]> git.proxmox.com Git - mirror_ovs.git/blob - tests/nsh.at
nsh: Add unit test for double NSH encap and decap
[mirror_ovs.git] / tests / nsh.at
1 AT_BANNER([network service header (NSH)])
2
3 ### -----------------------------------------------------------------
4 ### Simple NSH matching test case
5 ### -----------------------------------------------------------------
6
7 AT_SETUP([nsh - matching])
8
9 OVS_VSWITCHD_START([dnl
10 set bridge br0 datapath_type=dummy \
11 protocols=OpenFlow10,OpenFlow13,OpenFlow14,OpenFlow15 -- \
12 add-port br0 p1 -- set Interface p1 type=dummy ofport_request=1 -- \
13 add-port br0 p2 -- set Interface p2 type=dummy ofport_request=2])
14
15 AT_DATA([flows.txt], [dnl
16 table=0,in_port=1,dl_type=0x894f,nsh_ttl=63,nsh_mdtype=1,nsh_np=3,nsh_spi=0x123456,nsh_si=255,nsh_c1=0x11223344,actions=set_field:0x2->nsh_flags,set_field:254->nsh_si,set_field:0x44332211->nsh_c1,2
17 ])
18
19 AT_CHECK([
20 ovs-ofctl del-flows br0
21 ovs-ofctl -Oopenflow13 add-flows br0 flows.txt
22 ovs-ofctl -Oopenflow13 dump-flows br0 | ofctl_strip | sort | grep actions
23 ], [0], [dnl
24 in_port=1,dl_type=0x894f,nsh_ttl=63,nsh_mdtype=1,nsh_np=3,nsh_spi=0x123456,nsh_si=255,nsh_c1=0x11223344 actions=set_field:2->nsh_flags,set_field:254->nsh_si,set_field:0x44332211->nsh_c1,output:2
25 ])
26
27 AT_CHECK([
28 ovs-appctl ofproto/trace br0 'in_port=1,dl_type=0x894f,nsh_ttl=63,nsh_mdtype=1,nsh_np=3,nsh_spi=0x123456,nsh_si=255,nsh_c1=0x11223344,nsh_c2=0x55667788,nsh_c3=0x99aabbcc,nsh_c4=0xddeeff00'
29 ], [0], [dnl
30 Flow: in_port=1,vlan_tci=0x0000,dl_src=00:00:00:00:00:00,dl_dst=00:00:00:00:00:00,dl_type=0x894f,nsh_flags=0,nsh_ttl=63,nsh_mdtype=1,nsh_np=3,nsh_spi=0x123456,nsh_si=255,nsh_c1=0x11223344,nsh_c2=0x55667788,nsh_c3=0x99aabbcc,nsh_c4=0xddeeff00,nw_proto=0,nw_tos=0,nw_ecn=0,nw_ttl=0
31
32 bridge("br0")
33 -------------
34 0. in_port=1,dl_type=0x894f,nsh_ttl=63,nsh_mdtype=1,nsh_np=3,nsh_spi=0x123456,nsh_si=255,nsh_c1=0x11223344, priority 32768
35 set_field:2->nsh_flags
36 set_field:254->nsh_si
37 set_field:0x44332211->nsh_c1
38 output:2
39
40 Final flow: in_port=1,vlan_tci=0x0000,dl_src=00:00:00:00:00:00,dl_dst=00:00:00:00:00:00,dl_type=0x894f,nsh_flags=2,nsh_ttl=63,nsh_mdtype=1,nsh_np=3,nsh_spi=0x123456,nsh_si=254,nsh_c1=0x44332211,nsh_c2=0x55667788,nsh_c3=0x99aabbcc,nsh_c4=0xddeeff00,nw_proto=0,nw_tos=0,nw_ecn=0,nw_ttl=0
41 Megaflow: recirc_id=0,eth,in_port=1,dl_type=0x894f,nsh_flags=0,nsh_ttl=63,nsh_mdtype=1,nsh_np=3,nsh_spi=0x123456,nsh_si=255,nsh_c1=0x11223344
42 Datapath actions: set(nsh(flags=2,ttl=63,spi=0x123456,si=254,c1=0x44332211)),2
43 ])
44
45 OVS_VSWITCHD_STOP
46 AT_CLEANUP
47
48
49 ### -----------------------------------------------------------------
50 ### NSH MD1 on Ethernet encapsulation over veth link
51 ### -----------------------------------------------------------------
52
53 AT_SETUP([nsh - md1 encap over a veth link])
54
55 OVS_VSWITCHD_START([])
56
57 AT_CHECK([
58 ovs-vsctl set bridge br0 datapath_type=dummy \
59 protocols=OpenFlow10,OpenFlow13,OpenFlow14,OpenFlow15 -- \
60 add-port br0 p1 -- set Interface p1 type=dummy ofport_request=1 -- \
61 add-port br0 p2 -- set Interface p2 type=dummy ofport_request=2 -- \
62 add-port br0 v3 -- set Interface v3 type=patch options:peer=v4 ofport_request=3 -- \
63 add-port br0 v4 -- set Interface v4 type=patch options:peer=v3 ofport_request=4])
64
65 AT_DATA([flows.txt], [dnl
66 table=0,in_port=1,ip,actions=encap(nsh(md_type=1)),set_field:0x1234->nsh_spi,set_field:0x11223344->nsh_c1,encap(ethernet),set_field:11:22:33:44:55:66->dl_dst,3
67 table=0,in_port=4,dl_type=0x894f,nsh_mdtype=1,nsh_spi=0x1234,nsh_c1=0x11223344,actions=decap(),decap(),2
68 ])
69
70 AT_CHECK([
71 ovs-ofctl del-flows br0
72 ovs-ofctl -Oopenflow13 add-flows br0 flows.txt
73 ovs-ofctl -Oopenflow13 dump-flows br0 | ofctl_strip | sort | grep actions
74 ], [0], [dnl
75 in_port=4,dl_type=0x894f,nsh_mdtype=1,nsh_spi=0x1234,nsh_c1=0x11223344 actions=decap(),decap(),output:2
76 ip,in_port=1 actions=encap(nsh(md_type=1)),set_field:0x1234->nsh_spi,set_field:0x11223344->nsh_c1,encap(ethernet),set_field:11:22:33:44:55:66->eth_dst,output:3
77 ])
78
79 # TODO:
80 # The fields nw_proto, nw_tos, nw_ecn, nw_ttl in final flow seem unnecessary. Can they be avoided?
81 # The match on dl_dst=66:77:88:99:aa:bb in the Megaflow is a side effect of setting the dl_dst in the pushed outer
82 # Ethernet header. It is a consequence of using wc->masks both for tracking matched and set bits and seems hard to
83 # avoid except by using separate masks for both purposes.
