2011-09-12 16:19:57 -07:00
|
|
|
AT_BANNER([learning action])
|
|
|
|
|
|
|
|
AT_SETUP([learning action - parsing and formatting])
|
|
|
|
AT_DATA([flows.txt], [[
|
|
|
|
actions=learn()
|
2014-06-05 21:53:34 -07:00
|
|
|
actions=learn(send_flow_rem)
|
|
|
|
actions=learn(delete_learned)
|
|
|
|
actions=learn(send_flow_rem,delete_learned)
|
2011-09-12 16:19:57 -07:00
|
|
|
actions=learn(NXM_OF_VLAN_TCI[0..11], NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[], output:NXM_OF_IN_PORT[], load:10->NXM_NX_REG0[5..10])
|
2012-02-15 10:37:03 -08:00
|
|
|
actions=learn(table=1,idle_timeout=10, hard_timeout=20, fin_idle_timeout=5, fin_hard_timeout=10, priority=10, cookie=0xfedcba9876543210, in_port=99,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],load:NXM_OF_IN_PORT[]->NXM_NX_REG1[16..31])
|
2011-09-12 16:19:57 -07:00
|
|
|
]])
|
|
|
|
AT_CHECK([ovs-ofctl parse-flows flows.txt], [0],
|
2014-05-09 13:45:03 -07:00
|
|
|
[[usable protocols: any
|
2012-02-10 13:30:23 -08:00
|
|
|
chosen protocol: OpenFlow10-table_id
|
|
|
|
OFPT_FLOW_MOD (xid=0x1): ADD actions=learn(table=1)
|
2014-06-05 21:53:34 -07:00
|
|
|
OFPT_FLOW_MOD (xid=0x2): ADD actions=learn(table=1,send_flow_rem)
|
|
|
|
OFPT_FLOW_MOD (xid=0x3): ADD actions=learn(table=1,delete_learned)
|
|
|
|
OFPT_FLOW_MOD (xid=0x4): ADD actions=learn(table=1,send_flow_rem,delete_learned)
|
|
|
|
OFPT_FLOW_MOD (xid=0x5): ADD actions=learn(table=1,NXM_OF_VLAN_TCI[0..11],NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],output:NXM_OF_IN_PORT[],load:0xa->NXM_NX_REG0[5..10])
|
|
|
|
OFPT_FLOW_MOD (xid=0x6): ADD actions=learn(table=1,idle_timeout=10,hard_timeout=20,fin_idle_timeout=5,fin_hard_timeout=10,priority=10,cookie=0xfedcba9876543210,in_port=99,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],load:NXM_OF_IN_PORT[]->NXM_NX_REG1[16..31])
|
2011-09-12 16:19:57 -07:00
|
|
|
]])
|
|
|
|
AT_CLEANUP
|
2011-09-27 13:35:09 -07:00
|
|
|
|
2013-05-19 15:44:53 +03:00
|
|
|
AT_SETUP([learning action - parsing and formatting - illegal in_port_oxm])
|
|
|
|
AT_CHECK([[ovs-ofctl parse-flow 'actions=learn(table=1, in_port_oxm=123456)']],
|
|
|
|
[1], [], [stderr])
|
|
|
|
AT_CHECK([sed -e 's/.*|ofp_util|WARN|//' < stderr], [0],
|
|
|
|
[[port 123456 is outside the supported range 0 through ffff or 0xffffff00 through 0xffffffff
|
|
|
|
ovs-ofctl: 123456: port value out of range for in_port_oxm
|
|
|
|
]], [[]])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
|
|
|
AT_SETUP([learning action - parsing and formatting - OXM])
|
|
|
|
AT_DATA([flows.txt], [[
|
|
|
|
actions=learn(output:OXM_OF_IN_PORT[])
|
|
|
|
actions=learn(table=1, in_port=1, load:OXM_OF_IN_PORT[]->NXM_NX_REG1[], load:0xfffffffe->OXM_OF_IN_PORT[])
|
|
|
|
]])
|
2013-08-20 18:41:45 -07:00
|
|
|
AT_CHECK([ovs-ofctl -O OpenFlow12 parse-flows flows.txt], [0],
|
2014-05-09 13:45:03 -07:00
|
|
|
[[usable protocols: any
|
2013-08-20 18:41:45 -07:00
|
|
|
chosen protocol: OXM-OpenFlow12
|
2013-11-01 22:03:19 -07:00
|
|
|
OFPT_FLOW_MOD (OF1.2) (xid=0x1): ADD actions=learn(table=1,output:OXM_OF_IN_PORT[])
|
|
|
|
OFPT_FLOW_MOD (OF1.2) (xid=0x2): ADD actions=learn(table=1,in_port=1,load:OXM_OF_IN_PORT[]->NXM_NX_REG1[],load:0xfffffffe->OXM_OF_IN_PORT[])
|
2013-05-19 15:44:53 +03:00
|
|
|
]])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2011-09-27 13:35:09 -07:00
|
|
|
AT_SETUP([learning action - examples])
