3 AT_SETUP([ofproto - echo request])
5 AT_CHECK([ovs-ofctl -vwarn probe br0])
9 AT_SETUP([ofproto - handling messages with bad version])
12 # Start a monitor running OpenFlow 1.0, then send the switch an OF1.1 features
14 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
15 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
16 AT_CAPTURE_FILE([monitor.log])
17 ovs-appctl -t ovs-ofctl ofctl/send 0205000801234567
18 ovs-appctl -t ovs-ofctl ofctl/barrier
19 ovs-appctl -t ovs-ofctl exit
21 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//
22 /ECHO/d' monitor.log], [0], [dnl
23 send: OFPT_FEATURES_REQUEST (OF1.1):
24 OFPT_ERROR (OF1.1): OFPBRC_BAD_VERSION
25 OFPT_FEATURES_REQUEST (OF1.1):
29 OVS_VSWITCHD_STOP(["/received OpenFlow version 0x02 != expected 01/d"])
32 AT_SETUP([ofproto - feature request, config request])
34 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
35 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
36 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
37 n_tables:254, n_buffers:256
38 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
39 actions: OUTPUT SET_VLAN_VID SET_VLAN_PCP STRIP_VLAN SET_DL_SRC SET_DL_DST SET_NW_SRC SET_NW_DST SET_NW_TOS SET_TP_SRC SET_TP_DST ENQUEUE
40 LOCAL(br0): addr:aa:55:aa:55:00:00
43 speed: 0 Mbps now, 0 Mbps max
44 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
49 AT_SETUP([ofproto - set OpenFlow port number])
51 [add-port br0 p1 -- set Interface p1 type=dummy --\
52 add-port br0 p2 -- set Interface p2 type=dummy ofport_request=99])
53 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
55 s/ (xid=0x[0-9a-fA-F]*)//
56 s/00:0.$/00:0x/' < stdout]],
58 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
59 n_tables:254, n_buffers:256
60 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
61 actions: OUTPUT SET_VLAN_VID SET_VLAN_PCP STRIP_VLAN SET_DL_SRC SET_DL_DST SET_NW_SRC SET_NW_DST SET_NW_TOS SET_TP_SRC SET_TP_DST ENQUEUE
62 1(p1): addr:aa:55:aa:55:00:0x
65 speed: 0 Mbps now, 0 Mbps max
66 99(p2): addr:aa:55:aa:55:00:0x
69 speed: 0 Mbps now, 0 Mbps max
70 LOCAL(br0): addr:aa:55:aa:55:00:0x
73 speed: 0 Mbps now, 0 Mbps max
74 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
80 dnl This is really bare-bones.
81 dnl It at least checks request and reply serialization and deserialization.
82 AT_SETUP([ofproto - port stats - (OpenFlow 1.0)])
84 AT_CHECK([ovs-ofctl -vwarn dump-ports br0], [0], [stdout])
85 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
86 OFPST_PORT reply: 1 ports
87 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
88 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
93 AT_SETUP([ofproto - port stats - (OpenFlow 1.2)])
95 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-ports br0], [0], [stdout])
96 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
97 OFPST_PORT reply (OF1.2): 1 ports
98 port LOCAL: rx pkts=0, bytes=0, drop=0, errs=0, frame=0, over=0, crc=0
99 tx pkts=0, bytes=0, drop=0, errs=0, coll=0
104 dnl This is really bare-bones.
105 dnl It at least checks request and reply serialization and deserialization.
106 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.0)])
108 AT_CHECK([ovs-ofctl -vwarn dump-ports-desc br0], [0], [stdout])
109 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
110 OFPST_PORT_DESC reply:
111 LOCAL(br0): addr:aa:55:aa:55:00:00
114 speed: 0 Mbps now, 0 Mbps max
119 dnl This is really bare-bones.
120 dnl It at least checks request and reply serialization and deserialization.
121 AT_SETUP([ofproto - port-desc stats (OpenFlow 1.2)])
123 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-ports-desc br0], [0], [stdout])
124 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
125 OFPST_PORT_DESC reply (OF1.2):
126 LOCAL(br0): addr:aa:55:aa:55:00:00
129 speed: 0 Mbps now, 0 Mbps max
134 dnl This is really bare-bones.
135 dnl It at least checks request and reply serialization and deserialization.
136 AT_SETUP([ofproto - queue stats - (OpenFlow 1.0)])
138 AT_CHECK([ovs-ofctl -vwarn queue-stats br0], [0], [stdout])
139 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
140 OFPST_QUEUE reply: 0 queues
142 AT_CHECK([ovs-ofctl -vwarn queue-stats br0 ANY 5], [0],
143 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_QUEUE
144 OFPST_QUEUE request (xid=0x2):port=ANY queue=5
146 AT_CHECK([ovs-ofctl -vwarn queue-stats br0 10], [0],
147 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_PORT
148 OFPST_QUEUE request (xid=0x2):port=10 queue=ALL
153 AT_SETUP([ofproto - queue stats - (OpenFlow 1.2)])
155 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0], [0], [stdout])
156 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
157 OFPST_QUEUE reply (OF1.2): 0 queues
159 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0 ALL 5], [0],
160 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_QUEUE
161 OFPST_QUEUE request (OF1.2) (xid=0x2):port=ANY queue=5
163 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn queue-stats br0 10], [0],
164 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_PORT
165 OFPST_QUEUE request (OF1.2) (xid=0x2):port=10 queue=ALL
170 dnl This is really bare-bones.
171 dnl It at least checks request and reply serialization and deserialization.
172 AT_SETUP([ofproto - queue configuration - (OpenFlow 1.0)])
174 ADD_OF_PORTS([br0], [1], [2])
175 AT_CHECK([ovs-ofctl queue-get-config br0 1], [0], [stdout])
176 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
177 OFPT_QUEUE_GET_CONFIG_REPLY: port=1
179 AT_CHECK([ovs-ofctl queue-get-config br0 10], [0],
180 [OFPT_ERROR (xid=0x2): OFPQOFC_BAD_PORT
181 OFPT_QUEUE_GET_CONFIG_REQUEST (xid=0x2): port=10
186 AT_SETUP([ofproto - queue configuration - (OpenFlow 1.2)])
188 ADD_OF_PORTS([br0], [1], [2])
189 AT_CHECK([ovs-ofctl -O OpenFlow12 queue-get-config br0 1], [0], [stdout])
190 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
191 OFPT_QUEUE_GET_CONFIG_REPLY (OF1.2): port=1
193 AT_CHECK([ovs-ofctl -O OpenFlow12 queue-get-config br0 10], [0],
194 [OFPT_ERROR (OF1.2) (xid=0x2): OFPQOFC_BAD_PORT
195 OFPT_QUEUE_GET_CONFIG_REQUEST (OF1.2) (xid=0x2): port=10
200 dnl This is really bare-bones.
201 dnl It at least checks request and reply serialization and deserialization.
202 AT_SETUP([ofproto - del group])
204 AT_DATA([groups.txt], [dnl
205 group_id=1234,type=all,bucket=output:10
206 group_id=1235,type=all,bucket=output:10
208 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
209 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
210 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
211 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
212 OFPST_GROUP_DESC reply (OF1.1):
213 group_id=1235,type=all,bucket=actions=output:10
215 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
216 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
217 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
218 OFPST_GROUP_DESC reply (OF1.1):
219 group_id=1235,type=all,bucket=actions=output:10
221 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0], [0])
222 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
223 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
224 OFPST_GROUP_DESC reply (OF1.1):
229 dnl This is really bare-bones.
230 dnl It at least checks request and reply serialization and deserialization.
231 AT_SETUP([ofproto - del group deletes flows])
233 AT_DATA([groups.txt], [dnl
234 group_id=1234,type=all,bucket=output:10
235 group_id=1235,type=all,bucket=output:10
237 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
238 AT_DATA([flows.txt], [dnl
239 tcp actions=group:1234
240 udp actions=group:1235
242 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flows br0 flows.txt])
243 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
245 tcp actions=group:1234
246 udp actions=group:1235
247 OFPST_FLOW reply (OF1.1):
249 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
250 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
252 udp actions=group:1235
253 OFPST_FLOW reply (OF1.1):
255 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0 group_id=1234])
256 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
258 udp actions=group:1235
259 OFPST_FLOW reply (OF1.1):
261 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn del-groups br0])
262 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-flows br0 | ofctl_strip | sort],
264 OFPST_FLOW reply (OF1.1):
269 dnl This is really bare-bones.
270 dnl It at least checks request and reply serialization and deserialization.
271 AT_SETUP([ofproto - flow mod checks group availability])
273 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10])
274 AT_DATA([flows.txt], [dnl
275 tcp actions=group:1234
276 udp actions=group:1235
278 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1234'])
279 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1235'], [1], [], [stderr])
281 # The output should look like this:
283 # 00000000 02 0e 00 98 00 00 00 02-00 00 00 00 00 00 00 00 |................|
284 # 00000010 00 00 00 00 00 00 00 00-ff 00 00 00 00 00 80 00 |................|
285 # 00000020 ff ff ff ff ff ff ff ff-ff ff ff ff 00 00 00 00 |................|
286 # 00000030 00 00 00 58 00 00 00 00-00 00 03 d7 00 00 00 00 |...X............|
288 # This 'sed' command captures the error message but drops details.
289 AT_CHECK([sed '/truncated/d
290 /^000000.0/d' stderr | STRIP_XIDS], [0],
291 [OFPT_ERROR (OF1.1): OFPBAC_BAD_OUT_GROUP
292 OFPT_FLOW_MOD (OF1.1):
297 dnl This is really bare-bones.
298 dnl It at least checks request and reply serialization and deserialization.
299 AT_SETUP([ofproto - group description])
301 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10], [0], [stdout])
302 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
303 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
304 OFPST_GROUP_DESC reply (OF1.1):
305 group_id=1234,type=all,bucket=actions=output:10
310 dnl This is really bare-bones.
311 dnl It at least checks request and reply serialization and deserialization.
312 AT_SETUP([ofproto - group description])
314 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-group br0 group_id=1234,type=all,bucket=output:10])
315 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-groups br0], [0], [stdout])
316 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
317 OFPST_GROUP_DESC reply (OF1.1):
318 group_id=1234,type=all,bucket=actions=output:10
323 dnl This is really bare-bones.
324 dnl It at least checks request and reply serialization and deserialization.
325 AT_SETUP([ofproto - group features])
327 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn dump-group-features br0], [0], [stdout])
328 AT_CHECK([STRIP_XIDS stdout], [0], [dnl
329 OFPST_GROUP_FEATURES reply (OF1.2):
337 dnl This is really bare-bones.