84
85 AT_CHECK([
86 ovs-appctl ofproto/trace br0 'in_port=1,icmp,dl_src=00:11:22:33:44:55,dl_dst=66:77:88:99:aa:bb,nw_dst=10.10.10.10,nw_src=20.20.20.20'
87 ], [0], [dnl
88 Flow: icmp,in_port=1,vlan_tci=0x0000,dl_src=00:11:22:33:44:55,dl_dst=66:77:88:99:aa:bb,nw_src=20.20.20.20,nw_dst=10.10.10.10,nw_tos=0,nw_ecn=0,nw_ttl=0,icmp_type=0,icmp_code=0
89
90 bridge("br0")
91 -------------
92 0. ip,in_port=1, priority 32768
93 encap(nsh(md_type=1))
94 set_field:0x1234->nsh_spi
95 set_field:0x11223344->nsh_c1
96 encap(ethernet)
97 set_field:11:22:33:44:55:66->eth_dst
98 output:3
99
100 bridge("br0")
101 -------------
102 0. in_port=4,dl_type=0x894f,nsh_mdtype=1,nsh_spi=0x1234,nsh_c1=0x11223344, priority 32768
103 decap()
104 decap()
105
106 Final flow: in_port=1,vlan_tci=0x0000,dl_src=00:00:00:00:00:00,dl_dst=11:22:33:44:55:66,dl_type=0x894f,nsh_flags=0,nsh_ttl=63,nsh_mdtype=1,nsh_np=3,nsh_spi=0x1234,nsh_si=255,nsh_c1=0x11223344,nsh_c2=0x0,nsh_c3=0x0,nsh_c4=0x0,nw_proto=0,nw_tos=0,nw_ecn=0,nw_ttl=0
107 Megaflow: recirc_id=0,eth,ip,in_port=1,dl_dst=66:77:88:99:aa:bb,nw_frag=no
108 Datapath actions: push_nsh(flags=0,ttl=63,mdtype=1,np=3,spi=0x1234,si=255,c1=0x11223344,c2=0x0,c3=0x0,c4=0x0),push_eth(src=00:00:00:00:00:00,dst=11:22:33:44:55:66),pop_eth,pop_nsh(),set(eth(dst=11:22:33:44:55:66)),recirc(0x1)
109 ])
110
111 AT_CHECK([
112 ovs-appctl ofproto/trace br0 'in_port=4,dl_type=0x894f,nsh_mdtype=1,nsh_np=3,nsh_spi=0x1234,nsh_c1=0x11223344'
113 ], [0], [dnl
114 Flow: in_port=4,vlan_tci=0x0000,dl_src=00:00:00:00:00:00,dl_dst=00:00:00:00:00:00,dl_type=0x894f,nsh_flags=0,nsh_ttl=0,nsh_mdtype=1,nsh_np=3,nsh_spi=0x1234,nsh_si=0,nsh_c1=0x11223344,nsh_c2=0x0,nsh_c3=0x0,nsh_c4=0x0,nw_proto=0,nw_tos=0,nw_ecn=0,nw_ttl=0
115
116 bridge("br0")
117 -------------
118 0. in_port=4,dl_type=0x894f,nsh_mdtype=1,nsh_spi=0x1234,nsh_c1=0x11223344, priority 32768
119 decap()
120 decap()
121
122 Final flow: unchanged
123 Megaflow: recirc_id=0,eth,in_port=4,dl_type=0x894f,nsh_mdtype=1,nsh_np=3,nsh_spi=0x1234,nsh_c1=0x11223344
124 Datapath actions: pop_eth,pop_nsh(),recirc(0x2)
125 ])
126
127 # Now send two real ICMP echo request packets in on port p1
128
129 AT_CHECK([
130 ovs-appctl netdev-dummy/receive p1 1e2ce92a669e3a6dd2099cab0800450000548a53400040011addc0a80a0ac0a80a1e08006f200a4d0001fc509a58000000002715020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
131 ovs-appctl netdev-dummy/receive p1 1e2ce92a669e3a6dd2099cab0800450000548a83400040011aadc0a80a0ac0a80a1e0800b7170a4d0002fd509a5800000000de1c020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
132 ], [0], [ignore])
133
134 ovs-appctl time/warp 1000
135
136 # A packet count of 1 in the megaflow entries means the first packet was processed by
137 # the ofproto slow path and the second successfully by the datapath flow entry.
138
139 AT_CHECK([
140 ovs-appctl dpctl/dump-flows dummy@ovs-dummy | strip_used | grep -v ipv6 | sort
141 ], [0], [flow-dump from non-dpdk interfaces:
142 recirc_id(0),in_port(1),packet_type(ns=0,id=0),eth(dst=1e:2c:e9:2a:66:9e),eth_type(0x0800),ipv4(frag=no), packets:1, bytes:98, used:0.0s, actions:push_nsh(flags=0,ttl=63,mdtype=1,np=3,spi=0x1234,si=255,c1=0x11223344,c2=0x0,c3=0x0,c4=0x0),push_eth(src=00:00:00:00:00:00,dst=11:22:33:44:55:66),pop_eth,pop_nsh(),set(eth(dst=11:22:33:44:55:66)),recirc(0x3)
143 recirc_id(0x3),in_port(1),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(frag=no), packets:1, bytes:98, used:0.0s, actions:2
144 ])
145
146 # Verify, that VLAN tagged packets can be encapsulated by NSH header.
147 ovs-appctl time/warp 10000
148
149 AT_DATA([flows.txt], [dnl
150 table=0,in_port=1,actions=push_vlan:0x8100,mod_vlan_vid:100,3
151 table=0,in_port=4,actions=encap(nsh),decap(),2
152 ])
153
154 AT_CHECK([
155 ovs-ofctl del-flows br0
156 ovs-ofctl -Oopenflow13 add-flows br0 flows.txt
157 ovs-ofctl -Oopenflow13 dump-flows br0 | ofctl_strip | sort | grep actions
158 ], [0], [dnl
159 in_port=1 actions=push_vlan:0x8100,set_field:4196->vlan_vid,output:3
160 in_port=4 actions=encap(nsh),decap(),output:2
161 ])
162
163 AT_CHECK([
164 ovs-appctl netdev-dummy/receive p1 1e2ce92a669e3a6dd2099cab0800450000548a53400040011addc0a80a0ac0a80a1e08006f200a4d0001fc509a58000000002715020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
165 ovs-appctl netdev-dummy/receive p1 1e2ce92a669e3a6dd2099cab0800450000548a83400040011aadc0a80a0ac0a80a1e0800b7170a4d0002fd509a5800000000de1c020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
166 ], [0], [ignore])
167
168 ovs-appctl time/warp 1000
169 ovs-appctl time/warp 1000
170 ovs-appctl time/warp 1000
171
172 AT_CHECK([
173 ovs-appctl dpctl/dump-flows dummy@ovs-dummy | strip_used | grep -v ipv6 | sort
174 ], [0], [flow-dump from non-dpdk interfaces:
175 recirc_id(0),in_port(1),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(frag=no), packets:1, bytes:98, used:0.0s, actions:push_vlan(vid=100,pcp=0),push_nsh(flags=0,ttl=63,mdtype=1,np=3,spi=0x0,si=255,c1=0x0,c2=0x0,c3=0x0,c4=0x0),pop_nsh(),recirc(0x4)
176 recirc_id(0x4),in_port(1),packet_type(ns=0,id=0),eth_type(0x8100),vlan(vid=100,pcp=0),encap(eth_type(0x0800),ipv4(frag=no)), packets:1, bytes:102, used:0.0s, actions:2
177 ])
178
179 OVS_VSWITCHD_STOP
180 AT_CLEANUP
181
182
183 ### -----------------------------------------------------------------
184 ### NSH MD2 on Ethernet encapsulation over veth link
185 ### -----------------------------------------------------------------
186
187 AT_SETUP([nsh - md2 encap over a veth link])
188
189 OVS_VSWITCHD_START([])
190
191 AT_CHECK([
192 ovs-vsctl set bridge br0 datapath_type=dummy \
193 protocols=OpenFlow10,OpenFlow13,OpenFlow14,OpenFlow15 -- \
194 add-port br0 p1 -- set Interface p1 type=dummy ofport_request=1 -- \
195 add-port br0 p2 -- set Interface p2 type=dummy ofport_request=2 -- \
196 add-port br0 v3 -- set Interface v3 type=patch options:peer=v4 ofport_request=3 -- \
197 add-port br0 v4 -- set Interface v4 type=patch options:peer=v3 ofport_request=4])
198
199 AT_DATA([flows.txt], [dnl
200 table=0,in_port=1,ip,actions=encap(nsh(md_type=2,tlv(0x1000,10,0x12345678),tlv(0x2000,20,0xfedcba9876543210))),set_field:0x1234->nsh_spi,encap(ethernet),set_field:11:22:33:44:55:66->dl_dst,3
201 table=0,in_port=4,dl_type=0x894f,nsh_mdtype=2,nsh_spi=0x1234,actions=decap(),decap(),2
202 ])
203
204 AT_CHECK([
205 ovs-ofctl del-flows br0
206 ovs-ofctl -Oopenflow13 add-flows br0 flows.txt
