On Tue, Dec 23, 2014 at 3:42 PM, Sharo, Randall A CIV SPAWARSYSCEN-ATLANTIC, 55200 <randall.sh...@navy.mil> wrote: > This patch adds set-field operations for nd_target, nd_sll, and nd_tll > fields, with and without masks, using Nicira extensions and OpenFlow 1.2 > protocol. > > This version defines protocol structures in packets.h to support messages > aligned on 16-bit boundaries. It eliminates the clang alignment warning, > removes extraneous typecasting and adds a unit test that verifies checksum > recalculation and ND header modification. > > > Signed-off-by: Randall A Sharo <randall.sharo at navy.mil> > > > > --- > > diff --git a/lib/csum.c b/lib/csum.c > index a9334fe..155ae85 100644 > --- a/lib/csum.c > +++ b/lib/csum.c > @@ -113,6 +113,26 @@ recalc_csum32(ovs_be16 old_csum, ovs_be32 old_u32, > ovs_be32 new_u32) > } > > /* Returns the new checksum for a packet in which the checksum field > previously > + * contained 'old_csum' and in which a field that contained the 6 bytes at > + * 'old_bytes' was changed to contain the 6 bytes at 'new_bytes'. */ > +ovs_be16 > +recalc_csum48(ovs_be16 old_csum, const void *old_bytes, > + const void *new_bytes) > +{ > + ovs_be16 new_csum = old_csum; > + const uint16_t *p16_old = old_bytes, > + *p16_new = new_bytes; > + int i; > + > + for (i = 0; i < 3; ++i) { > + new_csum = recalc_csum16(new_csum, get_unaligned_be16(&p16_old[i]), > + get_unaligned_be16(&p16_new[i])); > + } > + > + return new_csum; > +} > + > +/* Returns the new checksum for a packet in which the checksum field > previously > * contained 'old_csum' and in which a field that contained 'old_u32[4]' was > * changed to contain 'new_u32[4]'. */ > ovs_be16 > diff --git a/lib/csum.h b/lib/csum.h > index df4b19d..ceff001 100644 > --- a/lib/csum.h > +++ b/lib/csum.h > @@ -28,6 +28,8 @@ uint32_t csum_continue(uint32_t partial, const void *, > size_t); > ovs_be16 csum_finish(uint32_t partial); > ovs_be16 recalc_csum16(ovs_be16 old_csum, ovs_be16 old_u16, ovs_be16 > new_u16); > ovs_be16 recalc_csum32(ovs_be16 old_csum, ovs_be32 old_u32, ovs_be32 > new_u32); > +ovs_be16 recalc_csum48(ovs_be16 old_csum, const void *old_bytes, > + const void *new_bytes); > ovs_be16 recalc_csum128(ovs_be16 old_csum, ovs_16aligned_be32 old_u32[4], > const ovs_be32 new_u32[4]); > > diff --git a/lib/meta-flow.h b/lib/meta-flow.h > index 62e9c79..c0fd75e 100644 > --- a/lib/meta-flow.h > +++ b/lib/meta-flow.h > @@ -1329,7 +1329,7 @@ enum OVS_PACKED_ENUM mf_field_id { > * Maskable: bitwise. > * Formatting: IPv6. > * Prerequisites: ND. > - * Access: read-only. > + * Access: read/write. > * NXM: NXM_NX_ND_TARGET(23) since v1.1. > * OXM: OXM_OF_IPV6_ND_TARGET(31) since OF1.2 and v1.7. > */ > @@ -1343,7 +1343,7 @@ enum OVS_PACKED_ENUM mf_field_id { > * Maskable: bitwise. > * Formatting: Ethernet. > * Prerequisites: ND solicit. > - * Access: read-only. > + * Access: read/write. > * NXM: NXM_NX_ND_SLL(24) since v1.1. > * OXM: OXM_OF_IPV6_ND_SLL(32) since OF1.2 and v1.7. > */ > @@ -1357,7 +1357,7 @@ enum OVS_PACKED_ENUM mf_field_id { > * Maskable: bitwise. > * Formatting: Ethernet. > * Prerequisites: ND advert. > - * Access: read-only. > + * Access: read/write. > * NXM: NXM_NX_ND_TLL(25) since v1.1. > * OXM: OXM_OF_IPV6_ND_TLL(33) since OF1.2 and v1.7. > */ > diff --git a/lib/odp-execute.c b/lib/odp-execute.c > index 720d24e..0edd3a8 100644 > --- a/lib/odp-execute.c > +++ b/lib/odp-execute.c > @@ -19,6 +19,7 @@ > #include "odp-execute.h" > #include <arpa/inet.h> > #include <netinet/ip6.h> > +#include <netinet/icmp6.h> > #include <stdlib.h> > #include <string.h> > > @@ -181,6 +182,48 @@ set_arp(struct ofpbuf *packet, const struct ovs_key_arp > *key, > } > > static void > +odp_set_nd(struct ofpbuf *packet, const struct ovs_key_nd *key, > + const struct ovs_key_nd *mask) > +{ > + const struct ovs_nd_msg *ns = ofpbuf_l4(packet); > + const struct ovs_nd_opt *nd_opt = ofpbuf_get_nd_payload(packet); > + > + if (OVS_LIKELY(ns && nd_opt)) { > + int bytes_remain = ofpbuf_l4_size(packet) - sizeof(*ns); > + ovs_be32 tgt_buf[4]; > + uint8_t sll_buf[ETH_ADDR_LEN] = {0}; > + uint8_t tll_buf[ETH_ADDR_LEN] = {0}; > + > + while (bytes_remain >= ND_OPT_LEN && nd_opt->nd_opt_len != 0) { > + if (nd_opt->nd_opt_type == ND_OPT_SOURCE_LINKADDR > + && nd_opt->nd_opt_len == 1) { > + memcpy(sll_buf, nd_opt->nd_opt_data, ETH_ADDR_LEN); > + ether_addr_copy_masked(sll_buf, key->nd_sll, mask->nd_sll); > + > + /* A packet can only contain one SLL or TLL option */ > + break; > + } else if (nd_opt->nd_opt_type == ND_OPT_TARGET_LINKADDR > + && nd_opt->nd_opt_len == 1) { > + memcpy(tll_buf, nd_opt->nd_opt_data, ETH_ADDR_LEN); > + ether_addr_copy_masked(tll_buf, key->nd_tll, mask->nd_tll); > + > + /* A packet can only contain one SLL or TLL option */ > + break; > + } > + > + nd_opt += nd_opt->nd_opt_len; > + bytes_remain -= nd_opt->nd_opt_len * ND_OPT_LEN; > + } > + > + packet_set_nd(packet, > + mask_ipv6_addr(ns->target.be32, > + key->nd_target, mask->nd_target, > tgt_buf), > + sll_buf, > + tll_buf); > + } > +} > + > +static void > odp_execute_set_action(struct dpif_packet *packet, const struct nlattr *a) > { > enum ovs_key_attr type = nl_attr_type(a); > @@ -258,6 +301,15 @@ odp_execute_set_action(struct dpif_packet *packet, const > struct nlattr *a) > set_arp(&packet->ofpbuf, nl_attr_get(a), NULL); > break; > > + case OVS_KEY_ATTR_ND: > + if (OVS_LIKELY(ofpbuf_get_nd_payload(&packet->ofpbuf))) { > + const struct ovs_key_nd *nd_key > + = nl_attr_get_unspec(a, sizeof(struct ovs_key_nd)); > + packet_set_nd(&packet->ofpbuf, nd_key->nd_target, > + nd_key->nd_sll, nd_key->nd_tll); > + } > + break; > + > case OVS_KEY_ATTR_DP_HASH: > md->dp_hash = nl_attr_get_u32(a); > dpif_packet_set_dp_hash(packet, md->dp_hash); > @@ -274,7 +326,6 @@ odp_execute_set_action(struct dpif_packet *packet, const > struct nlattr *a) > case OVS_KEY_ATTR_VLAN: > case OVS_KEY_ATTR_ICMP: > case OVS_KEY_ATTR_ICMPV6: > - case OVS_KEY_ATTR_ND: > case OVS_KEY_ATTR_TCP_FLAGS: > case __OVS_KEY_ATTR_MAX: > default: > @@ -347,6 +398,11 @@ odp_execute_masked_set_action(struct dpif_packet *packet, > get_mask(a, struct ovs_key_arp)); > break; > > + case