|
|
|
|
& ofp_actions|WARN|bad action at offset 0 (OFPBAC_BAD_LEN):
|
|
|
|
& 00000000 00 00 00 f0 00 00 00 00-
|
|
|
|
00 00 00 f0 00 00 00 00
|
|
|
|
|
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_LEN
|
|
|
|
& ofp_actions|WARN|OpenFlow action OFPAT_OUTPUT length 16 not in valid range [[8,8]]
|
|
|
|
& ofp_actions|WARN|bad action at offset 0 (OFPBAC_BAD_LEN):
|
|
|
|
& 00000000 00 00 00 10 ff fe ff ff-00 00 00 00 00 00 00 00
|
|
|
|
00 00 00 10 ff fe ff ff 00 00 00 00 00 00 00 00
|
|
|
|
|
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_LEN
|
|
|
|
& ofp_actions|WARN|OpenFlow action NXAST_DEC_TTL_CNT_IDS length 17 is not a multiple of 8
|
|
|
|
ffff 0011 00002320 0015 0001 00000000 0000000000000000
|
|
|
|
|
2015-07-29 08:36:07 -07:00
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_OUT_PORT
|
|
|
|
0000 0008 ffff 0000
|
|
|
|
|
Add support for connection tracking.
This patch adds a new action and fields to OVS that allow connection
tracking to be performed. This support works in conjunction with the
Linux kernel support merged into the Linux-4.3 development cycle.
Packets have two possible states with respect to connection tracking:
Untracked packets have not previously passed through the connection
tracker, while tracked packets have previously been through the
connection tracker. For OpenFlow pipeline processing, untracked packets
can become tracked, and they will remain tracked until the end of the
pipeline. Tracked packets cannot become untracked.
Connections can be unknown, uncommitted, or committed. Packets which are
untracked have unknown connection state. To know the connection state,
the packet must become tracked. Uncommitted connections have no
connection state stored about them, so it is only possible for the
connection tracker to identify whether they are a new connection or
whether they are invalid. Committed connections have connection state
stored beyond the lifetime of the packet, which allows later packets in
the same connection to be identified as part of the same established
connection, or related to an existing connection - for instance ICMP
error responses.
The new 'ct' action transitions the packet from "untracked" to
"tracked" by sending this flow through the connection tracker.
The following parameters are supported initally:
- "commit": When commit is executed, the connection moves from
uncommitted state to committed state. This signals that information
about the connection should be stored beyond the lifetime of the
packet within the pipeline. This allows future packets in the same
connection to be recognized as part of the same "established" (est)
connection, as well as identifying packets in the reply (rpl)
direction, or packets related to an existing connection (rel).
- "zone=[u16|NXM]": Perform connection tracking in the zone specified.
Each zone is an independent connection tracking context. When the
"commit" parameter is used, the connection will only be committed in
the specified zone, and not in other zones. This is 0 by default.
- "table=NUMBER": Fork pipeline processing in two. The original instance
of the packet will continue processing the current actions list as an
untracked packet. An additional instance of the packet will be sent to
the connection tracker, which will be re-injected into the OpenFlow
pipeline to resume processing in the specified table, with the
ct_state and other ct match fields set. If the table is not specified,
then the packet is submitted to the connection tracker, but the
pipeline does not fork and the ct match fields are not populated. It
is strongly recommended to specify a table later than the current
table to prevent loops.
When the "table" option is used, the packet that continues processing in
the specified table will have the ct_state populated. The ct_state may
have any of the following flags set:
- Tracked (trk): Connection tracking has occurred.
- Reply (rpl): The flow is in the reply direction.
- Invalid (inv): The connection tracker couldn't identify the connection.
- New (new): This is the beginning of a new connection.
- Established (est): This is part of an already existing connection.
- Related (rel): This connection is related to an existing connection.
For more information, consult the ovs-ofctl(8) man pages.
Below is a simple example flow table to allow outbound TCP traffic from
port 1 and drop traffic from port 2 that was not initiated by port 1:
table=0,priority=1,action=drop
table=0,arp,action=normal
table=0,in_port=1,tcp,ct_state=-trk,action=ct(commit,zone=9),2
table=0,in_port=2,tcp,ct_state=-trk,action=ct(zone=9,table=1)
table=1,in_port=2,ct_state=+trk+est,tcp,action=1
table=1,in_port=2,ct_state=+trk+new,tcp,action=drop
Based on original design by Justin Pettit, contributions from Thomas
Graf and Daniele Di Proietto.
Signed-off-by: Joe Stringer <joestringer@nicira.com>
Acked-by: Jarno Rajahalme <jrajahalme@nicira.com>
Acked-by: Ben Pfaff <blp@nicira.com>
2015-08-11 10:56:09 -07:00
|
|
|
# actions=ct()
|
|
|
|
ffff 0018 00002320 0023 0000 00000000 0000 FF 000000 0000
|
|
|
|
|
|
|
|
# actions=ct(commit)
|
|
|
|
ffff 0018 00002320 0023 0001 00000000 0000 FF 000000 0000
|
|
|
|
|
|
|
|
# actions=ct(table=10)
|
|
|
|
ffff 0018 00002320 0023 0000 00000000 0000 0A 000000 0000
|
|
|
|
|
|
|
|
# actions=ct(zone=10)
|
|
|
|
ffff 0018 00002320 0023 0000 00000000 000A FF 000000 0000
|
|
|
|
|
|
|
|
# actions=ct(zone=NXM_NX_REG0[0..15])
|
|
|
|
ffff 0018 00002320 0023 0000 00010004 000F FF 000000 0000
|
|
|
|
|
|
|
|
dnl Can't read 8 bits from register into 16-bit zone.
|
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_SET_LEN
|
|
|
|
ffff 0018 00002320 0023 0000 00010004 0007 FF 000000 0000
|
|
|
|
|
|
|
|
dnl Can't read 32 bits from register into 16-bit zone.
|
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_SET_LEN
|
|
|
|
ffff 0018 00002320 0023 0000 00010004 001F FF 000000 0000
|
|
|
|
|
Add connection tracking mark support.