|
|
|
|
AT_DATA([flows.txt], [[
|
|
|
|
# These are the examples from nicira-ext.h.
|
|
|
|
actions=learn(in_port=99,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[], load:NXM_OF_IN_PORT[]->NXM_NX_REG1[16..31])
|
|
|
|
actions=learn(NXM_OF_VLAN_TCI[0..11], NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],output:NXM_OF_IN_PORT[])
|
|
|
|
table=0 actions=learn(table=1,hard_timeout=10, NXM_OF_VLAN_TCI[0..11],output:NXM_OF_IN_PORT[]), resubmit(,1)
|
|
|
|
table=1 priority=0 actions=flood
|
|
|
|
]])
|
|
|
|
AT_CHECK([ovs-ofctl parse-flows flows.txt], [0],
|
2014-05-09 13:45:03 -07:00
|
|
|
[[usable protocols: OXM,OpenFlow10+table_id,NXM+table_id,OpenFlow11
|
2012-02-10 13:30:23 -08:00
|
|
|
chosen protocol: OpenFlow10+table_id
|
|
|
|
OFPT_FLOW_MOD (xid=0x1): ADD table:255 actions=learn(table=1,in_port=99,NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],load:NXM_OF_IN_PORT[]->NXM_NX_REG1[16..31])
|
|
|
|
OFPT_FLOW_MOD (xid=0x2): ADD table:255 actions=learn(table=1,NXM_OF_VLAN_TCI[0..11],NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[],output:NXM_OF_IN_PORT[])
|
|
|
|
OFPT_FLOW_MOD (xid=0x3): ADD actions=learn(table=1,hard_timeout=10,NXM_OF_VLAN_TCI[0..11],output:NXM_OF_IN_PORT[]),resubmit(,1)
|
|
|
|
OFPT_FLOW_MOD (xid=0x4): ADD table:1 priority=0 actions=FLOOD
|
2011-09-27 13:35:09 -07:00
|
|
|
]])
|
|
|
|
AT_CLEANUP
|
2011-09-12 16:19:57 -07:00
|
|
|
|
|
|
|
AT_SETUP([learning action - satisfied prerequisites])
|
|
|
|
AT_DATA([flows.txt],
|
|
|
|
[[actions=learn(eth_type=0x800,load:5->NXM_OF_IP_DST[])
|
|
|
|
ip,actions=learn(load:NXM_OF_IP_DST[]->NXM_NX_REG1[])
|
2012-06-26 10:52:34 -07:00
|
|
|
ip,actions=learn(eth_type=0x800,OXM_OF_IPV4_DST[])
|
2011-09-12 16:19:57 -07:00
|
|
|
]])
|
|
|
|
AT_CHECK([ovs-ofctl parse-flows flows.txt], [0],
|
2014-05-09 13:45:03 -07:00
|
|
|
[[usable protocols: any
|
2012-02-10 13:30:23 -08:00
|
|
|
chosen protocol: OpenFlow10-table_id
|
2012-07-03 22:17:14 -07:00
|
|
|
OFPT_FLOW_MOD (xid=0x1): ADD actions=learn(table=1,eth_type=0x800,load:0x5->NXM_OF_IP_DST[])
|
2011-09-12 16:19:57 -07:00
|
|
|
OFPT_FLOW_MOD (xid=0x2): ADD ip actions=learn(table=1,load:NXM_OF_IP_DST[]->NXM_NX_REG1[])
|
|
|
|
OFPT_FLOW_MOD (xid=0x3): ADD ip actions=learn(table=1,eth_type=0x800,NXM_OF_IP_DST[])
|
|
|
|
]])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
|
|
|
AT_SETUP([learning action - invalid prerequisites])
|
|
|
|
AT_CHECK([[ovs-ofctl parse-flow 'actions=learn(load:5->NXM_OF_IP_DST[])']],
|
2013-05-08 10:50:15 +09:00
|
|
|
[1], [], [stderr])
|
|
|
|
AT_CHECK([sed -e 's/.*|meta_flow|WARN|//' < stderr], [0],
|
|
|
|
[[destination field ip_dst lacks correct prerequisites
|
2013-08-23 11:11:03 -07:00
|
|
|
ovs-ofctl: actions are invalid with specified match (OFPBAC_MATCH_INCONSISTENT)
|
2013-05-08 10:50:15 +09:00
|
|
|
]], [[]])
|
2011-09-12 16:19:57 -07:00
|
|
|
AT_CHECK([[ovs-ofctl parse-flow 'actions=learn(load:NXM_OF_IP_DST[]->NXM_NX_REG1[])']],
|
2013-05-08 10:50:15 +09:00
|
|
|
[1], [], [stderr])
|
|
|
|
AT_CHECK([sed -e 's/.*|meta_flow|WARN|//' < stderr], [0],
|
|
|
|
[[source field ip_dst lacks correct prerequisites
|
2013-08-23 11:11:03 -07:00
|
|
|
ovs-ofctl: actions are invalid with specified match (OFPBAC_MATCH_INCONSISTENT)
|
2011-09-12 16:19:57 -07:00
|
|
|
]])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2015-05-29 15:15:01 -07:00
|
|
|
AT_SETUP([learning action - too-long immediate value])
|
|
|
|
dnl 129 bits is too long.
|
|
|
|
AT_CHECK([[ovs-ofctl parse-flow 'actions=learn(load:0x1fedbca9876543210fedbca9876543210->NXM_NX_IPV6_DST[])']],
|
|
|
|
[1], [], [[ovs-ofctl: 0x1fedbca9876543210fedbca9876543210->NXM_NX_IPV6_DST[]: too many bits in immediate value
|
|
|
|
]])
|
|
|
|
|
|
|
|
dnl 128 bits is merely a bad prerequisite.
|
|
|
|
AT_CHECK([[ovs-ofctl parse-flow 'actions=learn(load:0xfedbca9876543210fedbca9876543210->NXM_NX_IPV6_DST[])']], [1], [], [stderr])
|
|
|
|
AT_CHECK([sed -e 's/.*|meta_flow|WARN|//' < stderr], [0],
|
|
|
|
[[destination field ipv6_dst lacks correct prerequisites
|
|
|
|
ovs-ofctl: actions are invalid with specified match (OFPBAC_MATCH_INCONSISTENT)
|
|
|
|
]], [[]])
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2011-09-12 16:19:57 -07:00
|
|
|
AT_SETUP([learning action - standard VLAN+MAC learning])
|
2011-10-24 10:36:01 -07:00
|
|
|
OVS_VSWITCHD_START(
|
2012-10-13 17:45:00 -07:00
|
|
|
[add-port br0 p1 -- set Interface p1 type=dummy ofport_request=1 -- \
|
|
|
|
add-port br0 p2 -- set Interface p2 type=dummy ofport_request=2 -- \
|
|
|
|
add-port br0 p3 -- set Interface p3 type=dummy ofport_request=3])
|
2011-09-12 16:19:57 -07:00
|
|
|
# Set up flow table for VLAN+MAC learning.
|
|
|
|
AT_DATA([flows.txt], [[
|
|
|
|
table=0 actions=learn(table=1, hard_timeout=60, NXM_OF_VLAN_TCI[0..11], NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[], output:NXM_OF_IN_PORT[]), resubmit(,1)
|
|
|
|
table=1 priority=0 actions=flood
|
|
|
|
]])
|
|
|
|
AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
|
|
|
|
|
|
|
|
# Trace an ARP packet arriving on port 3, to create a MAC learning entry.
|
2012-10-13 17:45:00 -07:00
|
|
|
flow="in_port(3),eth(src=50:54:00:00:00:05,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=192.168.0.1,tip=192.168.0.2,op=1,sha=50:54:00:00:00:05,tha=00:00:00:00:00:00)"
|
2013-05-20 11:36:05 -07:00
|
|
|
AT_CHECK([ovs-appctl ofproto/trace ovs-dummy "$flow" -generate], [0], [stdout])
|
2012-10-13 17:45:00 -07:00
|
|
|
actual=`tail -1 stdout | sed 's/Datapath actions: //'`
|
|
|
|
|
|
|
|
expected="1,2,100"
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$expected"], [0], [stdout])
|
|
|
|
mv stdout expout
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$actual"], [0], [expout])
|
2011-09-12 16:19:57 -07:00
|
|
|
|
|
|
|
# Check for the MAC learning entry.
|
2012-02-01 12:45:32 -08:00
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip | sort], [0], [dnl
|
2012-04-26 15:54:54 -07:00
|
|
|
table=1, hard_timeout=60, vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:05 actions=output:3
|
2012-02-01 12:45:32 -08:00
|
|
|
table=1, priority=0 actions=FLOOD
|
2011-09-12 16:19:57 -07:00
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Trace a packet arrival destined for the learned MAC.
