From patchwork Tue Mar 12 09:28:30 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ales Musil X-Patchwork-Id: 1910917 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=HkDfZ9lu; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org (client-ip=2605:bc80:3010::136; helo=smtp3.osuosl.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org) Received: from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4Tv7cd1F76z1yWt for ; Tue, 12 Mar 2024 20:28:49 +1100 (AEDT) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 84F4360883; Tue, 12 Mar 2024 09:28:46 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F-mjB8T2XRLA; Tue, 12 Mar 2024 09:28:41 +0000 (UTC) X-Comment: SPF check N/A for local connections - client-ip=2605:bc80:3010:104::8cd3:938; helo=lists.linuxfoundation.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver= DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org A64CA60835 Authentication-Results: smtp3.osuosl.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=HkDfZ9lu Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [IPv6:2605:bc80:3010:104::8cd3:938]) by smtp3.osuosl.org (Postfix) with ESMTPS id A64CA60835; Tue, 12 Mar 2024 09:28:41 +0000 (UTC) Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id 7685FC0077; Tue, 12 Mar 2024 09:28:41 +0000 (UTC) X-Original-To: dev@openvswitch.org Delivered-To: ovs-dev@lists.linuxfoundation.org Received: from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136]) by lists.linuxfoundation.org (Postfix) with ESMTP id B54A0C008E for ; Tue, 12 Mar 2024 09:28:40 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 982226081C for ; Tue, 12 Mar 2024 09:28:40 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h1sKmnY_OGNB for ; Tue, 12 Mar 2024 09:28:38 +0000 (UTC) Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=170.10.129.124; helo=us-smtp-delivery-124.mimecast.com; envelope-from=amusil@redhat.com; receiver= DMARC-Filter: OpenDMARC Filter v1.4.2 smtp3.osuosl.org B9BAE605EC Authentication-Results: smtp3.osuosl.org; dmarc=pass (p=none dis=none) header.from=redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org B9BAE605EC Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by smtp3.osuosl.org (Postfix) with ESMTPS id B9BAE605EC for ; Tue, 12 Mar 2024 09:28:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1710235716; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=FCxwnhqo2DYYADq+KAPHATMgIBOasKcUpCB3pescx80=; b=HkDfZ9lu56DLMq+a8dHKw6UehP6QyWTzQlfvfjW8YGNI4ppw18nxCMyQjX/MQFFSRYbWRv 5qbmDh2BrOnEDQSB87SgT2tV/9W5IeJ+JIsiM965KDN/5QK/ufUmO+Y02XJSRm9vr/aUue vH0wGct0HwhaIXjnDecl9e5/VKMde2A= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-343-KVwuQ2nbMryo_VVXa0cUDA-1; Tue, 12 Mar 2024 05:28:33 -0400 X-MC-Unique: KVwuQ2nbMryo_VVXa0cUDA-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id C38C1185A783 for ; Tue, 12 Mar 2024 09:28:32 +0000 (UTC) Received: from amusil.brq.redhat.com (unknown [10.43.17.32]) by smtp.corp.redhat.com (Postfix) with ESMTP id D364E2166AE4; Tue, 12 Mar 2024 09:28:31 +0000 (UTC) From: Ales Musil To: dev@openvswitch.org Date: Tue, 12 Mar 2024 10:28:30 +0100 Message-ID: <20240312092831.67936-1-amusil@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.6 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Cc: dceara@redhat.com Subject: [ovs-dev] [PATCH ovn v3 1/2] tests: Add helper for tcpdump. X-BeenThere: ovs-dev@openvswitch.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: ovs-dev-bounces@openvswitch.org Sender: "dev" The way how tcpdump was called in tests was inconsistent, a lot fo the tests didn't even wait for the tcpdump to properly start, some of them didn't redirect the stderr which could cause leak into the test stderr and fail the test. To prevent that add macro that starts tcpdump and properly waits for the "listening" state, at the same time redirects the stderr into separate file. Signed-off-by: Ales Musil --- v2: Rebase on top of current main. Address comment from Dumitru and rework the tcpdump in system tests. v3: Rebase on top of current main. --- tests/system-common-macros.at | 25 ++- tests/system-ovn-kmod.at | 24 +-- tests/system-ovn.at | 312 ++++++++++++++-------------------- 3 files changed, 151 insertions(+), 210 deletions(-) diff --git a/tests/system-common-macros.at b/tests/system-common-macros.at index 177178067..021f5cb9a 100644 --- a/tests/system-common-macros.at +++ b/tests/system-common-macros.at @@ -271,6 +271,18 @@ m4_define([OVS_START_L7], ] ) +# NETNS_START_TCPDUMP([namespace], [params], [name]) +# +# Helper to properly start tcpdump and wait for the startup. +# The tcpdump output is available in .tcpdump file. +m4_define([NETNS_START_TCPDUMP], + [ + NETNS_DAEMONIZE([$1], [tcpdump -l $2 >$3.tcpdump 2>$3.stderr], [$3.pid]) + OVS_WAIT_UNTIL([grep -q "listening" $3.stderr]) + ] +) + + # OVS_CHECK_VXLAN() # # Do basic check for vxlan functionality, skip the test if it's not there. @@ -438,8 +450,7 @@ chown root:dhcpd /var/lib/dhcp /var/lib/dhcp/dhcpd6.leases chmod 775 /var/lib/dhcp chmod 664 /var/lib/dhcp/dhcpd6.leases -NS_CHECK_EXEC([server], [tcpdump -nni s1 > pkt.pcap &]) - +NETNS_START_TCPDUMP([server], [-nni s1], [server]) NETNS_DAEMONIZE([server], [dhcpd -6 -f s1 > dhcpd.log 2>&1], [dhcpd.pid]) ovn-nbctl --wait=hv sync @@ -462,22 +473,20 @@ ovn-nbctl list logical_router_port rp-public > /tmp/rp-public ovn-nbctl set logical_router_port