207 ovs-ofctl -Oopenflow13 dump-flows br0 | ofctl_strip | sort | grep actions
208 ], [0], [dnl
209 in_port=4,dl_type=0x894f,nsh_mdtype=2,nsh_spi=0x1234 actions=decap(),decap(),output:2
210 ip,in_port=1 actions=encap(nsh(md_type=2,tlv(0x1000,10,0x12345678),tlv(0x2000,20,0xfedcba9876543210))),set_field:0x1234->nsh_spi,encap(ethernet),set_field:11:22:33:44:55:66->eth_dst,output:3
211 ])
212
213 AT_CHECK([
214 ovs-appctl ofproto/trace br0 'in_port=1,icmp,dl_src=00:11:22:33:44:55,dl_dst=66:77:88:99:aa:bb,nw_dst=10.10.10.10,nw_src=20.20.20.20'
215 ], [0], [dnl
216 Flow: icmp,in_port=1,vlan_tci=0x0000,dl_src=00:11:22:33:44:55,dl_dst=66:77:88:99:aa:bb,nw_src=20.20.20.20,nw_dst=10.10.10.10,nw_tos=0,nw_ecn=0,nw_ttl=0,icmp_type=0,icmp_code=0
217
218 bridge("br0")
219 -------------
220 0. ip,in_port=1, priority 32768
221 encap(nsh(md_type=2,tlv(0x1000,10,0x12345678),tlv(0x2000,20,0xfedcba9876543210)))
222 set_field:0x1234->nsh_spi
223 encap(ethernet)
224 set_field:11:22:33:44:55:66->eth_dst
225 output:3
226
227 bridge("br0")
228 -------------
229 0. in_port=4,dl_type=0x894f,nsh_mdtype=2,nsh_spi=0x1234, priority 32768
230 decap()
231 decap()
232
233 Final flow: in_port=1,vlan_tci=0x0000,dl_src=00:00:00:00:00:00,dl_dst=11:22:33:44:55:66,dl_type=0x894f,nsh_flags=0,nsh_ttl=63,nsh_mdtype=2,nsh_np=3,nsh_spi=0x1234,nsh_si=255,nw_proto=0,nw_tos=0,nw_ecn=0,nw_ttl=0
234 Megaflow: recirc_id=0,eth,ip,in_port=1,dl_dst=66:77:88:99:aa:bb,nw_frag=no
235 Datapath actions: push_nsh(flags=0,ttl=63,mdtype=2,np=3,spi=0x1234,si=255,md2=0x10000a041234567820001408fedcba9876543210),push_eth(src=00:00:00:00:00:00,dst=11:22:33:44:55:66),pop_eth,pop_nsh(),set(eth(dst=11:22:33:44:55:66)),recirc(0x1)
236 ])
237
238 AT_CHECK([
239 ovs-appctl ofproto/trace br0 'in_port=4,dl_type=0x894f,nsh_mdtype=2,nsh_np=3,nsh_spi=0x1234'
240 ], [0], [dnl
241 Flow: in_port=4,vlan_tci=0x0000,dl_src=00:00:00:00:00:00,dl_dst=00:00:00:00:00:00,dl_type=0x894f,nsh_flags=0,nsh_ttl=0,nsh_mdtype=2,nsh_np=3,nsh_spi=0x1234,nsh_si=0,nw_proto=0,nw_tos=0,nw_ecn=0,nw_ttl=0
242
243 bridge("br0")
244 -------------
245 0. in_port=4,dl_type=0x894f,nsh_mdtype=2,nsh_spi=0x1234, priority 32768
246 decap()
247 decap()
248
249 Final flow: unchanged
250 Megaflow: recirc_id=0,eth,in_port=4,dl_type=0x894f,nsh_mdtype=2,nsh_np=3,nsh_spi=0x1234
251 Datapath actions: pop_eth,pop_nsh(),recirc(0x2)
252 ])
253
254 # Now send two real ICMP echo request packets in on port p1
255
256 AT_CHECK([
257 ovs-appctl netdev-dummy/receive p1 1e2ce92a669e3a6dd2099cab0800450000548a53400040011addc0a80a0ac0a80a1e08006f200a4d0001fc509a58000000002715020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
258 ovs-appctl netdev-dummy/receive p1 1e2ce92a669e3a6dd2099cab0800450000548a83400040011aadc0a80a0ac0a80a1e0800b7170a4d0002fd509a5800000000de1c020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
259 ], [0], [ignore])
260
261 ovs-appctl time/warp 1000
262
263 # A packet count of 1 in the megaflow entries means the first packet was processed by
264 # the ofproto slow path and the second successfully by the datapath flow entry.
265
266 AT_CHECK([
267 ovs-appctl dpctl/dump-flows dummy@ovs-dummy | strip_used | grep -v ipv6 | sort
268 ], [0], [flow-dump from non-dpdk interfaces:
269 recirc_id(0),in_port(1),packet_type(ns=0,id=0),eth(dst=1e:2c:e9:2a:66:9e),eth_type(0x0800),ipv4(frag=no), packets:1, bytes:98, used:0.0s, actions:push_nsh(flags=0,ttl=63,mdtype=2,np=3,spi=0x1234,si=255,md2=0x10000a041234567820001408fedcba9876543210),push_eth(src=00:00:00:00:00:00,dst=11:22:33:44:55:66),pop_eth,pop_nsh(),set(eth(dst=11:22:33:44:55:66)),recirc(0x3)
270 recirc_id(0x3),in_port(1),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(frag=no), packets:1, bytes:98, used:0.0s, actions:2
271 ])
272
273
274 OVS_VSWITCHD_STOP
275 AT_CLEANUP
276
277
278 ### -----------------------------------------------------------------
279 ### Double NSH MD1 encapsulation using groups over veth link
280 ### -----------------------------------------------------------------
281
282 AT_SETUP([nsh - double encap over veth link using groups])
283
284 OVS_VSWITCHD_START([])
285
286 AT_CHECK([
287 ovs-vsctl set bridge br0 datapath_type=dummy \
288 protocols=OpenFlow10,OpenFlow13,OpenFlow14,OpenFlow15 -- \
289 add-port br0 p1 -- set Interface p1 type=dummy ofport_request=1 -- \
290 add-port br0 p2 -- set Interface p2 type=dummy ofport_request=2 -- \
291 add-port br0 v3 -- set Interface v3 type=patch options:peer=v4 ofport_request=3 -- \
292 add-port br0 v4 -- set Interface v4 type=patch options:peer=v3 ofport_request=4])
293
294 AT_DATA([flows.txt], [dnl
295 table=0,in_port=1,ip,actions=group:100
296 table=0,in_port=4,packet_type=(0,0),dl_type=0x894f,nsh_mdtype=1,nsh_spi=0x5678,nsh_c1=0x55667788,actions=decap(),goto_table:1
297 table=1,packet_type=(1,0x894f),nsh_mdtype=1,nsh_spi=0x5678,nsh_c1=0x55667788,actions=decap(),goto_table:2
298 table=2,packet_type=(1,0x894f),nsh_mdtype=1,nsh_spi=0x1234,nsh_c1=0x11223344,actions=decap(),output:2
299 ])
300
301 AT_DATA([groups.txt], [dnl
302 add group_id=100,type=indirect,bucket=actions=encap(nsh(md_type=1)),set_field:0x1234->nsh_spi,set_field:0x11223344->nsh_c1,group:200
303 add group_id=200,type=indirect,bucket=actions=encap(nsh(md_type=1)),set_field:0x5678->nsh_spi,set_field:0x55667788->nsh_c1,group:300
304 add group_id=300,type=indirect,bucket=actions=encap(ethernet),set_field:11:22:33:44:55:66->dl_dst,3
305 ])
306
307 AT_CHECK([
308 ovs-ofctl del-flows br0
309 ovs-ofctl -Oopenflow13 add-groups br0 groups.txt
310 ovs-ofctl -Oopenflow13 add-flows br0 flows.txt
311 ovs-ofctl -Oopenflow13 dump-flows br0 | ofctl_strip | sort | grep actions
312 ], [0], [dnl
313 in_port=4,dl_type=0x894f,nsh_mdtype=1,nsh_spi=0x5678,nsh_c1=0x55667788 actions=decap(),goto_table:1
314 ip,in_port=1 actions=group:100
315 table=1, packet_type=(1,0x894f),nsh_mdtype=1,nsh_spi=0x5678,nsh_c1=0x55667788 actions=decap(),goto_table:2
316 table=2, packet_type=(1,0x894f),nsh_mdtype=1,nsh_spi=0x1234,nsh_c1=0x11223344 actions=decap(),output:2
317 ])
318
319 # TODO:
320 # The fields nw_proto, nw_tos, nw_ecn, nw_ttl in final flow seem unnecessary. Can they be avoided?
321 # The match on dl_dst=66:77:88:99:aa:bb in the Megaflow is a side effect of setting the dl_dst in the pushed outer
322 # Ethernet header. It is a consequence of using wc->masks both for tracking matched and set bits and seems hard to
323 # avoid except by using separate masks for both purposes.