|
|
|
|
# (This will also learn a MAC.)
|
2013-05-20 11:36:05 -07:00
|
|
|
AT_CHECK([ovs-appctl ofproto/trace ovs-dummy 'in_port(1),eth(src=50:54:00:00:00:06,dst=50:54:00:00:00:05),eth_type(0x0806),arp(sip=192.168.0.2,tip=192.168.0.1,op=2,sha=50:54:00:00:00:06,tha=50:54:00:00:00:05)' -generate], [0], [stdout])
|
2011-09-12 16:19:57 -07:00
|
|
|
AT_CHECK([tail -1 stdout], [0], [Datapath actions: 3
|
|
|
|
])
|
|
|
|
|
|
|
|
# Check for both MAC learning entries.
|
2012-02-01 12:45:32 -08:00
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip |sort], [0], [dnl
|
2012-04-26 15:54:54 -07:00
|
|
|
table=1, hard_timeout=60, vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:05 actions=output:3
|
|
|
|
table=1, hard_timeout=60, vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:06 actions=output:1
|
2012-02-01 12:45:32 -08:00
|
|
|
table=1, priority=0 actions=FLOOD
|
2011-09-12 16:19:57 -07:00
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Trace a packet arrival that updates the first learned MAC entry.
|
2012-10-13 17:45:00 -07:00
|
|
|
flow="in_port(2),eth(src=50:54:00:00:00:05,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=192.168.0.1,tip=192.168.0.2,op=1,sha=50:54:00:00:00:05,tha=00:00:00:00:00:00)"
|
2013-05-20 11:36:05 -07:00
|
|
|
AT_CHECK([ovs-appctl ofproto/trace ovs-dummy "$flow" -generate], [0], [stdout])
|
2012-10-13 17:45:00 -07:00
|
|
|
actual=`tail -1 stdout | sed 's/Datapath actions: //'`
|
|
|
|
|
|
|
|
expected="1,3,100"
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$expected"], [0], [stdout])
|
|
|
|
mv stdout expout
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$actual"], [0], [expout])
|
2011-09-12 16:19:57 -07:00
|
|
|
|
|
|
|
# Check that the MAC learning entry was updated.
|
2012-02-01 12:45:32 -08:00
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip | sort], [0], [dnl
|
2012-04-26 15:54:54 -07:00
|
|
|
table=1, hard_timeout=60, vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:05 actions=output:2
|
|
|
|
table=1, hard_timeout=60, vlan_tci=0x0000/0x0fff,dl_dst=50:54:00:00:00:06 actions=output:1
|
2012-02-01 12:45:32 -08:00
|
|
|
table=1, priority=0 actions=FLOOD
|
2011-09-12 16:19:57 -07:00
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
2011-10-24 10:36:01 -07:00
|
|
|
OVS_VSWITCHD_STOP
|
2011-09-12 16:19:57 -07:00
|
|
|
AT_CLEANUP
|
2012-02-15 10:37:03 -08:00
|
|
|
|
2013-01-25 15:07:36 -08:00
|
|
|
dnl This test checks that repeated uses of a "learn" action cause the
|
|
|
|
dnl modified time of the learned flow to advance. Otherwise, the
|
|
|
|
dnl learned flow will expire after its hard timeout even though it's
|
|
|
|
dnl supposed to be refreshed. (The expiration can be hard to see since
|
|
|
|
dnl it gets re-learned again the next time a packet appears, but
|
|
|
|
dnl sometimes the expiration can cause temporary flooding etc.)
|
|
|
|
AT_SETUP([learning action - learn refreshes hard_age])
|
|
|
|
OVS_VSWITCHD_START(
|
|
|
|
[add-port br0 p1 -- set Interface p1 type=dummy ofport_request=1 -- \
|
|
|
|
add-port br0 p2 -- set Interface p2 type=dummy ofport_request=2 -- \
|
|
|
|
add-port br0 p3 -- set Interface p3 type=dummy ofport_request=3])
|
|
|
|
|
|
|
|
ovs-appctl time/stop
|
|
|
|
|
|
|
|
# Set up flow table for MAC learning.
|
|
|
|
AT_DATA([flows.txt], [[
|
|
|
|
table=0 actions=learn(table=1, hard_timeout=10, NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[], output:NXM_OF_IN_PORT[]), resubmit(,1)
|
|
|
|
table=1 priority=0 actions=flood
|
|
|
|
]])
|
|
|
|
AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
|
|
|
|
|
|
|
|
# Trace an ICMP packet arriving on port 3, to create a MAC learning entry.
|
|
|
|
flow="in_port(3),eth(src=50:54:00:00:00:07,dst=50:54:00:00:00:05),eth_type(0x0800),ipv4(src=192.168.0.2,dst=192.168.0.1,proto=1,tos=0,ttl=64,frag=no),icmp(type=0,code=0)"
|
2013-05-20 11:36:05 -07:00
|
|
|
AT_CHECK([ovs-appctl ofproto/trace ovs-dummy "$flow" -generate], [0], [stdout])
|
2013-01-25 15:07:36 -08:00
|
|
|
actual=`tail -1 stdout | sed 's/Datapath actions: //'`
|
|
|
|
|
|
|
|
expected="1,2,100"
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$expected"], [0], [stdout])
|
|
|
|
mv stdout expout
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$actual"], [0], [expout])
