summaryrefslogtreecommitdiff
path: root/tests/system-userspace-macros.at
Commit message (Collapse)AuthorAgeFilesLines
* conntrack: Support conntrack flush by ct 5-tupleYi-Hung Wei2018-02-141-10/+0
| | | | | | | | | This patch adds support of flushing a conntrack entry specified by the conntrack 5-tuple in dpif-netdev. Signed-off-by: Yi-Hung Wei <yihung.wei@gmail.com> Signed-off-by: Ben Pfaff <blp@ovn.org> Acked-by: Darrell Ball <dlu998@gmail.com>
* tests: Add dpctl test for conntrack nconns/maxconns.Darrell Ball2018-01-091-0/+12
| | | | | Signed-off-by: Darrell Ball <dlu998@gmail.com> Signed-off-by: Ben Pfaff <blp@ovn.org>
* dpctl: Support flush conntrack by conntrack 5-tupleYi-Hung Wei2017-12-071-0/+10
| | | | | | | | | | | | | | | | | With this patch, "flush-conntrack" in ovs-dpctl and ovs-appctl accept a conntrack 5-tuple to delete the conntrack entry specified by the 5-tuple. For example, user can use the following command to flush a conntrack entry in zone 5. $ ovs-dpctl flush-conntrack zone=5 \ 'ct_nw_src=10.1.1.2,ct_nw_dst=10.1.1.1,ct_nw_proto=17,ct_tp_src=2,ct_tp_dst=1' $ ovs-appctl dpctl/flush-conntrack zone=5 \ 'ct_nw_src=10.1.1.2,ct_nw_dst=10.1.1.1,ct_nw_proto=17,ct_tp_src=2,ct_tp_dst=1' VMWare-BZ: #1983178 Signed-off-by: Yi-Hung Wei <yihung.wei@gmail.com> Signed-off-by: Justin Pettit <jpettit@ovn.org>
* tests: Convert uuidfilt utility from Perl to Python.Ben Pfaff2017-11-261-2/+2
| | | | | | | | Perl is unfashionable and Python is more widely available and understood, so this commit converts one of the OVS uses of Perl into Python. Signed-off-by: Ben Pfaff <blp@ovn.org> Acked-by: Aaron Conole <aconole@redhat.com>
* System tests: Enable ALGs for userspace.Darrell Ball2017-08-071-5/+2
| | | | | Signed-off-by: Darrell Ball <dlu998@gmail.com> Signed-off-by: Ben Pfaff <blp@ovn.org>
* system-userspace-macros: Fix ethtool with new kernels.Joe Stringer2017-07-261-1/+1
| | | | | | | | | | | | | | | | | The latest net-next kernels have removed the UFO feature, which results in older ethtool reporting the following error: Cannot get device udp-fragmentation-offload settings: Operation not supported Currently, we rely on no errors being reported, and if there is an error then a failure is reported. However, in this case we can safely ignore the stderr output. We still check the return code so if something is truly fatal, a failure will still be reported; otherwise, we will not fail the test due to the above. Signed-off-by: Joe Stringer <joe@ovn.org> Acked-by: Andy Zhou <azhou@ovn.org>
* dpdk: Enable NAT tests for userspace datapath.Darrell Ball2017-06-021-5/+2
| | | | | | | Signed-off-by: Darrell Ball <dlu998@gmail.com> Acked-by: Flavio Leitner <fbl@sysclose.org> Acked-by: Daniele Di Proietto <diproiettod@ovn.org> Signed-off-by: Ben Pfaff <blp@ovn.org>
* system-userspace-macros: allow passing sed args to OVS_TRAFFIC_VSWITCHD_STOP()Eric Garver2016-10-181-1/+1
| | | | | | | | | Passing sed arguments to OVS_TRAFFIC_VSWITCHD_STOP() was being ignored for check-system-userspace. This is useful to selective ignore log messages. Signed-off-by: Eric Garver <e@erig.me> Signed-off-by: Joe Stringer <joe@ovn.org>
* system-userspace-macros: Check the exit code of ethtool.Daniele Di Proietto2016-08-051-1/+1
| | | | | | | | | | | | | | | If the ethtool command is not available on the system we should fail, since the userspace testsuite cannot work properly without disabling offloads. Also, add ethtool to the list of installed packages on Vagrantfile, to ensure that offloads don't cause test failures in the vagrant VM when the kernel is updated. Fixes: ddcf96d2dcc1 ("system-tests: Disable offloads in userspace tests.") Reported-by: Joe Stringer <joe@ovn.org> Signed-off-by: Daniele Di Proietto <diproiettod@vmware.com> Acked-by: Joe Stringer <joe@ovn.org>
* system-tests: Run conntrack tests with userspace.Daniele Di Proietto2016-07-291-3/+42
| | | | | | | | | | | | | | | The userspace connection tracker doesn't support ALGs, frag reassembly or NAT yet, so skip those tests. Also, connection tracking state input from a local port is not possible in userspace. Finally, the userspace datapath checks for the IPv4 header checksum, so fix those in the hardcoded packets. Signed-off-by: Daniele Di Proietto <diproiettod@vmware.com> Acked-by: Joe Stringer <joe@ovn.org> Acked-by: Flavio Leitner <fbl@sysclose.org>
* system-traffic: Remove datapath specific tests and macro.William Tu2016-07-141-7/+0
| | | | | | | | | We generally try to keep the testsuite independent of the underlying datapath. This patch removes the datapath-specific tests and macros. Tested-at: https://travis-ci.org/williamtu/ovs-travis/builds/141642065 Signed-off-by: William Tu <u9012063@gmail.com> Signed-off-by: Joe Stringer <joe@ovn.org>
