blob: ccd97fbf34cc95a53df666f303f4038791ef2cf5 [file] [log] [blame]
Ed Swierk76cce912012-07-11 18:59:34 -07001"""
2"""
3import struct
4
5import logging
6
Rich Lane477f4812012-10-04 22:49:00 -07007from oftest import config
Ed Swierk76cce912012-07-11 18:59:34 -07008import oftest.controller as controller
9import oftest.cstruct as ofp
10import oftest.message as message
Rich Laneb90a1c42012-10-05 09:16:05 -070011import oftest.base_tests as base_tests
Ed Swierk76cce912012-07-11 18:59:34 -070012
Rich Laneda3b5ad2012-10-03 09:05:32 -070013from oftest.testutils import *
Ed Swierk76cce912012-07-11 18:59:34 -070014
Ed Swierk76cce912012-07-11 18:59:34 -070015def normal_ip_mask(index):
16 """
17 Return the IP mask for the given wildcard index 0 - 63 per the OF 1.0 spec
18 """
19 if index < 32:
20 return ((1 << 32) - 1) ^ ((1 << index) - 1)
21 else:
22 return 0
23
24def fancy_ip_mask(index):
25 """
26 Return the IP mask for the given wildcard index 0 - 31 per the OF 1.0 spec.
27 For wildcard index 32 - 63, return a "negative" IP mask:
28 32 : wildcard the first bit, mask 127.255.255.255
29 33 : wildcard all first 2 bits, mask 63.255.255.255
30 ...
31 62 : wildcard all but last bit, mask 0.0.0.1
32 63 : wildcard all bits, mask 0.0.0.0
33 """
34 if index < 32:
35 return ((1 << 32) - 1) ^ ((1 << index) - 1)
36 else:
37 return (1 << (63 - index)) - 1
38
Rich Lane0a4f6372013-01-02 14:40:22 -080039@nonstandard
Rich Laneb90a1c42012-10-05 09:16:05 -070040class BSNConfigIPMask(base_tests.SimpleDataPlane):
Ed Swierk76cce912012-07-11 18:59:34 -070041 """
42 Exercise BSN vendor extension for configuring IP source/dest match mask
43 """
Rich Laned1d9c282012-10-04 22:07:10 -070044
Ed Swierk76cce912012-07-11 18:59:34 -070045 def bsn_set_ip_mask(self, index, mask):
46 """
47 Use the BSN_SET_IP_MASK vendor command to change the IP mask for the
48 given wildcard index
49 """
Rich Lane9a003812012-10-04 17:17:59 -070050 logging.info("Setting index %d to mask is %s" % (index, mask))
Ed Swierk76cce912012-07-11 18:59:34 -070051 m = message.vendor()
52 m.vendor = 0x005c16c7
53 m.data = struct.pack("!LBBBBL", 0, index, 0, 0, 0, mask)
54 rc = self.controller.message_send(m)
55 self.assertNotEqual(rc, -1, "Error sending set IP mask command")
56
57 def bsn_get_ip_mask(self, index):
58 """
Ed Swierkaba42582012-09-14 06:40:49 -070059 Use the BSN_GET_IP_MASK_REQUEST vendor command to get the current IP mask
60 for the given wildcard index
Ed Swierk76cce912012-07-11 18:59:34 -070061 """
62 m = message.vendor()
63 m.vendor = 0x005c16c7
64 m.data = struct.pack( "!LBBBBL", 1, index, 0, 0, 0, 0 )
65 rc = self.controller.message_send(m)
66 self.assertNotEqual(rc, -1, "Error sending get IP mask command")
Dan Talaycoc689a792012-09-28 14:22:53 -070067 m, r = self.controller.poll(ofp.OFPT_VENDOR)
Ed Swierk76cce912012-07-11 18:59:34 -070068 self.assertEqual(m.vendor, 0x005c16c7, "Wrong vendor ID")
69 x = struct.unpack("!LBBBBL", m.data)
Ed Swierkaba42582012-09-14 06:40:49 -070070 self.assertEqual(x[0], 2, "Wrong subtype")
Ed Swierk76cce912012-07-11 18:59:34 -070071 self.assertEqual(x[1], index, "Wrong index")
72 return x[5]
73
74 def runTest(self):
Ed Swierk99a74de2012-08-22 06:40:54 -070075 self.assertFalse(required_wildcards(self) & ofp.OFPFW_NW_DST_ALL,
76 "IP dst must be wildcarded")
77 self.assertFalse(required_wildcards(self) & ofp.OFPFW_NW_SRC_ALL,
78 "IP src must be wildcarded")
Ed Swierk76cce912012-07-11 18:59:34 -070079 for index in range(0, 64):
80 mask = self.bsn_get_ip_mask(index)
Rich Lane9a003812012-10-04 17:17:59 -070081 logging.info("Index %d mask is %s" %
Ed Swierk76cce912012-07-11 18:59:34 -070082 (index, scapy.utils.ltoa(mask)))
83 self.assertEqual(mask, normal_ip_mask(index), "Unexpected IP mask")
84
85 for index in range(0, 64):
86 mask = normal_ip_mask(index)
87 if mask == 0:
Rich Lane9a003812012-10-04 17:17:59 -070088 logging.info("Skipping IP wildcard index %d" % index)
Ed Swierk76cce912012-07-11 18:59:34 -070089 else:
Rich Lane9a003812012-10-04 17:17:59 -070090 logging.info("Testing IP wildcard index %d" % index)