|
|
|
|
|
|
|
|
# Check that the MAC learning entry appeared.
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip | sort], [0], [dnl
|
|
|
|
table=1, hard_timeout=10, dl_dst=50:54:00:00:00:07 actions=output:3
|
|
|
|
table=1, priority=0 actions=FLOOD
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# For 25 seconds, make sure that the MAC learning entry doesn't
|
|
|
|
# disappear as long as we refresh it every second.
|
|
|
|
for i in 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25; do
|
|
|
|
ovs-appctl time/warp 1000
|
2013-05-20 11:36:05 -07:00
|
|
|
AT_CHECK([ovs-appctl ofproto/trace ovs-dummy "$flow" -generate], [0], [stdout])
|
2013-01-25 15:07:36 -08:00
|
|
|
|
|
|
|
# Check that the entry is there.
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 table=1], [0], [stdout])
|
|
|
|
AT_CHECK([ofctl_strip < stdout | sort], [0], [dnl
|
|
|
|
table=1, hard_timeout=10, dl_dst=50:54:00:00:00:07 actions=output:3
|
|
|
|
table=1, priority=0 actions=FLOOD
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
if test $i != 1; then
|
|
|
|
# Check that hard_age has appeared. We need to do this separately
|
|
|
|
# from the above check because ofctl_strip removes it. dump-flows
|
|
|
|
# only prints hard_age when it is different from the flow's duration
|
|
|
|
# (that is, the number of seconds from the time it was created),
|
|
|
|
# so we only check for it after we've refreshed the flow once.
|
|
|
|
AT_CHECK([grep dl_dst=50:54:00:00:00:07 stdout | grep -c hard_age],
|
|
|
|
[0], [1
|
|
|
|
])
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
# Make sure that 15 seconds without refreshing makes the flow time out.
|
2014-07-15 08:16:52 -07:00
|
|
|
ovs-appctl time/warp 15000 5000
|
2014-04-04 19:18:35 +09:00
|
|
|
sleep 1
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip | sort], [0], [dnl
|
2013-01-25 15:07:36 -08:00
|
|
|
table=1, priority=0 actions=FLOOD
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2012-04-11 17:08:13 -07:00
|
|
|
AT_SETUP([learning action - TCPv4 port learning])
|
|
|
|
OVS_VSWITCHD_START(
|
2012-10-13 17:45:00 -07:00
|
|
|
[add-port br0 p1 -- set Interface p1 type=dummy -- \
|
|
|
|
add-port br0 p2 -- set Interface p2 type=dummy -- \
|
|
|
|
add-port br0 p3 -- set Interface p3 type=dummy])
|
2012-04-11 17:08:13 -07:00
|
|
|
# Set up flow table for TCPv4 port learning.
|
|
|
|
AT_CHECK([[ovs-ofctl add-flow br0 'table=0 tcp actions=learn(table=1, hard_timeout=60, eth_type=0x800, nw_proto=6, NXM_OF_IP_SRC[]=NXM_OF_IP_DST[], NXM_OF_IP_DST[]=NXM_OF_IP_SRC[], NXM_OF_TCP_SRC[]=NXM_OF_TCP_DST[], NXM_OF_TCP_DST[]=NXM_OF_TCP_SRC[]), flood']])
|
|
|
|
|
|
|
|
# Trace a TCPv4 packet arriving on port 3.
|
2012-10-13 17:45:00 -07:00
|
|
|
flow="in_port(3),eth(src=50:54:00:00:00:05,dst=50:54:00:00:00:06),eth_type(0x0800),ipv4(src=192.168.0.2,dst=192.168.0.1,proto=6,tos=0,ttl=64,frag=no),tcp(src=40000,dst=80)"
|
2013-05-20 11:36:05 -07:00
|
|
|
AT_CHECK([ovs-appctl ofproto/trace ovs-dummy "$flow" -generate], [0], [stdout])
|
2012-10-13 17:45:00 -07:00
|
|
|
actual=`tail -1 stdout | sed 's/Datapath actions: //'`
|
|
|
|
|
|
|
|
expected="1,2,100"
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$expected"], [0], [stdout])
|
|
|
|
mv stdout expout
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$actual"], [0], [expout])
|
2012-04-11 17:08:13 -07:00
|
|
|
|
|
|
|
# Check for the learning entry.
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip | sort], [0], [dnl
|
2012-04-26 15:54:54 -07:00
|
|
|
table=1, hard_timeout=60, tcp,nw_src=192.168.0.1,nw_dst=192.168.0.2,tp_src=80,tp_dst=40000 actions=drop
|
2012-04-11 17:08:13 -07:00
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|
|
|
|
|
|
|
|
AT_SETUP([learning action - TCPv6 port learning])
|
|
|
|
OVS_VSWITCHD_START(
|
2012-10-13 17:45:00 -07:00
|
|
|
[add-port br0 p1 -- set Interface p1 type=dummy -- \
|
|
|
|
add-port br0 p2 -- set Interface p2 type=dummy -- \
|
|
|
|
add-port br0 p3 -- set Interface p3 type=dummy])
|
2012-04-11 17:08:13 -07:00
|
|
|
# Set up flow table for TCPv6 port learning.
|
2012-04-13 21:24:17 -07:00
|
|
|
# Also add a 128-bit-wide "load" action and a 128-bit literal match to check
|
|
|
|
# that they work.
|
|
|
|
AT_CHECK([[ovs-ofctl add-flow br0 'table=0 tcp6 actions=learn(table=1, hard_timeout=60, eth_type=0x86dd, nw_proto=6, NXM_NX_IPV6_SRC[]=NXM_NX_IPV6_DST[], ipv6_dst=2001:0db8:85a3:0000:0000:8a2e:0370:7334, NXM_OF_TCP_SRC[]=NXM_OF_TCP_DST[], NXM_OF_TCP_DST[]=NXM_OF_TCP_SRC[], load(0x20010db885a308d313198a2e03707348->NXM_NX_IPV6_DST[])), flood']])
|
2012-04-11 17:08:13 -07:00
|
|
|
|
|
|
|
# Trace a TCPv6 packet arriving on port 3.
|
2012-10-13 17:45:00 -07:00
|
|
|
flow="in_port(3),eth(src=50:54:00:00:00:05,dst=50:54:00:00:00:06),eth_type(0x86dd),ipv6(src=fec0::2,dst=fec0::1,label=0,proto=6,tclass=0,hlimit=255,frag=no),tcp(src=40000,dst=80)"
|
2013-05-20 11:36:05 -07:00
|
|
|
AT_CHECK([ovs-appctl ofproto/trace ovs-dummy "$flow" -generate], [0], [stdout])
|
2012-10-13 17:45:00 -07:00
|
|
|
actual=`tail -1 stdout | sed 's/Datapath actions: //'`
|
|
|
|
|
|
|
|
expected="1,2,100"
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$expected"], [0], [stdout])
|
|
|
|
mv stdout expout
|
|
|
|
AT_CHECK([ovs-dpctl normalize-actions "$flow" "$actual"], [0], [expout])