This patch adds a new 32-bit metadata field to the connection tracking
interface. When a mark is specified as part of the ct action and the
connection is committed, the value is saved with the current connection.
Subsequent ct lookups with the table specified will expose this metadata
as the "ct_mark" field in the flow.
For example, to allow new TCP connections from port 1->2 and only allow
established connections from port 2->1, and to associate a mark with those
connections:
table=0,priority=1,action=drop
table=0,arp,action=normal
table=0,in_port=1,tcp,action=ct(commit,exec(set_field:1->ct_mark)),2
table=0,in_port=2,ct_state=-trk,tcp,action=ct(table=1)
table=1,in_port=2,ct_state=+trk,ct_mark=1,tcp,action=1
Signed-off-by: Joe Stringer <joestringer@nicira.com>
Acked-by: Jarno Rajahalme <jrajahalme@nicira.com>
Acked-by: Ben Pfaff <blp@nicira.com>
2015-09-18 13:58:00 -07:00
|
|
|
# actions=ct(commit,exec(load:0xf009->NXM_NX_CT_MARK[]))
|
|
|
|
ffff 0030 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0018 00002320 0007 001f 0001d604 000000000000f009
|
|
|
|
|
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_SET_ARGUMENT
|
|
|
|
& ofp_actions|WARN|cannot set CT fields outside of ct action
|
|
|
|
ffff 0018 00002320 0007 001f 0001d604 000000000000f009
|
|
|
|
|
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_SET_ARGUMENT
|
|
|
|
& meta_flow|WARN|destination field ct_zone is not writable
|
|
|
|
ffff 0030 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0018 00002320 0007 000f 0001d504 000000000000f009
|
|
|
|
|
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_ARGUMENT
|
|
|
|
& ofp_actions|WARN|ct action doesn't support nested action ct
|
|
|
|
ffff 0030 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0018 00002320 0023 0000 00000000 0000 FF 000000 0000
|
|
|
|
|
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_ARGUMENT
|
|
|
|
& ofp_actions|WARN|ct action doesn't support nested modification of reg0
|
|
|
|
ffff 0030 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0018 00002320 0007 001f 00010004 000000000000f009
|
|
|
|
|
Add support for connection tracking helper/ALGs.
This patch adds support for specifying a "helper" or ALG to assist
connection tracking for protocols that consist of multiple streams.
Initially, only support for FTP is included.
Below is an example set of flows to allow FTP control connections from
port 1->2 to establish active data connections in the reverse direction:
table=0,priority=1,action=drop
table=0,arp,action=normal
table=0,in_port=1,tcp,action=ct(alg=ftp,commit),2
table=0,in_port=2,tcp,ct_state=-trk,action=ct(table=1)
table=1,in_port=2,tcp,ct_state=+trk+est,action=1
table=1,in_port=2,tcp,ct_state=+trk+rel,action=ct(commit),1
Signed-off-by: Joe Stringer <joestringer@nicira.com>
Acked-by: Jarno Rajahalme <jrajahalme@nicira.com>
Acked-by: Ben Pfaff <blp@nicira.com>
2015-09-15 14:29:16 -07:00
|
|
|
# actions=ct(alg=ftp)
|
|
|
|
ffff 0018 00002320 0023 0000 00000000 0000 FF 000000 0015
|
|
|
|
|
2015-11-24 15:47:56 -08:00
|
|
|
# actions=ct(commit,nat(src))
|
|
|
|
ffff 0028 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0010 00002320 0024 00 00 0001 0000
|
|
|
|
|
|
|
|
# actions=ct(commit,nat(dst))
|
|
|
|
ffff 0028 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0010 00002320 0024 00 00 0002 0000
|
|
|
|
|
|
|
|
# actions=ct(nat)
|
|
|
|
ffff 0028 00002320 0023 0000 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0010 00002320 0024 00 00 0000 0000
|
|
|
|
|
|
|
|
# actions=ct(commit,nat(src=10.0.0.240,random))
|
|
|
|
ffff 0030 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0018 00002320 0024 00 00 0011 0001 0a0000f0 00000000
|
|
|
|
|
|
|
|
# actions=ct(commit,nat(src=10.0.0.240:32768-65535,random))
|
|
|
|
ffff 0030 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0018 00002320 0024 00 00 0011 0031 0a0000f0 8000ffff
|
|
|
|
|
|
|
|
# actions=ct(commit,nat(dst=10.0.0.128-10.0.0.254,hash))
|
|
|
|
ffff 0030 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0018 00002320 0024 00 00 000a 0003 0a000080 0a0000fe
|
|
|
|
|
|
|
|
# actions=ct(commit,nat(src=10.0.0.240-10.0.0.254:32768-65535,persistent))
|
|
|
|
ffff 0038 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0020 00002320 0024 00 00 0005 0033 0a0000f0 0a0000fe 8000ffff 00000000
|
|
|
|
|
|
|
|
# actions=ct(commit,nat(src=fe80::20c:29ff:fe88:a18b,random))
|
|
|
|
ffff 0038 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0020 00002320 0024 00 00 0011 0004 fe800000 00000000 020c 29ff fe88 a18b
|
|
|
|
|
|
|
|
# actions=ct(commit,nat(src=fe80::20c:29ff:fe88:1-fe80::20c:29ff:fe88:a18b,random))
|
|
|
|
ffff 0048 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0030 00002320 0024 00 00 0011 000c fe800000 00000000 020c 29ff fe88 0001 fe800000 00000000 020c 29ff fe88 a18b
|
|
|
|
|
|
|
|
# actions=ct(commit,nat(src=[fe80::20c:29ff:fe88:1]-[fe80::20c:29ff:fe88:a18b]:255-4096,random))
|
|
|
|
ffff 0050 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0038 00002320 0024 00 00 0011 003c dnl
|
|
|
|
fe800000 00000000 020c 29ff fe88 0001 dnl
|
|
|
|
fe800000 00000000 020c 29ff fe88 a18b dnl
|
|
|
|
00ff1000 00000000
|
|
|
|
|
Implement serializing the state of packet traversal in "continuations".