324
325 AT_CHECK([
326 ovs-appctl ofproto/trace br0 'in_port=1,icmp,dl_src=00:11:22:33:44:55,dl_dst=66:77:88:99:aa:bb,nw_dst=10.10.10.10,nw_src=20.20.20.20'
327 ], [0], [dnl
328 Flow: icmp,in_port=1,vlan_tci=0x0000,dl_src=00:11:22:33:44:55,dl_dst=66:77:88:99:aa:bb,nw_src=20.20.20.20,nw_dst=10.10.10.10,nw_tos=0,nw_ecn=0,nw_ttl=0,icmp_type=0,icmp_code=0
329
330 bridge("br0")
331 -------------
332 0. ip,in_port=1, priority 32768
333 group:100
334 encap(nsh(md_type=1))
335 set_field:0x1234->nsh_spi
336 set_field:0x11223344->nsh_c1
337 group:200
338 encap(nsh(md_type=1))
339 set_field:0x5678->nsh_spi
340 set_field:0x55667788->nsh_c1
341 group:300
342 encap(ethernet)
343 set_field:11:22:33:44:55:66->eth_dst
344 output:3
345
346 bridge("br0")
347 -------------
348 0. in_port=4,dl_type=0x894f,nsh_mdtype=1,nsh_spi=0x5678,nsh_c1=0x55667788, priority 32768
349 decap()
350 goto_table:1
351 1. packet_type=(1,0x894f),nsh_mdtype=1,nsh_spi=0x5678,nsh_c1=0x55667788, priority 32768
352 decap()
353
354 Final flow: unchanged
355 Megaflow: recirc_id=0,eth,ip,in_port=1,dl_dst=66:77:88:99:aa:bb,nw_frag=no
356 Datapath actions: push_nsh(flags=0,ttl=63,mdtype=1,np=3,spi=0x1234,si=255,c1=0x11223344,c2=0x0,c3=0x0,c4=0x0),push_nsh(flags=0,ttl=63,mdtype=1,np=4,spi=0x5678,si=255,c1=0x55667788,c2=0x0,c3=0x0,c4=0x0),push_eth(src=00:00:00:00:00:00,dst=11:22:33:44:55:66),pop_eth,pop_nsh(),recirc(0x1)
357 ])
358
359 AT_CHECK([
360 ovs-appctl ofproto/trace br0 'recirc_id=1,in_port=4,packet_type=(1,0x894f),nsh_mdtype=1,nsh_np=3,nsh_spi=0x1234,nsh_c1=0x11223344'
361 ], [0], [dnl
362 Flow: recirc_id=0x1,packet_type=(1,0x894f),in_port=4
363
364 bridge("br0")
365 -------------
366 thaw
367 Resuming from table 0
368 Restoring actions: goto_table:2
369 goto_table:2
370 2. packet_type=(1,0x894f),nsh_mdtype=1,nsh_spi=0x1234,nsh_c1=0x11223344, priority 32768
371 decap()
372
373 Final flow: recirc_id=0x1,eth,in_port=4,vlan_tci=0x0000,dl_src=00:00:00:00:00:00,dl_dst=00:00:00:00:00:00,dl_type=0x0000
374 Megaflow: recirc_id=0x1,packet_type=(1,0x894f),in_port=4,nsh_mdtype=1,nsh_np=3,nsh_spi=0x1234,nsh_c1=0x11223344
375 Datapath actions: pop_nsh(),recirc(0x2)
376 ])
377
378 AT_CHECK([
379 ovs-appctl ofproto/trace br0 'recirc_id=2,in_port=4,ip'
380 ], [0], [dnl
381 Flow: recirc_id=0x2,eth,ip,in_port=4,vlan_tci=0x0000,dl_src=00:00:00:00:00:00,dl_dst=00:00:00:00:00:00,nw_src=0.0.0.0,nw_dst=0.0.0.0,nw_proto=0,nw_tos=0,nw_ecn=0,nw_ttl=0
382
383 bridge("br0")
384 -------------
385 thaw
386 Resuming from table 0
387 Restoring actions: unroll_xlate(table=2, cookie=0),output:2
388 unroll_xlate(table=2, cookie=0)
389 restored state: table=2, cookie=0
390 output:2
391
392 Final flow: unchanged
393 Megaflow: recirc_id=0x2,eth,ip,in_port=4,nw_frag=no
394 Datapath actions: 2
395 ])
396
397 # Now send two real ICMP echo request packets in on port p1
398
399 AT_CHECK([
400 ovs-appctl netdev-dummy/receive p1 1e2ce92a669e3a6dd2099cab0800450000548a53400040011addc0a80a0ac0a80a1e08006f200a4d0001fc509a58000000002715020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
401 ovs-appctl netdev-dummy/receive p1 1e2ce92a669e3a6dd2099cab0800450000548a83400040011aadc0a80a0ac0a80a1e0800b7170a4d0002fd509a5800000000de1c020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
402 ], [0], [ignore])
403
404 ovs-appctl time/warp 1000
405
406 # A packet count of 1 in the megaflow entries means the first packet was processed by
407 # the ofproto slow path and the second successfully by the datapath flow entry.
408
409 AT_CHECK([
410 ovs-appctl dpctl/dump-flows dummy@ovs-dummy | strip_used | grep -v ipv6 | sort
411 ], [0], [flow-dump from non-dpdk interfaces:
412 recirc_id(0),in_port(1),packet_type(ns=0,id=0),eth(dst=1e:2c:e9:2a:66:9e),eth_type(0x0800),ipv4(frag=no), packets:1, bytes:98, used:0.0s, actions:push_nsh(flags=0,ttl=63,mdtype=1,np=3,spi=0x1234,si=255,c1=0x11223344,c2=0x0,c3=0x0,c4=0x0),push_nsh(flags=0,ttl=63,mdtype=1,np=4,spi=0x5678,si=255,c1=0x55667788,c2=0x0,c3=0x0,c4=0x0),push_eth(src=00:00:00:00:00:00,dst=11:22:33:44:55:66),pop_eth,pop_nsh(),recirc(0x3)
413 recirc_id(0x3),in_port(1),packet_type(ns=1,id=0x894f),nsh(mdtype=1,np=3,spi=0x1234,c1=0x11223344), packets:1, bytes:122, used:0.0s, actions:pop_nsh(),recirc(0x4)
414 recirc_id(0x4),in_port(1),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(frag=no), packets:1, bytes:98, used:0.0s, actions:2
415 ])
416
417 OVS_VSWITCHD_STOP
418 AT_CLEANUP
419
420
421 ### -----------------------------------------------------------------
422 ### Triangle bridge setup with VXLAN-GPE tunnels
423 ### -----------------------------------------------------------------
424
425 ########################
426 # VxLAN-gpe + NSH tunneling test setup for PTAP bridge
427 #
428 # 192.168.10.10 192.168.10.20 192.168.10.30
429 # n1 n2 n3
430 # |ovs-n1 |ovs-n2 |ovs-n3
431 # +------o------+ +------o------+ +------o------+
432 # | br-in1 | | br-in2 | | br-in3 |
433 # | (PTAP) | | (PTAP) | | (PTAP) |
434 # +------o------+ +------o------+ +------o------+
435 # vxlan-gpe vxlan-gpe vxlan-gpe
436 # 10.0.0.1 (10.0.0.2) (10.0.0.3)
437 # (20.0.0.1) 20.0.0.2 (20.0.0.3)
438 # (30.0.0.1) LOCAL (30.0.0.2) LOCAL 30.0.0.3 LOCAL
439 # +-----------o-+ +-----------o-+ +-----------o-+
440 # | br-p1 | | br-p2 | | br-p3 |
441 # +------o------+ +------o------+ +------o------+
442 # p1-0 | | p2-0 | p3-0
443 # p0-1 | | p0-2 | p0-3
444 # +--o------------------------o-------------------------o--+
445 # | br0 |
446 # +--------------------------------------------------------+
447 #
448 # VxLAN-gpe tunnel ports:
449 #
450 # No Bridge Name Packet-type Remote bridge & ports