rp-sw0 options:prefix=false ovn-nbctl set logical_router_port rp-sw1 options:prefix=false # Renew message -NS_CHECK_EXEC([server], [tcpdump -c 1 -nni s1 ip6[[48:1]]=0x05 and ip6[[113:4]]=0x${prefix} > renew.pcap &]) +NETNS_START_TCPDUMP([server], [-c 1 -nni s1 ip6[[48:1]]=0x05 and ip6[[113:4]]=0x${prefix}], [renew]) # Reply message with Status OK -NS_CHECK_EXEC([server], [tcpdump -c 1 -nni s1 ip6[[48:1]]=0x07 and ip6[[81:4]]=0x${prefix} > reply.pcap &]) +NETNS_START_TCPDUMP([server], [-c 1 -nni s1 ip6[[48:1]]=0x07 and ip6[[81:4]]=0x${prefix}], [reply]) OVS_WAIT_UNTIL([ - total_pkts=$(cat renew.pcap | wc -l) + total_pkts=$(cat renew.tcpdump | wc -l) test "${total_pkts}" = "1" ]) OVS_WAIT_UNTIL([ - total_pkts=$(cat reply.pcap | wc -l) + total_pkts=$(cat reply.tcpdump | wc -l) test "${total_pkts}" = "1" ]) -kill $(pidof tcpdump) - ovn-nbctl set logical_router_port rp-sw0 options:prefix=false ovn-nbctl clear logical_router_port rp-sw0 ipv6_prefix OVS_WAIT_WHILE([test "$(ovn-nbctl get logical_router_port rp-sw0 ipv6_prefix | cut -c3-16)" = "[2001:1db8:3333]"]) diff --git a/tests/system-ovn-kmod.at b/tests/system-ovn-kmod.at index 14fe4ecec..d8a27213c 100644 --- a/tests/system-ovn-kmod.at +++ b/tests/system-ovn-kmod.at @@ -668,19 +668,15 @@ test_fragmented_traffic() { NETNS_DAEMONIZE([server], [nc -l -u 172.16.1.2 4242 > /dev/null], [server.pid]) # Collect ICMP packets on client side - NETNS_DAEMONIZE([client], [tcpdump -l -U -i client -vnne \ - udp > client.pcap 2>client_err], [tcpdump0.pid]) - OVS_WAIT_UNTIL([grep "listening" client_err]) + NETNS_START_TCPDUMP([client], [-U -i client -vnne udp], [tcpdump-client]) # Collect UDP packets on server side - NETNS_DAEMONIZE([server], [tcpdump -l -U -i server -vnne \ - 'udp and ip[[6:2]] > 0 and not ip[[6]] = 64' > server.pcap 2>server_err], [tcpdump1.pid]) - OVS_WAIT_UNTIL([grep "listening" server_err]) + NETNS_START_TCPDUMP([server], [-U -i server -vnne 'udp and ip[[6:2]] > 0 and not ip[[6]] = 64'], [tcpdump-server]) NS_CHECK_EXEC([client], [$PYTHON3 ./client.py]) - OVS_WAIT_UNTIL([test "$(cat server.pcap | wc -l)" = "4"]) + OVS_WAIT_UNTIL([test "$(cat tcpdump-server.tcpdump | wc -l)" = "4"]) - check kill $(cat tcpdump0.pid) $(cat tcpdump1.pid) $(cat server.pid) + check kill $(cat tcpdump-client.pid) $(cat tcpdump-server.pid) $(cat server.pid) } AS_BOX([LB on router without port and protocol]) @@ -1006,14 +1002,10 @@ while True: NETNS_DAEMONIZE([server], [$PYTHON3 ./server.py > server.log], [server.pid]) dnl Collect packets on server side. -NETNS_DAEMONIZE([server], [tcpdump -l -U -i server -vnne \ - 'ip and (icmp or udp)' > server.tcpdump 2>server_err], [tcpdump0.pid]) -OVS_WAIT_UNTIL([grep "listening" server_err]) +NETNS_START_TCPDUMP([server], [-U -i server -vnne 'ip and (icmp or udp)'], [tcpdump-server]) dnl Collect packets on client side. -NETNS_DAEMONIZE([client], [tcpdump -l -U -i client -vnne \ - 'ip and (icmp or udp)' > client.tcpdump 2>client_err], [tcpdump1.pid]) -OVS_WAIT_UNTIL([grep "listening" client_err]) +NETNS_START_TCPDUMP([client], [-U -i client -vnne 'ip and (icmp or udp)'], [tcpdump-client]) dnl Send two packets to the server with a short interval. dnl First packet should generate 'needs frag', the second should result in @@ -1031,8 +1023,8 @@ time.sleep(5) NS_CHECK_EXEC([client], [$PYTHON3 ./client.py]) dnl Expecting 2 outgoing packets and 2 fragments back - 8 lines total. -OVS_WAIT_UNTIL([test "$(cat client.tcpdump | wc -l)" = "8"]) -AT_CHECK([test $(grep -c "need to frag (mtu 800)" server.tcpdump) -eq 1]) +OVS_WAIT_UNTIL([test "$(cat tcpdump-client.tcpdump | wc -l)" = "8"]) +AT_CHECK([test $(grep -c "need to frag (mtu 800)" tcpdump-server.tcpdump) -eq 1]) ovn-appctl -t ovn-controller vlog/set info diff --git a/tests/system-ovn.at b/tests/system-ovn.at index 2411b0267..154de2259 100644 --- a/tests/system-ovn.at +++ b/tests/system-ovn.at @@ -1602,12 +1602,11 @@ OVS_WAIT_UNTIL([ ovn-nbctl --reject lb-add lb3 30.0.0.10:80 "" ovn-nbctl ls-lb-add foo lb3 # Filter reset segments -NS_CHECK_EXEC([foo1], [tcpdump -l -c 1 -neei foo1 ip[[33:1]]=0x14 > rst.pcap 2>tcpdump_err &]) -OVS_WAIT_UNTIL([grep "listening" tcpdump_err]) +NETNS_START_TCPDUMP([foo1], [-c 1 -neei foo1 ip[[33:1]]=0x14], [rst]) NS_CHECK_EXEC([foo1], [wget -q 30.0.0.10],[4]) OVS_WAIT_UNTIL([ - n_reset=$(cat rst.pcap | wc -l) + n_reset=$(cat rst.tcpdump | wc -l) test "${n_reset}" = "1" ]) @@ -3564,8 +3563,7 @@ icmp,orig=(src=192.168.2.2,dst=172.16.1.2,id=,type=8,code=0),reply=(src ]) # Try to ping external network -NS_CHECK_EXEC([ext-net], [tcpdump -l -n -c 3 -i ext-veth dst 172.16.1.3 and icmp > ext-net.pcap 2>tcpdump_err &]) -OVS_WAIT_UNTIL([grep "listening" tcpdump_err]) +NETNS_START_TCPDUMP([ext-net], [-n -c 3 -i ext-veth dst 172.16.1.3 and icmp], [ext-net]) AT_CHECK([ovn-nbctl lr-nat-del R1 snat]) NS_CHECK_EXEC([foo1], [ping -q -c 3 -i 0.3 -w 2 10.0.0.1 | FORMAT_PING], \ [0], [dnl @@ -3573,7 +3571,7 @@ NS_CHECK_EXEC([foo1], [ping -q -c 3 -i 0.3 -w 2 10.0.0.1 | FORMAT_PING], \ ]) OVS_WAIT_UNTIL([ - total_pkts=$(cat ext-net.pcap | wc -l) + total_pkts=$(cat ext-net.tcpdump | wc -l) test "${total_pkts}" = "3" ]) @@ -4316,19 +4314,19 @@ ovn-nbctl set Logical_Switch sw2 \ other_config:mcast_ip6_src="2000::fe" # Check that v4 queries are generated. -NS_CHECK_EXEC([sw2-p1], [tcpdump -n -c 2 -i sw2-p1 igmp > sw2-p1-v4.pcap &]) +NETNS_START_TCPDUMP([sw2-p1], [-n -c 2 -i sw2-p1 igmp], [sw2-p1-v4]) OVS_WAIT_UNTIL([ - total_queries=`grep "igmp query" -c sw2-p1-v4.pcap` + total_queries=`grep "igmp query" -c sw2-p1-v4.tcpdump` test "${total_queries}" = "2" ]) # Check that v6 queries are generated (ip6 next header == Hop-By-Hop and # icmpv6 type == MLD Query). -NS_CHECK_EXEC([sw2-p1], [tcpdump -n -c 2 -i sw2-p1 ip6[[6]]==0 and ip6[[48]]==0x82 > sw2-p1-v6.pcap &]) +NETNS_START_TCPDUMP([sw2-p1], [-n -c 2 -i sw2-p1 ip6[[6]]==0 and ip6[[48]]==0x82], [sw2-p1-v6]) OVS_WAIT_UNTIL([ - total_queries=`grep "multicast listener query" -c sw2-p1-v6.pcap` + total_queries=`grep "multicast listener query" -c sw2-p1-v6.tcpdump` test "${total_queries}" = "2" ]) @@ -4546,13 +4544,13 @@ service_monitor protocol=udp | sed '/^$/d' | grep offline | wc -l`]) pid_file=$(cat l7_pid_file) NS_CHECK_EXEC([sw1-p1], [kill $(cat $pid_file)]) -NS_CHECK_EXEC([sw0-p2], [tcpdump -c 1 -neei sw0-p2 ip[[33:1]]=0x14 > rst.pcap &]) +NETNS_START_TCPDUMP([sw0-p2], [-c 1 -neei sw0-p2 ip[[33:1]]=0x14], [rst]) OVS_WAIT_UNTIL([test 2 = `ovn-sbctl --bare --columns status find \ service_monitor protocol=tcp | sed '/^$/d' | grep offline | wc -l`]) NS_CHECK_EXEC([sw0-p2], [wget 10.0.0.10 -v -o wget$i.log],[4]) OVS_WAIT_UNTIL([ - n_reset=$(cat rst.pcap | wc -l) + n_reset=$(cat rst.tcpdump | wc -l) test "${n_reset}" = "1" ]) @@ -4818,8 +4816,7 @@ NS_CHECK_EXEC([lsp], [nc 88.88.88.90 4041 -z], [0], [ignore], [ignore]) # Capture IPv4 UDP hairpinned packets. filter="dst 42.42.42.1 and dst port 2021 and udp" -NS_CHECK_EXEC([lsp], [tcpdump -l -nn -c 3 -i lsp ${filter} > lsp.pcap 2>tcpdump_err &]) -OVS_WAIT_UNTIL([grep "listening" tcpdump_err]) +NETNS_START_TCPDUMP([lsp], [-nn -c 3 -i lsp ${filter}], [lsp]) # Generate IPv4 UDP hairpin traffic. NS_CHECK_EXEC([lsp], [echo a | nc -u 88.88.88.88 4040], [ignore], [ignore], [ignore]) @@ -4828,7 +4825,7 @@ NS_CHECK_EXEC([lsp], [echo a | nc -u 88.88.88.90 2021], [ignore], [ignore], [ign # Check hairpin traffic. OVS_WAIT_UNTIL([ - total_pkts=$(cat lsp.pcap | wc -l) + total_pkts=$(cat lsp.tcpdump | wc -l) test "${total_pkts}" = "3" ]) @@ -4916,8 +4913,7 @@ NS_CHECK_EXEC([lsp], [nc 8800::0090 4041 -z], [0], [ignore], [ignore]) # Capture IPv6 UDP hairpinned packets. filter="dst 4200::1 and dst port 2021 and udp" -NS_CHECK_EXEC([lsp], [tcpdump -l -nn -c 3 -i lsp $filter > lsp.pcap 2>tcpdump_err &]) -OVS_WAIT_UNTIL([grep "listening" tcpdump_err]) +NETNS_START_TCPDUMP([lsp], [-nn -c 3 -i lsp $filter], [lsp]) # Generate IPv6 UDP hairpin traffic. NS_CHECK_EXEC([lsp], [echo a | nc -u 8800::0088 4040], [ignore], [ignore], [ignore]) @@ -4926,7 +4922,7 @@ NS_CHECK_EXEC([lsp], [echo a | nc -u 8800::0090 2021], [ignore], [ignore], [igno # Check hairpin traffic. OVS_WAIT_UNTIL([ - total_pkts=$(cat lsp.pcap | wc -l) + total_pkts=$(cat lsp.tcpdump | wc -l) test "${total_pkts}" = "3" ]) @@ -5040,10 +5036,7 @@ ADD_VETH(sw1-p1-rej, sw1-p1-rej, br-int, "20.0.0.3/24", "40:54:00:00:00:03", \ "20.0.0.1") # Capture packets in sw0-p1-rej. -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej tcp > sw0-p1-rej-ip4.pcap 2> err &], [0]) - -#Wait for tcpdump to get started before generating first packets -OVS_WAIT_UNTIL([test 1 = $(cat err | grep -c listening)]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej tcp], [sw0-p1-rej-ip4]) OVS_WAIT_UNTIL([ ip netns exec sw0-p1-rej nc -vz 10.0.0.4 80 2>&1 | grep -i 'connection refused' @@ -5061,17 +5054,12 @@ grep controller | grep tp_dst=84 -c) ]) OVS_WAIT_UNTIL([ - total=`cat sw0-p1-rej-ip4.pcap | grep "10\.0\.0\.3" | wc -l` + total=`cat sw0-p1-rej-ip4.tcpdump | grep "10\.0\.0\.3" | wc -l` echo "total = $total" test "${total}" = "4" ]) -kill $(pidof tcpdump) - -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej tcp port 80 > sw0-p2-rej-ip6.pcap 2> err &], [0]) - -#Wait for tcpdump to get started before generating first packets -OVS_WAIT_UNTIL([test 1 = $(cat err | grep -c listening)]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej tcp port 80], [sw0-p2-rej-ip6]) OVS_WAIT_UNTIL([ ip netns exec sw0-p2-rej nc -vz6 aef0::3 80 2>&1 | grep -i 'connection refused' @@ -5079,7 +5067,7 @@ OVS_WAIT_UNTIL([ OVS_WAIT_UNTIL([ - total=`cat sw0-p2-rej-ip6.pcap | grep "aef0::3\.80" |wc -l` + total=`cat sw0-p2-rej-ip6.tcpdump | grep "aef0::3\.80" |wc -l` echo "total = $total" test "${total}" = "2" ]) @@ -5091,61 +5079,57 @@ OVS_WAIT_UNTIL([ ip netns exec sw1-p1-rej nc -vz 10.0.0.4 84 2>&1 | grep -i 'connection refused' ]) -kill $(pidof tcpdump) - # Now test for IPv4 UDP. -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej udp port 90 > sw0-p1-rej-udp.pcap 2> err &], [0]) -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej icmp > sw0-p1-rej-icmp.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej udp port 90], [sw0-p1-rej-udp]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej icmp], [sw0-p1-rej-icmp]) printf '.%.0s' {1..100} > foo OVS_WAIT_UNTIL([ ip netns exec sw0-p1-rej nc -u 10.0.0.4 90 < foo - c=$(cat sw0-p1-rej-icmp.pcap | grep \ + c=$(cat sw0-p1-rej-icmp.tcpdump | grep \ "10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port 90 unreachable" | uniq | wc -l) test $c -ge 1 ]) kill $(pidof tcpdump) -rm -f *.pcap +rm -f *.tcpdump -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej udp port 94 > sw0-p1-rej-udp.pcap 2> err &], [0]) -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej icmp > sw0-p1-rej-icmp.