One purpose of OpenFlow packet-in messages is to allow a controller to
interpose on the path of a packet through the flow tables. If, for
example, the controller needs to modify a packet in some way that the
switch doesn't directly support, the controller should be able to
program the switch to send it the packet, then modify the packet and
send it back to the switch to continue through the flow table.
That's the theory. In practice, this doesn't work with any but the
simplest flow tables. Packet-in messages simply don't include enough
context to allow the flow table traversal to continue. For example:
* Via "resubmit" actions, an Open vSwitch packet can have an
effective "call stack", but a packet-in can't describe it, and
so it would be lost.
* A packet-in can't preserve the stack used by NXAST_PUSH and
NXAST_POP actions.
* A packet-in can't preserve the OpenFlow 1.1+ action set.
* A packet-in can't preserve the state of Open vSwitch mirroring
or connection tracking.
This commit introduces a solution called "continuations". A continuation
is the state of a packet's traversal through OpenFlow flow tables. A
"controller" action with the "pause" flag, which is newly implemented in
this commit, generates a continuation and sends it to the OpenFlow
controller in a packet-in asynchronous message (only NXT_PACKET_IN2
supports continuations, so the controller must configure them with
NXT_SET_PACKET_IN_FORMAT). The controller processes the packet-in,
possibly modifying some of its data, and sends it back to the switch with
an NXT_RESUME request, which causes flow table traversal to continue. In
principle, a single packet can be paused and resumed multiple times.
Another way to look at it is:
- "pause" is an extension of the existing OFPAT_CONTROLLER
action. It sends the packet to the controller, with full
pipeline context (some of which is switch implementation
dependent, and may thus vary from switch to switch).
- A continuation is an extension of OFPT_PACKET_IN, allowing for
implementation dependent metadata.
- NXT_RESUME is an extension of OFPT_PACKET_OUT, with the
semantics that the pipeline processing is continued with the
original translation context from where it was left at the time
it was paused.
Signed-off-by: Ben Pfaff <blp@ovn.org>
Acked-by: Jarno Rajahalme <jarno@ovn.org>
2016-02-19 16:10:06 -08:00
|
|
|
# bad OpenFlow10 actions: NXBRC_MUST_BE_ZERO
|
|
|
|
ffff 0018 00002320 0025 0000 0005 0000 1122334455 000005
|
|
|
|
|
|
|
|
# bad OpenFlow10 actions: NXBRC_MUST_BE_ZERO
|
|
|
|
ffff 0018 00002320 0025 0000 0005 5000 1122334455 000000
|
|
|
|
|
2015-11-24 15:47:56 -08:00
|
|
|
# bad OpenFlow10 actions: OFPBAC_BAD_ARGUMENT
|
|
|
|
ffff 0048 00002320 0023 0001 00000000 0000 FF 000000 0000 dnl
|
|
|
|
ffff 0030 00002320 0024 00 00 0011 000c fe800000 00000000 020c 29ff fe88 a18b fe800000 00000000 020c 29ff fe88 0001
|
|
|
|
|
2012-07-03 22:17:14 -07:00
|
|
|
])
|
|
|
|
sed '/^[[#&]]/d' < test-data > input.txt
|
|
|
|
sed -n 's/^# //p; /^$/p' < test-data > expout
|
|
|
|
sed -n 's/^& //p' < test-data > experr
|
|
|
|
AT_CAPTURE_FILE([input.txt])
|
|
|
|
AT_CAPTURE_FILE([expout])
|
|
|
|
AT_CAPTURE_FILE([experr])
|
|
|
|
AT_CHECK(
|
2014-08-07 16:03:42 -07:00
|
|
|
[ovs-ofctl '-vPATTERN:console:%c|%p|%m' parse-actions OpenFlow10 < input.txt],
|
2012-07-03 22:17:14 -07:00
|
|
|
[0], [expout], [experr])
|
|
|
|
AT_CLEANUP
|
2012-07-03 22:14:29 -07:00
|
|
|
|
2014-08-07 16:09:07 -07:00
|
|
|
AT_SETUP([OpenFlow 1.0 "instruction" translations])
|
|
|
|
AT_KEYWORDS([ofp-actions OF1.0 instruction])
|
|
|
|
AT_DATA([test-data], [dnl
|
|
|
|
dnl Try a couple of ordinary actions to make sure they're accepted,
|
|
|
|
dnl but there's no point in retrying all the actions from the previous test.
|
|
|
|
# actions=LOCAL
|
|
|
|
0000 0008 fffe 04d2
|
|
|
|
|
|
|
|
# actions=mod_dl_src:00:11:22:33:44:55
|
|
|
|
0004 0010 001122334455 000000000000
|
|
|
|
|
|
|
|
dnl Now check that write_metadata is accepted.