451 # -----------------------------------------------------------------------
452 # 1020 br-in1 vxlangpe12 ptap br-in2 2010 (ptap)
453 # 1030 br-in1 vxlangpe13 ptap br-in3 3010 (ptap)
454 # 2010 br-in2 vxlangpe21 ptap br-in1 1020 (ptap)
455 # 2030 br-in2 vxlangpe13 ptap br-in3 3020 (ptap)
456 # 3010 br-in1 vxlangpe31 ptap br-in1 1030 (ptap)
457 # 3020 br-in1 vxlangpe32 ptap br-in2 2010 (ptap)
458
459 AT_SETUP([nsh - triangle PTAP bridge setup with NSH over vxlan-gpe])
460
461 OVS_VSWITCHD_START([])
462
463 HWADDR_BRP1=aa:55:00:00:00:01
464 HWADDR_BRP2=aa:55:00:00:00:02
465 HWADDR_BRP3=aa:55:00:00:00:03
466
467 # Setup bridge infrastructure
468 AT_CHECK([
469 ovs-vsctl add-br br-in1 -- \
470 set bridge br-in1 datapath_type=dummy fail-mode=standalone
471 ovs-vsctl add-br br-in2 -- \
472 set bridge br-in2 datapath_type=dummy fail-mode=standalone
473 ovs-vsctl add-br br-in3 -- \
474 set bridge br-in3 datapath_type=dummy fail-mode=standalone
475 ovs-vsctl add-br br-p1 -- \
476 set bridge br-p1 datapath_type=dummy fail-mode=standalone other-config:hwaddr=$HWADDR_BRP1
477 ovs-vsctl add-br br-p2 -- \
478 set bridge br-p2 datapath_type=dummy fail-mode=standalone other-config:hwaddr=$HWADDR_BRP2
479 ovs-vsctl add-br br-p3 -- \
480 set bridge br-p3 datapath_type=dummy fail-mode=standalone other-config:hwaddr=$HWADDR_BRP3
481
482 ovs-vsctl add-port br-p1 p1-0 -- set interface p1-0 type=patch options:peer=p0-1 ofport_request=2
483 ovs-vsctl add-port br-p2 p2-0 -- set interface p2-0 type=patch options:peer=p0-2 ofport_request=2
484 ovs-vsctl add-port br-p3 p3-0 -- set interface p3-0 type=patch options:peer=p0-3 ofport_request=2
485 ovs-vsctl add-port br0 p0-1 -- set interface p0-1 type=patch options:peer=p1-0 ofport_request=10
486 ovs-vsctl add-port br0 p0-2 -- set interface p0-2 type=patch options:peer=p2-0 ofport_request=20
487 ovs-vsctl add-port br0 p0-3 -- set interface p0-3 type=patch options:peer=p3-0 ofport_request=30
488
489 # Populate the MAC table of br0
490 ovs-ofctl del-flows br0
491 ovs-ofctl add-flow br0 dl_dst=$HWADDR_BRP1,actions=10
492 ovs-ofctl add-flow br0 dl_dst=$HWADDR_BRP2,actions=20
493 ovs-ofctl add-flow br0 dl_dst=$HWADDR_BRP3,actions=30
494
495 ovs-ofctl del-flows br-in1
496 ovs-ofctl del-flows br-in2
497 ovs-ofctl del-flows br-in3
498 ovs-ofctl del-flows br-p1
499 ovs-ofctl del-flows br-p2
500 ovs-ofctl del-flows br-p3
501 ], [0])
502
503 ### Setup vxlan-gpe tunnels
504 AT_CHECK([
505 ovs-vsctl add-port br-in1 vxlangpe12 -- \
506 set interface vxlangpe12 type=vxlan options:exts=gpe options:remote_ip=10.0.0.2 options:packet_type=ptap ofport_request=1020
507 ovs-vsctl add-port br-in1 vxlangpe13 -- \
508 set interface vxlangpe13 type=vxlan options:exts=gpe options:remote_ip=10.0.0.3 options:packet_type=ptap ofport_request=1030
509
510 ovs-vsctl add-port br-in2 vxlangpe21 -- \
511 set interface vxlangpe21 type=vxlan options:exts=gpe options:remote_ip=20.0.0.1 options:packet_type=ptap ofport_request=2010
512 ovs-vsctl add-port br-in2 vxlangpe23 -- \
513 set interface vxlangpe23 type=vxlan options:exts=gpe options:remote_ip=20.0.0.3 options:packet_type=ptap ofport_request=2030
514
515 ovs-vsctl add-port br-in3 vxlangpe31 -- \
516 set interface vxlangpe31 type=vxlan options:exts=gpe options:remote_ip=30.0.0.1 options:packet_type=ptap ofport_request=3010
517 ovs-vsctl add-port br-in3 vxlangpe32 -- \
518 set interface vxlangpe32 type=vxlan options:exts=gpe options:remote_ip=30.0.0.2 options:packet_type=ptap ofport_request=3020
519
520 ovs-appctl netdev-dummy/ip4addr br-p1 10.0.0.1/24
521 ovs-appctl ovs/route/add 10.0.0.0/24 br-p1
522 ovs-appctl tnl/arp/set br-p1 10.0.0.1 $HWADDR_BRP1
523 ovs-appctl tnl/arp/set br-p1 10.0.0.2 $HWADDR_BRP2
524 ovs-appctl tnl/arp/set br-p1 10.0.0.3 $HWADDR_BRP3
525
526 ovs-appctl netdev-dummy/ip4addr br-p2 20.0.0.2/24
527 ovs-appctl ovs/route/add 20.0.0.0/24 br-p2
528 ovs-appctl tnl/arp/set br-p2 20.0.0.1 $HWADDR_BRP1
529 ovs-appctl tnl/arp/set br-p2 20.0.0.2 $HWADDR_BRP2
530 ovs-appctl tnl/arp/set br-p2 20.0.0.3 $HWADDR_BRP3
531
532 ovs-appctl netdev-dummy/ip4addr br-p3 30.0.0.3/24
533 ovs-appctl ovs/route/add 30.0.0.0/24 br-p3
534 ovs-appctl tnl/arp/set br-p3 30.0.0.1 $HWADDR_BRP1
535 ovs-appctl tnl/arp/set br-p3 30.0.0.2 $HWADDR_BRP2
536 ovs-appctl tnl/arp/set br-p3 30.0.0.3 $HWADDR_BRP3
537 ], [0], [stdout])
538
539 AT_CHECK([
540 ovs-appctl ovs/route/add 10.0.0.0/24 br-p1
541 ovs-appctl tnl/arp/set br-p1 10.0.0.1 $HWADDR_BRP1
542 ovs-appctl tnl/arp/set br-p1 10.0.0.2 $HWADDR_BRP2
543 ovs-appctl tnl/arp/set br-p1 10.0.0.3 $HWADDR_BRP3
544 ], [0], [stdout])
545
546 AT_CHECK([
547 ovs-appctl ovs/route/add 20.0.0.0/24 br-p2
548 ovs-appctl tnl/arp/set br-p2 20.0.0.1 $HWADDR_BRP1
549 ovs-appctl tnl/arp/set br-p2 20.0.0.2 $HWADDR_BRP2
550 ovs-appctl tnl/arp/set br-p2 20.0.0.3 $HWADDR_BRP3
551 ], [0], [stdout])
552
553 AT_CHECK([
554 ovs-appctl ovs/route/add 30.0.0.0/24 br-p3
555 ovs-appctl tnl/arp/set br-p3 30.0.0.1 $HWADDR_BRP1
556 ovs-appctl tnl/arp/set br-p3 30.0.0.2 $HWADDR_BRP2
557 ovs-appctl tnl/arp/set br-p3 30.0.0.3 $HWADDR_BRP3
558 ], [0], [stdout])
559
560 AT_CHECK([
561 ovs-appctl ovs/route/show | grep User:
562 ], [0], [dnl
563 User: 10.0.0.0/24 dev br-p1 SRC 10.0.0.1
564 User: 20.0.0.0/24 dev br-p2 SRC 20.0.0.2
565 User: 30.0.0.0/24 dev br-p3 SRC 30.0.0.3
566 ])
567
568 AT_CHECK([
569 ovs-appctl tnl/neigh/show | grep br-p | sort
570 ], [0], [stdout])
571
572
573 ### Flows in br-p<x>to twist TEP IP addresses in tunnel IP headers
574 AT_CHECK([
575 ovs-ofctl add-flow br-p1 in_port:LOCAL,actions=2
576 ovs-ofctl add-flow br-p1 in_port:2,ip,nw_dst:20.0.0.1,actions=mod_nw_dst:10.0.0.1,mod_nw_src:10.0.0.2,LOCAL
