blob: ccd97fbf34cc95a53df666f303f4038791ef2cf5 [file] [log] [blame]
"""
"""
import struct
import logging
from oftest import config
import oftest.controller as controller
import oftest.cstruct as ofp
import oftest.message as message
import oftest.base_tests as base_tests
from oftest.testutils import *
def normal_ip_mask(index):
"""
Return the IP mask for the given wildcard index 0 - 63 per the OF 1.0 spec
"""
if index < 32:
return ((1 << 32) - 1) ^ ((1 << index) - 1)
else:
return 0
def fancy_ip_mask(index):
"""
Return the IP mask for the given wildcard index 0 - 31 per the OF 1.0 spec.
For wildcard index 32 - 63, return a "negative" IP mask:
32 : wildcard the first bit, mask 127.255.255.255
33 : wildcard all first 2 bits, mask 63.255.255.255
...
62 : wildcard all but last bit, mask 0.0.0.1
63 : wildcard all bits, mask 0.0.0.0
"""
if index < 32:
return ((1 << 32) - 1) ^ ((1 << index) - 1)
else:
return (1 << (63 - index)) - 1
@nonstandard
class BSNConfigIPMask(base_tests.SimpleDataPlane):
"""
Exercise BSN vendor extension for configuring IP source/dest match mask
"""
def bsn_set_ip_mask(self, index, mask):
"""
Use the BSN_SET_IP_MASK vendor command to change the IP mask for the
given wildcard index
"""
logging.info("Setting index %d to mask is %s" % (index, mask))
m = message.vendor()
m.vendor = 0x005c16c7
m.data = struct.pack("!LBBBBL", 0, index, 0, 0, 0, mask)
rc = self.controller.message_send(m)
self.assertNotEqual(rc, -1, "Error sending set IP mask command")
def bsn_get_ip_mask(self, index):
"""
Use the BSN_GET_IP_MASK_REQUEST vendor command to get the current IP mask
for the given wildcard index
"""
m = message.vendor()
m.vendor = 0x005c16c7
m.data = struct.pack( "!LBBBBL", 1, index, 0, 0, 0, 0 )
rc = self.controller.message_send(m)
self.assertNotEqual(rc, -1, "Error sending get IP mask command")
m, r = self.controller.poll(ofp.OFPT_VENDOR)
self.assertEqual(m.vendor, 0x005c16c7, "Wrong vendor ID")
x = struct.unpack("!LBBBBL", m.data)
self.assertEqual(x[0], 2, "Wrong subtype")
self.assertEqual(x[1], index, "Wrong index")
return x[5]
def runTest(self):
self.assertFalse(required_wildcards(self) & ofp.OFPFW_NW_DST_ALL,
"IP dst must be wildcarded")
self.assertFalse(required_wildcards(self) & ofp.OFPFW_NW_SRC_ALL,
"IP src must be wildcarded")
for index in range(0, 64):
mask = self.bsn_get_ip_mask(index)
logging.info("Index %d mask is %s" %
(index, scapy.utils.ltoa(mask)))
self.assertEqual(mask, normal_ip_mask(index), "Unexpected IP mask")
for index in range(0, 64):
mask = normal_ip_mask(index)
if mask == 0:
logging.info("Skipping IP wildcard index %d" % index)
else:
logging.info("Testing IP wildcard index %d" % index)
self.check_ip_mask(True, index, mask)
self.check_ip_mask(False, index, mask)
logging.info("Setting fancy IP masks")
for index in range(0, 64):
self.bsn_set_ip_mask(index, fancy_ip_mask(index))
for index in range(0, 64):
mask = self.bsn_get_ip_mask(index)
logging.info("Index %d mask is %s" %
(index, scapy.utils.ltoa(mask)))
self.assertEqual(mask, fancy_ip_mask(index), "Unexpected IP mask")
for index in range(0, 64):
mask = fancy_ip_mask(index)
if mask == 0:
logging.info("Skipping IP wildcard index %d" % index)
else:
logging.info("Testing IP wildcard index %d" % index)
self.check_ip_mask(True, index, mask)
self.check_ip_mask(False, index, mask)
def check_ip_mask(self, source, index, mask):
ports = config["port_map"].keys()
# For each mask we install two flow entries, one which matches
# on IP source or dest addr all-0s (modulo the mask) and
# outputs to port 1, the other which matches on all-1s (modulo
# the mask) and outputs to port 2.
# Then we construct four packets: The first two are the same
# as the two flow entry matches (all 0s and all 1s), and we
# check that the packets go to ports 1 and 2, respectively.
# For the second set of packets, we flip the un-masked bits
# and check that only the masked bits are matched.
ip0 = scapy.utils.ltoa(0x00000000)
ip1 = scapy.utils.ltoa(0xffffffff)
ip2 = scapy.utils.ltoa(0xffffffff ^ mask)
ip3 = scapy.utils.ltoa(0x00000000 ^ mask)
if source:
wildcards = ((ofp.OFPFW_ALL ^ ofp.OFPFW_DL_TYPE ^ ofp.OFPFW_NW_SRC_MASK)
| (index << ofp.OFPFW_NW_SRC_SHIFT))
pkt0 = simple_tcp_packet(ip_src=ip0)
pkt1 = simple_tcp_packet(ip_src=ip1)
pkt2 = simple_tcp_packet(ip_src=ip2)
pkt3 = simple_tcp_packet(ip_src=ip3)
msg = lambda ip: logging.info("Testing source IP %s" % ip)
else:
wildcards = ((ofp.OFPFW_ALL ^ ofp.OFPFW_DL_TYPE ^ ofp.OFPFW_NW_DST_MASK)
| (index << ofp.OFPFW_NW_DST_SHIFT))
pkt0 = simple_tcp_packet(ip_dst=ip0)
pkt1 = simple_tcp_packet(ip_dst=ip1)
pkt2 = simple_tcp_packet(ip_dst=ip2)
pkt3 = simple_tcp_packet(ip_dst=ip3)
msg = lambda ip: logging.info("Testing dest IP %s" % ip)
rc = delete_all_flows(self.controller)
self.assertEqual(rc, 0, "Failed to delete all flows")
rc = self.controller.message_send(flow_msg_create(
self, pkt0, ing_port=ports[0], egr_ports=[ports[1]],
wildcards=wildcards))
self.assertNotEqual(rc, -1, "Error inserting flow entry 0")
rc = self.controller.message_send(flow_msg_create(
self, pkt1, ing_port=ports[0], egr_ports=[ports[2]],
wildcards=wildcards))
self.assertNotEqual(rc, -1, "Error inserting flow entry 1")
self.assertEqual(do_barrier(self.controller), 0, "Barrier failed")
msg(ip0)
self.dataplane.send(ports[0], str(pkt0))
receive_pkt_verify(self, [ports[1]], pkt0, ports[0])
msg(ip1)
self.dataplane.send(ports[0], str(pkt1))
receive_pkt_verify(self, [ports[2]], pkt1, ports[0])
msg(ip2)
self.dataplane.send(ports[0], str(pkt2))
receive_pkt_verify(self, [ports[1]], pkt2, ports[0])
msg(ip3)
self.dataplane.send(ports[0], str(pkt3))
receive_pkt_verify(self, [ports[2]], pkt3, ports[0])