|
|
|
|
# actions=write_metadata:0xfedcba9876543210
|
|
|
|
ffff 0020 00002320 0016 000000000000 fedcba9876543210 ffffffffffffffff
|
|
|
|
|
|
|
|
# actions=write_metadata:0xfedcba9876543210/0xffff0000ffff0000
|
|
|
|
ffff 0020 00002320 0016 000000000000 fedcba9876543210 ffff0000ffff0000
|
|
|
|
|
|
|
|
])
|
|
|
|
sed '/^[[#&]]/d' < test-data > input.txt
|
|
|
|
sed -n 's/^# //p; /^$/p' < test-data > expout
|
|
|
|
sed -n 's/^& //p' < test-data > experr
|
|
|
|
AT_CAPTURE_FILE([input.txt])
|
|
|
|
AT_CAPTURE_FILE([expout])
|
|
|
|
AT_CAPTURE_FILE([experr])
|
|
|
|
AT_CHECK(
|
2014-08-07 16:03:42 -07:00
|
|
|
[ovs-ofctl '-vPATTERN:console:%c|%p|%m' parse-instructions OpenFlow10 < input.txt],
|
2014-08-07 16:09:07 -07:00
|
|
|
[0], [expout], [experr])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2012-07-03 22:14:29 -07:00
|
|
|
AT_SETUP([OpenFlow 1.1 action translation])
|
2012-10-19 02:37:37 +09:00
|
|
|
AT_KEYWORDS([ofp-actions OF1.1])
|
2012-07-03 22:14:29 -07:00
|
|
|
AT_DATA([test-data], [dnl
|
|
|
|
# actions=LOCAL
|
|
|
|
0000 0010 fffffffe 04d2 000000000000
|
|
|
|
|
|
|
|
# actions=CONTROLLER:1234
|
|
|
|
0000 0010 fffffffd 04d2 000000000000
|
|
|
|
|
2013-10-24 13:19:25 -07:00
|
|
|
# actions=set_vlan_vid:9
|
2012-07-03 22:14:29 -07:00
|
|
|
0001 0008 0009 0000
|
|
|
|
|
2013-10-24 13:19:25 -07:00
|
|
|
# actions=set_vlan_pcp:6
|
2012-07-03 22:14:29 -07:00
|
|
|
0002 0008 06 000000
|
|
|
|
|
|
|
|
# actions=mod_dl_src:00:11:22:33:44:55
|
|
|
|
0003 0010 001122334455 000000000000
|
|
|
|
|
|
|
|
# actions=mod_dl_dst:10:20:30:40:50:60
|
|
|
|
0004 0010 102030405060 000000000000
|
|
|
|
|
|
|
|
# actions=mod_nw_src:1.2.3.4
|
|
|
|
0005 0008 01020304
|
|
|
|
|
|
|
|
# actions=mod_nw_dst:192.168.0.1
|
|
|
|
0006 0008 c0a80001
|
|
|
|
|
|
|
|
# actions=mod_nw_tos:48
|
|
|
|
0007 0008 30 000000
|
|
|
|
|
|
|
|
# actions=mod_tp_src:80
|
|
|
|
0009 0008 0050 0000
|
|
|
|
|
|
|
|
# actions=mod_tp_dst:443
|
|
|
|
000a 0008 01bb 0000
|
|
|
|
|
2013-10-24 13:19:26 -07:00
|
|
|
# actions=pop_vlan
|
2012-10-18 03:51:58 +09:00
|
|
|
0012 0008 00000000
|
|
|
|
|
2012-11-30 10:04:06 +09:00
|
|
|
# actions=set_queue:2309737729
|
|
|
|
0015 0008 89abcd01
|
|
|
|
|
2012-10-26 13:43:19 +09:00
|
|
|
dnl 802.1ad isn't supported at the moment
|
|
|
|
dnl # actions=push_vlan:0x88a8
|
|
|
|
dnl 0011 0008 88a8 0000
|
|
|
|
# actions=push_vlan:0x8100
|
|
|
|
0011 0008 8100 0000
|
|
|
|
|
2012-07-03 22:14:29 -07:00
|
|
|
# actions=resubmit:5
|
|
|
|
ffff 0010 00002320 0001 0005 00000000
|
|
|
|
|
|
|
|
# actions=set_tunnel:0x12345678
|
|
|
|
ffff 0010 00002320 0002 0000 12345678
|
|
|
|
|
|
|
|
# actions=pop_queue
|
|
|
|
ffff 0010 00002320 0005 000000000000
|
|
|
|
|
|
|
|
# actions=move:NXM_OF_IN_PORT[]->NXM_OF_VLAN_TCI[]
|
|
|
|
ffff 0018 00002320 0006 0010 0000 0000 00000002 00000802
|
|
|
|
|
|
|
|
# actions=load:0xf009->NXM_OF_VLAN_TCI[]
|
|
|
|
ffff 0018 00002320 0007 000f 00000802 000000000000f009
|
|
|
|
|
|
|
|
# actions=note:11.e9.9a.ad.67.f3
|
|
|
|
ffff 0010 00002320 0008 11e99aad67f3
|
|
|
|
|
|
|
|
# actions=set_tunnel64:0xc426384d49c53d60
|
|
|
|
ffff 0018 00002320 0009 000000000000 c426384d49c53d60
|
|
|
|
|
|
|
|
# actions=set_tunnel64:0x885f3298
|
|
|
|
ffff 0018 00002320 0009 000000000000 00000000885f3298
|
|
|
|
|
2014-08-07 16:09:07 -07:00
|
|
|
dnl Write-Metadata is only allowed in contexts that allow instructions.
