3 # Expands into the proper ovs-vsctl commands to create a bridge with the
4 # appropriate type and properties
5 m4_define([_ADD_BR], [[add-br $1 -- set Bridge $1 datapath_type="netdev" protocols=OpenFlow10,OpenFlow11,OpenFlow12,OpenFlow13,OpenFlow14,OpenFlow15 fail-mode=secure ]])
7 # OVS_TRAFFIC_VSWITCHD_START([vsctl-args], [vsctl-output], [=override])
9 # Creates a database and starts ovsdb-server, starts ovs-vswitchd
10 # connected to that database, calls ovs-vsctl to create a bridge named
11 # br0 with predictable settings, passing 'vsctl-args' as additional
12 # commands to ovs-vsctl. If 'vsctl-args' causes ovs-vsctl to provide
13 # output (e.g. because it includes "create" commands) then 'vsctl-output'
14 # specifies the expected output after filtering through uuidfilt.
15 m4_define([OVS_TRAFFIC_VSWITCHD_START],
17 OVS_WAIT_WHILE([ip link show ovs-netdev])
18 _OVS_VSWITCHD_START([--disable-system])
19 dnl Add bridges, ports, etc.
20 OVS_WAIT_WHILE([ip link show br0])
21 AT_CHECK([ovs-vsctl -- _ADD_BR([br0]) -- $1 m4_if([$2], [], [], [| uuidfilt])], [0], [$2])
24 # OVS_TRAFFIC_VSWITCHD_STOP([WHITELIST], [extra_cmds])
26 # Gracefully stops ovs-vswitchd and ovsdb-server, checking their log files
27 # for messages with severity WARN or higher and signaling an error if any
28 # is present. The optional WHITELIST may contain shell-quoted "sed"
29 # commands to delete any warnings that are actually expected, e.g.:
31 # OVS_TRAFFIC_VSWITCHD_STOP(["/expected error/d"])
33 # 'extra_cmds' are shell commands to be executed afte OVS_VSWITCHD_STOP() is
34 # invoked. They can be used to perform additional cleanups such as name space
36 m4_define([OVS_TRAFFIC_VSWITCHD_STOP],
37 [OVS_VSWITCHD_STOP([dnl
38 $1";/netdev_linux.*obtaining netdev stats via vport failed/d
39 /dpif_netlink.*Generic Netlink family 'ovs_datapath' does not exist. The Open vSwitch kernel module is probably not loaded./d
40 /dpif_netdev(revalidator.*)|ERR|internal error parsing flow key.*proto=2.*/d
41 /dpif(revalidator.*)|WARN|netdev@ovs-netdev: failed to.*proto=2.*/d"])
45 # CONFIGURE_VETH_OFFLOADS([VETH])
47 # Disable TX offloads for veths. The userspace datapath uses the AF_PACKET
48 # socket to receive packets for veths. Unfortunately, the AF_PACKET socket
49 # doesn't play well with offloads:
50 # 1. GSO packets are received without segmentation and therefore discarded.
51 # 2. Packets with offloaded partial checksum are received with the wrong
52 # checksum, therefore discarded by the receiver.
54 # By disabling tx offloads in the non-OVS side of the veth peer we make sure
55 # that the AF_PACKET socket will not receive bad packets.
57 # This is a workaround, and should be removed when offloads are properly
58 # supported in netdev-linux.
59 m4_define([CONFIGURE_VETH_OFFLOADS],
60 [AT_CHECK([ethtool -K $1 tx off], [0], [ignore], [ignore])]
65 # Perform requirements checks for running conntrack tests.
67 m4_define([CHECK_CONNTRACK], [])
69 # CHECK_CONNTRACK_ALG()
71 # Perform requirements checks for running conntrack ALG tests. The userspace
72 # supports FTP and TFTP.
74 m4_define([CHECK_CONNTRACK_ALG])
76 # CHECK_CONNTRACK_LOCAL_STACK()
78 # Perform requirements checks for running conntrack tests with local stack.
79 # While the kernel connection tracker automatically passes all the connection
80 # tracking state from an internal port to the OpenvSwitch kernel module, there
81 # is simply no way of doing that with the userspace, so skip the tests.
82 m4_define([CHECK_CONNTRACK_LOCAL_STACK],
87 # CHECK_CONNTRACK_FRAG_OVERLAP()
89 # The userspace datapath supports fragment overlap check.
90 m4_define([CHECK_CONNTRACK_FRAG_OVERLAP])
92 # CHECK_CONNTRACK_NAT()
94 # Perform requirements checks for running conntrack NAT tests. The userspace
95 # datapath supports NAT.
97 m4_define([CHECK_CONNTRACK_NAT])
99 # CHECK_CONNTRACK_TIMEOUT()
101 # Perform requirements checks for running conntrack customized timeout tests.
102 * The userspace datapath does not support this feature yet.
104 m4_define([CHECK_CONNTRACK_TIMEOUT],
109 # CHECK_CT_DPIF_SET_GET_MAXCONNS()
111 # Perform requirements checks for running ovs-dpctl ct-set-maxconns or
112 # ovs-dpctl ct-get-maxconns. The userspace datapath does support this feature.
113 m4_define([CHECK_CT_DPIF_SET_GET_MAXCONNS])
115 # CHECK_CT_DPIF_GET_NCONNS()
117 # Perform requirements checks for running ovs-dpctl ct-get-nconns. The
118 # userspace datapath does support this feature.
119 m4_define([CHECK_CT_DPIF_GET_NCONNS])
121 # DPCTL_SET_MIN_FRAG_SIZE()
123 # The userspace datapath supports this command.