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej udp port 94], [sw0-p1-rej-udp]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej icmp], [sw0-p1-rej-icmp]) OVS_WAIT_UNTIL([ ip netns exec sw0-p1-rej nc -u 10.0.0.4 94 < foo - c=$(cat sw0-p1-rej-icmp.pcap | grep \ + c=$(cat sw0-p1-rej-icmp.tcpdump | grep \ "10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port 94 unreachable" | uniq | wc -l) test $c -ge 1 ]) -kill $(pidof tcpdump) # Now test for IPv6 UDP. -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej udp port 90 > sw0-p2-rej-ip6-udp.pcap 2> err &], [0]) -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej icmp6 > sw0-p2-rej-icmp6.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej udp port 90], [sw0-p2-rej-ip6-udp]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej icmp6], [sw0-p2-rej-icmp6]) OVS_WAIT_UNTIL([ ip netns exec sw0-p2-rej nc -u -6 aef0::3 90 < foo - c=$(cat sw0-p2-rej-icmp6.pcap | grep \ + c=$(cat sw0-p2-rej-icmp6.tcpdump | grep \ "IP6 aef0::3 > aef0::4: ICMP6, destination unreachable, unreachable port, \ aef0::3 udp port 90" | uniq | wc -l) test $c -ge 1 ]) kill $(pidof tcpdump) -rm -f *.pcap +rm -f *.tcpdump -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej udp port 94 > sw0-p2-rej-ip6-udp.pcap 2> err &], [0]) -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej icmp6 > sw0-p2-rej-icmp6.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej udp port 94], [sw0-p2-rej-ip6-udp]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej icmp6], [sw0-p2-rej-icmp6]) OVS_WAIT_UNTIL([ ip netns exec sw0-p2-rej nc -u -6 aef0::3 94 < foo - c=$(cat sw0-p2-rej-icmp6.pcap | grep \ + c=$(cat sw0-p2-rej-icmp6.tcpdump | grep \ "IP6 aef0::3 > aef0::4: ICMP6, destination unreachable, unreachable port, \ aef0::3 udp port 94" | uniq | wc -l) test $c -ge 1 ]) -kill $(pidof tcpdump) # Delete all the ACLs of pg0 and add the ACL with a generic match with reject action. ovn-nbctl pg-del pg0 @@ -5160,31 +5144,30 @@ OVS_WAIT_UNTIL([ ip netns exec sw0-p2-rej nc -vz6 aef0::3 80 2>&1 | grep -i 'connection refused' ]) -rm -f *.pcap +rm -f *.tcpdump -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej icmp > sw0-p1-rej-icmp.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej icmp], [sw0-p1-rej-icmp]) printf '.%.0s' {1..100} > foo OVS_WAIT_UNTIL([ ip netns exec sw0-p1-rej nc -u 10.0.0.4 90 < foo - c=$(cat sw0-p1-rej-icmp.pcap | grep \ + c=$(cat sw0-p1-rej-icmp.tcpdump | grep \ "10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port 90 unreachable" | uniq | wc -l) test $c -ge 1 ]) kill $(pidof tcpdump) -rm -f *.pcap +rm -f *.tcpdump # Now test for IPv6 UDP. -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej icmp6 > sw0-p2-rej-icmp6.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej icmp6], [sw0-p2-rej-icmp6]) OVS_WAIT_UNTIL([ ip netns exec sw0-p2-rej nc -u -6 aef0::3 90 < foo - c=$(cat sw0-p2-rej-icmp6.pcap | grep \ + c=$(cat sw0-p2-rej-icmp6.tcpdump | grep \ "IP6 aef0::3 > aef0::4: ICMP6, destination unreachable, unreachable port, \ aef0::3 udp port 90" | uniq | wc -l) test $c -ge 1 ]) -kill $(pidof tcpdump) OVS_APP_EXIT_AND_WAIT([ovn-controller]) @@ -5287,10 +5270,7 @@ ADD_VETH(sw1-p1-rej, sw1-p1-rej, br-int, "20.0.0.3/24", "40:54:00:00:00:03", \ "20.0.0.1") # Capture packets in sw0-p1-rej. -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej tcp > sw0-p1-rej-ip4.pcap 2> err &], [0]) - -#Wait for tcpdump to get started before generating first packets -OVS_WAIT_UNTIL([test 1 = $(cat err | grep -c listening)]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej tcp], [sw0-p1-rej-ip4]) OVS_WAIT_UNTIL([ ip netns exec sw0-p1-rej nc -vz 10.0.0.4 80 2>&1 | grep -i 'connection refused' @@ -5308,17 +5288,12 @@ grep controller | grep tp_dst=84 -c) ]) OVS_WAIT_UNTIL([ - total=`cat sw0-p1-rej-ip4.pcap | grep "10\.0\.0\.4" | wc -l` + total=`cat sw0-p1-rej-ip4.tcpdump | grep "10\.0\.0\.4" | wc -l` echo "total = $total" test "${total}" = "4" ]) -kill $(pidof tcpdump) - -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej tcp port 80 > sw0-p2-rej-ip6.pcap 2> err &], [0]) - -#Wait for tcpdump to get started before generating first packets -OVS_WAIT_UNTIL([test 1 = $(cat err | grep -c listening)]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej tcp port 80], [sw0-p2-rej-ip6]) OVS_WAIT_UNTIL([ ip netns exec sw0-p2-rej nc -vz6 aef0::3 80 2>&1 | grep -i 'connection refused' @@ -5326,7 +5301,7 @@ OVS_WAIT_UNTIL([ OVS_WAIT_UNTIL([ - total=`cat sw0-p2-rej-ip6.pcap | grep "aef0::3\.80" | wc -l` + total=`cat sw0-p2-rej-ip6.tcpdump | grep "aef0::3\.80" | wc -l` echo "total = $total" test "${total}" = "2" ]) @@ -5342,53 +5317,51 @@ OVS_WAIT_UNTIL([ ]) # Now test for IPv4 UDP. -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej udp port 90 > sw0-p1-rej-udp.pcap 2> err &], [0]) -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej icmp > sw0-p1-rej-icmp.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej udp port 90], [sw0-p1-rej-udp]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej icmp], [sw0-p1-rej-icmp]) printf '.%.0s' {1..100} > foo OVS_WAIT_UNTIL([ ip netns exec sw0-p1-rej nc -u 10.0.0.4 90 < foo - c=$(cat sw0-p1-rej-icmp.pcap | grep \ + c=$(cat sw0-p1-rej-icmp.tcpdump | grep \ "10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port 90 unreachable" | uniq | wc -l) test $c -ge 1 ]) kill $(pidof tcpdump) -rm -f *.pcap +rm -f *.tcpdump -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej udp port 94 > sw0-p1-rej-udp.pcap 2> err &], [0]) -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej icmp > sw0-p1-rej-icmp.