* ofp-actions: Add truncate action.William Tu2016-06-241-0/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | The patch adds a new action to support packet truncation. The new action is formatted as 'output(port=n,max_len=m)', as output to port n, with packet size being MIN(original_size, m). One use case is to enable port mirroring to send smaller packets to the destination port so that only useful packet information is mirrored/copied, saving some performance overhead of copying entire packet payload. Example use case is below as well as shown in the testcases: - Output to port 1 with max_len 100 bytes. - The output packet size on port 1 will be MIN(original_packet_size, 100). # ovs-ofctl add-flow br0 'actions=output(port=1,max_len=100)' - The scope of max_len is limited to output action itself. The following packet size of output:1 and output:2 will be intact. # ovs-ofctl add-flow br0 \ 'actions=output(port=1,max_len=100),output:1,output:2' - The Datapath actions shows: # Datapath actions: trunc(100),1,1,2 Tested-at: https://travis-ci.org/williamtu/ovs-travis/builds/140037134 Signed-off-by: William Tu <u9012063@gmail.com> Acked-by: Pravin B Shelar <pshelar@ovn.org>
* system-tests: Disable offloads in userspace tests.Daniele Di Proietto2016-04-261-0/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The system userspace testsuite uses the userspace datapath with netdev-linux devices, connected to veth pairs with the AF_PACKET socket: (veth pair) (AF_PACKET) TCP stack -> p0 ---> ovs-p0 -------------> netdev-linux (userspace OVS) Unfortunately this configuration has some problems with offloads: a packet generated by the TCP stack maybe sent to p0 without being checksummed or segmented. The AF_PACKET socket, by default, ignores the offloads and just transmits the data of the packets to userspace, but: 1. The packet may need GSO, so the data will be too big to be received by the userspace datapath 2. The packet might have incomplete checksums, so it will likely be discarded by the receiver. Problem 1 causes TCP connections to see a congestion window smaller than the MTU, which hurts performance but doesn't prevent communication. Problem 2 was hidden in the testsuite by a Linux kernel bug, fixed by commit ce8c839b74e3("veth: don’t modify ip_summed; doing so treats packets with bad checksums as good"). In the kernels that include the fix, the userspace datapath is able to process pings, but not tcp or udp data. Unfortunately I couldn't find a way to ask the AF_PACKET to perform offloads in kernel. A possible fix would be to use the PACKET_VNET_HDR sockopt and perform the offloads in userspace. Until a proper fix is worked out for netdev-linux, this commit disables offloads on the non-OVS side of the veth pair, as a workaround. Signed-off-by: Daniele Di Proietto <diproiettod@vmware.com> Acked-by: Joe Stringer <joe@ovn.org> Acked-by: Flavio Leitner <fbl@sysclose.org>
* check-system-userspace: Waiting for port's availability before creation.Ilya Maximets2016-03-301-0/+2
| | | | | | | | | | | | | Fixes failure of test due to not yet fully destroyed ports from previous test if ovs-vswitchd was killed. Example: netdev_linux|WARN|br0: creating tap device failed: Device or resource busy bridge|WARN|could not open network device br0 (Device or resource busy) Signed-off-by: Ilya Maximets <i.maximets@samsung.com> Signed-off-by: Joe Stringer <joe@ovn.org>
* system-tests: Make bridge creation more consistent.Jarno Rajahalme2015-11-241-3/+3
| | | | | | | | | Create all bridges with the same set of supported OpenFlow protocols and fail-safe-mode secure, so that each test explicitly specifies flow handling. Signed-off-by: Jarno Rajahalme <jarno@ovn.org> Acked-by: Ben Pfaff <blp@ovn.org>
* Add support for connection tracking.Joe Stringer2015-10-131-0/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This patch adds a new action and fields to OVS that allow connection tracking to be performed. This support works in conjunction with the Linux kernel support merged into the Linux-4.3 development cycle. Packets have two possible states with respect to connection tracking: Untracked packets have not previously passed through the connection tracker, while tracked packets have previously been through the connection tracker. For OpenFlow pipeline processing, untracked packets can become tracked, and they will remain tracked until the end of the pipeline. Tracked packets cannot become untracked. Connections can be unknown, uncommitted, or committed. Packets which are untracked have unknown connection state. To know the connection state, the packet must become tracked. Uncommitted connections have no connection state stored about them, so it is only possible for the connection tracker to identify whether they are a new connection or whether they are invalid. Committed connections have connection state stored beyond the lifetime of the packet, which allows later packets in the same connection to be identified as part of the same established connection, or related to an existing connection - for instance ICMP error responses. The new 'ct' action transitions the packet from "untracked" to "tracked" by sending this flow through