124 m4_define([DPCTL_SET_MIN_FRAG_SIZE],
126 AT_CHECK([ovs-appctl dpctl/ipf-set-min-frag v4 400], [], [dnl
127 setting minimum fragment size successful
129 AT_CHECK([ovs-appctl dpctl/ipf-set-min-frag v6 400], [], [dnl
130 setting minimum fragment size successful
134 # DPCTL_MODIFY_FRAGMENTATION()
136 # The userspace datapath supports this command.
137 m4_define([DPCTL_MODIFY_FRAGMENTATION],
139 AT_CHECK([ovs-appctl dpctl/ipf-set-min-frag v4 1000], [], [dnl
140 setting minimum fragment size successful
142 AT_CHECK([ovs-appctl dpctl/ipf-set-max-nfrags 500], [], [dnl
143 setting maximum fragments successful
145 AT_CHECK([ovs-appctl dpctl/ipf-get-status], [], [dnl
146 Fragmentation Module Status
147 ---------------------------
150 max num frags (v4/v6): 500
152 min v4 frag size: 1000
154 v4 frags completed: 0
156 v4 frags too small: 0
157 v4 frags overlapped: 0
159 min v6 frag size: 1280
161 v6 frags completed: 0
163 v6 frags too small: 0
164 v6 frags overlapped: 0
169 # DPCTL_CHECK_FRAGMENTATION_PASS()
171 # Used to check fragmentation counters for some fragmentation tests using
172 # the userspace datapath.
173 m4_define([DPCTL_CHECK_FRAGMENTATION_PASS],
175 AT_CHECK([ovs-appctl dpctl/ipf-get-status --more], [], [dnl
176 Fragmentation Module Status
177 ---------------------------
180 max num frags (v4/v6): 500
182 min v4 frag size: 1000
183 v4 frags accepted: 30
184 v4 frags completed: 30
186 v4 frags too small: 0
187 v4 frags overlapped: 0
189 min v6 frag size: 1280
191 v6 frags completed: 0
193 v6 frags too small: 0
194 v6 frags overlapped: 0
202 # DPCTL_CHECK_V6_FRAGMENTATION_PASS()
204 # Used to check fragmentation counters for some fragmentation tests using
205 # the userspace datapath.
206 m4_define([DPCTL_CHECK_V6_FRAGMENTATION_PASS],
208 AT_CHECK([ovs-appctl dpctl/ipf-get-status --more], [], [dnl
209 Fragmentation Module Status
210 ---------------------------
213 max num frags (v4/v6): 1000
215 min v4 frag size: 1200
217 v4 frags completed: 0
219 v4 frags too small: 0
220 v4 frags overlapped: 0
222 min v6 frag size: 1280
223 v6 frags accepted: 30
224 v6 frags completed: 30
226 v6 frags too small: 0
227 v6 frags overlapped: 0
235 # FORMAT_FRAG_LIST([])
237 # Strip content from the piped input which can differ from test to test; recirc_id
238 # and ip_id fields in an ipf_list vary from test to test and hence are cleared.
239 m4_define([FORMAT_FRAG_LIST],
240 [[sed -e 's/ip_id=[0-9]*/ip_id=<cleared>/g' -e 's/recirc_id=[0-9]*/recirc_id=<cleared>/g']])
242 # DPCTL_CHECK_FRAGMENTATION_FAIL()
244 # Used to check fragmentation counters for some fragmentation tests using
245 # the userspace datapath, when failure to transmit fragments is expected.
246 m4_define([DPCTL_CHECK_FRAGMENTATION_FAIL],
248 AT_CHECK([ovs-appctl dpctl/ipf-get-status -m | FORMAT_FRAG_LIST()], [], [dnl
249 Fragmentation Module Status
250 ---------------------------
253 max num frags (v4/v6): 500
255 min v4 frag size: 1000
257 v4 frags completed: 0
259 v4 frags too small: 0
260 v4 frags overlapped: 0
262 min v6 frag size: 1280
264 v6 frags completed: 0
266 v6 frags too small: 0
267 v6 frags overlapped: 0
272 (src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
273 (src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
274 (src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
275 (src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
276 (src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
277 (src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
278 (src=10.1.1.1,dst=10.1.1.2,recirc_id=<cleared>,ip_id=<cleared>,dl_type=0x800,zone=9,nw_proto=1,num_fragments=1,state=first frag)
282 # OVS_CHECK_MIN_KERNEL([minversion], [maxversion])
284 # The userspace skips all tests that check kernel version.
285 m4_define([OVS_CHECK_MIN_KERNEL],
290 # OVS_CHECK_KERNEL_EXCL([minversion], [maxversion], [minsublevel], [maxsublevel])
292 # The userspace skips all tests that check kernel version.
293 m4_define([OVS_CHECK_KERNEL_EXCL],
298 # VSCTL_ADD_DATAPATH_TABLE()
300 # Create datapath table "netdev" for userspace tests in ovsdb
301 m4_define([VSCTL_ADD_DATAPATH_TABLE],
303 AT_CHECK([ovs-vsctl -- --id=@m create Datapath datapath_version=0 -- set Open_vSwitch . datapaths:"netdev"=@m], [0], [stdout])
304 DP_TYPE=$(echo "netdev")
308 # CHECK_L3L4_CONNTRACK_REASM()
310 # Only allow this test to run on the kernel datapath - it is not useful
311 # or necessary for the userspace datapath as it is checking for a kernel
312 # specific regression.
313 m4_define([CHECK_L3L4_CONNTRACK_REASM],