|
2012-04-11 17:08:13 -07:00
|
|
|
|
|
|
|
# Check for the learning entry.
|
2012-04-13 21:24:17 -07:00
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
2012-04-26 15:54:54 -07:00
|
|
|
table=1, hard_timeout=60, tcp6,ipv6_src=fec0::1,ipv6_dst=2001:db8:85a3::8a2e:370:7334,tp_src=80,tp_dst=40000 actions=load:0x13198a2e03707348->NXM_NX_IPV6_DST[[0..63]],load:0x20010db885a308d3->NXM_NX_IPV6_DST[[64..127]]
|
2012-04-13 21:24:17 -07:00
|
|
|
tcp6 actions=learn(table=1,hard_timeout=60,eth_type=0x86dd,nw_proto=6,NXM_NX_IPV6_SRC[[]]=NXM_NX_IPV6_DST[[]],ipv6_dst=2001:db8:85a3::8a2e:370:7334,NXM_OF_TCP_SRC[[]]=NXM_OF_TCP_DST[[]],NXM_OF_TCP_DST[[]]=NXM_OF_TCP_SRC[[]],load:0x20010db885a308d313198a2e03707348->NXM_NX_IPV6_DST[[]]),FLOOD
|
2012-04-11 17:08:13 -07:00
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2013-01-31 16:27:14 -08:00
|
|
|
# In this use of a learn action, the first packet in the flow creates
|
|
|
|
# a new flow that changes the behavior of subsequent packets in the
|
|
|
|
# flow.
|
|
|
|
AT_SETUP([learning action - self-modifying flow])
|
|
|
|
OVS_VSWITCHD_START
|
|
|
|
ADD_OF_PORTS([br0], 1, 2, 3)
|
|
|
|
|
2013-09-04 15:49:19 -07:00
|
|
|
ovs-appctl time/stop
|
2013-01-31 16:27:14 -08:00
|
|
|
# Set up flow table for TCPv4 port learning.
|
|
|
|
AT_CHECK([[ovs-ofctl add-flow br0 'actions=load:3->NXM_NX_REG0[0..15],learn(table=0,priority=65535,NXM_OF_ETH_SRC[],NXM_OF_VLAN_TCI[0..11],output:NXM_NX_REG0[0..15]),output:2']])
|
|
|
|
|
|
|
|
# Trace some packets arriving. The particular packets don't matter.
|
|
|
|
for i in 1 2 3 4 5 6 7 8 9 10; do
|
|
|
|
ovs-appctl netdev-dummy/receive p1 'in_port(1),eth(src=50:54:00:00:00:05,dst=50:54:00:00:00:07),eth_type(0x0800),ipv4(src=192.168.0.1,dst=192.168.0.2,proto=6,tos=0,ttl=64,frag=no),tcp(src=8,dst=9)'
|
2013-08-13 11:22:26 -07:00
|
|
|
ovs-appctl time/warp 10
|
2013-12-20 19:31:06 +09:00
|
|
|
if [[ $i -eq 1 ]]; then
|
|
|
|
sleep 1
|
|
|
|
fi
|
2013-01-31 16:27:14 -08:00
|
|
|
done
|
|
|
|
|
|
|
|
# Check for the learning entry.
|
2013-08-13 11:22:26 -07:00
|
|
|
ovs-appctl time/warp 1000
|
2013-01-31 16:27:14 -08:00
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0],
|
|
|
|
[[ n_packets=1, n_bytes=60, actions=load:0x3->NXM_NX_REG0[0..15],learn(table=0,priority=65535,NXM_OF_ETH_SRC[],NXM_OF_VLAN_TCI[0..11],output:NXM_NX_REG0[0..15]),output:2
|
2013-08-13 11:22:26 -07:00
|
|
|
n_packets=9, n_bytes=540, priority=65535,vlan_tci=0x0000/0x0fff,dl_src=50:54:00:00:00:05 actions=output:3
|
2013-01-31 16:27:14 -08:00
|
|
|
NXST_FLOW reply:
|
|
|
|
]])
|
|
|
|
|
|
|
|
# Check that the first packet went out port 2 and the rest out port 3.
|
|
|
|
AT_CHECK(
|
|
|
|
[(ovs-ofctl dump-ports br0 2; ovs-ofctl dump-ports br0 3) | STRIP_XIDS], [0],
|
|
|
|
[OFPST_PORT reply: 1 ports
|
|
|
|
port 2: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
|
|
|
|
tx pkts=1, bytes=60, drop=0, errs=0, coll=0
|
|
|
|
OFPST_PORT reply: 1 ports
|
|
|
|
port 3: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
|
|
|
|
tx pkts=9, bytes=540, drop=0, errs=0, coll=0
|
|
|
|
])
|
2014-03-06 17:20:27 -08:00
|
|
|
|
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|
|
|
|
|
|
|
|
# This test is much like the previous, but adds idle timeouts and sends
|
|
|
|
# two different flows to the bridge. This tests that the statistics are
|
|
|
|
# attributed correctly.
|
|
|
|
AT_SETUP([learning action - self-modifying flow with idle_timeout])
|
|
|
|
OVS_VSWITCHD_START
|
|
|
|
ADD_OF_PORTS([br0], 1, 2, 3)
|
|
|
|
|
|
|
|
ovs-appctl time/stop
|
|
|
|
# Set up flow table for TCPv4 port learning.
|
|
|
|
AT_CHECK([[ovs-ofctl add-flow br0 'actions=load:3->NXM_NX_REG0[0..15],learn(table=0,idle_timeout=5,priority=65535,NXM_OF_ETH_SRC[],NXM_OF_VLAN_TCI[0..11],output:NXM_NX_REG0[0..15]),output:2']])
|
|
|
|
|
|
|
|
# Trace some packets arriving. The particular packets don't matter.
|
|
|
|
for i in `seq 1 10`; do
|
|
|
|
ovs-appctl netdev-dummy/receive p1 'in_port(1),eth(src=50:54:00:00:00:05,dst=50:54:00:00:00:07),eth_type(0x0800),ipv4(src=192.168.0.1,dst=192.168.0.2,proto=6,tos=0,ttl=64,frag=no),tcp(src=8,dst=9)'