OVS_KEY_ATTR_ND: > + odp_set_nd(&packet->ofpbuf, nl_attr_get(a), > + get_mask(a, struct ovs_key_nd)); > + break; > + > case OVS_KEY_ATTR_DP_HASH: > md->dp_hash = nl_attr_get_u32(a) > | (dpif_packet_get_dp_hash(packet) & ~*get_mask(a, uint32_t)); > @@ -366,7 +422,6 @@ odp_execute_masked_set_action(struct dpif_packet *packet, > case OVS_KEY_ATTR_VLAN: > case OVS_KEY_ATTR_ICMP: > case OVS_KEY_ATTR_ICMPV6: > - case OVS_KEY_ATTR_ND: > case OVS_KEY_ATTR_TCP_FLAGS: > case __OVS_KEY_ATTR_MAX: > default: > diff --git a/lib/odp-util.c b/lib/odp-util.c > index b8fda49..a8fbafe 100644 > --- a/lib/odp-util.c > +++ b/lib/odp-util.c > @@ -2813,6 +2813,8 @@ static void put_ipv6_key(const struct ovs_key_ipv6 *, > struct flow *, > bool is_mask); > static void get_arp_key(const struct flow *, struct ovs_key_arp *); > static void put_arp_key(const struct ovs_key_arp *, struct flow *); > +static void get_nd_key(const struct flow *, struct ovs_key_nd *); > +static void put_nd_key(const struct ovs_key_nd *, struct flow *); > > /* These share the same layout. */ > union ovs_key_tp { > @@ -4156,6 +4158,45 @@ commit_set_arp_action(const struct flow *flow, struct > flow *base_flow, > return 0; > } > > +static void > +get_nd_key(const struct flow *flow, struct ovs_key_nd *nd) > +{ > + memcpy(nd->nd_target, &flow->nd_target, sizeof flow->nd_target); > + /* nd_sll and nd_tll are stored in arp_sha and arp_tha, respectively */ > + memcpy(nd->nd_sll, flow->arp_sha, ETH_ADDR_LEN); > + memcpy(nd->nd_tll, flow->arp_tha, ETH_ADDR_LEN); > +} > + > +static void > +put_nd_key(const struct ovs_key_nd *nd, struct flow *flow) > +{ > + memcpy(&flow->nd_target, &flow->nd_target, sizeof flow->nd_target); > + /* nd_sll and nd_tll are stored in arp_sha and arp_tha, respectively */ > + memcpy(flow->arp_sha, nd->nd_sll, ETH_ADDR_LEN); > + memcpy(flow->arp_tha, nd->nd_tll, ETH_ADDR_LEN); > +} > + > +static enum slow_path_reason > +commit_set_nd_action(const struct flow *flow, struct flow *base_flow, > + struct ofpbuf *odp_actions, > + struct flow_wildcards *wc, bool use_masked) > +{ > + struct ovs_key_nd key, mask, base; > + > + get_nd_key(flow, &key); > + get_nd_key(base_flow, &base); > + get_nd_key(&wc->masks, &mask); > + > + if (commit(OVS_KEY_ATTR_ND, use_masked, &key, &base, &mask, sizeof key, > + odp_actions)) { > + put_nd_key(&base, base_flow); > + put_nd_key(&mask, &wc->masks); > + return SLOW_ACTION; > + } > + > + return 0; > +} > + > static enum slow_path_reason > commit_set_nw_action(const struct flow *flow, struct flow *base, > struct ofpbuf *odp_actions, struct flow_wildcards *wc, > @@ -4173,7 +4214,7 @@ commit_set_nw_action(const struct flow *flow, struct > flow *base, > > case ETH_TYPE_IPV6: > commit_set_ipv6_action(flow, base, odp_actions, wc, use_masked); > - break; > + return commit_set_nd_action(flow, base, odp_actions, wc, use_masked); > > case ETH_TYPE_ARP: > return commit_set_arp_action(flow, base, odp_actions, wc); > diff --git a/lib/ofp-print.c b/lib/ofp-print.c > index d15a385..f4c5bc6 100644 > --- a/lib/ofp-print.c > +++ b/lib/ofp-print.c > @@ -82,6 +82,14 @@ ofp_packet_to_string(const void *data, size_t len) > struct sctp_header *sh = ofpbuf_l4(&buf); > ds_put_format(&ds, " sctp_csum:%"PRIx32, > ntohl(get_16aligned_be32(&sh->sctp_csum))); > + } else if (flow.nw_proto == IPPROTO_ICMP && l4_size >= ICMP_HEADER_LEN) { > + struct icmp_header *icmph = ofpbuf_l4(&buf); > + ds_put_format(&ds, " icmp_csum:%"PRIx16, > + ntohs(icmph->icmp_csum)); > + } else if (flow.nw_proto == IPPROTO_ICMPV6 && l4_size >= > ICMP6_HEADER_LEN) { > + struct icmp6_header *icmp6h = ofpbuf_l4(&buf); > + ds_put_format(&ds, " icmp6_csum:%"PRIx16, > + ntohs(icmp6h->icmp6_cksum)); > } > > ds_put_char(&ds, '\n'); > diff --git a/lib/ofpbuf.h b/lib/ofpbuf.h > index 4c0f7ea..4e7038d 100644 > --- a/lib/ofpbuf.h > +++ b/lib/ofpbuf.h > @@ -104,6 +104,7 @@ static inline const void *ofpbuf_get_tcp_payload(const > struct ofpbuf *); > static inline const void *ofpbuf_get_udp_payload(const struct ofpbuf *); > static inline const void *ofpbuf_get_sctp_payload(const struct ofpbuf *); > static inline const void *ofpbuf_get_icmp_payload(const struct ofpbuf *); > +static inline const void *ofpbuf_get_nd_payload(const struct ofpbuf *); > > void ofpbuf_use(struct ofpbuf *, void *, size_t); > void ofpbuf_use_stack(struct ofpbuf *, void *, size_t); > @@ -374,6 +375,12 @@ static inline const void *ofpbuf_get_icmp_payload(const > struct ofpbuf *b) > ? (const char *)ofpbuf_l4(b) + ICMP_HEADER_LEN : NULL; > } > > +static inline const void *ofpbuf_get_nd_payload(const struct ofpbuf *b) > +{ > + return OVS_LIKELY(ofpbuf_l4_size(b) >= ND_MSG_LEN) > + ? (const char *)ofpbuf_l4(b) + ND_MSG_LEN : NULL; > +} > + > #ifdef DPDK_NETDEV > BUILD_ASSERT_DECL(offsetof(struct ofpbuf, mbuf) == 0); > > diff --git a/lib/packets.c b/lib/packets.c > index af99e3b..4d8aca9 100644 > --- a/lib/packets.c > +++ b/lib/packets.c > @@ -875,6 +875,58 @@ packet_set_sctp_port(struct ofpbuf *packet, ovs_be16 > src, ovs_be16 dst) > put_16aligned_be32(&sh->sctp_csum, old_csum ^ old_correct_csum ^ > new_csum); > } > > +void > +packet_set_nd(struct ofpbuf *packet, const ovs_be32 target[4], > + const uint8_t sll[ETH_ADDR_LEN], > + const uint8_t tll[ETH_ADDR_LEN]) { > + struct ovs_nd_msg *ns; > + struct ovs_nd_opt *nd_opt; > + int bytes_remain = ofpbuf_l4_size(packet); > + > + if (OVS_UNLIKELY(bytes_remain < sizeof(*ns))) { > + return; > + } > + > + ns = ofpbuf_l4(packet); > + nd_opt = &ns->options[0]; > + bytes_remain -= sizeof(*ns); > + > + if (memcmp(&ns->target, target, sizeof(ovs_be32[4]))) { > + packet_set_ipv6_addr(packet, IPPROTO_ICMPV6, > + ns->target.be32, > + target, true); > + } > + > + while (bytes_remain >= ND_OPT_LEN && nd_opt->nd_opt_len != 0) { > + if (nd_opt->nd_opt_type == ND_OPT_SOURCE_LINKADDR > + && nd_opt->nd_opt_len == 1) { > + if (memcmp(nd_opt->nd_opt_data, sll, ETH_ADDR_LEN)) { > + ovs_be16 *csum = &(ns->icmph.icmp6_cksum); > + > + *csum = recalc_csum48(*csum, nd_opt->nd_opt_data, sll); > + memcpy(nd_opt->nd_opt_data, sll, ETH_ADDR_LEN); > + } > + > + /* A packet can only contain one SLL or TLL option */ > + break; > + } else if (nd_opt->nd_opt_type == ND_OPT_TARGET_LINKADDR > + && nd_opt->nd_opt_len == 1) { > + if (memcmp(nd_opt->nd_opt_data, tll, ETH_ADDR_LEN)) { > + ovs_be16 *csum = &(ns->icmph.icmp6_cksum); > + > + *csum = recalc_csum48(*csum, nd_opt->nd_opt_data, tll); > + memcpy(nd_opt->nd_opt_data, tll, ETH_ADDR_LEN); > + } > + > + /* A packet can only contain one SLL or TLL option */ > + break; > + } > + > + nd_opt += nd_opt->nd_opt_len; > + bytes_remain -= nd_opt->nd_opt_len * ND_OPT_LEN; > + } > +} > + > const char * > packet_tcp_flag_to_string(uint32_t flag) > { > diff --git a/lib/packets.h b/lib/packets.h > index 65d2274..1c74d73 100644 > --- a/lib/packets.h > +++ b/lib/packets.h > @@ -647,6 +647,27 @@ struct icmp6_header { > }; > BUILD_ASSERT_DECL(ICMP6_HEADER_LEN == sizeof(struct icmp6_header)); > > +/* Neighbor Discovery option field. > + * ND options are always a multiple of 8 bytes in size. */ > +#define ND_OPT_LEN 8 > +struct ovs_nd_opt { > + uint8_t nd_opt_type; /* Values defined in icmp6.h */ > + uint8_t nd_opt_len; /* in units of 8 octets (the size of this > struct) */ > + uint8_t nd_opt_data[6]; /* Ethernet address in the case of SLL or TLL > options */ > +}; > +BUILD_ASSERT_DECL(ND_OPT_LEN == sizeof(struct ovs_nd_opt)); > + > +/* Like struct nd_msg (from ndisc.h), but whereas that struct requires 32-bit > + * alignment, this one only requires 16-bit alignment. */ > +#define ND_MSG_LEN 24 > +struct ovs_nd_msg { > + struct icmp6_header icmph; MSVC does not support including a structure with zero-sized array in another structure when it is not the last member. (See: http://msdn.microsoft.com/en-us/library/0scy7z2d.aspx) For e.g., icmp6_header has a zero sized array and it is now included as part of ovs_nd_msg structure causing a compilation error. Can we work the patch to fix it?
> + ovs_16aligned_be32 rco_flags; > + union ovs_16aligned_in6_addr target; > + struct ovs_nd_opt options[0]; > +}; > +BUILD_ASSERT_DECL(ND_MSG_LEN == sizeof(struct ovs_nd_msg)); > + > /* The IPv6 flow label is in the lower 20 bits of the first 32-bit word. */ > #define IPV6_LABEL_MASK 0x000fffff > > @@ -758,6 +779,8 @@ void packet_set_ipv6(struct ofpbuf *, uint8_t proto, > const ovs_be32 src[4], > void packet_set_tcp_port(struct ofpbuf *, ovs_be16 src, ovs_be16 dst); > void packet_set_udp_port(struct ofpbuf *, ovs_be16 src, ovs_be16 dst); > void packet_set_sctp_port(struct ofpbuf *, ovs_be16 src, ovs_be16 dst); > +void packet_set_nd(struct ofpbuf *, const ovs_be32 target[4], > + const uint8_t sll[6], const uint8_t tll[6]); > > void packet_format_tcp_flags(struct ds *, uint16_t); > const char *packet_tcp_flag_to_string(uint32_t flag); > diff --git a/tests/ofp-print.at b/tests/ofp-print.at > index c58ab7d..f25ce4b 100644 > --- a/tests/ofp-print.at > +++ b/tests/ofp-print.at > @@ -934,6 +934,23 @@ OFPT_FLOW_MOD (OF1.2) (xid=0x52334507): ADD > priority=255,dp_hash=0x1234567/0xfff > ]) > AT_CLEANUP > > +AT_SETUP([OFPT_FLOW_MOD - OF1.2 - set-field nd_target, nd_sll]) > +AT_KEYWORDS([ofp-print]) > +AT_CHECK([ovs-ofctl '-vPATTERN:console:%c|%p|%m' ofp-print "\ > +03 0e 00 78 00 00 00 02 00 00 00 00 00 00 00 00 \ > +00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff \ > +ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 \ > +00 01 00 14 80 00 0a 02 86 dd 80 00 14 01 3a 80 \ > +00 3a 01 87 00 00 00 00 00 04 00 30 00 00 00 00 \ > +00 19 00 18 80 00 3e 10 00 00 00 00 00 00 00 00 \ > +00 00 00 00 00 00 00 01 00 19 00 10 80 00 40 06 \ > +aa aa aa aa aa aa 00 00 > +" 2], [0], [dnl > +OFPT_FLOW_MOD (OF1.2) (xid=0x2): ADD priority=255,icmp6,icmp_type=135 > actions=set_field:::1->nd_target,set_field:aa:aa:aa:aa:aa:aa->nd_sll > +], [dnl > +]) > +AT_CLEANUP > + > dnl This triggered a buggy "instructions out of order" message earlier. > AT_SETUP([OFPT_FLOW_MOD - OF1.3 - meter]) > AT_KEYWORDS([ofp-print]) > diff --git a/tests/ofproto-dpif.at b/tests/ofproto-dpif.at > index baa942f..8f19e80 100644 > --- a/tests/ofproto-dpif.at > +++ b/tests/ofproto-dpif.at > @@ -198,6 +198,25 @@ Datapath actions: > 10,set(ipv4(src=192.168.3.91)),11,set(ipv4(src=192.168.3.90)), > OVS_VSWITCHD_STOP > AT_CLEANUP > > +AT_SETUP([ofproto-dpif - modify IPv6 Neighbor Solitication (ND)]) > +OVS_VSWITCHD_START > +ADD_OF_PORTS([br0], [1], [10], [11], [12], [13]) > +AT_DATA([flows.txt], [dnl > +table=0 in_port=1,icmp6,icmpv6_type=135 > actions=output(10),write_actions(set_field:fe80::3->nd_target,set_field:aa:aa:aa:aa:aa:aa->nd_sll,output(12)),goto_table(1) > +table=1 icmp6 actions=write_actions(output(13)),goto_table(2) > +table=2 in_port=1,icmp6,icmpv6_type=135 > actions=set_field:fe80::4->nd_target,set_field:cc:cc:cc:cc:cc:cc->nd_sll,output(11) > +]) > +AT_CHECK([ovs-ofctl -O OpenFlow12 add-flows br0 flows.txt]) > +AT_CHECK([ovs-appctl ofproto/trace br0 > 'in_port=1,dl_src=50:54:00:00:00:05,dl_dst=50:54:00:00:00:07,icmp6,ipv6_src=fe80::1,ipv6_dst=fe80::2,nw_tos=0,nw_ttl=128,icmpv6_type=135,nd_target=fe80::2020,nd_sll=66:55:44:33:22:11'], > [0], [stdout]) > +AT_CHECK([tail -4 stdout], [0], > + [Megaflow: > recirc_id=0,icmp6,in_port=1,nw_frag=no,icmp_type=135,icmp_code=0x0/0xff,nd_target=fe80::2020,nd_sll=66:55:44:33:22:11 > +Datapath actions: > 10,set(nd(target=fe80::4,sll=cc:cc:cc:cc:cc:cc)),11,set(nd(target=fe80::3,sll=aa:aa:aa:aa:aa:aa)),13 > +This flow is handled by the userspace slow path because it: > + - Uses action(s) not supported by datapath. > +]) > +OVS_VSWITCHD_STOP > +AT_CLEANUP > + > AT_SETUP([ofproto-dpif - clear actions]) > OVS_VSWITCHD_START > ADD_OF_PORTS([br0], [1], [10], [11], [12]) > @@ -6280,8 +6299,30 @@ OVS_WAIT_UNTIL([ovs-appctl -t ovs-ofctl exit]) > > AT_CHECK([cat ofctl_monitor.log], [0], [dnl > NXT_PACKET_IN (xid=0x0): cookie=0x0 total_len=86 in_port=1 (via no_match) > data_len=86 (unbuffered) > -icmp6,in_port=0,vlan_tci=0x0000,dl_src=00:00:86:05:80:da,dl_dst=00:60:97:07:69:ea,ipv6_src=fe80::200:86ff:fe05:80da,ipv6_dst=fe80::260:97ff:fe07:69ea,ipv6_label=0x00000,nw_tos=0,nw_ecn=0,nw_ttl=255,icmp_type=135,icmp_code=0,nd_target=fe80::260:97ff:fe07:69ea,nd_sll=00:00:86:05:80:da,nd_tll=00:00:00:00:00:00 > +icmp6,in_port=0,vlan_tci=0x0000,dl_src=00:00:86:05:80:da,dl_dst=00:60:97:07:69:ea,ipv6_src=fe80::200:86ff:fe05:80da,ipv6_dst=fe80::260:97ff:fe07:69ea,ipv6_label=0x00000,nw_tos=0,nw_ecn=0,nw_ttl=255,icmp_type=135,icmp_code=0,nd_target=fe80::260:97ff:fe07:69ea,nd_sll=00:00:86:05:80:da,nd_tll=00:00:00:00:00:00 > icmp6_csum:68bd > ]) > > OVS_VSWITCHD_STOP > AT_CLEANUP > + > +AT_SETUP([ofproto-dpif - Neighbor Discovery set-field with checksum update]) > +OVS_VSWITCHD_START > +ADD_OF_PORTS([br0], 1) > +AT_CHECK([ovs-ofctl add-flow br0 > icmp6,icmpv6_type=135,action=set_field:fe80::1-\>nd_target,set_field:32:21:14:86:11:74-\>nd_sll,output:controller]) > + > +AT_CAPTURE_FILE([ofctl_monitor.log]) > + > +AT_CHECK([ovs-ofctl monitor br0 65534 --detach --no-chdir --pidfile 2> > ofctl_monitor.log]) > + > +ovs-appctl netdev-dummy/receive p1 > '0060970769ea0000860580da86dd6000000000203afffe80000000000000020086fffe0580dafe80000000000000026097fffe0769ea870068bd00000000fe80000000000000026097fffe0769ea01010000860580da' > + > +OVS_WAIT_UNTIL([ovs-appctl -t ovs-ofctl exit]) > + > +AT_CHECK([cat ofctl_monitor.log], [0], [dnl > +NXT_PACKET_IN (xid=0x0): cookie=0x0 total_len=86 in_port=1 (via action) > data_len=86 (unbuffered) > +icmp6,in_port=0,vlan_tci=0x0000,dl_src=00:00:86:05:80:da,dl_dst=00:60:97:07:69:ea,ipv6_src=fe80::200:86ff:fe05:80da,ipv6_dst=fe80::260:97ff:fe07:69ea,ipv6_label=0x00000,nw_tos=0,nw_ecn=0,nw_ttl=255,icmp_type=135,icmp_code=0,nd_target=fe80::1,nd_sll=32:21:14:86:11:74,nd_tll=00:00:00:00:00:00 > icmp6_csum:19d3 > +]) > + > +OVS_VSWITCHD_STOP > +AT_CLEANUP > + > diff --git a/tests/ofproto.at b/tests/ofproto.at > index 8cfecc6..ad47d6d 100644 > --- a/tests/ofproto.at > +++ b/tests/ofproto.at > @@ -844,7 +844,9 @@ AT_SETUP([ofproto - set-field flow_mod commands (NXM)]) > OVS_VSWITCHD_START > AT_CHECK([ovs-ofctl add-flow br0 ipv6,table=1,in_port=3,actions=drop]) > AT_CHECK([ovs-ofctl add-flow br0 > ipv6,table=1,in_port=3,actions=set_field:fe80:0123:4567:890a:a6ba:dbff:fefe:59fa-\>ipv6_src]) > +AT_CHECK([ovs-ofctl add-flow br0 > icmp6,icmp_type=136,table=1,in_port=3,actions=set_field:fe80:8675:3097:890a:a6ba:dbff:f00d:59fa-\>nd_target,set_field:cc:dd:ee:ff:00:11-\>nd_tll]) > AT_CHECK([ovs-ofctl dump-flows br0 | ofctl_strip | sort], [0], [dnl > + table=1, icmp6,in_port=3,icmp_type=136 > actions=load:0xa6badbfff00d59fa->NXM_NX_ND_TARGET[[0..63]],load:0xfe8086753097890a->NXM_NX_ND_TARGET[[64..127]],load:0xccddeeff0011->NXM_NX_ND_TLL[[]] > table=1, ipv6,in_port=3 > actions=load:0xa6badbfffefe59fa->NXM_NX_IPV6_SRC[[0..63]],load:0xfe8001234567890a->NXM_NX_IPV6_SRC[[64..127]] > NXST_FLOW reply: > ]) > @@ -870,6 +872,19 @@ AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | > ofctl_strip], [0], [OFPST_FLO > OVS_VSWITCHD_STOP > AT_CLEANUP > > +AT_SETUP([ofproto - set-field flow_mod commands (OF1.2)]) > +OVS_VSWITCHD_START > +AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 > ipv6,table=1,in_port=3,actions=drop]) > +AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 > ipv6,table=1,in_port=3,actions=set_field:fe80:0123:4567:890a:a6ba:dbff:fefe:59fa-\>ipv6_src]) > +AT_CHECK([ovs-ofctl -O OpenFlow12 add-flow br0 > icmp6,icmp_type=136,table=1,in_port=3,actions=set_field:fe80:8675:3097:890a:a6ba:dbff:f00d:59fa-\>nd_target,set_field:cc:dd:ee:ff:00:11-\>nd_tll]) > +AT_CHECK([ovs-ofctl -O OpenFlow12 dump-flows br0 | ofctl_strip | sort], [0], > [dnl > + table=1, icmp6,in_port=3,icmp_type=136 > actions=set_field:fe80:8675:3097:890a:a6ba:dbff:f00d:59fa->nd_target,set_field:cc:dd:ee:ff:00:11->nd_tll > + table=1, ipv6,in_port=3 > actions=set_field:fe80:123:4567:890a:a6ba:dbff:fefe:59fa->ipv6_src > +OFPST_FLOW reply (OF1.2): > +]) > +OVS_VSWITCHD_STOP > +AT_CLEANUP > + > AT_SETUP([ofproto - dump flows with cookie]) > OVS_VSWITCHD_START > AT_CHECK([ovs-ofctl add-flow br0 cookie=0x1,in_port=1,actions=1]) > @@ -1323,7 +1338,7 @@ OVS_VSWITCHD_START > instructions: > apply_actions,clear_actions,write_actions,write_metadata,goto_table > Write-Actions and Apply-Actions features: > actions: output group set_field strip_vlan push_vlan mod_nw_ttl > dec_ttl set_mpls_ttl dec_mpls_ttl push_mpls pop_mpls set_queue > - supported on Set-Field: metadata in_port_oxm eth_src eth_dst > vlan_vid vlan_pcp mpls_label mpls_tc ip_src ip_dst ipv6_src ipv6_dst ip_dscp > nw_ecn arp_op arp_spa arp_tpa arp_sha arp_tha tcp_src tcp_dst udp_src udp_dst > sctp_src sctp_dst > + supported on Set-Field: metadata in_port_oxm eth_src eth_dst > vlan_vid vlan_pcp mpls_label mpls_tc ip_src ip_dst ipv6_src ipv6_dst ip_dscp > nw_ecn arp_op arp_spa arp_tpa arp_sha arp_tha tcp_src tcp_dst udp_src udp_dst > sctp_src sctp_dst nd_target nd_sll nd_tll > matching: > metadata: exact match or wildcard > in_port_oxm: exact match or wildcard > @@ -1401,7 +1416,7 @@ OVS_VSWITCHD_START > instructions: > meter,apply_actions,clear_actions,write_actions,write_metadata,goto_table > Write-Actions and Apply-Actions features: > actions: output group set_field strip_vlan push_vlan mod_nw_ttl > dec_ttl set_mpls_ttl dec_mpls_ttl push_mpls pop_mpls set_queue > - supported on Set-Field: tun_id tun_src tun_dst metadata in_port > in_port_oxm pkt_mark reg0 reg1 reg2 reg3 reg4 reg5 reg6 reg7 xreg0 xreg1 > xreg2 xreg3 eth_src eth_dst vlan_tci vlan_vid vlan_pcp mpls_label mpls_tc > ip_src ip_dst ipv6_src ipv6_dst nw_tos ip_dscp nw_ecn nw_ttl arp_op arp_spa > arp_tpa arp_sha arp_tha tcp_src tcp_dst udp_src udp_dst sctp_src sctp_dst > + supported on Set-Field: tun_id tun_src tun_dst metadata in_port > in_port_oxm pkt_mark reg0 reg1 reg2 reg3 reg4 reg5 reg6 reg7 xreg0 xreg1 > xreg2 xreg3 eth_src eth_dst vlan_tci vlan_vid vlan_pcp mpls_label mpls_tc > ip_src ip_dst ipv6_src ipv6_dst nw_tos ip_dscp nw_ecn nw_ttl arp_op arp_spa > arp_tpa arp_sha arp_tha tcp_src tcp_dst udp_src udp_dst sctp_src sctp_dst > nd_target nd_sll nd_tll > matching: > dp_hash: arbitrary mask > recirc_id: exact match or wildcard > _______________________________________________ > dev mailing list > dev@openvswitch.org > http://openvswitch.org/mailman/listinfo/dev _______________________________________________ dev mailing list dev@openvswitch.org http://openvswitch.org/mailman/listinfo/dev