|
|
|
|
& ofp_actions|WARN|write_metadata instruction not allowed here
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 actions: OFPBIC_UNSUP_INST
|
2012-10-19 02:37:37 +09:00
|
|
|
ffff 0020 00002320 0016 000000000000 fedcba9876543210 ffffffffffffffff
|
|
|
|
|
2012-07-03 22:14:29 -07:00
|
|
|
# actions=multipath(eth_src,50,modulo_n,1,0,NXM_NX_REG0[])
|
|
|
|
ffff 0020 00002320 000a 0000 0032 0000 0000 0000 0000 0000 0000 001f 00010004
|
|
|
|
|
|
|
|
# actions=bundle(eth_src,0,hrw,ofport,slaves:4,8)
|
|
|
|
ffff 0028 00002320 000c 0001 0000 0000 00000002 0002 0000 00000000 00000000 dnl
|
|
|
|
0004 0008 00000000
|
|
|
|
|
|
|
|
# actions=bundle_load(eth_src,0,hrw,ofport,NXM_NX_REG0[],slaves:4,8)
|
|
|
|
ffff 0028 00002320 000d 0001 0000 0000 00000002 0002 001f 00010004 00000000 dnl
|
|
|
|
0004 0008 00000000
|
|
|
|
|
|
|
|
# actions=resubmit(10,5)
|
|
|
|
ffff 0010 00002320 000e 000a 05 000000
|
|
|
|
|
|
|
|
# actions=output:NXM_NX_REG1[5..10]
|
|
|
|
ffff 0018 00002320 000f 0145 00010204 ffff 000000000000
|
|
|
|
|
|
|
|
# actions=learn(table=2,idle_timeout=10,hard_timeout=20,fin_idle_timeout=2,fin_hard_timeout=4,priority=80,cookie=0x123456789abcdef0,NXM_OF_VLAN_TCI[0..11],NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],output:NXM_OF_IN_PORT[])
|
|
|
|
ffff 0048 00002320 0010 000a 0014 0050 123456789abcdef0 0000 02 00 0002 0004 dnl
|
|
|
|
000c 00000802 0000 00000802 0000 dnl
|
|
|
|
0030 00000406 0000 00000206 0000 dnl
|
|
|
|
1010 00000002 0000 dnl
|
|
|
|
00000000
|
|
|
|
|
|
|
|
# actions=exit
|
|
|
|
ffff 0010 00002320 0011 000000000000
|
|
|
|
|
2012-10-18 07:02:04 +09:00
|
|
|
dnl OpenFlow 1.1 OFPAT_DEC_TTL
|
|
|
|
# actions=dec_ttl
|
|
|
|
0018 0008 00000000
|
|
|
|
|
2012-07-03 22:14:29 -07:00
|
|
|
# actions=fin_timeout(idle_timeout=10,hard_timeout=20)
|
|
|
|
ffff 0010 00002320 0013 000a 0014 0000
|
|
|
|
|
|
|
|
# actions=controller(reason=invalid_ttl,max_len=1234,id=5678)
|
|
|
|
ffff 0010 00002320 0014 04d2 162e 02 00
|
|
|
|
|
2012-08-16 14:25:07 -07:00
|
|
|
# actions=dec_ttl(32768,12345,90,765,1024)
|
|
|
|
ffff 0020 00002320 0015 000500000000 80003039005A02fd 0400000000000000
|
|
|
|
|
2013-04-22 10:01:14 -07:00
|
|
|
# actions=sample(probability=12345,collector_set_id=23456,obs_domain_id=34567,obs_point_id=45678)
|
|
|
|
ffff 0018 00002320 001d 3039 00005BA0 00008707 0000B26E
|
|
|
|
|
2015-07-29 08:36:07 -07:00
|
|
|
# bad OpenFlow11 actions: OFPBAC_BAD_OUT_PORT
|
|
|
|
& ofp_actions|WARN|bad action at offset 0 (OFPBAC_BAD_OUT_PORT):
|
|
|
|
& 00000000 00 00 00 10 ff ff ff ff-00 00 00 00 00 00 00 00
|
|
|
|
0000 0010 ffffffff 0000 000000000000
|
|
|
|
|
2012-07-03 22:14:29 -07:00
|
|
|
])
|
|
|
|
sed '/^[[#&]]/d' < test-data > input.txt
|
|
|
|
sed -n 's/^# //p; /^$/p' < test-data > expout
|
|
|
|
sed -n 's/^& //p' < test-data > experr
|
|
|
|
AT_CAPTURE_FILE([input.txt])
|
|
|
|
AT_CAPTURE_FILE([expout])
|
|
|
|
AT_CAPTURE_FILE([experr])
|
|
|
|
AT_CHECK(
|
2014-08-07 16:03:42 -07:00
|
|
|
[ovs-ofctl '-vPATTERN:console:%c|%p|%m' parse-actions OpenFlow11 < input.txt],
|
2012-07-03 22:14:29 -07:00
|
|
|
[0], [expout], [experr])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
|
|
|
AT_SETUP([OpenFlow 1.1 instruction translation])
|
2012-10-19 02:37:37 +09:00
|
|
|
AT_KEYWORDS([OF1.1 instruction ofp-actions])
|
2012-07-03 22:14:29 -07:00
|
|
|
AT_DATA([test-data], [dnl
|
|
|
|
# actions=LOCAL
|
|
|
|
0004 0018 00000000 dnl
|
|
|
|
0000 0010 fffffffe 04d2 000000000000
|
|
|
|
|
2012-10-05 15:56:56 +09:00
|
|
|
dnl Apply-Actions non-zero padding
|
|
|
|
# actions=drop
|
|
|
|
# 0: 00 -> (none)
|
|
|
|
# 1: 04 -> (none)
|
|
|
|
# 2: 00 -> (none)
|
|
|
|
# 3: 08 -> (none)
|
|
|
|
# 4: 00 -> (none)
|
|
|
|
# 5: 00 -> (none)
|
|
|
|
# 6: 00 -> (none)
|
|
|
|
# 7: 01 -> (none)
|
|
|
|
0004 0008 00000001
|
|
|
|
|
2012-07-03 22:14:29 -07:00
|
|
|
dnl Check that an empty Apply-Actions instruction gets dropped.
|
|
|
|
# actions=drop
|
|
|
|
# 0: 00 -> (none)
|
|
|
|
# 1: 04 -> (none)
|
|
|
|
# 2: 00 -> (none)
|
|
|
|
# 3: 08 -> (none)
|
|
|
|
# 4: 00 -> (none)
|
|
|
|
# 5: 00 -> (none)
|
|
|
|
# 6: 00 -> (none)
|
|
|
|
# 7: 00 -> (none)
|
|
|
|
0004 0008 00000000
|
|
|
|
|
2012-09-04 15:51:59 +09:00
|
|
|
dnl Duplicate instruction type:
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_DUP_INST
|
2012-07-03 22:14:29 -07:00
|
|
|
0004 0008 00000000 0004 0008 00000000
|
|
|
|
|
|
|
|
dnl Instructions not multiple of 8 in length.
|
|
|
|
& ofp_actions|WARN|OpenFlow message instructions length 9 is not a multiple of 8
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_BAD_LEN
|
2012-07-03 22:14:29 -07:00
|
|
|
0004 0009 01 00000000
|
|
|
|
|
|
|
|
dnl Goto-Table instruction too long.