338 dnl It at least checks request and reply serialization and deserialization.
339 AT_SETUP([ofproto - group stats])
341 AT_DATA([groups.txt], [dnl
342 group_id=1234,type=all,bucket=output:10
343 group_id=1235,type=all,bucket=output:10
345 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-groups br0 groups.txt])
346 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn add-flow br0 'tcp actions=group:1234'])
347 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-group-stats br0 group_id=1234], [0], [stdout])
348 AT_CHECK([STRIP_XIDS stdout | sort], [0], [dnl
349 group_id=1234,ref_count=1,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
350 OFPST_GROUP reply (OF1.1):
352 AT_CHECK([ovs-ofctl -O OpenFlow11 -vwarn dump-group-stats br0], [0], [stdout])
353 AT_CHECK([STRIP_XIDS stdout | sort], [0], [dnl
354 group_id=1234,ref_count=1,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
355 group_id=1235,ref_count=0,packet_count=0,byte_count=0,bucket0:packet_count=0,byte_count=0
356 OFPST_GROUP reply (OF1.1):
361 AT_SETUP([ofproto - mod-port (OpenFlow 1.0)])
363 for command_config_state in \
365 'noflood NO_FLOOD 0' \
366 'down PORT_DOWN,NO_FLOOD LINK_DOWN' \
367 'flood PORT_DOWN LINK_DOWN' \
368 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
369 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
370 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
371 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
372 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
376 set $command_config_state
377 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
378 AT_CHECK([ovs-ofctl -vwarn mod-port br0 br0 $command])
379 AT_CHECK([ovs-ofctl -vwarn show br0], [0], [stdout])
380 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
381 OFPT_FEATURES_REPLY: dpid:fedcba9876543210
382 n_tables:254, n_buffers:256
383 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS ARP_MATCH_IP
384 actions: OUTPUT SET_VLAN_VID SET_VLAN_PCP STRIP_VLAN SET_DL_SRC SET_DL_DST SET_NW_SRC SET_NW_DST SET_NW_TOS SET_TP_SRC SET_TP_DST ENQUEUE
385 LOCAL(br0): addr:aa:55:aa:55:00:00
388 speed: 0 Mbps now, 0 Mbps max
389 OFPT_GET_CONFIG_REPLY: frags=normal miss_send_len=0
395 AT_SETUP([ofproto - mod-port (OpenFlow 1.2)])
397 for command_config_state in \
399 'down PORT_DOWN LINK_DOWN' \
400 'no-receive PORT_DOWN,NO_RECV LINK_DOWN' \
401 'no-forward PORT_DOWN,NO_RECV,NO_FWD LINK_DOWN' \
402 'no-packet-in PORT_DOWN,NO_RECV,NO_FWD,NO_PACKET_IN LINK_DOWN' \
403 'forward PORT_DOWN,NO_RECV,NO_PACKET_IN LINK_DOWN' \
404 'packet-in PORT_DOWN,NO_RECV LINK_DOWN' \
408 set $command_config_state
409 command=$[1] config=`echo $[2] | sed 's/,/ /g'` state=$[3]
410 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn mod-port br0 br0 $command])
411 AT_CHECK([ovs-ofctl -O OpenFlow12 -vwarn show br0], [0], [stdout])
412 AT_CHECK_UNQUOTED([STRIP_XIDS stdout], [0], [dnl
413 OFPT_FEATURES_REPLY (OF1.2): dpid:fedcba9876543210
414 n_tables:254, n_buffers:256
415 capabilities: FLOW_STATS TABLE_STATS PORT_STATS QUEUE_STATS
416 LOCAL(br0): addr:aa:55:aa:55:00:00
419 speed: 0 Mbps now, 0 Mbps max
420 OFPT_GET_CONFIG_REPLY (OF1.2): frags=normal miss_send_len=0
426 AT_SETUP([ofproto - basic flow_mod commands (NXM)])
428 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
430 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl add-flows br0 -])
431 AT_CHECK([ovs-ofctl add-flow br0 in_port=1,actions=2])
432 AT_CHECK([ovs-ofctl -F nxm add-flow br0 table=1,in_port=4,actions=3])
433 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
434 in_port=1 actions=output:2
435 in_port=2 actions=output:1
436 table=1, in_port=4 actions=output:3
439 AT_CHECK([ovs-ofctl dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
440 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=2
442 AT_CHECK([ovs-ofctl del-flows br0])
443 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
448 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.0)])
450 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply:
452 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -F openflow10 add-flows br0 -])
453 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 in_port=1,actions=2])
454 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 table=1,in_port=4,actions=3])
455 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
456 in_port=1 actions=output:2
457 in_port=2 actions=output:1
458 table=1, in_port=4 actions=output:3
461 AT_CHECK([ovs-ofctl -F openflow10 dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
462 OFPST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=2
464 AT_CHECK([ovs-ofctl -F openflow10 del-flows br0])
465 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply:
470 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.1)])
472 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.1):
474 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -O OpenFlow11 add-flows br0 -])
475 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 in_port=1,actions=2])
476 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 table=1,in_port=4,actions=3])
477 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
478 in_port=1 actions=output:2
479 in_port=2 actions=output:1
480 table=1, in_port=4 actions=output:3
481 OFPST_FLOW reply (OF1.1):
483 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
484 OFPST_AGGREGATE reply (OF1.1): packet_count=0 byte_count=0 flow_count=2
486 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0])
487 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.1):
488 table=1, in_port=4 actions=output:3
493 AT_SETUP([ofproto - flow_mod negative test (OpenFlow 1.1)])
495 [set bridge br0 protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13])
496 AT_CHECK([ovs-ofctl add-flow -O OpenFlow11 br0 table=1,action=goto_table:2])
498 # The error message here actually comes from ovs-ofctl, not from ovs-vswitchd,
499 # but at least it's the same code in ofpacts_check() that issues the error.
500 AT_CHECK([ovs-ofctl add-flow -O OpenFlow11 br0 table=1,action=goto_table:1],
502 [ovs-ofctl: actions are invalid with specified match (OFPBRC_BAD_TABLE_ID)
507 AT_SETUP([ofproto - set-field flow_mod commands (NXM)])
509 AT_CHECK([ovs-ofctl add-flow br0 ipv6,table=1,in_port=3,actions=drop])
510 AT_CHECK([ovs-ofctl add-flow br0 ipv6,table=1,in_port=3,actions=set_field:fe80:0123:4567:890a:a6ba:dbff:fefe:59fa-\>ipv6_src])
511 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
512 table=1, ipv6,in_port=3 actions=load:0xa6badbfffefe59fa->NXM_NX_IPV6_SRC[[0..63]],load:0xfe8001234567890a->NXM_NX_IPV6_SRC[[64..127]]
518 AT_SETUP([ofproto - basic flow_mod commands (OpenFlow 1.2)])
520 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.2):
522 AT_CHECK([echo 'in_port=2,actions=1' | ovs-ofctl -O OpenFlow12 add-flows br0 -])
523 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=1,actions=2])
524 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 table=1,in_port=4,actions=3])
525 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
526 in_port=1 actions=output:2
527 in_port=2 actions=output:1
528 table=1, in_port=4 actions=output:3
529 OFPST_FLOW reply (OF1.2):
531 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0])
532 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip], [0], [OFPST_FLOW reply (OF1.2):
537 AT_SETUP([ofproto - dump flows with cookie])
539 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
540 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
541 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
542 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
543 cookie=0x1, in_port=1 actions=output:1
544 cookie=0x2, in_port=2 actions=output:1
545 cookie=0x3, in_port=3 actions=output:1
548 AT_CHECK([ovs-ofctl dump-aggregate br0 table=0 | STRIP_XIDS], [0], [dnl
549 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=3
551 AT_CHECK([ovs-ofctl dump-flows br0 cookie=0x3/-1 | ofctl_strip | sort], [0], [dnl
552 cookie=0x3, in_port=3 actions=output:1
555 AT_CHECK([ovs-ofctl dump-aggregate br0 cookie=0x3/-1 | STRIP_XIDS], [0], [dnl
556 NXST_AGGREGATE reply: packet_count=0 byte_count=0 flow_count=1
561 AT_SETUP([ofproto - mod flow with cookie change (OpenFlow 1.0)])
563 AT_CHECK([ovs-ofctl -F openflow10 add-flow br0 cookie=0x1,in_port=1,actions=1])
564 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
565 cookie=0x1, in_port=1 actions=output:1
569 AT_CHECK([ovs-ofctl -F openflow10 mod-flows br0 cookie=0x2,in_port=1,actions=1])
570 AT_CHECK([ovs-ofctl -F openflow10 dump-flows br0 | ofctl_strip | sort], [0], [dnl
571 cookie=0x2, in_port=1 actions=output:1
577 AT_SETUP([ofproto - mod flow with cookie change (NXM)])
579 AT_CHECK([ovs-ofctl -F nxm add-flow br0 cookie=0x1,in_port=1,actions=1])
580 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
581 cookie=0x1, in_port=1 actions=output:1
585 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=0x2,in_port=1,actions=1])
586 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
587 cookie=0x2, in_port=1 actions=output:1
593 AT_SETUP([ofproto - no mod flow with cookie change (OpenFlow 1.1)])
595 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
596 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
597 cookie=0x1, in_port=1 actions=output:1
598 OFPST_FLOW reply (OF1.1):
600 AT_CHECK([ovs-ofctl -O OpenFlow11 mod-flows br0 cookie=0x2,in_port=1,actions=1])
601 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
602 cookie=0x1, in_port=1 actions=output:1
603 OFPST_FLOW reply (OF1.1):
608 dnl The OpenFlow 1.2 spec states that the cookie may not be modified
609 AT_SETUP([ofproto - no mod flow with cookie change (OpenFlow 1.2)])
611 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
612 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
613 cookie=0x1, in_port=1 actions=output:1
614 OFPST_FLOW reply (OF1.2):
617 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 cookie=0x2,in_port=1,actions=1])
618 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
619 cookie=0x1, in_port=1 actions=output:1
620 OFPST_FLOW reply (OF1.2):
625 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.0)])
627 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
628 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=2,actions=1])
629 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=3,actions=1])
630 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
631 cookie=0x1, in_port=1 actions=output:1
632 cookie=0x1, in_port=2 actions=output:1
633 cookie=0x2, in_port=3 actions=output:1
637 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=0x1/0xff,actions=4])
638 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
639 cookie=0x1, in_port=1 actions=output:4
640 cookie=0x1, in_port=2 actions=output:4
641 cookie=0x2, in_port=3 actions=output:1
647 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.1)])
649 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
650 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=2,actions=1])
651 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=3,actions=1])
652 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
653 cookie=0x1, in_port=1 actions=output:1