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej udp port 94], [sw0-p1-rej-udp]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej icmp], [sw0-p1-rej-icmp]) OVS_WAIT_UNTIL([ ip netns exec sw0-p1-rej nc -u 10.0.0.4 94 < foo - c=$(cat sw0-p1-rej-icmp.pcap | grep \ + c=$(cat sw0-p1-rej-icmp.tcpdump | grep \ "10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port 94 unreachable" | uniq | wc -l) test $c -ge 1 ]) -kill $(pidof tcpdump) - # Now test for IPv6 UDP. -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej udp port 90 > sw0-p2-rej-ip6-udp.pcap 2> err &], [0]) -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej icmp6 > sw0-p2-rej-icmp6.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej udp port 90], [sw0-p2-rej-ip6-udp]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej icmp6], [sw0-p2-rej-icmp6]) OVS_WAIT_UNTIL([ ip netns exec sw0-p2-rej nc -u -6 aef0::3 90 < foo - c=$(cat sw0-p2-rej-icmp6.pcap | grep \ + c=$(cat sw0-p2-rej-icmp6.tcpdump | grep \ "IP6 aef0::3 > aef0::4: ICMP6, destination unreachable, unreachable port, \ aef0::3 udp port 90" | uniq | wc -l) test $c -ge 1 ]) kill $(pidof tcpdump) -rm -f *.pcap +rm -f *.tcpdump -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej udp port 94 > sw0-p2-rej-ip6-udp.pcap 2> err &], [0]) -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej icmp6 > sw0-p2-rej-icmp6.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej udp port 94], [sw0-p2-rej-ip6-udp]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej icmp6], [sw0-p2-rej-icmp6]) OVS_WAIT_UNTIL([ ip netns exec sw0-p2-rej nc -u -6 aef0::3 94 < foo - c=$(cat sw0-p2-rej-icmp6.pcap | grep \ + c=$(cat sw0-p2-rej-icmp6.tcpdump | grep \ "IP6 aef0::3 > aef0::4: ICMP6, destination unreachable, unreachable port, \ aef0::3 udp port 94" | uniq | wc -l) test $c -ge 1 @@ -5408,33 +5381,31 @@ OVS_WAIT_UNTIL([ ]) kill $(pidof tcpdump) -rm -f *.pcap +rm -f *.tcpdump -NS_CHECK_EXEC([sw0-p1-rej], [tcpdump -l -nn -i sw0-p1-rej icmp > sw0-p1-rej-icmp.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p1-rej], [-nn -i sw0-p1-rej icmp], [sw0-p1-rej-icmp]) printf '.%.0s' {1..100} > foo OVS_WAIT_UNTIL([ ip netns exec sw0-p1-rej nc -u 10.0.0.4 90 < foo - c=$(cat sw0-p1-rej-icmp.pcap | grep \ + c=$(cat sw0-p1-rej-icmp.tcpdump | grep \ "10.0.0.4 > 10.0.0.3: ICMP 10.0.0.4 udp port 90 unreachable" | uniq | wc -l) test $c -ge 1 ]) kill $(pidof tcpdump) -rm -f *.pcap +rm -f *.tcpdump # Now test for IPv6 UDP. -NS_CHECK_EXEC([sw0-p2-rej], [tcpdump -l -nn -i sw0-p2-rej icmp6 > sw0-p2-rej-icmp6.pcap 2> err &], [0]) +NETNS_START_TCPDUMP([sw0-p2-rej], [-nn -i sw0-p2-rej icmp6], [sw0-p2-rej-icmp6]) OVS_WAIT_UNTIL([ ip netns exec sw0-p2-rej nc -u -6 aef0::3 90 < foo - c=$(cat sw0-p2-rej-icmp6.pcap | grep \ + c=$(cat sw0-p2-rej-icmp6.tcpdump | grep \ "IP6 aef0::3 > aef0::4: ICMP6, destination unreachable, unreachable port, \ aef0::3 udp port 90" | uniq | wc -l) test $c -ge 1 ]) -kill $(pidof tcpdump) - OVS_APP_EXIT_AND_WAIT([ovn-controller]) as ovn-sb @@ -6867,10 +6838,10 @@ check ovn-nbctl lr-policy-del R1 wait_column "admin_down" nb:bfd status logical_port=rp-public OVS_WAIT_UNTIL([ip netns exec server bfdd-control status | grep -qi state=Down]) -NS_CHECK_EXEC([server], [tcpdump -nni s1 udp port 3784 -Q in > bfd.pcap &]) +NETNS_START_TCPDUMP([server], [-nni s1 udp port 3784 -Q in], [bfd]) sleep 5 kill $(pidof tcpdump) -AT_CHECK([grep -qi bfd bfd.pcap],[1]) +AT_CHECK([grep -qi bfd bfd.tcpdump],[1]) # restart the connection check ovn-nbctl set logical_router_static_route $route_uuid bfd=$uuid @@ -6928,10 +6899,10 @@ stopping # remove bfd entry ovn-nbctl destroy bfd $uuid check_row_count bfd 0 -NS_CHECK_EXEC([server], [tcpdump -nni s1 udp port 3784 -Q in > bfd.pcap &]) +NETNS_START_TCPDUMP([server], [-nni s1 udp port 3784 -Q in], [bfd]) sleep 5 kill $(pidof tcpdump) -AT_CHECK([grep -qi bfd bfd.pcap],[1]) +AT_CHECK([grep -qi bfd bfd.tcpdump],[1]) uuid_v6=$(ovn-nbctl create bfd logical_port=rp-public dst_ip=\"1000::b\") check ovn-nbctl lr-route-add R1 2000::/64 1000::b @@ -7392,7 +7363,7 @@ check ovn-nbctl lsp-add public public1 \ -- lsp-set-type public1 localnet \ -- lsp-set-options public1 network_name=phynet -NS_EXEC([sw01], [tcpdump -l -n -i sw01 icmp -Q in > reject.pcap &]) +NETNS_START_TCPDUMP([sw01], [-n -i sw01 icmp -Q in], [reject]) check ovn-nbctl meter-add acl-meter drop 1 pktps 0 check ovn-nbctl copp-add copp0 reject acl-meter check ovn-nbctl ls-copp-add copp0 sw0 @@ -7409,14 +7380,14 @@ EOF # 1pps OVS_WAIT_UNTIL([ - n_reject=$(grep unreachable reject.pcap | wc -l) + n_reject=$(grep unreachable reject.tcpdump | wc -l) test "${n_reject}" = "1" ]) kill $(pidof tcpdump) -rm -f reject.pcap +rm -f reject.tcpdump # Let's update the meter -NS_EXEC([sw01], [tcpdump -l -n -i sw01 icmp -Q in > reject.pcap &]) +NETNS_START_TCPDUMP([sw01], [-n -i sw01 icmp -Q in], [reject]) check ovn-nbctl --may-exist --wait=hv meter-add acl-meter drop 5 pktps 0 OVS_WAIT_UNTIL([ovs-ofctl -O OpenFlow15 meter-stats br-int | grep -q packet_count:0]) ip netns exec sw01 scapy -H <<-EOF @@ -7426,14 +7397,14 @@ EOF # 10pps OVS_WAIT_UNTIL([ - n_reject=$(grep unreachable reject.pcap | wc -l) + n_reject=$(grep unreachable reject.tcpdump | wc -l) test "${n_reject}" = "5" ]) kill $(pidof tcpdump) -rm -f reject.pcap +rm -f reject.tcpdump -NS_EXEC([sw01], [tcpdump -l -n -i sw01 icmp -Q in > reject.pcap &]) +NETNS_START_TCPDUMP([sw01], [-n -i sw01 icmp -Q in], [reject]) check ovn-nbctl --wait=hv copp-del copp0 reject ip netns exec sw01 scapy -H <<-EOF @@ -7442,12 +7413,11 @@ send (p, iface='sw01', loop = 0, verbose = 0, count = 20) EOF OVS_WAIT_UNTIL([ - n_reject=$(grep unreachable reject.pcap | wc -l) + n_reject=$(grep unreachable reject.tcpdump | wc -l) test "${n_reject}" = "20" ]) -kill $(pidof tcpdump) -NS_EXEC([server], [tcpdump -l -n -i s1 arp[[24:4]]=0xac100164 > arp.pcap &]) +NETNS_START_TCPDUMP([server], [-n -i s1 arp[[24:4]]=0xac100164], [arp]) check ovn-nbctl meter-add arp-meter drop 1 pktps 0 check ovn-nbctl copp-add copp1 arp-resolve arp-meter check ovn-nbctl --wait=hv lr-copp-add copp1 R1 @@ -7462,10 +7432,9 @@ EOF # 1pps OVS_WAIT_UNTIL([ - n_arp=$(grep ARP arp.pcap | wc -l) + n_arp=$(grep ARP arp.tcpdump | wc -l) test "${n_arp}" = "1" ]) -kill $(pidof tcpdump) check ovn-nbctl meter-add icmp-meter drop 1 pktps 0 check ovn-nbctl copp-add copp2 icmp4-error icmp-meter @@ -7474,7 +7443,7 @@ AT_CHECK([ovn-nbctl copp-list copp2 |grep icmp4-error], [0], [dnl icmp4-error: icmp-meter ]) -NS_EXEC([sw01], [tcpdump -l -n -i sw01 icmp > icmp.pcap &]) +NETNS_START_TCPDUMP([sw01], [-n -i sw01 icmp], [icmp]) ip netns exec sw01 scapy -H <<-EOF p = IP(src="192.168.1.2", dst="172.16.1.100", ttl=1) / TCP(dport = 8080, flags="S") / Raw(b"X"*64) send (p, iface='sw01', loop = 0, verbose = 0, count = 100) @@ -7482,10 +7451,9 @@ EOF # 1pps OVS_WAIT_UNTIL([ - n_icmp=$(grep ICMP icmp.pcap | wc -l) + n_icmp=$(grep ICMP icmp.tcpdump | wc -l) test "${n_icmp}" = "1" ]) -kill $(pidof tcpdump) check ovn-nbctl meter-add bfd-meter drop 1 pktps 0 check ovn-nbctl copp-add copp3 bfd bfd-meter @@ -7496,7 +7464,7 @@ bfd: bfd-meter check ovn-nbctl --wait=hv --bfd lr-route-add R1 240.0.0.0/8 172.16.1.50 rp-public printf "%08x" $(ovn-sbctl get bfd . disc) > /tmp/disc -NS_EXEC([server], [tcpdump -l -nn -i s1 udp port 3784 and ip[[29]]==0x90 -Q in > bfd.pcap &]) +NETNS_START_TCPDUMP([server], [-nn -i s1 udp port 3784 and ip[[29]]==0x90 -Q in], [bfd]) ip netns exec server scapy -H <<-EOF import binascii f = open("/tmp/disc", "r") @@ -7511,10 +7479,9 @@ rm /tmp/disc # 1pps OVS_WAIT_UNTIL([ - n_bfd=$(grep 3784 bfd.pcap | wc -l) + n_bfd=$(grep 3784 bfd.tcpdump | wc -l) test "${n_bfd}" = "1" ]) -kill $(pidof tcpdump) check ovn-nbctl set nb_global . options:svc_monitor_mac="33:33:33:33:33:33" check ovn-nbctl meter-add svc-meter drop 1 pktps 0 @@ -8830,7 +8797,7 @@ ADD_NAMESPACES(vm2) ADD_VETH(vm2, vm2, br-int, "42.42.42.2/24", "00:00:00:00:00:02") ADD_NAMESPACES(vm3) -NETNS_DAEMONIZE([vm3], [tcpdump -n -i any -nnleX > vm3.pcap 2>/dev/null], [tcpdump3.pid]) +NETNS_START_TCPDUMP([vm3], [-n -i any -nnleX], [vm3]) ADD_VETH(vm3, vm3, br-int, "42.42.42.3/24", "00:00:00:00:00:03", \ "42.42.42.5") @@ -8845,11 +8812,11 @@ wait_igmp_flows_installed 228.0.0.1 NS_CHECK_EXEC([vm1], [ping -q -c 3 -i 0.3 -w 2 228.0.0.1], [ignore], [ignore]) OVS_WAIT_UNTIL([ - requests=`grep "ICMP echo request" -c vm3.pcap` + requests=`grep "ICMP echo request" -c vm3.tcpdump` test "${requests}" -ge "3" ]) -NETNS_DAEMONIZE([vm2], [tcpdump -n -i any -nnleX > vm2.pcap 2>/dev/null], [tcpdump2.pid]) +NETNS_START_TCPDUMP([vm2], [-n -i any -nnleX], [vm2]) for i in `seq 1 40`;do NS_CHECK_EXEC([vm2], [ip addr add 228.1.$i.1 dev vm2 autojoin &], [0]) @@ -8868,7 +8835,7 @@ ovn-sbctl list multicast_group NS_CHECK_EXEC([vm1], [ping -q -c 3 -i 0.3 -w 2 228.1.1.1], [ignore], [ignore]) OVS_WAIT_UNTIL([ - requests=`grep "ICMP echo request" -c vm2.pcap` + requests=`grep "ICMP echo request" -c vm2.tcpdump` test "${requests}" -ge "3" ]) @@ -9047,16 +9014,13 @@ test_related_traffic() { check ovs-appctl dpctl/flush-conntrack - NETNS_DAEMONIZE([client], [tcpdump -l -U -i client -w client.pcap 2>client_err], [tcpdump0.pid]) - NETNS_DAEMONIZE([server], [tcpdump -l -U -i server -w server.pcap 2>server_err], [tcpdump1.pid]) + NETNS_START_TCPDUMP([client], [-U -i client -w client.pcap], [tcpdump0]) + NETNS_START_TCPDUMP([server], [-U -i server -w server.pcap], [tcpdump1]) # Setup a dummy UDP listeners so we don't get "port unreachable". NETNS_DAEMONIZE([client], [nc -l -u 1], [nc0.pid]) NETNS_DAEMONIZE([server], [nc -l -u 2], [nc1.pid]) - OVS_WAIT_UNTIL([grep "listening" client_err]) - OVS_WAIT_UNTIL([grep "listening" server_err]) - # Send UDP client -> server check ovs-ofctl packet-out br-int "in_port=ovs-client,packet=$client_udp,actions=resubmit(,0)" @@ -9275,10 +9239,9 @@ name: 'vport4' value: '999' # Start IPv4 TCP server on vm1. NETNS_DAEMONIZE([vm1], [nc -k -l 42.42.42.2 4242], [nc-vm1.pid]) -NETNS_DAEMONIZE([vm1], - [tcpdump -n -i vm1 -nnleX -c6 udp and dst 42.42.42.2 and dst port 4343 > vm1.pcap 2> vm1.pcap.stderr], - [tcpdump1.pid]) -OVS_WAIT_UNTIL([grep "listening" vm1.pcap.stderr]) +NETNS_START_TCPDUMP([vm1], + [-n -i vm1 -nnleX -c6 udp and dst 42.42.42.2 and dst port 4343], + [vm1]) # Make sure connecting to the VIP works (hairpin, via ls and via lr). NS_CHECK_EXEC([vm1], [nc 66.66.66.66 666 -z], [0], [ignore], [ignore]) @@ -9298,7 +9261,7 @@ NS_CHECK_EXEC([vm2], [echo a | nc -u 66.66.66.66 999], [ignore], [ignore], [igno NS_CHECK_EXEC([vm3], [echo