577 ovs-ofctl add-flow br-p1 in_port:2,ip,nw_dst:30.0.0.1,actions=mod_nw_dst:10.0.0.1,mod_nw_src:10.0.0.3,LOCAL
578
579 ovs-ofctl add-flow br-p2 in_port:LOCAL,actions=2
580 ovs-ofctl add-flow br-p2 in_port:2,ip,nw_dst:10.0.0.2,actions=mod_nw_dst:20.0.0.2,mod_nw_src:20.0.0.1,LOCAL
581 ovs-ofctl add-flow br-p2 in_port:2,ip,nw_dst:30.0.0.2,actions=mod_nw_dst:20.0.0.2,mod_nw_src:20.0.0.3,LOCAL
582
583 ovs-ofctl add-flow br-p3 in_port:LOCAL,actions=2
584 ovs-ofctl add-flow br-p3 in_port:2,ip,nw_dst:10.0.0.3,actions=mod_nw_dst:30.0.0.3,mod_nw_src:30.0.0.1,LOCAL
585 ovs-ofctl add-flow br-p3 in_port:2,ip,nw_dst:20.0.0.3,actions=mod_nw_dst:30.0.0.3,mod_nw_src:30.0.0.2,LOCAL
586 ], [0])
587
588 AT_CHECK([
589 ovs-ofctl dump-flows br-p1 | ofctl_strip | sort | grep actions
590 ovs-ofctl dump-flows br-p2 | ofctl_strip | sort | grep actions
591 ovs-ofctl dump-flows br-p3 | ofctl_strip | sort | grep actions
592 ], [0], [dnl
593 in_port=LOCAL actions=output:2
594 ip,in_port=2,nw_dst=20.0.0.1 actions=mod_nw_dst:10.0.0.1,mod_nw_src:10.0.0.2,LOCAL
595 ip,in_port=2,nw_dst=30.0.0.1 actions=mod_nw_dst:10.0.0.1,mod_nw_src:10.0.0.3,LOCAL
596 in_port=LOCAL actions=output:2
597 ip,in_port=2,nw_dst=10.0.0.2 actions=mod_nw_dst:20.0.0.2,mod_nw_src:20.0.0.1,LOCAL
598 ip,in_port=2,nw_dst=30.0.0.2 actions=mod_nw_dst:20.0.0.2,mod_nw_src:20.0.0.3,LOCAL
599 in_port=LOCAL actions=output:2
600 ip,in_port=2,nw_dst=10.0.0.3 actions=mod_nw_dst:30.0.0.3,mod_nw_src:30.0.0.1,LOCAL
601 ip,in_port=2,nw_dst=20.0.0.3 actions=mod_nw_dst:30.0.0.3,mod_nw_src:30.0.0.2,LOCAL
602 ])
603
604 ### Setup test ports for traffic injection
605 N1_IP=192.168.10.10
606 N2_IP=192.168.10.20
607 N3_IP=192.168.10.30
608 N1_MAC=aa:55:aa:55:00:01
609 N2_MAC=aa:55:aa:55:00:02
610 N3_MAC=aa:55:aa:55:00:03
611 N1_OFPORT=10
612 N2_OFPORT=20
613 N3_OFPORT=30
614
615 AT_CHECK([
616 ovs-vsctl add-port br-in1 n1 -- \
617 set interface n1 type=dummy ofport_request=$N1_OFPORT options:tx_pcap=n1.pcap
618 ovs-vsctl add-port br-in2 n2 -- \
619 set interface n2 type=dummy ofport_request=$N2_OFPORT options:tx_pcap=n2.pcap
620 ovs-vsctl add-port br-in3 n3 -- \
621 set interface n3 type=dummy ofport_request=$N3_OFPORT options:tx_pcap=n3.pcap
622 ], [0])
623
624 #N1_DPPORT=$(ovs-appctl dpif/show | grep "n1 10" | sed 's|.*/\([[0-9]]*\):.*|\1|')
625 #N2_DPPORT=$(ovs-appctl dpif/show | grep "n2 20" | sed 's|.*/\([[0-9]]*\):.*|\1|')
626 #N3_DPPORT=$(ovs-appctl dpif/show | grep "n3 30" | sed 's|.*/\([[0-9]]*\):.*|\1|')
627
628 ### Verify datapath configuration
629 AT_CHECK([
630 ovs-appctl dpif/show | grep -v hit | sed 's/\t/ /g'
631 ], [0], [dnl
632 br-in1:
633 br-in1 65534/101: (dummy-internal)
634 n1 10/4: (dummy)
635 vxlangpe12 1020/4789: (vxlan: packet_type=ptap, remote_ip=10.0.0.2)
636 vxlangpe13 1030/4789: (vxlan: packet_type=ptap, remote_ip=10.0.0.3)
637 br-in2:
638 br-in2 65534/102: (dummy-internal)
639 n2 20/5: (dummy)
640 vxlangpe21 2010/4789: (vxlan: packet_type=ptap, remote_ip=20.0.0.1)
641 vxlangpe23 2030/4789: (vxlan: packet_type=ptap, remote_ip=20.0.0.3)
642 br-in3:
643 br-in3 65534/103: (dummy-internal)
644 n3 30/6: (dummy)
645 vxlangpe31 3010/4789: (vxlan: packet_type=ptap, remote_ip=30.0.0.1)
646 vxlangpe32 3020/4789: (vxlan: packet_type=ptap, remote_ip=30.0.0.2)
647 br-p1:
648 br-p1 65534/1: (dummy-internal)
649 p1-0 2/none: (patch: peer=p0-1)
650 br-p2:
651 br-p2 65534/2: (dummy-internal)
652 p2-0 2/none: (patch: peer=p0-2)
653 br-p3:
654 br-p3 65534/3: (dummy-internal)
655 p3-0 2/none: (patch: peer=p0-3)
656 br0:
657 br0 65534/100: (dummy-internal)
658 p0-1 10/none: (patch: peer=p1-0)
659 p0-2 20/none: (patch: peer=p2-0)
660 p0-3 30/none: (patch: peer=p3-0)
661 ])
662
663 ### Setup SFC flow configuration
664
665 # br-in1 is SFC classifier (table 1) and final SFF (tables 2,3)
666 AT_DATA([br-in1.txt], [dnl
667 table=0,in_port=10,ip,actions=decap(),goto_table:1
668 table=0,in_port=10,packet_type=(1,0x800),actions=goto_table:1
669 table=0,in_port=1020,packet_type=(1,0x894f),actions=goto_table:2
670 table=0,in_port=1030,packet_type=(1,0x894f),actions=goto_table:2
671 table=1,priority=32,packet_type=(1,0x800),nw_dst=192.168.10.30,actions=encap(nsh(md_type=1)),set_field:0x3000->nsh_spi,output:1030
672 table=1,priority=0,packet_type=(1,0x800),nw_dst=0.0.0.0/0,actions=encap(nsh(md_type=1)),set_field:0x3020->nsh_spi,output:1020
673 table=2,packet_type=(1,0x894f),nsh_spi=0x1000,nsh_si=255,actions=decap(),goto_table:3
674 table=2,packet_type=(1,0x894f),nsh_spi=0x1020,nsh_si=254,actions=decap(),goto_table:3
675 table=3,ip,actions=set_field:aa:55:aa:55:00:01->dl_dst,output:10
676 table=3,packet_type=(1,0x800),actions=encap(ethernet),set_field:aa:55:aa:55:00:01->dl_dst,output:10
677 ])
678
679 # br-in2 is intermediate SFF (table 2) and simulated SF (table 4)
680 AT_DATA([br-in2.txt], [dnl
681 table=0,in_port=2010,packet_type=(1,0x894f),actions=goto_table:2
682 table=0,in_port=2030,packet_type=(1,0x894f),actions=goto_table:2
683 table=2,packet_type=(1,0x894f),nsh_spi=0x3020,nsh_si=255,actions=encap(ethernet),set_field:11:22:33:44:55:66->dl_dst,goto_table:4
684 table=2,packet_type=(1,0x894f),nsh_spi=0x3020,nsh_si=254,actions=output:2030
685 table=2,packet_type=(1,0x894f),nsh_spi=0x1020,nsh_si=255,actions=encap(ethernet),set_field:77:88:99:aa:bb:cc->dl_dst,goto_table:4
686 table=2,packet_type=(1,0x894f),nsh_spi=0x1020,nsh_si=254,actions=output:2010
687 table=4,dl_type=0x894f,dl_dst=11:22:33:44:55:66,actions=set_field:254->nsh_si,decap(),resubmit(,2)
688 table=4,dl_type=0x894f,dl_dst=77:88:99:aa:bb:cc,actions=dec_nsh_ttl,decap(),resubmit(,2)
689 ])
690
691 # br-in3 is SFC classifier (table 1) and final SFF (tables 2,3)