654 cookie=0x1, in_port=2 actions=output:1
655 cookie=0x2, in_port=3 actions=output:1
656 OFPST_FLOW reply (OF1.1):
659 AT_CHECK([ovs-ofctl -O OpenFlow11 mod-flows br0 cookie=0x1/0xff,actions=4])
660 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
661 cookie=0x1, in_port=1 actions=output:4
662 cookie=0x1, in_port=2 actions=output:4
663 cookie=0x2, in_port=3 actions=output:1
664 OFPST_FLOW reply (OF1.1):
669 AT_SETUP([ofproto - mod flows based on cookie mask (OpenFlow 1.2)])
671 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
672 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=2,actions=1])
673 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=3,actions=1])
674 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
675 cookie=0x1, in_port=1 actions=output:1
676 cookie=0x1, in_port=2 actions=output:1
677 cookie=0x2, in_port=3 actions=output:1
678 OFPST_FLOW reply (OF1.2):
681 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 cookie=0x1/0xff,actions=4])
682 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
683 cookie=0x1, in_port=1 actions=output:4
684 cookie=0x1, in_port=2 actions=output:4
685 cookie=0x2, in_port=3 actions=output:1
686 OFPST_FLOW reply (OF1.2):
691 dnl The OpenFlow 1.2 spec states that the cookie may not be modified
692 AT_SETUP([ofproto - mod flows based on cookie mask with cookie change])
694 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
695 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=2,actions=1])
696 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=3,actions=1])
697 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
698 cookie=0x1, in_port=1 actions=output:1
699 cookie=0x1, in_port=2 actions=output:1
700 cookie=0x2, in_port=3 actions=output:1
704 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=1/-1,cookie=4,actions=4])
705 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
706 cookie=0x2, in_port=3 actions=output:1
707 cookie=0x4, in_port=1 actions=output:4
708 cookie=0x4, in_port=2 actions=output:4
714 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - NXM])
716 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 in_port=1,actions=1])
717 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
718 in_port=1 actions=output:1
724 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - OF1.1])
726 AT_CHECK([ovs-ofctl -O openflow11 mod-flows br0 in_port=1,actions=1])
727 AT_CHECK([ovs-ofctl -O openflow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
728 in_port=1 actions=output:1
729 OFPST_FLOW reply (OF1.1):
734 AT_SETUP([ofproto - mod flow with cookie miss (mask==0) - OF1.2])
736 AT_CHECK([ovs-ofctl -O openflow12 mod-flows br0 in_port=1,actions=1])
737 AT_CHECK([ovs-ofctl -O openflow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
738 OFPST_FLOW reply (OF1.2):
743 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - NXM])
745 AT_CHECK([ovs-ofctl -F nxm mod-flows br0 cookie=1/1,in_port=1,actions=1])
746 AT_CHECK([ovs-ofctl -F nxm dump-flows br0 | ofctl_strip | sort], [0], [dnl
752 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - OF1.1])
754 AT_CHECK([ovs-ofctl -O openflow11 mod-flows br0 cookie=1/1,in_port=1,actions=1])
755 AT_CHECK([ovs-ofctl -O openflow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
756 OFPST_FLOW reply (OF1.1):
761 AT_SETUP([ofproto - mod flow with cookie miss (mask!=0) - OF1.2])
763 AT_CHECK([ovs-ofctl -O openflow12 mod-flows br0 cookie=1/1,in_port=1,actions=1])
764 AT_CHECK([ovs-ofctl -O openflow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
765 OFPST_FLOW reply (OF1.2):
770 AT_SETUP([ofproto - del flows with cookies])
772 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
773 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
774 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
775 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
776 cookie=0x1, in_port=1 actions=output:1
777 cookie=0x2, in_port=2 actions=output:1
778 cookie=0x3, in_port=3 actions=output:1
782 AT_CHECK([ovs-ofctl del-flows br0])
783 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
789 AT_SETUP([ofproto - del flows based on cookie])
791 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
792 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
793 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
794 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
795 cookie=0x1, in_port=1 actions=output:1
796 cookie=0x2, in_port=2 actions=output:1
797 cookie=0x3, in_port=3 actions=output:1
801 AT_CHECK([ovs-ofctl del-flows br0 cookie=0x3/-1])
802 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
803 cookie=0x1, in_port=1 actions=output:1
804 cookie=0x2, in_port=2 actions=output:1
810 AT_SETUP([ofproto - del flows based on cookie mask])
812 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
813 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,actions=1])
814 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x3,in_port=3,actions=1])
815 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
816 cookie=0x1, in_port=1 actions=output:1
817 cookie=0x2, in_port=2 actions=output:1
818 cookie=0x3, in_port=3 actions=output:1
821 AT_CHECK([ovs-ofctl del-flows br0 cookie=0x3/0x1])
822 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
823 cookie=0x2, in_port=2 actions=output:1
829 AT_SETUP([ofproto - del flows based on table id (NXM)])
831 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
832 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
833 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
834 cookie=0x1, in_port=1 actions=output:1
835 cookie=0x2, table=1, in_port=2 actions=output:1
838 AT_CHECK([ovs-ofctl del-flows br0 table=0])
839 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
840 cookie=0x2, table=1, in_port=2 actions=output:1
843 AT_CHECK([ovs-ofctl del-flows br0 table=1])
844 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
847 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1])
848 AT_CHECK([ovs-ofctl add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
849 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
850 cookie=0x1, in_port=1 actions=output:1
851 cookie=0x2, table=1, in_port=2 actions=output:1
854 AT_CHECK([ovs-ofctl del-flows br0])
855 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
861 AT_SETUP([ofproto - del flows based on table id (OpenFlow 1.1)])
863 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
864 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
865 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
866 cookie=0x1, in_port=1 actions=output:1
867 cookie=0x2, table=1, in_port=2 actions=output:1
868 OFPST_FLOW reply (OF1.1):
870 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0 table=0])
871 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
872 cookie=0x2, table=1, in_port=2 actions=output:1
873 OFPST_FLOW reply (OF1.1):
875 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0 table=1])
876 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
877 OFPST_FLOW reply (OF1.1):
879 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x1,in_port=1,actions=1])
880 AT_CHECK([ovs-ofctl -O OpenFlow11 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
881 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip | sort], [0], [dnl
882 cookie=0x1, in_port=1 actions=output:1
883 cookie=0x2, table=1, in_port=2 actions=output:1
884 OFPST_FLOW reply (OF1.1):
886 AT_CHECK([ovs-ofctl -O OpenFlow11 del-flows br0])
887 AT_CHECK([ovs-ofctl -O OpenFlow11 dump-flows br0 | ofctl_strip], [0], [dnl
888 OFPST_FLOW reply (OF1.1):
889 cookie=0x2, table=1, in_port=2 actions=output:1
894 AT_SETUP([ofproto - del flows based on table id (OpenFlow 1.2)])
896 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
897 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
898 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
899 cookie=0x1, in_port=1 actions=output:1
900 cookie=0x2, table=1, in_port=2 actions=output:1
901 OFPST_FLOW reply (OF1.2):
903 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0 table=0])
904 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
905 cookie=0x2, table=1, in_port=2 actions=output:1
906 OFPST_FLOW reply (OF1.2):
908 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0 table=1])
909 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
910 OFPST_FLOW reply (OF1.2):
912 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x1,in_port=1,actions=1])
913 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 cookie=0x2,in_port=2,table=1,actions=1])
914 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
915 cookie=0x1, in_port=1 actions=output:1
916 cookie=0x2, table=1, in_port=2 actions=output:1
917 OFPST_FLOW reply (OF1.2):
919 AT_CHECK([ovs-ofctl -O OpenFlow12 del-flows br0])
920 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
921 OFPST_FLOW reply (OF1.2):
926 AT_SETUP([ofproto - flow table configuration (OpenFlow 1.0)])
928 # Check the default configuration.
929 (echo "OFPST_TABLE reply (xid=0x2): 254 tables
930 0: classifier: wild=0x3fffff, max=1000000, active=0
933 while test $x -lt 254; do
934 printf " %d: %-8s: wild=0x3fffff, max=1000000, active=0
939 AT_CHECK([ovs-ofctl dump-tables br0], [0], [expout])
940 # Change the configuration.
943 -- --id=@t0 create Flow_Table name=main \
944 -- --id=@t1 create Flow_Table flow-limit=1024 \
945 -- set bridge br0 'flow_tables={1=@t1,0=@t0}' \
946 | ${PERL} $srcdir/uuidfilt.pl],
950 # Check that the configuration was updated.
951 mv expout orig-expout
952 (echo "OFPST_TABLE reply (xid=0x2): 254 tables
953 0: main : wild=0x3fffff, max=1000000, active=0
955 1: table1 : wild=0x3fffff, max= 1024, active=0
957 tail -n +6 orig-expout) > expout
958 AT_CHECK([ovs-ofctl dump-tables br0], [0], [expout])
962 AT_SETUP([ofproto - flow table configuration (OpenFlow 1.2)])
964 # Check the default configuration.
965 (mid="wild=0xfffffffff, max=1000000,"
968 match=0xfffffffff, instructions=0x00000007, config=0x00000003
969 write_actions=0x00000000, apply_actions=0x00000000
970 write_setfields=0x0000000fffffffff
971 apply_setfields=0x0000000fffffffff
972 metadata_match=0xffffffffffffffff
973 metadata_write=0xffffffffffffffff"
974 echo "OFPST_TABLE reply (OF1.2) (xid=0x2): 254 tables
975 0: classifier: $mid active=0$tail"
977 while test $x -lt 254; do
978 printf " %d: %-8s: $mid active=0$tail
982 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-tables br0], [0], [expout])
983 # Change the configuration.
986 -- --id=@t0 create Flow_Table name=main \
987 -- --id=@t1 create Flow_Table flow-limit=1024 \
988 -- set bridge br0 'flow_tables={1=@t1,0=@t0}' \
989 | ${PERL} $srcdir/uuidfilt.pl],
993 # Check that the configuration was updated.
994 mv expout orig-expout
995 (echo "OFPST_TABLE reply (OF1.2) (xid=0x2): 254 tables
996 0: main : wild=0xfffffffff, max=1000000, active=0"
997 tail -n +3 orig-expout | head -7
998 echo " 1: table1 : wild=0xfffffffff, max= 1024, active=0"
999 tail -n +11 orig-expout) > expout
1000 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-tables br0], [0], [expout])
1004 AT_SETUP([ofproto - hard limits on flow table size (OpenFlow 1.0)])
1006 # Configure a maximum of 4 flows.