Ed Swierk76cce912012-07-11 18:59:34 -070091 self.check_ip_mask(True, index, mask)
92 self.check_ip_mask(False, index, mask)
93
Rich Lane9a003812012-10-04 17:17:59 -070094 logging.info("Setting fancy IP masks")
Ed Swierk76cce912012-07-11 18:59:34 -070095 for index in range(0, 64):
96 self.bsn_set_ip_mask(index, fancy_ip_mask(index))
97 for index in range(0, 64):
98 mask = self.bsn_get_ip_mask(index)
Rich Lane9a003812012-10-04 17:17:59 -070099 logging.info("Index %d mask is %s" %
Ed Swierk76cce912012-07-11 18:59:34 -0700100 (index, scapy.utils.ltoa(mask)))
101 self.assertEqual(mask, fancy_ip_mask(index), "Unexpected IP mask")
102
103 for index in range(0, 64):
104 mask = fancy_ip_mask(index)
105 if mask == 0:
Rich Lane9a003812012-10-04 17:17:59 -0700106 logging.info("Skipping IP wildcard index %d" % index)
Ed Swierk76cce912012-07-11 18:59:34 -0700107 else:
Rich Lane9a003812012-10-04 17:17:59 -0700108 logging.info("Testing IP wildcard index %d" % index)
Ed Swierk76cce912012-07-11 18:59:34 -0700109 self.check_ip_mask(True, index, mask)
110 self.check_ip_mask(False, index, mask)
111
112 def check_ip_mask(self, source, index, mask):
Rich Lane477f4812012-10-04 22:49:00 -0700113 ports = config["port_map"].keys()
Ed Swierk76cce912012-07-11 18:59:34 -0700114
115 # For each mask we install two flow entries, one which matches
116 # on IP source or dest addr all-0s (modulo the mask) and
117 # outputs to port 1, the other which matches on all-1s (modulo
118 # the mask) and outputs to port 2.
119
120 # Then we construct four packets: The first two are the same
121 # as the two flow entry matches (all 0s and all 1s), and we
122 # check that the packets go to ports 1 and 2, respectively.
123 # For the second set of packets, we flip the un-masked bits
124 # and check that only the masked bits are matched.
125
126 ip0 = scapy.utils.ltoa(0x00000000)
127 ip1 = scapy.utils.ltoa(0xffffffff)
128 ip2 = scapy.utils.ltoa(0xffffffff ^ mask)
129 ip3 = scapy.utils.ltoa(0x00000000 ^ mask)
130
131 if source:
132 wildcards = ((ofp.OFPFW_ALL ^ ofp.OFPFW_DL_TYPE ^ ofp.OFPFW_NW_SRC_MASK)
133 | (index << ofp.OFPFW_NW_SRC_SHIFT))
134 pkt0 = simple_tcp_packet(ip_src=ip0)
135 pkt1 = simple_tcp_packet(ip_src=ip1)
136 pkt2 = simple_tcp_packet(ip_src=ip2)
137 pkt3 = simple_tcp_packet(ip_src=ip3)
Rich Lane9a003812012-10-04 17:17:59 -0700138 msg = lambda ip: logging.info("Testing source IP %s" % ip)
Ed Swierk76cce912012-07-11 18:59:34 -0700139 else:
140 wildcards = ((ofp.OFPFW_ALL ^ ofp.OFPFW_DL_TYPE ^ ofp.OFPFW_NW_DST_MASK)
141 | (index << ofp.OFPFW_NW_DST_SHIFT))
142 pkt0 = simple_tcp_packet(ip_dst=ip0)
143 pkt1 = simple_tcp_packet(ip_dst=ip1)
144 pkt2 = simple_tcp_packet(ip_dst=ip2)
145 pkt3 = simple_tcp_packet(ip_dst=ip3)
Rich Lane9a003812012-10-04 17:17:59 -0700146 msg = lambda ip: logging.info("Testing dest IP %s" % ip)
Ed Swierk76cce912012-07-11 18:59:34 -0700147
Rich Lane9a003812012-10-04 17:17:59 -0700148 rc = delete_all_flows(self.controller)
Ed Swierk76cce912012-07-11 18:59:34 -0700149 self.assertEqual(rc, 0, "Failed to delete all flows")
150
151 rc = self.controller.message_send(flow_msg_create(
152 self, pkt0, ing_port=ports[0], egr_ports=[ports[1]],
153 wildcards=wildcards))
154 self.assertNotEqual(rc, -1, "Error inserting flow entry 0")
155 rc = self.controller.message_send(flow_msg_create(
156 self, pkt1, ing_port=ports[0], egr_ports=[ports[2]],
157 wildcards=wildcards))
158 self.assertNotEqual(rc, -1, "Error inserting flow entry 1")
159
160 self.assertEqual(do_barrier(self.controller), 0, "Barrier failed")
161
162 msg(ip0)
163 self.dataplane.send(ports[0], str(pkt0))
164 receive_pkt_verify(self, [ports[1]], pkt0, ports[0])
165
166 msg(ip1)
167 self.dataplane.send(ports[0], str(pkt1))
168 receive_pkt_verify(self, [ports[2]], pkt1, ports[0])
169
170 msg(ip2)
171 self.dataplane.send(ports[0], str(pkt2))
172 receive_pkt_verify(self, [ports[1]], pkt2, ports[0])
173
174 msg(ip3)
175 self.dataplane.send(ports[0], str(pkt3))
176 receive_pkt_verify(self, [ports[2]], pkt3, ports[0])