692 AT_DATA([br-in3.txt], [dnl
693 table=0,in_port=30,ip,actions=decap(),goto_table:1
694 table=0,in_port=30,packet_type=(1,0x800),actions=goto_table:1
695 table=0,in_port=3010,packet_type=(1,0x894f),actions=goto_table:2
696 table=0,in_port=3020,packet_type=(1,0x894f),actions=goto_table:2
697 table=1,priority=32,packet_type=(1,0x800),nw_dst=192.168.10.10,actions=encap(nsh(md_type=1)),set_field:0x1000->nsh_spi,3010
698 table=1,priority=0,packet_type=(1,0x800),nw_dst=0.0.0.0/0,actions=encap(nsh(md_type=1)),set_field:0x1020->nsh_spi,3020
699 table=2,packet_type=(1,0x894f),nsh_spi=0x3000,nsh_si=255,actions=decap(),goto_table:3
700 table=2,packet_type=(1,0x894f),nsh_spi=0x3020,nsh_si=254,actions=decap(),goto_table:3
701 table=3,ip,actions=set_field:aa:55:aa:55:00:03->dl_dst,output:30
702 table=3,packet_type=(1,0x800),actions=encap(ethernet),set_field:aa:55:aa:55:00:03->dl_dst,output:30
703 ])
704
705 AT_CHECK([
706 ovs-ofctl -Oopenflow13 add-flows br-in1 br-in1.txt
707 ovs-ofctl -Oopenflow13 add-flows br-in2 br-in2.txt
708 ovs-ofctl -Oopenflow13 add-flows br-in3 br-in3.txt
709 ])
710
711 ### Inject ICMP Echo request test packets
712
713 # N1 to N3, via the direct SF path with spi 0x3000
714 AT_CHECK([
715 ovs-appctl netdev-dummy/receive n1 1e2ce92a669e3a6dd2099cab0800450000548a53400040011addc0a80a0ac0a80a1e08006f200a4d0001fc509a58000000002715020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
716 ovs-appctl netdev-dummy/receive n1 1e2ce92a669e3a6dd2099cab0800450000548a83400040011aadc0a80a0ac0a80a1e0800b7170a4d0002fd509a5800000000de1c020000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
717 ], [0], [ignore])
718
719 ovs-appctl time/warp 1000
720 ovs-appctl time/warp 1000
721 ovs-appctl time/warp 1000
722
723 AT_CHECK([
724 ovs-appctl dpctl/dump-flows dummy@ovs-dummy | strip_used | grep -v ipv6 | sort
725 ], [0], [flow-dump from non-dpdk interfaces:
726 recirc_id(0),in_port(4),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(dst=192.168.10.30,frag=no), packets:1, bytes:98, used:0.0s, actions:pop_eth,push_nsh(flags=0,ttl=63,mdtype=1,np=1,spi=0x3000,si=255,c1=0x0,c2=0x0,c3=0x0,c4=0x0),clone(tnl_push(tnl_port(4789),header(size=50,type=4,eth(dst=aa:55:00:00:00:03,src=aa:55:00:00:00:01,dl_type=0x0800),ipv4(src=10.0.0.1,dst=10.0.0.3,proto=17,tos=0,ttl=64,frag=0x4000),udp(src=0,dst=4789,csum=0x0),vxlan(flags=0xc000004,vni=0x0)),out_port(1)),set(ipv4(src=30.0.0.1,dst=30.0.0.3)),tnl_pop(4789))
727 tunnel(tun_id=0x0,src=30.0.0.1,dst=30.0.0.3,flags(-df-csum+key)),recirc_id(0),in_port(4789),packet_type(ns=1,id=0x894f),nsh(np=1,spi=0x3000,si=255), packets:1, bytes:108, used:0.0s, actions:pop_nsh(),recirc(0x1)
728 tunnel(tun_id=0x0,src=30.0.0.1,dst=30.0.0.3,flags(-df-csum+key)),recirc_id(0x1),in_port(4789),packet_type(ns=1,id=0x800),ipv4(frag=no), packets:1, bytes:84, used:0.0s, actions:push_eth(src=00:00:00:00:00:00,dst=aa:55:aa:55:00:03),6
729 ])
730
731 AT_CHECK([
732 ovs-ofctl -Oopenflow13 dump-flows br-in1 | ofctl_strip | sort | grep actions
733 ovs-ofctl -Oopenflow13 dump-flows br-in2 | ofctl_strip | sort | grep actions
734 ovs-ofctl -Oopenflow13 dump-flows br-in3 | ofctl_strip | sort | grep actions
735 ], [0], [dnl
736 n_packets=2, n_bytes=196, ip,in_port=10 actions=decap(),goto_table:1
737 packet_type=(1,0x800),in_port=10 actions=goto_table:1
738 packet_type=(1,0x894f),in_port=1020 actions=goto_table:2
739 packet_type=(1,0x894f),in_port=1030 actions=goto_table:2
740 table=1, n_packets=2, n_bytes=196, priority=32,packet_type=(1,0x800),nw_dst=192.168.10.30 actions=encap(nsh(md_type=1)),set_field:0x3000->nsh_spi,output:1030
741 table=1, priority=0,packet_type=(1,0x800) actions=encap(nsh(md_type=1)),set_field:0x3020->nsh_spi,output:1020
742 table=2, packet_type=(1,0x894f),nsh_spi=0x1000,nsh_si=255 actions=decap(),goto_table:3
743 table=2, packet_type=(1,0x894f),nsh_spi=0x1020,nsh_si=254 actions=decap(),goto_table:3
744 table=3, ip actions=set_field:aa:55:aa:55:00:01->eth_dst,output:10
745 table=3, packet_type=(1,0x800) actions=encap(ethernet),set_field:aa:55:aa:55:00:01->eth_dst,output:10
746 packet_type=(1,0x894f),in_port=2010 actions=goto_table:2
747 packet_type=(1,0x894f),in_port=2030 actions=goto_table:2
748 table=2, packet_type=(1,0x894f),nsh_spi=0x1020,nsh_si=254 actions=output:2010
749 table=2, packet_type=(1,0x894f),nsh_spi=0x1020,nsh_si=255 actions=encap(ethernet),set_field:77:88:99:aa:bb:cc->eth_dst,goto_table:4
750 table=2, packet_type=(1,0x894f),nsh_spi=0x3020,nsh_si=254 actions=output:2030
751 table=2, packet_type=(1,0x894f),nsh_spi=0x3020,nsh_si=255 actions=encap(ethernet),set_field:11:22:33:44:55:66->eth_dst,goto_table:4
752 table=4, dl_dst=11:22:33:44:55:66,dl_type=0x894f actions=set_field:254->nsh_si,decap(),resubmit(,2)
753 table=4, dl_dst=77:88:99:aa:bb:cc,dl_type=0x894f actions=dec_nsh_ttl,decap(),resubmit(,2)
754 ip,in_port=30 actions=decap(),goto_table:1
755 n_packets=2, n_bytes=216, packet_type=(1,0x894f),in_port=3010 actions=goto_table:2
756 packet_type=(1,0x800),in_port=30 actions=goto_table:1
757 packet_type=(1,0x894f),in_port=3020 actions=goto_table:2
758 table=1, priority=0,packet_type=(1,0x800) actions=encap(nsh(md_type=1)),set_field:0x1020->nsh_spi,output:3020
759 table=1, priority=32,packet_type=(1,0x800),nw_dst=192.168.10.10 actions=encap(nsh(md_type=1)),set_field:0x1000->nsh_spi,output:3010
760 table=2, n_packets=2, n_bytes=216, packet_type=(1,0x894f),nsh_spi=0x3000,nsh_si=255 actions=decap(),goto_table:3
761 table=2, packet_type=(1,0x894f),nsh_spi=0x3020,nsh_si=254 actions=decap(),goto_table:3
762 table=3, ip actions=set_field:aa:55:aa:55:00:03->eth_dst,output:30