1009 -- --id=@t0 create Flow_Table flow-limit=4 \
1010 -- set bridge br0 flow_tables:0=@t0 \
1011 | ${PERL} $srcdir/uuidfilt.pl],
1015 for in_port in 1 2 3 4; do
1016 ovs-ofctl add-flow br0 in_port=$in_port,actions=drop
1018 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1019 in_port=1 actions=drop
1020 in_port=2 actions=drop
1021 in_port=3 actions=drop
1022 in_port=4 actions=drop
1025 # Adding another flow will be refused.
1026 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop], [1], [], [stderr])
1027 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1028 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1030 # Also a mod-flow that would add a flow will be refused.
1031 AT_CHECK([ovs-ofctl mod-flows br0 in_port=5,actions=drop], [1], [], [stderr])
1032 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1033 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1035 # Replacing or modifying an existing flow is allowed.
1036 AT_CHECK([ovs-ofctl add-flow br0 in_port=4,actions=normal])
1037 AT_CHECK([ovs-ofctl mod-flows br0 in_port=3,actions=output:1])
1038 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1039 in_port=1 actions=drop
1040 in_port=2 actions=drop
1041 in_port=3 actions=output:1
1042 in_port=4 actions=NORMAL
1048 AT_SETUP([ofproto - hard limits on flow table size (OpenFlow 1.2)])
1050 # Configure a maximum of 4 flows.
1053 -- --id=@t0 create Flow_Table flow-limit=4 \
1054 -- set bridge br0 flow_tables:0=@t0 \
1055 | ${PERL} $srcdir/uuidfilt.pl],
1059 for in_port in 1 2 3 4; do
1060 ovs-ofctl -O OpenFlow12 add-flow br0 in_port=$in_port,actions=drop
1062 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1063 in_port=1 actions=drop
1064 in_port=2 actions=drop
1065 in_port=3 actions=drop
1066 in_port=4 actions=drop
1067 OFPST_FLOW reply (OF1.2):
1069 # Adding another flow will be refused.
1070 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=5,actions=drop], [1], [], [stderr])
1071 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1072 [OFPT_ERROR (OF1.2): OFPFMFC_TABLE_FULL
1074 # Replacing or modifying an existing flow is allowed.
1075 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=4,actions=normal])
1076 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=3,actions=output:1])
1077 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1078 in_port=1 actions=drop
1079 in_port=2 actions=drop
1080 in_port=3 actions=output:1
1081 in_port=4 actions=NORMAL
1082 OFPST_FLOW reply (OF1.2):
1087 AT_SETUP([ofproto - eviction upon table overflow (OpenFlow 1.0)])
1089 # Configure a maximum of 4 flows.
1092 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1093 -- set bridge br0 flow_tables:0=@t0 \
1094 | ${PERL} $srcdir/uuidfilt.pl],
1098 for in_port in 4 3 2 1; do
1099 ovs-ofctl add-flow br0 idle_timeout=${in_port}0,in_port=$in_port,actions=drop
1101 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1102 idle_timeout=10, in_port=1 actions=drop
1103 idle_timeout=20, in_port=2 actions=drop
1104 idle_timeout=30, in_port=3 actions=drop
1105 idle_timeout=40, in_port=4 actions=drop
1108 # Adding another flow will cause the one that expires soonest to be evicted.
1109 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1110 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1111 idle_timeout=20, in_port=2 actions=drop
1112 idle_timeout=30, in_port=3 actions=drop
1113 idle_timeout=40, in_port=4 actions=drop
1114 in_port=5 actions=drop
1117 # A mod-flow that adds a flow also causes eviction, but replacing or
1118 # modifying an existing flow doesn't.
1119 AT_CHECK([ovs-ofctl mod-flows br0 in_port=6,actions=drop])
1120 AT_CHECK([ovs-ofctl add-flow br0 in_port=4,actions=normal])
1121 AT_CHECK([ovs-ofctl mod-flows br0 in_port=3,actions=output:1])
1122 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1123 idle_timeout=30, in_port=3 actions=output:1
1124 in_port=4 actions=NORMAL
1125 in_port=5 actions=drop
1126 in_port=6 actions=drop
1129 # Flows with no timeouts at all cannot be evicted.
1130 AT_CHECK([ovs-ofctl add-flow br0 in_port=7,actions=normal])
1131 AT_CHECK([ovs-ofctl add-flow br0 in_port=8,actions=drop], [1], [], [stderr])
1132 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1133 [OFPT_ERROR: OFPFMFC_TABLE_FULL
1135 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1136 in_port=4 actions=NORMAL
1137 in_port=5 actions=drop
1138 in_port=6 actions=drop
1139 in_port=7 actions=NORMAL
1145 AT_SETUP([ofproto - eviction upon table overflow (OpenFlow 1.2)])
1147 # Configure a maximum of 4 flows.
1150 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1151 -- set bridge br0 flow_tables:0=@t0 \
1152 | ${PERL} $srcdir/uuidfilt.pl],
1156 for in_port in 4 3 2 1; do
1157 ovs-ofctl -O OpenFlow12 add-flow br0 idle_timeout=${in_port}0,in_port=$in_port,actions=drop
1159 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1160 idle_timeout=10, in_port=1 actions=drop
1161 idle_timeout=20, in_port=2 actions=drop
1162 idle_timeout=30, in_port=3 actions=drop
1163 idle_timeout=40, in_port=4 actions=drop
1164 OFPST_FLOW reply (OF1.2):
1166 # Adding another flow will cause the one that expires soonest to be evicted.
1167 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=5,actions=drop])
1168 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1169 idle_timeout=20, in_port=2 actions=drop
1170 idle_timeout=30, in_port=3 actions=drop
1171 idle_timeout=40, in_port=4 actions=drop
1172 in_port=5 actions=drop
1173 OFPST_FLOW reply (OF1.2):
1175 # In Open Flow 1.2 a mod-flow does not ever add a flow and thus
1176 # has no effect on eviction
1177 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=6,actions=drop])
1178 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=4,actions=normal])
1179 AT_CHECK([ovs-ofctl -O OpenFlow12 mod-flows br0 in_port=3,actions=output:1])
1180 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1181 idle_timeout=20, in_port=2 actions=drop
1182 idle_timeout=30, in_port=3 actions=output:1
1183 in_port=4 actions=NORMAL
1184 in_port=5 actions=drop
1185 OFPST_FLOW reply (OF1.2):
1187 # Flows with no timeouts at all cannot be evicted.
1188 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=6,actions=drop])
1189 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=7,actions=normal])
1190 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=8,actions=drop], [1], [], [stderr])
1191 AT_CHECK([head -n 1 stderr | ofctl_strip], [0],
1192 [OFPT_ERROR (OF1.2): OFPFMFC_TABLE_FULL
1194 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1195 in_port=4 actions=NORMAL
1196 in_port=5 actions=drop
1197 in_port=6 actions=drop
1198 in_port=7 actions=NORMAL
1199 OFPST_FLOW reply (OF1.2):
1204 AT_SETUP([ofproto - eviction upon table overflow, with fairness (OpenFlow 1.0)])
1206 # Configure a maximum of 4 flows.
1209 -- --id=@t0 create Flow_Table name=evict flow-limit=4 \
1210 overflow-policy=evict \
1211 groups='"NXM_OF_IN_PORT[[]]"' \
1212 -- set bridge br0 flow_tables:0=@t0 \
1213 | ${PERL} $srcdir/uuidfilt.pl],
1217 ovs-ofctl add-flows br0 - <<EOF
1218 idle_timeout=10 in_port=2 dl_src=00:44:55:66:77:88 actions=drop
1219 idle_timeout=20 in_port=1 dl_src=00:11:22:33:44:55 actions=drop
1220 idle_timeout=30 in_port=1 dl_src=00:22:33:44:55:66 actions=drop
1221 idle_timeout=40 in_port=1 dl_src=00:33:44:55:66:77 actions=drop
1223 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1224 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1225 idle_timeout=20, in_port=1,dl_src=00:11:22:33:44:55 actions=drop
1226 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1227 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1230 # Adding another flow will cause the one that expires soonest within
1231 # the largest group (those with in_port=1) to be evicted. In this
1232 # case this is not the same as the one that expires soonest overall
1233 # (which is what makes the test interesting):
1234 AT_CHECK([ovs-ofctl add-flow br0 in_port=2,dl_src=00:55:66:77:88:99,actions=drop])
1235 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1236 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1237 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1238 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1239 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1242 # Enlarge the flow limit, change the eviction policy back to strictly
1243 # based on expiration, and and add some flows.
1244 AT_CHECK([ovs-vsctl set Flow_Table evict groups='[[]]' flow-limit=7])
1245 ovs-ofctl add-flows br0 - <<EOF
1246 idle_timeout=50 in_port=2 dl_src=00:66:77:88:99:aa actions=drop
1247 idle_timeout=60 in_port=2 dl_src=00:77:88:99:aa:bb actions=drop
1248 idle_timeout=70 in_port=2 dl_src=00:88:99:aa:bb:cc actions=drop
1250 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1251 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1252 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1253 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1254 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1255 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1256 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1257 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1260 # Adding another flow will cause the one that expires soonest overall
1262 AT_CHECK([ovs-ofctl add-flow br0 'idle_timeout=80 in_port=2 dl_src=00:99:aa:bb:cc:dd actions=drop'])
1263 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1264 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1265 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1266 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1267 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1268 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1269 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1270 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1273 # Reducing the flow limit also causes the flows that expire soonest
1274 # overall to be evicted.
1275 AT_CHECK([ovs-vsctl set Flow_Table evict flow-limit=4])
1276 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1277 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1278 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1279 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1280 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1286 AT_SETUP([ofproto - eviction upon table overflow, with fairness (OpenFlow 1.2)])
1288 # Configure a maximum of 4 flows.
1291 -- --id=@t0 create Flow_Table name=evict flow-limit=4 \
1292 overflow-policy=evict \
1293 groups='"NXM_OF_IN_PORT[[]]"' \
1294 -- set bridge br0 flow_tables:0=@t0 \
1295 | ${PERL} $srcdir/uuidfilt.pl],
1299 ovs-ofctl -O OpenFlow12 add-flows br0 - <<EOF
1300 idle_timeout=10 in_port=2 dl_src=00:44:55:66:77:88 actions=drop
1301 idle_timeout=20 in_port=1 dl_src=00:11:22:33:44:55 actions=drop
1302 idle_timeout=30 in_port=1 dl_src=00:22:33:44:55:66 actions=drop
1303 idle_timeout=40 in_port=1 dl_src=00:33:44:55:66:77 actions=drop
1305 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1306 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1307 idle_timeout=20, in_port=1,dl_src=00:11:22:33:44:55 actions=drop
1308 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1309 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1310 OFPST_FLOW reply (OF1.2):
1312 # Adding another flow will cause the one that expires soonest within
1313 # the largest group (those with in_port=1) to be evicted. In this
1314 # case this is not the same as the one that expires soonest overall
1315 # (which is what makes the test interesting):
1316 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 in_port=2,dl_src=00:55:66:77:88:99,actions=drop])
1317 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1318 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1319 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1320 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1321 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1322 OFPST_FLOW reply (OF1.2):
1324 # Enlarge the flow limit, change the eviction policy back to strictly
1325 # based on expiration, and and add some flows.