a | nc -u 66.66.66.66 999], [ignore], [ignore], [ignore]) OVS_WAIT_UNTIL([ - requests=`grep "UDP" -c vm1.pcap` + requests=`grep "UDP" -c vm1.tcpdump` test "${requests}" -ge "6" ]) @@ -9427,10 +9390,9 @@ name: 'vport4' value: '999' # Start IPv6 TCP server on vm1. NETNS_DAEMONIZE([vm1], [nc -k -l 4242::2 4242], [nc-vm1.pid]) -NETNS_DAEMONIZE([vm1], - [tcpdump -n -i vm1 -nnleX -c6 udp and dst 4242::2 and dst port 4343 > vm1.pcap 2> vm1.pcap.stderr], - [tcpdump1.pid]) -OVS_WAIT_UNTIL([grep "listening" vm1.pcap.stderr]) +NETNS_START_TCPDUMP([vm1], + [-n -i vm1 -nnleX -c6 udp and dst 4242::2 and dst port 4343], + [vm1]) # Make sure connecting to the VIP works (hairpin, via ls and via lr). NS_CHECK_EXEC([vm1], [nc 6666::1 666 -z], [0], [ignore], [ignore]) @@ -9450,7 +9412,7 @@ NS_CHECK_EXEC([vm2], [echo a | nc -u 6666::1 999], [ignore], [ignore], [ignore]) NS_CHECK_EXEC([vm3], [echo a | nc -u 6666::1 999], [ignore], [ignore], [ignore]) OVS_WAIT_UNTIL([ - requests=`grep "UDP" -c vm1.pcap` + requests=`grep "UDP" -c vm1.tcpdump` test "${requests}" -ge "6" ]) @@ -9508,10 +9470,10 @@ ADD_NAMESPACES(remote1) ADD_VETH(remote1, remote1, br-ext, "172.16.1.4/24", "f0:00:00:01:02:06", \ "172.16.1.1") -NETNS_DAEMONIZE([remote], [tcpdump -c 3 -nneei remote -Q in src 192.168.1.2 and dst 172.16.1.2 and icmp > icmp.pcap], [tcpdump0.pid]) -NETNS_DAEMONIZE([remote], [tcpdump -c 1 -nneei remote -Q in arp and arp[[24:4]]==0xac100102 > arp.pcap], [tcpdump1.pid]) -NETNS_DAEMONIZE([remote1], [tcpdump -c 3 -nneei remote1 -Q in src 172.16.1.3 and dst 172.16.1.4 and icmp > icmp1.pcap 2>/dev/null], [tcpdump2.pid]) -NETNS_DAEMONIZE([remote1], [tcpdump -c 1 -nneei remote1 -Q in arp and arp[[24:4]]==0xac100104 > arp1.pcap 2>/dev/null], [tcpdump3.pid]) +NETNS_START_TCPDUMP([remote], [-c 3 -nneei remote -Q in src 192.168.1.2 and dst 172.16.1.2 and icmp], [icmp]) +NETNS_START_TCPDUMP([remote], [-c 1 -nneei remote -Q in arp and arp[[24:4]]==0xac100102], [arp]) +NETNS_START_TCPDUMP([remote1], [-c 3 -nneei remote1 -Q in src 172.16.1.3 and dst 172.16.1.4 and icmp], [icmp1]) +NETNS_START_TCPDUMP([remote1], [-c 1 -nneei remote1 -Q in arp and arp[[24:4]]==0xac100104], [arp1]) check ovn-nbctl lr-add R1 -- set Logical_Router R1 options:chassis=hv1 check ovn-nbctl ls-add sw0 @@ -9558,12 +9520,12 @@ NS_CHECK_EXEC([sw01], [ping -q -c 3 -i 0.3 -w 2 172.16.1.2 | FORMAT_PING], \ ]) OVS_WAIT_UNTIL([ - total_arp_pkts=$(cat arp.pcap | wc -l) + total_arp_pkts=$(cat arp.tcpdump | wc -l) test "${total_arp_pkts}" = "1" ]) OVS_WAIT_UNTIL([ - total_icmp_pkts=$(cat icmp.pcap | wc -l) + total_icmp_pkts=$(cat icmp.tcpdump | wc -l) test "${total_icmp_pkts}" = "3" ]) @@ -9573,12 +9535,12 @@ NS_CHECK_EXEC([sw11], [ping -q -c 3 -i 0.3 -w 2 172.16.1.4 | FORMAT_PING], \ ]) OVS_WAIT_UNTIL([ - total_arp1_pkts=$(cat arp1.pcap | wc -l) + total_arp1_pkts=$(cat arp1.tcpdump | wc -l) test "${total_arp1_pkts}" = "1" ]) OVS_WAIT_UNTIL([ - total_icmp1_pkts=$(cat icmp1.pcap | wc -l) + total_icmp1_pkts=$(cat icmp1.tcpdump | wc -l) test "${total_icmp1_pkts}" = "3" ]) @@ -10756,8 +10718,7 @@ check ovn-nbctl lsp-add bar bar1 \ # wait for ovn-controller to catch up. check ovn-nbctl --wait=hv sync -NETNS_DAEMONIZE([foo1], [tcpdump -l -nn -e -i foo1 'ether dst 0a:58:a9:fe:01:01 and icmp' > foo1-icmp.pcap 2>foo1-tcpdump.stderr], [foo1-icmp-tcpdump.pid]) -OVS_WAIT_UNTIL([grep "listening" foo1-tcpdump.stderr]) +NETNS_START_TCPDUMP([foo1], [-nn -e -i foo1 'ether dst 0a:58:a9:fe:01:01 and icmp'], [foo1-icmp]) # 'foo1' should be able to ping 'bar1' NS_CHECK_EXEC([foo1], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ @@ -10765,12 +10726,11 @@ NS_CHECK_EXEC([foo1], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - total_pkts=$(cat foo1-icmp.pcap| wc -l) + total_pkts=$(cat foo1-icmp.tcpdump| wc -l) test "${total_pkts}" = "3" ]) -NETNS_DAEMONIZE([foo2], [tcpdump -l -nn -e -i foo2 'ether dst 0a:58:a9:fe:01:01 and icmp' > foo2-icmp.pcap 2>foo2-tcpdump.stderr], [foo2-icmp-tcpdump.pid]) -OVS_WAIT_UNTIL([grep "listening" foo2-tcpdump.stderr]) +NETNS_START_TCPDUMP([foo2], [-nn -e -i foo2 'ether dst 0a:58:a9:fe:01:01 and icmp'], [foo2-icmp]) # 'foo2' should be able to ping 'bar1' NS_CHECK_EXEC([foo2], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ @@ -10778,12 +10738,11 @@ NS_CHECK_EXEC([foo2], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - total_pkts=$(cat foo2-icmp.pcap| wc -l) + total_pkts=$(cat foo2-icmp.tcpdump| wc -l) test "${total_pkts}" = "3" ]) -NETNS_DAEMONIZE([foo3], [tcpdump -l -nn -e -i foo3 'ether dst 0a:58:a9:fe:01:01 and icmp' > foo3-icmp.pcap 2>foo3-tcpdump.stderr], [foo3-icmp-tcpdump.pid]) -OVS_WAIT_UNTIL([grep "listening" foo3-tcpdump.stderr]) +NETNS_START_TCPDUMP([foo3], [-nn -e -i foo3 'ether dst 0a:58:a9:fe:01:01 and icmp'], [foo3-icmp]) # 'foo3' should be able to ping 'bar1' NS_CHECK_EXEC([foo3], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ @@ -10791,12 +10750,11 @@ NS_CHECK_EXEC([foo3], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - total_pkts=$(cat foo3-icmp.pcap| wc -l) + total_pkts=$(cat foo3-icmp.tcpdump| wc -l) test "${total_pkts}" = "3" ]) -NETNS_DAEMONIZE([ext1], [tcpdump -l -nn -e -i ext1 'ether dst 0a:58:a9:fe:01:01 and icmp' > ext1-icmp.pcap 2>ext1-tcpdump.stderr], [ext1-icmp-tcpdump.pid]) -OVS_WAIT_UNTIL([grep "listening" ext1-tcpdump.stderr]) +NETNS_START_TCPDUMP([ext1], [-nn -e -i ext1 'ether dst 