|
|
|
|
ovs-appctl time/warp 10
|
|
|
|
if [[ $i -eq 1 ]]; then
|
|
|
|
sleep 1
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
# Trace some packets arriving. This is is a different flow from the previous.
|
|
|
|
# Note that we advance time by 1 second between each packet here.
|
|
|
|
for i in `seq 1 10`; do
|
|
|
|
ovs-appctl netdev-dummy/receive p1 'in_port(1),eth(src=50:54:00:00:00:06,dst=50:54:00:00:00:07),eth_type(0x0800),ipv4(src=192.168.0.1,dst=192.168.0.2,proto=6,tos=0,ttl=64,frag=no),tcp(src=8,dst=9)'
|
|
|
|
ovs-appctl time/warp 1000
|
2014-04-04 13:57:26 +09:00
|
|
|
# Note: netdev-dummy/receive merely queues the packet.
|
|
|
|
# We need to wait for other thread to process the packet
|
|
|
|
# and update the flow's 'used' for the packet.
|
|
|
|
# (i % 3 == 0) below is somehow arbitrary but chosen to ensure
|
|
|
|
# that we update the flow's 'used' frequently enough to prevent
|
|
|
|
# idle_timeout.
|
2014-04-10 09:32:36 +09:00
|
|
|
if [[ $i -eq 1 -o $((i % 3)) -eq 0 ]]; then
|
2014-03-06 17:20:27 -08:00
|
|
|
sleep 1
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
2014-03-12 19:06:18 +09:00
|
|
|
# Check that the first packet of each flow went out port 2 and the rest out
|
|
|
|
# port 3.
|
2014-03-06 17:20:27 -08:00
|
|
|
AT_CHECK(
|
|
|
|
[(ovs-ofctl dump-ports br0 2; ovs-ofctl dump-ports br0 3) | STRIP_XIDS], [0],
|
|
|
|
[OFPST_PORT reply: 1 ports
|
|
|
|
port 2: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
|
|
|
|
tx pkts=2, bytes=120, drop=0, errs=0, coll=0
|
|
|
|
OFPST_PORT reply: 1 ports
|
|
|
|
port 3: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
|
|
|
|
tx pkts=18, bytes=1080, drop=0, errs=0, coll=0
|
|
|
|
])
|
|
|
|
|
|
|
|
# Check for the learning entry.
|
|
|
|
ovs-appctl time/warp 1000
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0],
|
|
|
|
[[ n_packets=2, n_bytes=120, actions=load:0x3->NXM_NX_REG0[0..15],learn(table=0,idle_timeout=5,priority=65535,NXM_OF_ETH_SRC[],NXM_OF_VLAN_TCI[0..11],output:NXM_NX_REG0[0..15]),output:2
|
|
|
|
n_packets=9, n_bytes=540, idle_timeout=5, priority=65535,vlan_tci=0x0000/0x0fff,dl_src=50:54:00:00:00:06 actions=output:3
|
|
|
|
NXST_FLOW reply:
|
|
|
|
]])
|
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2014-03-12 19:06:19 +09:00
|
|
|
# This test is much like the previous, but adds hard timeouts and sends
|
2014-03-06 17:20:27 -08:00
|
|
|
# two different flows to the bridge. This tests that the statistics are
|
|
|
|
# attributed correctly.
|
|
|
|
AT_SETUP([learning action - self-modifying flow with hard_timeout])
|
|
|
|
OVS_VSWITCHD_START
|
|
|
|
ADD_OF_PORTS([br0], 1, 2, 3)
|
|
|
|
|
|
|
|
ovs-appctl time/stop
|
|
|
|
# Set up flow table for TCPv4 port learning.
|
2014-03-12 19:06:20 +09:00
|
|
|
AT_CHECK([[ovs-ofctl add-flow br0 'actions=load:3->NXM_NX_REG0[0..15],learn(table=0,hard_timeout=10,priority=65535,NXM_OF_ETH_SRC[],NXM_OF_VLAN_TCI[0..11],output:NXM_NX_REG0[0..15]),output:2']])
|
2014-03-06 17:20:27 -08:00
|
|
|
|
|
|
|
# Trace some packets arriving. The particular packets don't matter.
|
|
|
|
for i in `seq 1 10`; do
|
|
|
|
ovs-appctl netdev-dummy/receive p1 'in_port(1),eth(src=50:54:00:00:00:05,dst=50:54:00:00:00:07),eth_type(0x0800),ipv4(src=192.168.0.1,dst=192.168.0.2,proto=6,tos=0,ttl=64,frag=no),tcp(src=8,dst=9)'
|
|
|
|
if [[ $i -eq 1 ]]; then
|
|
|
|
sleep 1
|
|
|
|
fi
|
2014-03-12 19:06:20 +09:00
|
|
|
ovs-appctl time/warp 10
|
2014-03-06 17:20:27 -08:00
|
|
|
done
|
|
|
|
|
|
|
|
# Trace some packets arriving. This is is a different flow from the previous.
|
2014-03-12 19:06:20 +09:00
|
|
|
# Note that we advance time by 2 second between each packet here.
|
2014-03-06 17:20:27 -08:00
|
|
|
for i in `seq 1 10`; do
|
|
|
|
ovs-appctl netdev-dummy/receive p1 'in_port(1),eth(src=50:54:00:00:00:06,dst=50:54:00:00:00:07),eth_type(0x0800),ipv4(src=192.168.0.1,dst=192.168.0.2,proto=6,tos=0,ttl=64,frag=no),tcp(src=8,dst=9)'