1326 AT_CHECK([ovs-vsctl set Flow_Table evict groups='[[]]' flow-limit=7])
1327 ovs-ofctl -O OpenFlow12 add-flows br0 - <<EOF
1328 idle_timeout=50 in_port=2 dl_src=00:66:77:88:99:aa actions=drop
1329 idle_timeout=60 in_port=2 dl_src=00:77:88:99:aa:bb actions=drop
1330 idle_timeout=70 in_port=2 dl_src=00:88:99:aa:bb:cc actions=drop
1332 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1333 idle_timeout=10, in_port=2,dl_src=00:44:55:66:77:88 actions=drop
1334 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1335 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1336 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1337 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1338 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1339 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1340 OFPST_FLOW reply (OF1.2):
1342 # Adding another flow will cause the one that expires soonest overall
1344 AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 'idle_timeout=80 in_port=2 dl_src=00:99:aa:bb:cc:dd actions=drop'])
1345 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1346 idle_timeout=30, in_port=1,dl_src=00:22:33:44:55:66 actions=drop
1347 idle_timeout=40, in_port=1,dl_src=00:33:44:55:66:77 actions=drop
1348 idle_timeout=50, in_port=2,dl_src=00:66:77:88:99:aa actions=drop
1349 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1350 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1351 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1352 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1353 OFPST_FLOW reply (OF1.2):
1355 # Reducing the flow limit also causes the flows that expire soonest
1356 # overall to be evicted.
1357 AT_CHECK([ovs-vsctl set Flow_Table evict flow-limit=4])
1358 AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], [dnl
1359 idle_timeout=60, in_port=2,dl_src=00:77:88:99:aa:bb actions=drop
1360 idle_timeout=70, in_port=2,dl_src=00:88:99:aa:bb:cc actions=drop
1361 idle_timeout=80, in_port=2,dl_src=00:99:aa:bb:cc:dd actions=drop
1362 in_port=2,dl_src=00:55:66:77:88:99 actions=drop
1363 OFPST_FLOW reply (OF1.2):
1368 AT_SETUP([ofproto - eviction upon table overflow, with modified hard timeout])
1370 # Configure a maximum of 4 flows.
1373 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1374 -- set bridge br0 flow_tables:0=@t0 \
1375 | ${PERL} $srcdir/uuidfilt.pl],
1379 for in_port in 4 3 2 1; do
1380 ovs-ofctl add-flow br0 hard_timeout=1${in_port},in_port=$in_port,actions=drop
1382 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1383 hard_timeout=11, in_port=1 actions=drop
1384 hard_timeout=12, in_port=2 actions=drop
1385 hard_timeout=13, in_port=3 actions=drop
1386 hard_timeout=14, in_port=4 actions=drop
1389 # Sleep and modify the one that expires soonest
1391 AT_CHECK([ovs-ofctl mod-flows br0 in_port=1,actions=drop])
1393 # Adding another flow will cause the one that expires soonest to be evicted.
1394 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1395 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1396 hard_timeout=11, in_port=1 actions=drop
1397 hard_timeout=13, in_port=3 actions=drop
1398 hard_timeout=14, in_port=4 actions=drop
1399 in_port=5 actions=drop
1405 AT_SETUP([ofproto - eviction upon table overflow, with modified idle timeout])
1406 OVS_VSWITCHD_START([add-port br0 p1 -- set interface p1 type=dummy ofport_request=1])
1407 # Configure a maximum of 4 flows.
1410 -- --id=@t0 create Flow_Table flow-limit=4 overflow-policy=evict \
1411 -- set bridge br0 flow_tables:0=@t0 \
1412 | ${PERL} $srcdir/uuidfilt.pl],
1416 for in_port in 4 3 2 1; do
1417 ovs-ofctl add-flow br0 idle_timeout=1${in_port},in_port=$in_port,actions=drop
1419 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1420 idle_timeout=11, in_port=1 actions=drop
1421 idle_timeout=12, in_port=2 actions=drop
1422 idle_timeout=13, in_port=3 actions=drop
1423 idle_timeout=14, in_port=4 actions=drop
1426 # Sleep and receive on the flow that expires soonest
1428 AT_CHECK([ovs-appctl netdev-dummy/receive p1 'in_port(1)'])
1430 # Adding another flow will cause the one that expires soonest to be evicted.
1431 AT_CHECK([ovs-ofctl add-flow br0 in_port=5,actions=drop])
1432 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl
1433 idle_timeout=13, in_port=3 actions=drop
1434 idle_timeout=14, in_port=4 actions=drop
1435 in_port=5 actions=drop
1436 n_packets=1, n_bytes=60, idle_timeout=11, in_port=1 actions=drop
1442 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.0)])
1444 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
1446 printf '\n\n--- check_async %d ---\n\n\n' $1
1449 ovs-appctl -t ovs-ofctl ofctl/barrier
1450 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1453 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1454 ovs-ofctl -v packet-out br0 controller controller '0001020304050010203040501234'
1455 if test X"$1" = X"OFPR_ACTION"; then shift;
1456 echo >>expout "OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1457 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1460 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1461 ovs-ofctl -v packet-out br0 controller 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1462 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1463 echo >>expout "OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via no_match) data_len=14 (unbuffered)
1464 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1467 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1468 ovs-ofctl packet-out br0 controller dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1469 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1470 echo >>expout "OFPT_PACKET_IN: total_len=76 in_port=CONTROLLER (via invalid_ttl) data_len=76 (unbuffered)
1471 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1474 # OFPT_PORT_STATUS, OFPPR_ADD
1475 ovs-vsctl add-port br0 test -- set Interface test type=dummy ofport_request=1
1476 if test X"$1" = X"OFPPR_ADD"; then shift;
1477 echo >>expout "OFPT_PORT_STATUS: ADD: 1(test): addr:aa:55:aa:55:00:0x
1480 speed: 0 Mbps now, 0 Mbps max"
1483 # OFPT_PORT_STATUS, OFPPR_DELETE
1484 ovs-vsctl del-port br0 test
1485 if test X"$1" = X"OFPPR_DELETE"; then shift;
1486 echo >>expout "OFPT_PORT_STATUS: DEL: 1(test): addr:aa:55:aa:55:00:0x
1489 speed: 0 Mbps now, 0 Mbps max"
1492 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1493 ovs-ofctl add-flow br0 send_flow_rem,actions=drop
1494 ovs-ofctl --strict del-flows br0 ''
1495 if test X"$1" = X"OFPRR_DELETE"; then shift;
1496 echo >>expout "OFPT_FLOW_REMOVED: reason=delete"
1498 AT_FAIL_IF([test X"$1" != X])
1500 ovs-appctl -t ovs-ofctl ofctl/barrier
1501 echo >>expout "OFPT_BARRIER_REPLY:"
1505 s/ (xid=0x[0-9a-fA-F]*)//
1507 s/00:0.$/00:0x/' < monitor.log]],
1511 # It's a service connection so initially there should be no async messages.
1514 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1515 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
1516 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1518 # Set miss_send_len to 128 and enable invalid_ttl.
1519 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700040080
1520 check_async 3 OFPR_ACTION OFPR_INVALID_TTL OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1522 # Become slave, which should disable everything except port status.
1523 ovs-appctl -t ovs-ofctl ofctl/send 0104001400000002000023200000000a00000002
1524 check_async 4 OFPPR_ADD OFPPR_DELETE
1526 # Use NXT_SET_ASYNC_CONFIG to enable a patchwork of asynchronous messages.
1527 ovs-appctl -t ovs-ofctl ofctl/send 01040028000000020000232000000013000000020000000500000005000000020000000200000005
1528 check_async 5 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1530 # Set controller ID 123.
1531 ovs-appctl -t ovs-ofctl ofctl/send 01040018000000030000232000000014000000000000007b
1532 check_async 6 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1534 # Restore controller ID 0.
1535 ovs-appctl -t ovs-ofctl ofctl/send 010400180000000300002320000000140000000000000000
1538 ovs-appctl -t ovs-ofctl ofctl/send 0104001400000002000023200000000a00000001
1539 check_async 7 OFPR_ACTION OFPPR_ADD
1541 ovs-appctl -t ovs-ofctl exit
1545 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.2)])
1547 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1549 printf '\n\n--- check_async %d ---\n\n\n' $1
1553 ovs-appctl -t ovs-ofctl ofctl/barrier
1554 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1557 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1558 ovs-ofctl -O OpenFlow12 -v packet-out br0 none controller '0001020304050010203040501234'
1559 if test X"$1" = X"OFPR_ACTION"; then shift;
1560 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1561 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1564 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1565 ovs-ofctl -O OpenFlow12 -v packet-out br0 none 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1566 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1567 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via no_match) data_len=14 (unbuffered)
1568 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1571 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1572 ovs-ofctl -O OpenFlow12 packet-out br0 none dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1573 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1574 echo >>expout "OFPT_PACKET_IN (OF1.2): total_len=76 in_port=ANY (via invalid_ttl) data_len=76 (unbuffered)
1575 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1578 # OFPT_PORT_STATUS, OFPPR_ADD
1579 ovs-vsctl add-port br0 test -- set Interface test type=dummy
1580 if test X"$1" = X"OFPPR_ADD"; then shift;
1581 echo >>expout "OFPT_PORT_STATUS (OF1.2): ADD: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1584 speed: 0 Mbps now, 0 Mbps max"
1587 # OFPT_PORT_STATUS, OFPPR_DELETE
1588 ovs-vsctl del-port br0 test
1589 if test X"$1" = X"OFPPR_DELETE"; then shift;
1590 echo >>expout "OFPT_PORT_STATUS (OF1.2): DEL: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1593 speed: 0 Mbps now, 0 Mbps max"
1596 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1597 ovs-ofctl -O OpenFlow12 add-flow br0 send_flow_rem,actions=drop
1598 ovs-ofctl -O OpenFlow12 --strict del-flows br0 ''
1599 if test X"$1" = X"OFPRR_DELETE"; then shift;
1600 echo >>expout "OFPT_FLOW_REMOVED (OF1.2): reason=delete table_id=0"
1602 AT_FAIL_IF([test X"$1" != X])
1604 ovs-appctl -t ovs-ofctl ofctl/barrier
1605 echo >>expout "OFPT_BARRIER_REPLY (OF1.2):"
1609 s/ (xid=0x[0-9a-fA-F]*)//
1611 s/00:0.$/00:0x/' < monitor.log]],
1615 # It's a service connection so initially there should be no async messages.