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_BAD_LEN
|
2012-07-03 22:14:29 -07:00
|
|
|
0001 0010 01 000000 0000000000000000
|
|
|
|
|
2012-10-05 15:56:56 +09:00
|
|
|
dnl Goto-Table 1 instruction non-zero padding
|
|
|
|
# actions=goto_table:1
|
|
|
|
# 7: 01 -> 00
|
|
|
|
0001 0008 01 000001
|
|
|
|
|
2013-06-05 13:18:09 -07:00
|
|
|
dnl Goto-Table 1 instruction go back to the previous table.
|
2014-09-24 09:53:13 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_BAD_TABLE_ID
|
2013-06-05 13:18:09 -07:00
|
|
|
2,0001 0008 01 000000
|
|
|
|
|
2012-10-05 15:56:56 +09:00
|
|
|
dnl Goto-Table 1
|
|
|
|
# actions=goto_table:1
|
2012-07-03 22:14:29 -07:00
|
|
|
0001 0008 01 000000
|
|
|
|
|
2012-10-19 02:37:37 +09:00
|
|
|
dnl Write-Metadata.
|
|
|
|
# actions=write_metadata:0xfedcba9876543210
|
2012-07-03 22:14:29 -07:00
|
|
|
0002 0018 00000000 fedcba9876543210 ffffffffffffffff
|
|
|
|
|
2014-08-07 16:09:07 -07:00
|
|
|
dnl Write-Metadata as Nicira extension action is transformed into instruction.
|
|
|
|
# actions=write_metadata:0xfedcba9876543210
|
|
|
|
# 1: 04 -> 02
|
|
|
|
# 3: 28 -> 18
|
|
|
|
# 8: ff -> fe
|
|
|
|
# 9: ff -> dc
|
|
|
|
# 10: 00 -> ba
|
|
|
|
# 11: 20 -> 98
|
|
|
|
# 12: 00 -> 76
|
|
|
|
# 13: 00 -> 54
|
|
|
|
# 14: 23 -> 32
|
|
|
|
# 15: 20 -> 10
|
|
|
|
# 16: 00 -> ff
|
|
|
|
# 17: 16 -> ff
|
|
|
|
# 18: 00 -> ff
|
|
|
|
# 19: 00 -> ff
|
|
|
|
# 20: 00 -> ff
|
|
|
|
# 21: 00 -> ff
|
|
|
|
# 22: 00 -> ff
|
|
|
|
# 23: 00 -> ff
|
|
|
|
# 24: fe -> (none)
|
|
|
|
# 25: dc -> (none)
|
|
|
|
# 26: ba -> (none)
|
|
|
|
# 27: 98 -> (none)
|
|
|
|
# 28: 76 -> (none)
|
|
|
|
# 29: 54 -> (none)
|
|
|
|
# 30: 32 -> (none)
|
|
|
|
# 31: 10 -> (none)
|
|
|
|
# 32: ff -> (none)
|
|
|
|
# 33: ff -> (none)
|
|
|
|
# 34: ff -> (none)
|
|
|
|
# 35: ff -> (none)
|
|
|
|
# 36: ff -> (none)
|
|
|
|
# 37: ff -> (none)
|
|
|
|
# 38: ff -> (none)
|
|
|
|
# 39: ff -> (none)
|
|
|
|
0004 0028 00000000 ffff 0020 00002320 0016 000000000000 fedcba9876543210 ffffffffffffffff
|
|
|
|
|
2012-10-19 02:37:37 +09:00
|
|
|
dnl Write-Metadata with mask.
|
|
|
|
# actions=write_metadata:0xfedcba9876543210/0xff00ff00ff00ff00
|
|
|
|
0002 0018 00000000 fedcba9876543210 ff00ff00ff00ff00
|
|
|
|
|
2012-07-03 22:14:29 -07:00
|
|
|
dnl Write-Metadata too short.
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_BAD_LEN
|
2012-07-03 22:14:29 -07:00
|
|
|
0002 0010 00000000 fedcba9876543210
|
|
|
|
|
|
|
|
dnl Write-Metadata too long.
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_BAD_LEN
|
2012-07-03 22:14:29 -07:00
|
|
|
0002 0020 00000000 fedcba9876543210 ffffffffffffffff 0000000000000000
|
|
|
|
|
2012-10-19 02:37:37 +09:00
|
|
|
dnl Write-Metadata duplicated.
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_DUP_INST
|
2012-10-19 02:37:37 +09:00
|
|
|
0002 0018 00000000 fedcba9876543210 ff00ff00ff00ff00 0002 0018 00000000 fedcba9876543210 ff00ff00ff00ff00
|
|
|
|
|
2013-01-03 09:02:52 -08:00
|
|
|
dnl Write-Metadata in wrong position (OpenFlow 1.1+ disregards the order
|
|
|
|
dnl and OVS reorders it to the canonical order)
|
|
|
|
# actions=write_metadata:0xfedcba9876543210,goto_table:1
|
|
|
|
# 1: 01 -> 02
|
|
|
|
# 3: 08 -> 18
|
|
|
|
# 4: 01 -> 00
|
|
|
|
# 8: 00 -> fe
|
|
|
|
# 9: 02 -> dc
|
|
|
|
# 10: 00 -> ba
|
|
|
|
# 11: 18 -> 98
|
|
|
|
# 12: 00 -> 76
|
|
|
|
# 13: 00 -> 54
|
|
|
|
# 14: 00 -> 32
|
|
|
|
# 15: 00 -> 10
|
|
|
|
# 16: fe -> ff
|
|
|
|
# 17: dc -> ff
|
|
|
|
# 18: ba -> ff
|
|
|
|
# 19: 98 -> ff
|
|
|
|
# 20: 76 -> ff
|
|
|
|
# 21: 54 -> ff
|
|
|
|
# 22: 32 -> ff
|
|
|
|
# 23: 10 -> ff
|
|
|
|
# 24: ff -> 00
|
|
|
|
# 25: ff -> 01
|
|
|
|
# 26: ff -> 00
|
|
|
|
# 27: ff -> 08
|
|
|
|
# 28: ff -> 01
|
|
|
|
# 29: ff -> 00
|
|
|
|
# 30: ff -> 00
|
|
|
|
# 31: ff -> 00
|
2012-10-19 02:37:37 +09:00
|
|
|
0001 0008 01 000000 0002 0018 00000000 fedcba9876543210 ffffffffffffffff
|
|
|
|
|
2013-10-11 13:23:29 +09:00
|
|
|
dnl empty Write-Actions non-zero padding
|
|
|
|
# actions=write_actions(drop)
|
|
|
|
# 0: 00 -> (none)
|
|
|
|
# 1: 03 -> (none)
|
|
|
|
# 2: 00 -> (none)
|
|
|
|
# 3: 08 -> (none)
|
|
|
|
# 4: 00 -> (none)
|
|
|
|
# 5: 00 -> (none)
|
|
|
|
# 6: 00 -> (none)
|
|
|
|
# 7: 01 -> (none)
|
|
|
|
0003 0008 00000001
|
|
|
|
|
|
|
|
dnl Check that an empty Write-Actions instruction gets dropped.