|
2014-03-12 19:06:20 +09:00
|
|
|
# Note: hard_timeout should fire immediately after #6 packet.
|
|
|
|
# #7 packet re-install the flow and the following 3 packets
|
|
|
|
# (#8, #9, #10) use the flow.
|
|
|
|
# it's difficult to predict the exact timing of rule expiry
|
|
|
|
# because it's affected by flow dumper thread via udpif_dump_seq.
|
|
|
|
# hard_timeout value for this test was chosen to overcome the uncertainty.
|
2014-04-04 18:23:00 +09:00
|
|
|
#
|
|
|
|
# receive #1 learn, install flow with hard_timeout=10
|
|
|
|
# sleep to ensure the flow installation
|
|
|
|
# (warp, timeout left 8s)
|
|
|
|
# receive #2 the learned flow
|
|
|
|
# (warp, timeout left 6s)
|
|
|
|
# receive #3
|
|
|
|
# (warp, timeout left 4s)
|
|
|
|
# receive #4
|
|
|
|
# (warp, timeout left 2s)
|
|
|
|
# receive #5
|
|
|
|
# (warp, timeout left 0s)
|
|
|
|
# NOTE: OVS does not consider this expired yet. cf. rule_expire()
|
|
|
|
# receive #6
|
|
|
|
# (warp, timeout left -2s)
|
|
|
|
# sleep to ensure flow expiration
|
|
|
|
# receive #7 learn, install flow with hard_timeout=10
|
|
|
|
# sleep to ensure the flow installation
|
|
|
|
# (warp, timeout left 8s)
|
|
|
|
# receive #8
|
|
|
|
# (warp, timeout left 6s)
|
|
|
|
# receive #9
|
|
|
|
# (warp, timeout left 4s)
|
|
|
|
# receive #10
|
|
|
|
# (warp, timeout left 2s)
|
|
|
|
if [[ $i -eq 1 -o $i -eq 7 ]]; then
|
2014-03-06 17:20:27 -08:00
|
|
|
sleep 1
|
|
|
|
fi
|
2014-03-12 19:06:20 +09:00
|
|
|
ovs-appctl time/warp 2000
|
2014-04-04 18:23:00 +09:00
|
|
|
if [[ $i -eq 6 ]]; then
|
|
|
|
sleep 1
|
|
|
|
fi
|
2014-03-06 17:20:27 -08:00
|
|
|
done
|
|
|
|
|
2014-03-12 19:06:18 +09:00
|
|
|
# Check that the first packet of each flow went out port 2 and the rest out
|
|
|
|
# port 3.
|
2014-03-06 17:20:27 -08:00
|
|
|
AT_CHECK(
|
|
|
|
[(ovs-ofctl dump-ports br0 2; ovs-ofctl dump-ports br0 3) | STRIP_XIDS], [0],
|
|
|
|
[OFPST_PORT reply: 1 ports
|
|
|
|
port 2: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
|
|
|
|
tx pkts=3, bytes=180, drop=0, errs=0, coll=0
|
|
|
|
OFPST_PORT reply: 1 ports
|
|
|
|
port 3: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
|
|
|
|
tx pkts=17, bytes=1020, drop=0, errs=0, coll=0
|
|
|
|
])
|
|
|
|
|
|
|
|
# Check for the learning entry.
|
|
|
|
ovs-appctl time/warp 1000
|
2014-03-12 19:06:20 +09:00
|
|
|
sleep 1
|
2014-03-06 17:20:27 -08:00
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0],
|
2014-03-12 19:06:20 +09:00
|
|
|
[[ n_packets=3, n_bytes=180, actions=load:0x3->NXM_NX_REG0[0..15],learn(table=0,hard_timeout=10,priority=65535,NXM_OF_ETH_SRC[],NXM_OF_VLAN_TCI[0..11],output:NXM_NX_REG0[0..15]),output:2
|
|
|
|
n_packets=3, n_bytes=180, hard_timeout=10, priority=65535,vlan_tci=0x0000/0x0fff,dl_src=50:54:00:00:00:06 actions=output:3
|
2014-03-06 17:20:27 -08:00
|
|
|
NXST_FLOW reply:
|
|
|
|
]])
|
2013-01-31 16:27:14 -08:00
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|
|
|
|
|
2012-02-15 10:37:03 -08:00
|
|
|
AT_SETUP([learning action - fin_timeout feature])
|
|
|
|
# This is a totally artificial use of the "learn" action. The only purpose
|
|
|
|
# is to check that specifying fin_idle_timeout or fin_hard_timeout causes
|
|
|
|
# a corresponding fin_timeout action to end up in the learned flows.
|
2012-09-28 17:56:07 -07:00
|
|
|
OVS_VSWITCHD_START(
|
|
|
|
[add-port br0 p1 -- set Interface p1 type=dummy ofport_request=1])
|
2012-02-15 10:37:03 -08:00
|
|
|
AT_CHECK([[ovs-ofctl add-flow br0 'actions=learn(fin_hard_timeout=10, fin_idle_timeout=5, NXM_OF_ETH_DST[]=NXM_OF_ETH_SRC[], output:NXM_OF_IN_PORT[])']])
|
2013-05-20 11:36:05 -07:00
|
|
|
AT_CHECK([ovs-appctl ofproto/trace ovs-dummy 'in_port(1),eth(src=50:54:00:00:00:05,dst=ff:ff:ff:ff:ff:ff),eth_type(0x0806),arp(sip=192.168.0.1,tip=192.168.0.2,op=1,sha=50:54:00:00:00:05,tha=00:00:00:00:00:00)' -generate], [0], [ignore])
|
2012-02-15 10:37:03 -08:00
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 table=1 | ofctl_strip], [0],
|
|
|
|
[NXST_FLOW reply:
|
|
|
|
table=1, dl_dst=50:54:00:00:00:05 actions=fin_timeout(idle_timeout=5,hard_timeout=10),output:1
|
|
|
|
])
|
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|
2014-06-05 21:53:34 -07:00
|
|
|
|
|
|
|
AT_SETUP([learning action - delete_learned feature])
|
|
|
|
OVS_VSWITCHD_START
|
|
|
|
|
|
|
|
# Add some initial flows and check that it was successful.
|
|
|
|
AT_DATA([flows.txt], [dnl
|
|
|
|
reg0=0x1 actions=learn(delete_learned,cookie=0x123)
|
|
|
|
reg0=0x2 actions=learn(delete_learned,cookie=0x123)
|
|
|
|
cookie=0x123, table=1, reg0=0x3 actions=drop
|
|
|
|
cookie=0x123, table=1, reg0=0x4 actions=drop
|
|
|
|
cookie=0x123, table=2, reg0=0x5 actions=drop
|
|
|
|
cookie=0x234, table=1, reg0=0x6 actions=drop
|
|
|
|
])
|
|
|
|
AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
|
|
|
cookie=0x123, table=1, reg0=0x3 actions=drop
|
|
|
|
cookie=0x123, table=1, reg0=0x4 actions=drop
|
|
|
|
cookie=0x123, table=2, reg0=0x5 actions=drop
|
|
|
|
cookie=0x234, table=1, reg0=0x6 actions=drop
|
|
|
|
reg0=0x1 actions=learn(table=1,delete_learned,cookie=0x123)
|
|
|
|
reg0=0x2 actions=learn(table=1,delete_learned,cookie=0x123)
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Delete one of the learn actions. The learned flows should stay, since there