1618 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1619 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
1620 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1622 # Set miss_send_len to 128 and enable invalid_ttl.
1623 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700040080
1624 check_async 3 OFPR_ACTION OFPR_INVALID_TTL OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1626 # Become slave (OF 1.2), which should disable everything except port status.
1627 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000200000003000000000000000000000001
1628 check_async 4 OFPPR_ADD OFPPR_DELETE
1630 # Use NXT_SET_ASYNC_CONFIG to enable a patchwork of asynchronous messages.
1631 ovs-appctl -t ovs-ofctl ofctl/send 03040028000000020000232000000013000000020000000500000005000000020000000200000005
1632 check_async 5 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1634 # Set controller ID 123.
1635 ovs-appctl -t ovs-ofctl ofctl/send 03040018000000030000232000000014000000000000007b
1636 check_async 6 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1638 # Restore controller ID 0.
1639 ovs-appctl -t ovs-ofctl ofctl/send 030400180000000300002320000000140000000000000000
1641 # Become master (OF 1.2).
1642 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000400000002000000000000000000000002
1643 check_async 7 OFPR_ACTION OFPPR_ADD
1645 ovs-appctl -t ovs-ofctl exit
1649 AT_SETUP([ofproto - asynchronous message control (OpenFlow 1.3)])
1651 AT_CHECK([ovs-ofctl -O OpenFlow13 monitor br0 --detach --no-chdir --pidfile])
1653 printf '\n\n--- check_async %d ---\n\n\n' $1
1657 ovs-appctl -t ovs-ofctl ofctl/barrier
1658 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1661 # OFPT_PACKET_IN, OFPR_ACTION (controller_id=0)
1662 ovs-ofctl -O OpenFlow13 -v packet-out br0 none controller '0001020304050010203040501234'
1663 if test X"$1" = X"OFPR_ACTION"; then shift;
1664 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1665 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1668 # OFPT_PACKET_IN, OFPR_NO_MATCH (controller_id=123)
1669 ovs-ofctl -O OpenFlow13 -v packet-out br0 none 'controller(reason=no_match,id=123)' '0001020304050010203040501234'
1670 if test X"$1" = X"OFPR_NO_MATCH"; then shift;
1671 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=14 in_port=ANY (via no_match) data_len=14 (unbuffered)
1672 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234"
1675 # OFPT_PACKET_IN, OFPR_INVALID_TTL (controller_id=0)
1676 ovs-ofctl -O OpenFlow13 packet-out br0 none dec_ttl '002583dfb4000026b98cb0f908004500003fb7e200000011339bac11370dac100002d7730035002b8f6d86fb0100000100000000000006626c702d7873066e696369726103636f6d00000f00'
1677 if test X"$1" = X"OFPR_INVALID_TTL"; then shift;
1678 echo >>expout "OFPT_PACKET_IN (OF1.3): total_len=76 in_port=ANY (via invalid_ttl) data_len=76 (unbuffered)
1679 udp,metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:26:b9:8c:b0:f9,dl_dst=00:25:83:df:b4:00,nw_src=172.17.55.13,nw_dst=172.16.0.2,nw_tos=0,nw_ecn=0,nw_ttl=0,tp_src=55155,tp_dst=53 udp_csum:8f6d"
1682 # OFPT_PORT_STATUS, OFPPR_ADD
1683 ovs-vsctl add-port br0 test -- set Interface test type=dummy
1684 if test X"$1" = X"OFPPR_ADD"; then shift;
1685 echo >>expout "OFPT_PORT_STATUS (OF1.3): ADD: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1688 speed: 0 Mbps now, 0 Mbps max"
1691 # OFPT_PORT_STATUS, OFPPR_DELETE
1692 ovs-vsctl del-port br0 test
1693 if test X"$1" = X"OFPPR_DELETE"; then shift;
1694 echo >>expout "OFPT_PORT_STATUS (OF1.3): DEL: ${INDEX}(test): addr:aa:55:aa:55:00:0x
1697 speed: 0 Mbps now, 0 Mbps max"
1700 # OFPT_FLOW_REMOVED, OFPRR_DELETE
1701 ovs-ofctl -O OpenFlow13 add-flow br0 send_flow_rem,actions=drop
1702 ovs-ofctl -O OpenFlow13 --strict del-flows br0 ''
1703 if test X"$1" = X"OFPRR_DELETE"; then shift;
1704 echo >>expout "OFPT_FLOW_REMOVED (OF1.3): reason=delete table_id=0"
1706 AT_FAIL_IF([test X"$1" != X])
1708 ovs-appctl -t ovs-ofctl ofctl/barrier
1709 echo >>expout "OFPT_BARRIER_REPLY (OF1.3):"
1713 s/ (xid=0x[0-9a-fA-F]*)//
1715 s/00:0.$/00:0x/' < monitor.log]],
1719 # It's a service connection so initially there should be no async messages.
1722 # Set miss_send_len to 128, turning on packet-ins for our service connection.
1723 ovs-appctl -t ovs-ofctl ofctl/send 0409000c0123456700000080
1724 check_async 2 OFPR_ACTION OFPPR_ADD OFPPR_DELETE OFPRR_DELETE
1726 # Become slave (OF 1.3), which should disable everything except port status.
1727 ovs-appctl -t ovs-ofctl ofctl/send 041800180000000200000003000000000000000000000001
1728 check_async 3 OFPPR_ADD OFPPR_DELETE
1730 # Use OF 1.3 OFPT_SET_ASYNC to enable a patchwork of asynchronous messages.
1731 ovs-appctl -t ovs-ofctl ofctl/send 041c002000000002000000020000000500000005000000020000000200000005
1732 check_async 4 OFPR_INVALID_TTL OFPPR_DELETE OFPRR_DELETE
1734 # Set controller ID 123.
1735 ovs-appctl -t ovs-ofctl ofctl/send 04040018000000030000232000000014000000000000007b
1736 check_async 5 OFPR_NO_MATCH OFPPR_DELETE OFPRR_DELETE
1738 # Restore controller ID 0.
1739 ovs-appctl -t ovs-ofctl ofctl/send 040400180000000300002320000000140000000000000000
1741 # Become master (OF 1.3).
1742 ovs-appctl -t ovs-ofctl ofctl/send 041800180000000400000002000000000000000000000002
1743 check_async 6 OFPR_ACTION OFPPR_ADD
1745 ovs-appctl -t ovs-ofctl exit
1749 dnl This test checks that the role request/response messaging works
1750 dnl and that generation_id is handled properly.
1751 AT_SETUP([ofproto - controller role (OpenFlow 1.2)])
1753 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1755 ovs-appctl -t ovs-ofctl ofctl/barrier
1756 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1760 # find out current role
1761 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000200000000000000000000000000000000
1762 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x2): role=nochange"
1763 echo >>expout "OFPT_ROLE_REPLY (OF1.2) (xid=0x2): role=equal"
1765 # Become slave (generation_id is initially undefined, so 2^63+2 should not be stale)
1766 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000300000003000000008000000000000002
1767 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x3): role=slave generation_id=9223372036854775810"
1768 echo >>expout "OFPT_ROLE_REPLY (OF1.2) (xid=0x3): role=slave generation_id=9223372036854775810"
1770 # Try to become the master using a stale generation ID
1771 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000400000002000000000000000000000002
1772 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x4): role=master generation_id=2"
1773 echo >>expout "OFPT_ERROR (OF1.2) (xid=0x4): OFPRRFC_STALE"
1774 echo >>expout "OFPT_ROLE_REQUEST (OF1.2) (xid=0x4): role=master generation_id=2"
1776 # Become master using a valid generation ID
1777 ovs-appctl -t ovs-ofctl ofctl/send 031800180000000500000002000000000000000000000001
1778 echo >>experr "send: OFPT_ROLE_REQUEST (OF1.2) (xid=0x5): role=master generation_id=1"
1779 echo >>expout "OFPT_ROLE_REPLY (OF1.2) (xid=0x5): role=master generation_id=1"
1780 ovs-appctl -t ovs-ofctl ofctl/barrier
1781 echo >>expout "OFPT_BARRIER_REPLY (OF1.2) (xid=0x3):"
1783 AT_CHECK([grep -v '^send:' monitor.log], [0], [expout])
1785 AT_CHECK([grep '^send:' monitor.log], [0], [expout])
1787 ovs-appctl -t ovs-ofctl exit
1791 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
1792 dnl specified by OpenFlow 1.0) and OFPP_CONTROLLER (used by some
1793 dnl controllers despite the spec) as meaning a packet that was generated
1794 dnl by the controller.
1795 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.0)])
1797 ADD_OF_PORTS([br0], [1])
1799 # Start a monitor listening for packet-ins.
1800 AT_CHECK([ovs-ofctl -P openflow10 monitor br0 --detach --no-chdir --pidfile])
1801 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
1802 ovs-appctl -t ovs-ofctl ofctl/barrier
1803 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1804 AT_CAPTURE_FILE([monitor.log])
1806 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
1807 AT_CHECK([ovs-ofctl packet-out br0 none controller,1 '0001020304050010203040501234'])
1808 AT_CHECK([ovs-ofctl packet-out br0 controller controller,1 '0001020304050010203040505678'])
1810 # Stop the monitor and check its output.
1811 ovs-appctl -t ovs-ofctl ofctl/barrier
1812 ovs-appctl -t ovs-ofctl exit
1814 ovs-ofctl dump-ports br0
1816 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1817 OFPT_PACKET_IN: total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1818 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1819 OFPT_PACKET_IN: total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1820 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
1827 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
1828 dnl specified by OpenFlow 1.2) and OFPP_CONTROLLER (used by some
1829 dnl controllers despite the spec) as meaning a packet that was generated
1830 dnl by the controller.
1831 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.2)])
1834 # Start a monitor listening for packet-ins.
1835 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1836 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
1837 ovs-appctl -t ovs-ofctl ofctl/barrier
1838 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1839 AT_CAPTURE_FILE([monitor.log])
1841 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
1842 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none controller '0001020304050010203040501234'])
1843 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 4294967293 controller '0001020304050010203040505678'])
1845 # Stop the monitor and check its output.