763 table=3, n_packets=2, n_bytes=168, packet_type=(1,0x800) actions=encap(ethernet),set_field:aa:55:aa:55:00:03->eth_dst,output:30
764 ])
765
766 # Clear up megaflow cache
767 ovs-appctl time/warp 11000
768
769 # N1 to some other IP destination (192.168.10.20), via the indirect SF path with spi 0x3020
770 AT_CHECK([
771 ovs-appctl netdev-dummy/receive n1 461e7d1a95a13a6dd2099cab080045000054500b40004001552fc0a80a0ac0a80a140800531f09a90001e9509a580000000055ba030000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637
772 ovs-appctl netdev-dummy/receive n1 461e7d1a95a13a6dd2099cab08004500005450934000400154a7c0a80a0ac0a80a140800f41d09a90002ea509a5800000000b3ba030000000000101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f3031323334353637], [0], [ignore])
773
774 ovs-appctl time/warp 1000
775 ovs-appctl time/warp 1000
776
777 AT_CHECK([
778 ovs-appctl dpctl/dump-flows dummy@ovs-dummy | strip_used | grep -v ipv6 | sort
779 ], [0], [flow-dump from non-dpdk interfaces:
780 recirc_id(0),in_port(4),packet_type(ns=0,id=0),eth_type(0x0800),ipv4(dst=192.168.10.20/255.255.255.248,frag=no), packets:1, bytes:98, used:0.0s, actions:pop_eth,push_nsh(flags=0,ttl=63,mdtype=1,np=1,spi=0x3020,si=255,c1=0x0,c2=0x0,c3=0x0,c4=0x0),clone(tnl_push(tnl_port(4789),header(size=50,type=4,eth(dst=aa:55:00:00:00:02,src=aa:55:00:00:00:01,dl_type=0x0800),ipv4(src=10.0.0.1,dst=10.0.0.2,proto=17,tos=0,ttl=64,frag=0x4000),udp(src=0,dst=4789,csum=0x0),vxlan(flags=0xc000004,vni=0x0)),out_port(1)),set(ipv4(src=20.0.0.1,dst=20.0.0.2)),tnl_pop(4789))
781 tunnel(tun_id=0x0,src=20.0.0.1,dst=20.0.0.2,flags(-df-csum+key)),recirc_id(0),in_port(4789),packet_type(ns=1,id=0x894f),nsh(spi=0x3020,si=255), packets:1, bytes:108, used:0.0s, actions:push_eth(src=00:00:00:00:00:00,dst=11:22:33:44:55:66),set(nsh(spi=0x3020,si=254)),pop_eth,clone(tnl_push(tnl_port(4789),header(size=50,type=4,eth(dst=aa:55:00:00:00:03,src=aa:55:00:00:00:02,dl_type=0x0800),ipv4(src=20.0.0.2,dst=20.0.0.3,proto=17,tos=0,ttl=64,frag=0x4000),udp(src=0,dst=4789,csum=0x0),vxlan(flags=0xc000004,vni=0x0)),out_port(2)),set(ipv4(src=30.0.0.2,dst=30.0.0.3)),tnl_pop(4789))
782 tunnel(tun_id=0x0,src=30.0.0.2,dst=30.0.0.3,flags(-df-csum+key)),recirc_id(0),in_port(4789),packet_type(ns=1,id=0x894f),nsh(np=1,spi=0x3020,si=254), packets:1, bytes:108, used:0.0s, actions:pop_nsh(),recirc(0x2)
783 tunnel(tun_id=0x0,src=30.0.0.2,dst=30.0.0.3,flags(-df-csum+key)),recirc_id(0x2),in_port(4789),packet_type(ns=1,id=0x800),ipv4(frag=no), packets:1, bytes:84, used:0.0s, actions:push_eth(src=00:00:00:00:00:00,dst=aa:55:aa:55:00:03),6
784 ])
785
786 AT_CHECK([
787 ovs-ofctl -Oopenflow13 dump-flows br-in1 | ofctl_strip | sort | grep actions
788 ovs-ofctl -Oopenflow13 dump-flows br-in2 | ofctl_strip | sort | grep actions
789 ovs-ofctl -Oopenflow13 dump-flows br-in3 | ofctl_strip | sort | grep actions
790 ], [0], [dnl
791 n_packets=4, n_bytes=392, ip,in_port=10 actions=decap(),goto_table:1
792 packet_type=(1,0x800),in_port=10 actions=goto_table:1
793 packet_type=(1,0x894f),in_port=1020 actions=goto_table:2
794 packet_type=(1,0x894f),in_port=1030 actions=goto_table:2
795 table=1, n_packets=2, n_bytes=196, priority=0,packet_type=(1,0x800) actions=encap(nsh(md_type=1)),set_field:0x3020->nsh_spi,output:1020
796 table=1, n_packets=2, n_bytes=196, priority=32,packet_type=(1,0x800),nw_dst=192.168.10.30 actions=encap(nsh(md_type=1)),set_field:0x3000->nsh_spi,output:1030
797 table=2, packet_type=(1,0x894f),nsh_spi=0x1000,nsh_si=255 actions=decap(),goto_table:3
798 table=2, packet_type=(1,0x894f),nsh_spi=0x1020,nsh_si=254 actions=decap(),goto_table:3
799 table=3, ip actions=set_field:aa:55:aa:55:00:01->eth_dst,output:10
800 table=3, packet_type=(1,0x800) actions=encap(ethernet),set_field:aa:55:aa:55:00:01->eth_dst,output:10
801 n_packets=2, n_bytes=216, packet_type=(1,0x894f),in_port=2010 actions=goto_table:2
802 packet_type=(1,0x894f),in_port=2030 actions=goto_table:2
803 table=2, n_packets=2, n_bytes=216, packet_type=(1,0x894f),nsh_spi=0x3020,nsh_si=254 actions=output:2030
804 table=2, n_packets=2, n_bytes=216, packet_type=(1,0x894f),nsh_spi=0x3020,nsh_si=255 actions=encap(ethernet),set_field:11:22:33:44:55:66->eth_dst,goto_table:4
805 table=2, packet_type=(1,0x894f),nsh_spi=0x1020,nsh_si=254 actions=output:2010
806 table=2, packet_type=(1,0x894f),nsh_spi=0x1020,nsh_si=255 actions=encap(ethernet),set_field:77:88:99:aa:bb:cc->eth_dst,goto_table:4
807 table=4, dl_dst=77:88:99:aa:bb:cc,dl_type=0x894f actions=dec_nsh_ttl,decap(),resubmit(,2)
808 table=4, n_packets=2, n_bytes=216, dl_dst=11:22:33:44:55:66,dl_type=0x894f actions=set_field:254->nsh_si,decap(),resubmit(,2)
809 ip,in_port=30 actions=decap(),goto_table:1
810 n_packets=2, n_bytes=216, packet_type=(1,0x894f),in_port=3010 actions=goto_table:2
811 n_packets=2, n_bytes=216, packet_type=(1,0x894f),in_port=3020 actions=goto_table:2
812 packet_type=(1,0x800),in_port=30 actions=goto_table:1
813 table=1, priority=0,packet_type=(1,0x800) actions=encap(nsh(md_type=1)),set_field:0x1020->nsh_spi,output:3020
814 table=1, priority=32,packet_type=(1,0x800),nw_dst=192.168.10.10 actions=encap(nsh(md_type=1)),set_field:0x1000->nsh_spi,output:3010
815 table=2, n_packets=2, n_bytes=216, packet_type=(1,0x894f),nsh_spi=0x3000,nsh_si=255 actions=decap(),goto_table:3
816 table=2, n_packets=2, n_bytes=216, packet_type=(1,0x894f),nsh_spi=0x3020,nsh_si=254 actions=decap(),goto_table:3
817 table=3, ip actions=set_field:aa:55:aa:55:00:03->eth_dst,output:30
818 table=3, n_packets=4, n_bytes=336, packet_type=(1,0x800) actions=encap(ethernet),set_field:aa:55:aa:55:00:03->eth_dst,output:30
819 ])
820
821 OVS_VSWITCHD_STOP
822 AT_CLEANUP