|
|
|
|
# actions=write_actions(drop)
|
|
|
|
# 0: 00 -> (none)
|
|
|
|
# 1: 03 -> (none)
|
|
|
|
# 2: 00 -> (none)
|
|
|
|
# 3: 08 -> (none)
|
|
|
|
# 4: 00 -> (none)
|
|
|
|
# 5: 00 -> (none)
|
|
|
|
# 6: 00 -> (none)
|
|
|
|
# 7: 00 -> (none)
|
|
|
|
0003 0008 00000000
|
2012-07-03 22:14:29 -07:00
|
|
|
|
2012-10-05 15:56:57 +09:00
|
|
|
dnl Clear-Actions too-long
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_BAD_LEN
|
2012-10-05 15:56:57 +09:00
|
|
|
0005 0010 00000000 0000000000000000
|
|
|
|
|
|
|
|
dnl Clear-Actions non-zero padding
|
|
|
|
# actions=clear_actions
|
|
|
|
# 7: 01 -> 00
|
|
|
|
0005 0008 00000001
|
|
|
|
|
|
|
|
dnl Clear-Actions non-zero padding
|
|
|
|
# actions=clear_actions
|
|
|
|
# 4: 01 -> 00
|
2012-07-03 22:14:29 -07:00
|
|
|
0005 0008 01 000000
|
|
|
|
|
2012-10-05 15:56:57 +09:00
|
|
|
dnl Clear-Actions
|
|
|
|
# actions=clear_actions
|
|
|
|
0005 0008 00000000
|
|
|
|
|
2012-07-03 22:14:29 -07:00
|
|
|
dnl Experimenter actions not supported yet.
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_BAD_EXPERIMENTER
|
2012-07-03 22:14:29 -07:00
|
|
|
ffff 0008 01 000000
|
|
|
|
|
|
|
|
dnl Bad instruction number (0 not assigned).
|
2014-08-07 16:03:42 -07:00
|
|
|
# bad OpenFlow11 instructions: OFPBIC_UNKNOWN_INST
|
2012-07-03 22:14:29 -07:00
|
|
|
0000 0008 01 000000
|
|
|
|
|
|
|
|
])
|
|
|
|
sed '/^[[#&]]/d' < test-data > input.txt
|
|
|
|
sed -n 's/^# //p; /^$/p' < test-data > expout
|
|
|
|
sed -n 's/^& //p' < test-data > experr
|
|
|
|
AT_CAPTURE_FILE([input.txt])
|
|
|
|
AT_CAPTURE_FILE([expout])
|
|
|
|
AT_CAPTURE_FILE([experr])
|
|
|
|
AT_CHECK(
|
2014-08-07 16:03:42 -07:00
|
|
|
[ovs-ofctl '-vPATTERN:console:%c|%p|%m' parse-instructions OpenFlow11 < input.txt],
|
2012-07-03 22:14:29 -07:00
|
|
|
[0], [expout], [experr])
|
|
|
|
AT_CLEANUP
|
2013-11-15 18:10:18 +09:00
|
|
|
|
2014-09-16 22:13:44 -07:00
|
|
|
dnl Our primary goal here is to verify OpenFlow 1.2-specific changes,
|
|
|
|
dnl so the list of tests is short.
|
|
|
|
AT_SETUP([OpenFlow 1.2 action translation])
|
|
|
|
AT_KEYWORDS([ofp-actions OF1.2])
|
|
|
|
AT_DATA([test-data], [dnl
|
|
|
|
# actions=LOCAL
|
|
|
|
0000 0010 fffffffe 04d2 000000000000
|
|
|
|
|
|
|
|
# bad OpenFlow12 actions: OFPBAC_BAD_SET_MASK
|
|
|
|
& ofp_actions|WARN|bad action at offset 0 (OFPBAC_BAD_SET_MASK):
|
|
|
|
& 00000000 00 19 00 18 80 00 09 0c-00 00 00 00 12 34 00 00
|
|
|
|
& 00000010 00 00 ff ff 00 00 00 00-
|
|
|
|
0019 0018 8000090c 000000001234 00000000ffff 00000000
|
|
|
|
|
|
|
|
])
|
|
|
|
sed '/^[[#&]]/d' < test-data > input.txt
|
|
|
|
sed -n 's/^# //p; /^$/p' < test-data > expout
|
|
|
|
sed -n 's/^& //p' < test-data > experr
|
|
|
|
AT_CAPTURE_FILE([input.txt])
|
|
|
|
AT_CAPTURE_FILE([expout])
|
|
|
|
AT_CAPTURE_FILE([experr])
|
|
|
|
AT_CHECK(
|
|
|
|
[ovs-ofctl '-vPATTERN:console:%c|%p|%m' parse-actions OpenFlow12 < input.txt],
|
|
|
|
[0], [expout], [experr])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2014-11-24 14:29:06 -08:00
|
|
|
dnl Our primary goal here is to verify OpenFlow 1.3-specific changes,
|
|
|
|
dnl so the list of tests is short.