1846 ovs-appctl -t ovs-ofctl ofctl/barrier
1847 ovs-appctl -t ovs-ofctl exit
1849 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1850 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1851 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1852 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1853 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
1854 OFPT_BARRIER_REPLY (OF1.2):
1860 dnl This test checks that OFPT_PACKET_OUT accepts both OFPP_NONE (as
1861 dnl specified by OpenFlow 1.1) and OFPP_CONTROLLER (used by some
1862 dnl controllers despite the spec) as meaning a packet that was generated
1863 dnl by the controller.
1864 AT_SETUP([ofproto - packet-out from controller (OpenFlow 1.1)])
1867 # Start a monitor listening for packet-ins.
1868 AT_CHECK([ovs-ofctl -O OpenFlow11 monitor br0 --detach --no-chdir --pidfile])
1869 ovs-appctl -t ovs-ofctl ofctl/send 0209000c0123456700000080
1870 ovs-appctl -t ovs-ofctl ofctl/barrier
1871 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1872 AT_CAPTURE_FILE([monitor.log])
1874 # Send some packet-outs with OFPP_NONE and OFPP_CONTROLLER (65533) as in_port.
1875 AT_CHECK([ovs-ofctl -O OpenFlow11 packet-out br0 none controller '0001020304050010203040501234'])
1876 AT_CHECK([ovs-ofctl -O OpenFlow11 packet-out br0 4294967293 controller '0001020304050010203040505678'])
1878 # Stop the monitor and check its output.
1879 ovs-appctl -t ovs-ofctl ofctl/barrier
1880 ovs-appctl -t ovs-ofctl exit
1882 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1883 OFPT_PACKET_IN (OF1.1): total_len=14 in_port=ANY (via action) data_len=14 (unbuffered)
1884 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1885 OFPT_PACKET_IN (OF1.1): total_len=14 in_port=CONTROLLER (via action) data_len=14 (unbuffered)
1886 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x5678
1887 OFPT_BARRIER_REPLY (OF1.1):
1893 dnl This test checks that metadata is encoded in packet_in structures,
1894 dnl supported by NXAST.
1895 AT_SETUP([ofproto - packet-out with metadata (NXM)])
1898 # Start a monitor listening for packet-ins.
1899 AT_CHECK([ovs-ofctl -P nxm monitor br0 --detach --no-chdir --pidfile])
1900 ovs-appctl -t ovs-ofctl ofctl/send 0109000c0123456700000080
1901 ovs-appctl -t ovs-ofctl ofctl/barrier
1902 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1903 AT_CAPTURE_FILE([monitor.log])
1905 # Send a packet-out with a load action to set some metadata, and forward to controller
1906 AT_CHECK([ovs-ofctl packet-out br0 controller 'load(0xfafafafa5a5a5a5a->OXM_OF_METADATA[[0..63]]), load(0xaa->NXM_NX_PKT_MARK[[]]), controller' '0001020304050010203040501234'])
1908 # Stop the monitor and check its output.
1909 ovs-appctl -t ovs-ofctl ofctl/barrier
1910 ovs-appctl -t ovs-ofctl exit
1912 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1913 NXT_PACKET_IN: total_len=14 in_port=CONTROLLER metadata=0xfafafafa5a5a5a5a pkt_mark=0xaa (via action) data_len=14 (unbuffered)
1914 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1921 dnl This test checks that metadata is encoded in packet_in structures,
1922 dnl supported by NXAST.
1923 AT_SETUP([ofproto - packet-out with metadata (OpenFlow 1.2)])
1926 # Start a monitor listening for packet-ins.
1927 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1928 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
1929 ovs-appctl -t ovs-ofctl ofctl/barrier
1930 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1931 AT_CAPTURE_FILE([monitor.log])
1933 # Send a packet-out with a load action to set some metadata, and forward to controller
1934 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none 'load(0xfafafafa5a5a5a5a->OXM_OF_METADATA[[0..63]]), controller' '0001020304050010203040501234'])
1936 # Stop the monitor and check its output.
1937 ovs-appctl -t ovs-ofctl ofctl/barrier
1938 ovs-appctl -t ovs-ofctl exit
1940 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1941 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY metadata=0xfafafafa5a5a5a5a (via action) data_len=14 (unbuffered)
1942 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1943 OFPT_BARRIER_REPLY (OF1.2):
1949 dnl This test checks that tunnel metadata is encoded in packet_in structures.
1950 AT_SETUP([ofproto - packet-out with tunnel metadata (OpenFlow 1.2)])
1953 # Start a monitor listening for packet-ins.
1954 AT_CHECK([ovs-ofctl -O OpenFlow12 monitor br0 --detach --no-chdir --pidfile])
1955 ovs-appctl -t ovs-ofctl ofctl/send 0309000c0123456700000080
1956 ovs-appctl -t ovs-ofctl ofctl/barrier
1957 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1958 AT_CAPTURE_FILE([monitor.log])
1960 # Send a packet-out with set field actions to set some tunnel metadata, and forward to controller
1961 AT_CHECK([ovs-ofctl -O OpenFlow12 packet-out br0 none 'set_field:127.0.0.1->tun_src,set_field:0x01020304->tun_id,set_field:192.168.0.1->tun_dst, controller' '0001020304050010203040501234'])
1963 # Stop the monitor and check its output.
1964 ovs-appctl -t ovs-ofctl ofctl/barrier
1965 ovs-appctl -t ovs-ofctl exit
1967 AT_CHECK([sed 's/ (xid=0x[[0-9a-fA-F]]*)//' monitor.log], [0], [dnl
1968 OFPT_PACKET_IN (OF1.2): total_len=14 in_port=ANY tun_id=0x1020304 tun_src=127.0.0.1 tun_dst=192.168.0.1 (via action) data_len=14 (unbuffered)
1969 metadata=0,in_port=0,vlan_tci=0x0000,dl_src=00:10:20:30:40:50,dl_dst=00:01:02:03:04:05,dl_type=0x1234
1970 OFPT_BARRIER_REPLY (OF1.2):
1976 AT_SETUP([ofproto - flow monitoring])
1977 AT_KEYWORDS([monitor])
1980 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:1
1982 # Start a monitor watching the flow table and check the initial reply.
1983 ovs-ofctl monitor br0 watch: --detach --no-chdir --pidfile >monitor.log 2>&1
1984 AT_CAPTURE_FILE([monitor.log])
1985 ovs-appctl -t ovs-ofctl ofctl/barrier
1986 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
1987 [NXST_FLOW_MONITOR reply:
1988 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:1
1992 # Add, delete, and modify some flows and check the updates.
1993 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
1994 ovs-ofctl add-flow br0 in_port=0,dl_vlan=124,actions=output:2
1995 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:5
1996 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,dl_vlan_pcp=0,actions=output:6
1997 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,dl_vlan_pcp=1,actions=output:7
1998 ovs-ofctl add-flow br0 in_port=0,dl_vlan=123,actions=output:8
1999 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,dl_vlan_pcp=0,actions=output:9
2000 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,dl_vlan_pcp=1,actions=output:10
2001 ovs-ofctl add-flow br0 in_port=0,dl_vlan=65535,actions=output:11
2002 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,dl_vlan_pcp=0,actions=output:12
2003 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,dl_vlan_pcp=1,actions=output:13
2004 ovs-ofctl add-flow br0 in_port=0,dl_vlan=8191,actions=output:14
2005 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=0,actions=output:15
2006 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=1,actions=output:16
2007 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,actions=output:17
2008 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=0,actions=output:18
2009 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,dl_vlan_pcp=1,actions=output:19
2010 ovs-ofctl add-flow br0 in_port=0,dl_vlan=0,actions=output:20
2011 ovs-ofctl add-flow br0 in_port=0,dl_vlan_pcp=0,actions=output:21
2012 ovs-ofctl add-flow br0 in_port=0,dl_vlan_pcp=1,actions=output:22
2013 ovs-ofctl add-flow br0 in_port=0,actions=output:23
2014 ovs-ofctl mod-flows br0 cookie=5,dl_vlan=123,actions=output:3
2015 ovs-ofctl del-flows br0 dl_vlan=123
2016 ovs-ofctl del-flows br0
2017 ovs-appctl -t ovs-ofctl ofctl/barrier
2019 # Sorts groups of lines that start with a space, without moving them
2020 # past the nearest line that does not start with a space.
2028 print $_ foreach sort(@buffer);
2033 print $_ foreach sort(@buffer);
2035 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log | ${PERL} -e "$sort"], [0],
2036 [NXST_FLOW_MONITOR reply (xid=0x0):
2037 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=124 actions=output:2
2038 NXST_FLOW_MONITOR reply (xid=0x0):
2039 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:5
2040 NXST_FLOW_MONITOR reply (xid=0x0):
2041 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:6
2042 NXST_FLOW_MONITOR reply (xid=0x0):
2043 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:7
2044 NXST_FLOW_MONITOR reply (xid=0x0):
2045 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=123 actions=output:8
2046 NXST_FLOW_MONITOR reply (xid=0x0):
2047 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:9
2048 NXST_FLOW_MONITOR reply (xid=0x0):
2049 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:10
2050 NXST_FLOW_MONITOR reply (xid=0x0):
2051 event=ADDED table=0 cookie=0 in_port=0,vlan_tci=0x0000 actions=output:11
2052 NXST_FLOW_MONITOR reply (xid=0x0):
2053 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=0 actions=output:12
2054 NXST_FLOW_MONITOR reply (xid=0x0):
2055 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=1 actions=output:13
2056 NXST_FLOW_MONITOR reply (xid=0x0):
2057 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=4095 actions=output:14
2058 NXST_FLOW_MONITOR reply (xid=0x0):
2059 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:15
2060 NXST_FLOW_MONITOR reply (xid=0x0):
2061 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:16
2062 NXST_FLOW_MONITOR reply (xid=0x0):
2063 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:17
2064 NXST_FLOW_MONITOR reply (xid=0x0):
2065 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:18
2066 NXST_FLOW_MONITOR reply (xid=0x0):
2067 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:19
2068 NXST_FLOW_MONITOR reply (xid=0x0):
2069 event=ADDED table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:20
2070 NXST_FLOW_MONITOR reply (xid=0x0):
2071 event=ADDED table=0 cookie=0 in_port=0,dl_vlan_pcp=0 actions=output:21
2072 NXST_FLOW_MONITOR reply (xid=0x0):
2073 event=ADDED table=0 cookie=0 in_port=0,dl_vlan_pcp=1 actions=output:22
2074 NXST_FLOW_MONITOR reply (xid=0x0):
2075 event=ADDED table=0 cookie=0 in_port=0 actions=output:23
2076 NXST_FLOW_MONITOR reply (xid=0x0):
2077 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123 actions=output:3
2078 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2079 event=MODIFIED table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2080 NXST_FLOW_MONITOR reply (xid=0x0):
2081 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123 actions=output:3
2082 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=0 actions=output:3
2083 event=DELETED reason=delete table=0 cookie=0x5 in_port=0,dl_vlan=123,dl_vlan_pcp=1 actions=output:3
2084 NXST_FLOW_MONITOR reply (xid=0x0):
2085 event=DELETED reason=delete table=0 cookie=0 in_port=0 actions=output:23
2086 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0 actions=output:20
2087 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=0 actions=output:18
2088 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=0,dl_vlan_pcp=1 actions=output:19
2089 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=124 actions=output:2
2090 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095 actions=output:14
2091 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=0 actions=output:12
2092 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan=4095,dl_vlan_pcp=1 actions=output:13
2093 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan_pcp=0 actions=output:21
2094 event=DELETED reason=delete table=0 cookie=0 in_port=0,dl_vlan_pcp=1 actions=output:22
2095 event=DELETED reason=delete table=0 cookie=0 in_port=0,vlan_tci=0x0000 actions=output:11
2099 # Check that our own changes are reported as abbreviations.