the connection tracker. The following parameters are supported initally: - "commit": When commit is executed, the connection moves from uncommitted state to committed state. This signals that information about the connection should be stored beyond the lifetime of the packet within the pipeline. This allows future packets in the same connection to be recognized as part of the same "established" (est) connection, as well as identifying packets in the reply (rpl) direction, or packets related to an existing connection (rel). - "zone=[u16|NXM]": Perform connection tracking in the zone specified. Each zone is an independent connection tracking context. When the "commit" parameter is used, the connection will only be committed in the specified zone, and not in other zones. This is 0 by default. - "table=NUMBER": Fork pipeline processing in two. The original instance of the packet will continue processing the current actions list as an untracked packet. An additional instance of the packet will be sent to the connection tracker, which will be re-injected into the OpenFlow pipeline to resume processing in the specified table, with the ct_state and other ct match fields set. If the table is not specified, then the packet is submitted to the connection tracker, but the pipeline does not fork and the ct match fields are not populated. It is strongly recommended to specify a table later than the current table to prevent loops. When the "table" option is used, the packet that continues processing in the specified table will have the ct_state populated. The ct_state may have any of the following flags set: - Tracked (trk): Connection tracking has occurred. - Reply (rpl): The flow is in the reply direction. - Invalid (inv): The connection tracker couldn't identify the connection. - New (new): This is the beginning of a new connection. - Established (est): This is part of an already existing connection. - Related (rel): This connection is related to an existing connection. For more information, consult the ovs-ofctl(8) man pages. Below is a simple example flow table to allow outbound TCP traffic from port 1 and drop traffic from port 2 that was not initiated by port 1: table=0,priority=1,action=drop table=0,arp,action=normal table=0,in_port=1,tcp,ct_state=-trk,action=ct(commit,zone=9),2 table=0,in_port=2,tcp,ct_state=-trk,action=ct(zone=9,table=1) table=1,in_port=2,ct_state=+trk+est,tcp,action=1 table=1,in_port=2,ct_state=+trk+new,tcp,action=drop Based on original design by Justin Pettit, contributions from Thomas Graf and Daniele Di Proietto. Signed-off-by: Joe Stringer <joestringer@nicira.com> Acked-by: Jarno Rajahalme <jrajahalme@nicira.com> Acked-by: Ben Pfaff <blp@nicira.com>
* system-macros: Don't explicitly remove bridge.Joe Stringer2015-08-191-2/+1
| | | | | | | | | | | | | | | | | | | | Depending on the kernel in use, manually removing a bridge during OVS_VSWITCHD_STOP can cause the kernel to send a route update that refers to the bridge device which is being deleted. OVS can't make sense of these messages, resulting in logs like the following: route_table|DBG|Could not find interface name[702]: No such device or address netlink_notifier|WARN|received bad netlink message One such example kernel is the Ubuntu 3.16.0-33-generic linux package. The bridge doesn't need to be explicitly removed, as the OVSDB configuration for each test will be cleared before executing the next. Drop this extra step. Signed-off-by: Joe Stringer <joestringer@nicira.com> Acked-by: Daniele Di Proietto <diproiettod@vmware.com>
* system-macros: Create ADD_BR variant.Joe Stringer2015-08-191-3/+3
| | | | | | | | | | | | | This patch splits ADD_BR into two commands, so they can be used from different contexts: ADD_BR(...) is a standalone command to add a bridge to OVS, and allows additional ovs-vsctl arguments to be passed. It uses _ADD_BR(). _ADD_BR(...) is the implementation-specific ovs-vsctl arguments to set up the correct datapath type for userspace or kmod tests. Signed-off-by: Joe Stringer <joestringer@nicira.com> Acked-by: Daniele Di Proietto <diproiettod@vmware.com>
* tests: Add system-userspace-testsuite.Daniele Di Proietto2015-08-071-0/+40
The new system-userspace-testsuite, which can be launched via `make check-system-userspace`, reuses the kmod tests on the userspace datapath. The userspace datapath is already tested by the main testsuite (and that's not going to change), but having also the system-userspace-testsuite has the following advantages: * More complicated tests are possible: real client and server applications can be used. * The same tests run on both kernel and userspace datapath: this gives us an easy way to make sure that the behaviour is consistent (e.g. with the upcoming connection tracker integration) The userspace datapath is able to use system network interfaces via an AF_PACKET socket. Signed-off-by: Daniele Di Proietto <diproiettod@vmware.com> Acked-by: Joe Stringer <joestringer@nicira.com>