|
|
|
|
AT_SETUP([OpenFlow 1.3 action translation])
|
|
|
|
AT_KEYWORDS([ofp-actions OF1.3])
|
|
|
|
AT_DATA([test-data], [dnl
|
|
|
|
# actions=LOCAL
|
|
|
|
0000 0010 fffffffe 04d2 000000000000
|
|
|
|
|
|
|
|
dnl Check the Nicira extension form of "move".
|
|
|
|
# actions=move:NXM_OF_IN_PORT[]->NXM_OF_VLAN_TCI[]
|
|
|
|
ffff 0018 00002320 0006 0010 0000 0000 00000002 00000802
|
|
|
|
|
|
|
|
dnl Check the ONF extension form of "copy_field".
|
|
|
|
# actions=move:NXM_OF_IN_PORT[]->NXM_OF_VLAN_TCI[]
|
|
|
|
ffff 0020 4f4e4600 0c80 0000 0010 0000 0000 0000 00000002 00000802 00000000
|
|
|
|
|
|
|
|
])
|
|
|
|
sed '/^[[#&]]/d' < test-data > input.txt
|
|
|
|
sed -n 's/^# //p; /^$/p' < test-data > expout
|
|
|
|
sed -n 's/^& //p' < test-data > experr
|
|
|
|
AT_CAPTURE_FILE([input.txt])
|
|
|
|
AT_CAPTURE_FILE([expout])
|
|
|
|
AT_CAPTURE_FILE([experr])
|
|
|
|
AT_CHECK(
|
|
|
|
[ovs-ofctl '-vPATTERN:console:%c|%p|%m' parse-actions OpenFlow13 < input.txt],
|
|
|
|
[0], [expout], [experr])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2014-08-11 14:13:53 -07:00
|
|
|
dnl Our primary goal here is to verify that OpenFlow 1.5-specific changes,
|
|
|
|
dnl so the list of tests is short.
|
2014-08-07 16:18:51 -07:00
|
|
|
AT_SETUP([OpenFlow 1.5 action translation])
|
|
|
|
AT_KEYWORDS([ofp-actions OF1.5])
|
|
|
|
AT_DATA([test-data], [dnl
|
|
|
|
# actions=LOCAL
|
|
|
|
0000 0010 fffffffe 04d2 000000000000
|
|
|
|
|
|
|
|
# actions=move:NXM_OF_IN_PORT[]->NXM_OF_VLAN_TCI[]
|
2014-11-24 12:25:56 -08:00
|
|
|
001c 0018 0010 0000 0000 0000 00000002 00000802 00000000
|
2014-08-07 16:18:51 -07:00
|
|
|
|
2014-10-07 16:49:50 -07:00
|
|
|
# actions=set_field:00:00:00:00:12:34/00:00:00:00:ff:ff->eth_src
|
2014-09-16 22:13:44 -07:00
|
|
|
0019 0018 8000090c 000000001234 00000000ffff 00000000
|
2014-08-11 14:13:53 -07:00
|
|
|
|
2014-08-07 16:18:51 -07:00
|
|
|
])
|
|
|
|
sed '/^[[#&]]/d' < test-data > input.txt
|
|
|
|
sed -n 's/^# //p; /^$/p' < test-data > expout
|
|
|
|
sed -n 's/^& //p' < test-data > experr
|
|
|
|
AT_CAPTURE_FILE([input.txt])
|
|
|
|
AT_CAPTURE_FILE([expout])
|
|
|
|
AT_CAPTURE_FILE([experr])
|
|
|
|
AT_CHECK(
|
|
|
|
[ovs-ofctl '-vPATTERN:console:%c|%p|%m' parse-actions OpenFlow15 < input.txt],
|
|
|
|
[0], [expout], [experr])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2013-11-15 18:10:18 +09:00
|
|
|
AT_SETUP([ofp-actions - inconsistent MPLS actions])
|
|
|
|
OVS_VSWITCHD_START
|
|
|
|
dnl OK: Use fin_timeout action on TCP flow
|
|
|
|
AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=fin_timeout(idle_timeout=1)'])
|
|
|
|
dnl Bad: Use fin_timeout action on TCP flow that has been converted to MPLS
|
|
|
|
AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=push_mpls:0x8847,fin_timeout(idle_timeout=1)'],
|
|
|
|
[1], [], [dnl
|
2013-11-15 14:19:57 -08:00
|
|
|
ovs-ofctl: none of the usable flow formats (OpenFlow10,NXM) is among the allowed flow formats (OpenFlow11)
|
2013-11-15 18:10:18 +09:00
|
|
|
])
|
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|
2014-12-04 14:31:56 -08:00
|
|
|
|
|
|
|
AT_SETUP([reg_load <-> set_field translation corner case])
|
|
|
|
AT_KEYWORDS([ofp-actions])
|
|
|
|
OVS_VSWITCHD_START
|
|
|
|
dnl In OpenFlow 1.3, set_field always sets all the bits in the field,
|
|
|
|
dnl but when we translate to NXAST_LOAD we need to only set the bits that
|
|
|
|
dnl actually exist (e.g. mpls_label only has 20 bits) otherwise OVS rejects
|
|
|
|
dnl the "load" action as invalid. Check that we do this correctly.
|
|
|
|
AT_CHECK([ovs-ofctl -O OpenFlow13 add-flow br0 mpls,actions=set_field:10-\>mpls_label])
|
|
|
|
AT_CHECK([ovs-ofctl -O OpenFlow10 dump-flows br0 | ofctl_strip], [0], [dnl
|
|
|
|
NXST_FLOW reply:
|
|
|
|
mpls actions=load:0xa->OXM_OF_MPLS_LABEL[[]]
|
|
|
|
])
|
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|