]>
Commit | Line | Data |
---|---|---|
7ca476af | 1 | # _ADD_BR([name]) |
d7c5426b DDP |
2 | # |
3 | # Expands into the proper ovs-vsctl commands to create a bridge with the | |
cf7659b6 JR |
4 | # appropriate type and properties |
5 | m4_define([_ADD_BR], [[add-br $1 -- set Bridge $1 datapath_type="netdev" protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13,OpenFlow14,OpenFlow15 fail-mode=secure ]]) | |
d7c5426b DDP |
6 | |
7 | # OVS_TRAFFIC_VSWITCHD_START([vsctl-args], [vsctl-output], [=override]) | |
8 | # | |
9 | # Creates a database and starts ovsdb-server, starts ovs-vswitchd | |
10 | # connected to that database, calls ovs-vsctl to create a bridge named | |
11 | # br0 with predictable settings, passing 'vsctl-args' as additional | |
12 | # commands to ovs-vsctl. If 'vsctl-args' causes ovs-vsctl to provide | |
13 | # output (e.g. because it includes "create" commands) then 'vsctl-output' | |
14 | # specifies the expected output after filtering through uuidfilt.pl. | |
15 | m4_define([OVS_TRAFFIC_VSWITCHD_START], | |
16 | [ | |
b9e04f84 | 17 | OVS_WAIT_WHILE([ip link show ovs-netdev]) |
d7c5426b DDP |
18 | _OVS_VSWITCHD_START([--disable-system]) |
19 | dnl Add bridges, ports, etc. | |
b9e04f84 | 20 | OVS_WAIT_WHILE([ip link show br0]) |
cf7659b6 | 21 | AT_CHECK([ovs-vsctl -- _ADD_BR([br0]) -- $1 m4_if([$2], [], [], [| ${PERL} $srcdir/uuidfilt.pl])], [0], [$2]) |
d7c5426b DDP |
22 | ]) |
23 | ||
24 | # OVS_TRAFFIC_VSWITCHD_STOP([WHITELIST], [extra_cmds]) | |
25 | # | |
26 | # Gracefully stops ovs-vswitchd and ovsdb-server, checking their log files | |
27 | # for messages with severity WARN or higher and signaling an error if any | |
28 | # is present. The optional WHITELIST may contain shell-quoted "sed" | |
29 | # commands to delete any warnings that are actually expected, e.g.: | |
30 | # | |
31 | # OVS_TRAFFIC_VSWITCHD_STOP(["/expected error/d"]) | |
32 | # | |
33 | # 'extra_cmds' are shell commands to be executed afte OVS_VSWITCHD_STOP() is | |
34 | # invoked. They can be used to perform additional cleanups such as name space | |
35 | # removal. | |
36 | m4_define([OVS_TRAFFIC_VSWITCHD_STOP], | |
5390d185 | 37 | [OVS_VSWITCHD_STOP([dnl |
afa0dfc6 | 38 | $1";/netdev_linux.*obtaining netdev stats via vport failed/d |
d7c5426b DDP |
39 | /dpif_netlink.*Generic Netlink family 'ovs_datapath' does not exist. The Open vSwitch kernel module is probably not loaded./d"]) |
40 | AT_CHECK([:; $2]) | |
41 | ]) | |
07659514 | 42 | |
ddcf96d2 DDP |
43 | # CONFIGURE_VETH_OFFLOADS([VETH]) |
44 | # | |
45 | # Disable TX offloads for veths. The userspace datapath uses the AF_PACKET | |
46 | # socket to receive packets for veths. Unfortunately, the AF_PACKET socket | |
47 | # doesn't play well with offloads: | |
48 | # 1. GSO packets are received without segmentation and therefore discarded. | |
49 | # 2. Packets with offloaded partial checksum are received with the wrong | |
50 | # checksum, therefore discarded by the receiver. | |
51 | # | |
52 | # By disabling tx offloads in the non-OVS side of the veth peer we make sure | |
53 | # that the AF_PACKET socket will not receive bad packets. | |
54 | # | |
55 | # This is a workaround, and should be removed when offloads are properly | |
56 | # supported in netdev-linux. | |
57 | m4_define([CONFIGURE_VETH_OFFLOADS], | |
941d80b4 | 58 | [AT_CHECK([ethtool -K $1 tx off], [0], [ignore], [ignore])] |
ddcf96d2 DDP |
59 | ) |
60 | ||
07659514 JS |
61 | # CHECK_CONNTRACK() |
62 | # | |
4573c42e | 63 | # Perform requirements checks for running conntrack tests. |
07659514 JS |
64 | # |
65 | m4_define([CHECK_CONNTRACK], | |
4573c42e | 66 | [AT_SKIP_IF([test $HAVE_PYTHON = no])] |
07659514 | 67 | ) |
4573c42e DDP |
68 | |
69 | # CHECK_CONNTRACK_ALG() | |
70 | # | |
71 | # Perform requirements checks for running conntrack ALG tests. The userspace | |
72 | # doesn't support ALGs yet, so skip the tests | |
73 | # | |
74 | m4_define([CHECK_CONNTRACK_ALG], | |
75 | [ | |
76 | AT_SKIP_IF([:]) | |
77 | ]) | |
78 | ||
79 | # CHECK_CONNTRACK_FRAG() | |
80 | # | |
81 | # Perform requirements checks for running conntrack fragmentations tests. | |
82 | # The userspace doesn't support fragmentation yet, so skip the tests. | |
83 | m4_define([CHECK_CONNTRACK_FRAG], | |
84 | [ | |
85 | AT_SKIP_IF([:]) | |
86 | ]) | |
87 | ||
88 | # CHECK_CONNTRACK_LOCAL_STACK() | |
89 | # | |
90 | # Perform requirements checks for running conntrack tests with local stack. | |
91 | # While the kernel connection tracker automatically passes all the connection | |
92 | # tracking state from an internal port to the OpenvSwitch kernel module, there | |
93 | # is simply no way of doing that with the userspace, so skip the tests. | |
94 | m4_define([CHECK_CONNTRACK_LOCAL_STACK], | |
95 | [ | |
96 | AT_SKIP_IF([:]) | |
97 | ]) | |
98 | ||
99 | # CHECK_CONNTRACK_NAT() | |
100 | # | |
101 | # Perform requirements checks for running conntrack NAT tests. The userspace | |
ae49b064 | 102 | # datapath supports NAT. |
4573c42e | 103 | # |
ae49b064 | 104 | m4_define([CHECK_CONNTRACK_NAT]) |