|
|
|
|
# is another learn action with the identical target.
|
|
|
|
AT_CHECK([ovs-ofctl del-flows br0 'table=0 reg0=1'])
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
|
|
|
cookie=0x123, table=1, reg0=0x3 actions=drop
|
|
|
|
cookie=0x123, table=1, reg0=0x4 actions=drop
|
|
|
|
cookie=0x123, table=2, reg0=0x5 actions=drop
|
|
|
|
cookie=0x234, table=1, reg0=0x6 actions=drop
|
|
|
|
reg0=0x2 actions=learn(table=1,delete_learned,cookie=0x123)
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Change the flow with the learn action by adding a second action. The learned
|
|
|
|
# flows should stay because the learn action is still there.
|
|
|
|
AT_CHECK([ovs-ofctl mod-flows br0 'table=0 reg0=2 actions=output:1,learn(delete_learned,cookie=0x123)'])
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
|
|
|
cookie=0x123, table=1, reg0=0x3 actions=drop
|
|
|
|
cookie=0x123, table=1, reg0=0x4 actions=drop
|
|
|
|
cookie=0x123, table=2, reg0=0x5 actions=drop
|
|
|
|
cookie=0x234, table=1, reg0=0x6 actions=drop
|
|
|
|
reg0=0x2 actions=output:1,learn(table=1,delete_learned,cookie=0x123)
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Change the flow with the learn action by replacing its learn action by one
|
|
|
|
# with a different target. The (previous) learned flows disappear.
|
|
|
|
AT_CHECK([ovs-ofctl mod-flows br0 'table=0 reg0=2 actions=learn(delete_learned,cookie=0x234)'])
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
|
|
|
cookie=0x123, table=2, reg0=0x5 actions=drop
|
|
|
|
cookie=0x234, table=1, reg0=0x6 actions=drop
|
|
|
|
reg0=0x2 actions=learn(table=1,delete_learned,cookie=0x234)
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Use add-flow to replace the flow with the learn action by one with the
|
|
|
|
# same learn action and an extra action. The (new) learned flow remains.
|
|
|
|
AT_CHECK([ovs-ofctl add-flow br0 'table=0 reg0=2 actions=learn(delete_learned,cookie=0x234),output:2'])
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
|
|
|
cookie=0x123, table=2, reg0=0x5 actions=drop
|
|
|
|
cookie=0x234, table=1, reg0=0x6 actions=drop
|
|
|
|
reg0=0x2 actions=learn(table=1,delete_learned,cookie=0x234),output:2
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Delete the flow with the learn action. The learned flow disappears too.
|
|
|
|
AT_CHECK([ovs-ofctl del-flows br0 table=0])
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
|
|
|
cookie=0x123, table=2, reg0=0x5 actions=drop
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Add a new set of flows to check on a corner case: the learned flows
|
|
|
|
# contain their own learn actions which cascade to further deletions.
|
|
|
|
# This can't happen if the learned flows were actually created by a
|
|
|
|
# learn action, since the learn action has very restricted action
|
|
|
|
# support, but there's no restriction that the deleted flows were
|
|
|
|
# created by a learn action.
|
|
|
|
AT_DATA([flows.txt], [dnl
|
|
|
|
reg0=0x1 actions=learn(table=1,delete_learned,cookie=0x123)
|
|
|
|
reg0=0x2 actions=learn(table=2,delete_learned,cookie=0x234)
|
|
|
|
cookie=0x123, table=1, reg0=0x3 actions=learn(table=3,delete_learned,cookie=0x345)
|
|
|
|
cookie=0x234, table=2, reg0=0x3 actions=learn(table=4,delete_learned,cookie=0x456)
|
|
|
|
cookie=0x345, table=3, reg0=0x4 actions=learn(table=5,delete_learned,cookie=0x567)
|
|
|
|
cookie=0x456, table=4, reg0=0x5 actions=learn(table=5,delete_learned,cookie=0x567)
|
|
|
|
cookie=0x567, table=5, reg0=0x6 actions=drop
|
|
|
|
cookie=0x567, table=5, reg0=0x7 actions=drop
|
|
|
|
cookie=0x567, table=5, reg0=0x8 actions=drop
|
|
|
|
])
|
|
|
|
AT_CHECK([ovs-ofctl del-flows br0])
|
|
|
|
AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
|
|
|
cookie=0x123, table=1, reg0=0x3 actions=learn(table=3,delete_learned,cookie=0x345)
|
|
|
|
cookie=0x234, table=2, reg0=0x3 actions=learn(table=4,delete_learned,cookie=0x456)
|
|
|
|
cookie=0x345, table=3, reg0=0x4 actions=learn(table=5,delete_learned,cookie=0x567)
|
|
|
|
cookie=0x456, table=4, reg0=0x5 actions=learn(table=5,delete_learned,cookie=0x567)
|
|
|
|
cookie=0x567, table=5, reg0=0x6 actions=drop
|
|
|
|
cookie=0x567, table=5, reg0=0x7 actions=drop
|
|
|
|
cookie=0x567, table=5, reg0=0x8 actions=drop
|
|
|
|
reg0=0x1 actions=learn(table=1,delete_learned,cookie=0x123)
|
|
|
|
reg0=0x2 actions=learn(table=2,delete_learned,cookie=0x234)
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Deleting the flow with reg0=1 should cascade to delete a few levels
|
|
|
|
# of learned flows, but the ones with cookie=0x567 stick around
|
|
|
|
# because of the flow with cookie=0x456.
|
|
|
|
AT_CHECK([ovs-ofctl del-flows br0 'table=0 reg0=1'])
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
|
|
|
cookie=0x234, table=2, reg0=0x3 actions=learn(table=4,delete_learned,cookie=0x456)
|
|
|
|
cookie=0x456, table=4, reg0=0x5 actions=learn(table=5,delete_learned,cookie=0x567)
|
|
|
|
cookie=0x567, table=5, reg0=0x6 actions=drop
|
|
|
|
cookie=0x567, table=5, reg0=0x7 actions=drop
|
|
|
|
cookie=0x567, table=5, reg0=0x8 actions=drop
|
|
|
|
reg0=0x2 actions=learn(table=2,delete_learned,cookie=0x234)
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
|
|
|
|
# Deleting the flow with reg0=2 should cascade to delete all the rest:
|
|
|
|
AT_CHECK([ovs-ofctl del-flows br0 'table=0 reg0=2'])
|
|
|
|
AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
|
|
|
|
NXST_FLOW reply:
|
|
|
|
])
|
|
|
|
OVS_VSWITCHD_STOP
|
|
|
|
AT_CLEANUP
|