2100 ovs-appctl -t ovs-ofctl ofctl/set-output-file monitor.log
2101 ovs-ofctl add-flow br0 in_port=1,actions=output:2
2102 ovs-ofctl add-flow br0 in_port=2,actions=output:1
2103 ovs-appctl -t ovs-ofctl ofctl/barrier
2104 ovs-appctl -t ovs-ofctl ofctl/send 010e004812345678003fffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000ffffffffffff0000
2105 ovs-appctl -t ovs-ofctl ofctl/barrier
2106 AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip], [0], [NXST_FLOW reply:
2108 AT_CHECK([sed 's/ (xid=0x[[1-9a-fA-F]][[0-9a-fA-F]]*)//' monitor.log], [0],
2109 [NXST_FLOW_MONITOR reply (xid=0x0):
2110 event=ADDED table=0 cookie=0 in_port=1 actions=output:2
2111 NXST_FLOW_MONITOR reply (xid=0x0):
2112 event=ADDED table=0 cookie=0 in_port=2 actions=output:1
2114 send: OFPT_FLOW_MOD: DEL priority=0 actions=drop
2115 NXST_FLOW_MONITOR reply (xid=0x0):
2116 event=ABBREV xid=0x12345678
2120 ovs-appctl -t ovs-ofctl exit
2124 AT_SETUP([ofproto - flow monitoring pause and resume])
2125 AT_KEYWORDS([monitor])
2127 # The maximum socket receive buffer size is important for this test, which
2128 # tests behavior when the receive buffer overflows.
2129 if test -e /proc/sys/net/core/rmem_max; then
2131 rmem_max=`cat /proc/sys/net/core/rmem_max`
2132 elif rmem_max=`sysctl -n net.inet.tcp.recvbuf_max 2>/dev/null`; then
2135 # Don't know how to get maximum socket receive buffer on this OS
2138 # Calculate the total amount of queuing: rmem_max in the kernel, 128 kB
2139 # in ofproto sending userspace (see ofmonitor_flush() in connmgr.c).
2140 queue_size=`expr $rmem_max + 128 \* 1024`
2141 echo rmem_max=$rmem_max queue_size=$queue_size
2143 # Each flow update message takes up at least 48 bytes of space in queues
2144 # and in practice more than that.
2145 n_msgs=`expr $queue_size / 48`
2150 # Start a monitor watching the flow table, then make it block.
2151 ON_EXIT([kill `cat ovs-ofctl.pid`])
2152 ovs-ofctl monitor br0 watch: --detach --no-chdir --pidfile >monitor.log 2>&1
2153 AT_CAPTURE_FILE([monitor.log])
2154 ovs-appctl -t ovs-ofctl ofctl/block
2156 # Add $n_msgs flows.
2157 (echo "in_port=2,actions=output:2"
2159 for ($i = 0; $i < '$n_msgs'; $i++) {
2160 print "cookie=1,reg1=$i,actions=drop\n";
2163 AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
2164 # Check that multipart flow dumps work properly:
2165 AT_CHECK([ovs-ofctl diff-flows br0 flows.txt])
2166 AT_CHECK([ovs-ofctl add-flow br0 in_port=1,cookie=3,actions=drop])
2167 AT_CHECK([ovs-ofctl mod-flows br0 in_port=2,cookie=2,actions=output:2])
2168 AT_CHECK([ovs-ofctl del-flows br0 cookie=1/-1])
2170 ovs-appctl -t ovs-ofctl ofctl/unblock
2171 ovs-appctl -t ovs-ofctl ofctl/barrier
2173 ovs-appctl -t ovs-ofctl exit
2175 # Check that the flow monitor reported the same number of flows
2176 # added and deleted, but fewer than we actually added and deleted.
2177 adds=`grep -c 'ADDED.*reg1=' monitor.log`
2178 deletes=`grep -c 'DELETED.*reg1=' monitor.log`
2179 echo adds=$adds deletes=$deletes
2180 AT_CHECK([test $adds -gt 100 && test $adds -lt $n_msgs])
2181 AT_CHECK([test $adds = $deletes])
2183 # Check that the flow monitor reported everything in the expected order:
2185 # event=ADDED table=0 cookie=0x1 reg1=0x22
2187 # NXT_FLOW_MONITOR_PAUSED:
2189 # event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2191 # event=ADDED table=0 cookie=0x3 in_port=1
2192 # event=MODIFIED table=0 cookie=0x2 in_port=2 actions=output:2
2193 # NXT_FLOW_MONITOR_RESUMED:
2195 # except that, between the PAUSED and RESUMED, the order of the ADDED
2196 # and MODIFIED lines lines depends on hash order, that is, it varies
2197 # as we change the hash function or change architecture. Therefore,
2198 # we use a couple of tests below to accept both orders.
2199 AT_CHECK([ofctl_strip < monitor.log | sed -n -e '
2202 /NXT_FLOW_MONITOR_PAUSED:/p
2203 /NXT_FLOW_MONITOR_RESUMED:/p
2204 ' > monitor.log.subset])
2205 AT_CHECK([grep -v MODIFIED monitor.log.subset], [0], [dnl
2206 event=ADDED table=0 cookie=0x1 reg1=0x22
2207 NXT_FLOW_MONITOR_PAUSED:
2208 event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2209 event=ADDED table=0 cookie=0x3 in_port=1
2210 NXT_FLOW_MONITOR_RESUMED:
2212 AT_CHECK([grep -v ADDED monitor.log.subset], [0], [dnl
2213 NXT_FLOW_MONITOR_PAUSED:
2214 event=DELETED reason=delete table=0 cookie=0x1 reg1=0x22
2215 event=MODIFIED table=0 cookie=0x2 in_port=2 actions=output:2
2216 NXT_FLOW_MONITOR_RESUMED:
2222 AT_SETUP([ofproto - event filtering (OpenFlow 1.3)])
2223 AT_KEYWORDS([monitor])
2226 # Start a monitor, use the required protocol version
2227 ovs-ofctl -O OpenFlow13 monitor br0 --detach --no-chdir --pidfile >monitor.log 2>&1
2228 AT_CAPTURE_FILE([monitor.log])
2230 # Send an OpenFlow13 message (04), OFPT_GET_ASYNC_REQUEST (1a), length (8), xid (0a)
2231 ovs-appctl -t ovs-ofctl ofctl/send 041a00080000000a
2232 ovs-appctl -t ovs-ofctl ofctl/barrier
2234 # Check default setting
2235 read -r -d '' expected <<'EOF'
2238 AT_CHECK([ofctl_strip < monitor.log], [], [dnl
2239 send: OFPT_GET_ASYNC_REQUEST (OF1.3):
2240 OFPT_GET_ASYNC_REPLY (OF1.3):
2242 PACKET_IN: no_match action
2243 PORT_STATUS: add delete modify
2244 FLOW_REMOVED: idle hard delete
2248 PORT_STATUS: add delete modify
2250 OFPT_BARRIER_REPLY (OF1.3):
2256 AT_SETUP([ofproto - ofport_request])
2258 ADD_OF_PORTS([br0], [1], [2], [3])
2260 set_and_check_specific_ofports () {
2261 ovs-vsctl set Interface p1 ofport_request="$1" -- \
2262 set Interface p2 ofport_request="$2" -- \
2263 set Interface p3 ofport_request="$3"
2264 ofports=`ovs-vsctl get Interface p1 ofport -- \
2265 get Interface p2 ofport -- \
2266 get Interface p3 ofport`
2267 AT_CHECK_UNQUOTED([echo $ofports], [0], [$1 $2 $3
2270 for pre in '1 2 3' '1 3 2' '2 1 3' '2 3 1' '3 1 2' '3 2 1'; do
2271 for post in '1 2 3' '1 3 2' '2 1 3' '2 3 1' '3 1 2' '3 2 1'; do
2272 echo -----------------------------------------------------------
2273 echo "Check changing port numbers from $pre to $post"
2274 set_and_check_ofports $pre
2275 set_and_check_ofports $post
2279 ovs-vsctl del-port p3
2281 set_and_check_poorly_specified_ofports () {
2282 ovs-vsctl set Interface p1 ofport_request="$1" -- \
2283 set Interface p2 ofport_request="$2"
2284 p1=`ovs-vsctl get Interface p1 ofport`
2285 p2=`ovs-vsctl get Interface p2 ofport`
2288 AT_CHECK([test "$p1" != "$p2"])
2289 if test "$1" = "$2" && test "$1" != '[[]]'; then
2290 # One port number must be the requested one.
2291 AT_CHECK([test "$p1" = "$1" || test "$p2" = "$1"])
2292 # The other port number must be different (already tested above).
2294 AT_CHECK([test "$1" = '[[]]' || test "$p1" == "$1"])
2295 AT_CHECK([test "$2" = '[[]]' || test "$p2" == "$2"])
2298 for pre in '1 2' '[[]] 2' '1 [[]]' '[[]] [[]]' '2 1' '[[]] 1' '2 [[]]' \
2300 for post in '1 2' '[[]] 2' '1 [[]]' '[[]] [[]]' '2 1' '[[]] 1' '2 [[]]' \
2302 echo -----------------------------------------------------------
2303 echo "Check changing port numbers from $pre to $post"
2304 set_and_check_poorly_specified_ofports $pre
2305 set_and_check_poorly_specified_ofports $post