0a:58:a9:fe:01:01 and icmp'], [ext1-icmp]) # 'ext1' should be able to ping 'bar1' NS_CHECK_EXEC([ext1], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ @@ -10804,7 +10762,7 @@ NS_CHECK_EXEC([ext1], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - total_pkts=$(cat ext1-icmp.pcap| wc -l) + total_pkts=$(cat ext1-icmp.tcpdump| wc -l) test "${total_pkts}" = "3" ]) @@ -10900,8 +10858,7 @@ check ovn-nbctl --wait=hv sync # Force ipv6 nd neighbour solicitation NS_EXEC([foo1], [ping6 -c 1 fd12::2]) -NETNS_DAEMONIZE([foo1], [tcpdump -vvvv -ttt -l -nn -e -i foo1 'ether dst 0a:58:a9:fe:01:01 and icmp6' > foo1-icmp6.pcap 2> foo1-tcpdump.stderr], [foo1-icmp6-tcpdump.pid]) -OVS_WAIT_UNTIL([grep "listening" foo1-tcpdump.stderr]) +NETNS_START_TCPDUMP([foo1], [-vvvv -ttt -nn -e -i foo1 'ether dst 0a:58:a9:fe:01:01 and icmp6'], [foo1-icmp6]) # 'foo1' should be able to ping 'bar1' NS_CHECK_EXEC([foo1], [ping6 -q -c 3 -i 0.3 -w 2 fd12::2 | FORMAT_PING], \ @@ -10909,15 +10866,14 @@ NS_CHECK_EXEC([foo1], [ping6 -q -c 3 -i 0.3 -w 2 fd12::2 | FORMAT_PING], \ 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - total_pkts=$(cat foo1-icmp6.pcap| grep "echo request" | wc -l) + total_pkts=$(cat foo1-icmp6.tcpdump| grep "echo request" | wc -l) test "${total_pkts}" = "3" ]) # Force ipv6 nd neighbour solicitation NS_EXEC([foo2], [ping6 -c 1 fd12::2]) -NETNS_DAEMONIZE([foo2], [tcpdump -vvvv -ttt -l -nn -e -i foo2 'ether dst 0a:58:a9:fe:01:01 and icmp6' > foo2-icmp6.pcap 2> foo2-tcpdump.stderr], [foo2-icmp6-tcpdump.pid]) -OVS_WAIT_UNTIL([grep "listening" foo2-tcpdump.stderr]) +NETNS_START_TCPDUMP([foo2], [-vvvv -ttt -nn -e -i foo2 'ether dst 0a:58:a9:fe:01:01 and icmp6'], [foo2-icmp6]) # 'foo2' should be able to ping 'bar1' NS_CHECK_EXEC([foo2], [ping6 -q -c 3 -i 0.3 -w 2 fd12::2 | FORMAT_PING], \ @@ -10925,15 +10881,14 @@ NS_CHECK_EXEC([foo2], [ping6 -q -c 3 -i 0.3 -w 2 fd12::2 | FORMAT_PING], \ 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - total_pkts=$(cat foo2-icmp6.pcap| grep "echo request" | wc -l) + total_pkts=$(cat foo2-icmp6.tcpdump| grep "echo request" | wc -l) test "${total_pkts}" = "3" ]) # Force ipv6 nd neighbour solicitation NS_EXEC([foo3], [ping6 -c 1 fd12::2]) -NETNS_DAEMONIZE([foo3], [tcpdump -vvvv -ttt -l -nn -e -i foo3 'ether dst 0a:58:a9:fe:01:01 and icmp6' > foo3-icmp6.pcap 2> foo3-tcpdump.stderr], [foo3-icmp6-tcpdump.pid]) -OVS_WAIT_UNTIL([grep "listening" foo3-tcpdump.stderr]) +NETNS_START_TCPDUMP([foo3], [-vvvv -ttt -nn -e -i foo3 'ether dst 0a:58:a9:fe:01:01 and icmp6'], [foo3-icmp6]) # 'foo3' should be able to ping 'bar1' NS_CHECK_EXEC([foo3], [ping6 -q -c 3 -i 0.3 -w 2 fd12::2 | FORMAT_PING], \ @@ -10941,7 +10896,7 @@ NS_CHECK_EXEC([foo3], [ping6 -q -c 3 -i 0.3 -w 2 fd12::2 | FORMAT_PING], \ 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - total_pkts=$(cat foo3-icmp6.pcap| grep "echo request" | wc -l) + total_pkts=$(cat foo3-icmp6.tcpdump| grep "echo request" | wc -l) test "${total_pkts}" = "3" ]) @@ -11361,27 +11316,23 @@ AT_CHECK([ip addr add 172.16.0.101/24 dev br-mirror]) AT_CHECK([ip addr add 2003::a/64 dev br-mirror nodad]) AT_CHECK([ip link set dev br-mirror up]) -NS_CHECK_EXEC([mirror], [tcpdump -l -c 3 -neei mirror proto GRE > gre_mirror4.pcap 2>gre_mirror4_error &]) -OVS_WAIT_UNTIL([grep "listening" gre_mirror4_error]) +NETNS_START_TCPDUMP([mirror], [-c 3 -neei mirror proto GRE], [gre_mirror4]) NS_CHECK_EXEC([foo1], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ [0], [dnl 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - n_packets=$(grep "GRE" -c gre_mirror4.pcap) + n_packets=$(grep "GRE" -c gre_mirror4.tcpdump) test "${n_packets}" = "3" ]) -killall tcpdump - ovn-nbctl mirror-del mirror0 ovn-nbctl mirror-add mirror1 gre 2 to-lport 2003::b ovn-nbctl --wait=hv lsp-attach-mirror bar1 mirror1 -NS_CHECK_EXEC([mirror], [tcpdump -l -c 3 -neei mirror proto GRE > gre_mirror6.pcap 2>gre_mirror6_error &]) -OVS_WAIT_UNTIL([grep "listening" gre_mirror6_error]) +NETNS_START_TCPDUMP([mirror], [-c 3 -neei mirror proto GRE], [gre_mirror6]) NS_CHECK_EXEC([foo1], [ping6 -q -c 3 -i 0.3 -w 2 2002::2 | FORMAT_PING], \ [0], [dnl @@ -11389,53 +11340,44 @@ NS_CHECK_EXEC([foo1], [ping6 -q -c 3 -i 0.3 -w 2 2002::2 | FORMAT_PING], \ ]) OVS_WAIT_UNTIL([ - n_packets=$(grep "GRE" -c gre_mirror6.pcap) + n_packets=$(grep "GRE" -c gre_mirror6.tcpdump) test "${n_packets}" = "3" ]) -killall tcpdump - ovn-nbctl mirror-del mirror1 ovn-nbctl mirror-add mirror2 erspan 3 to-lport 172.16.0.100 ovn-nbctl --wait=hv lsp-attach-mirror bar1 mirror2 -NS_CHECK_EXEC([mirror], [tcpdump -l -c 3 -neei mirror ip[[22:2]]=0x88be > erspan_mirror4.pcap 2>erspan_mirror4_error &]) -OVS_WAIT_UNTIL([grep "listening" erspan_mirror4_error]) +NETNS_START_TCPDUMP([mirror], [-c 3 -neei mirror ip[[22:2]]=0x88be], [erspan_mirror4]) NS_CHECK_EXEC([foo1], [ping -q -c 3 -i 0.3 -w 2 192.168.2.2 | FORMAT_PING], \ [0], [dnl 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - n_packets=$(grep "gre-proto-0x88be" -c erspan_mirror4.pcap) + n_packets=$(grep "gre-proto-0x88be" -c erspan_mirror4.tcpdump) test "${n_packets}" = "3" ]) -killall tcpdump - ovn-nbctl mirror-del mirror2 ovn-nbctl mirror-add mirror3 erspan 4 to-lport 2003::b ovn-nbctl --wait=hv lsp-attach-mirror bar1 mirror3 -NS_CHECK_EXEC([mirror], [tcpdump -l -c 3 -neei mirror ip6[[42:2]]=0x88be > erspan_mirror6.pcap 2>erspan_mirror6_error &]) -OVS_WAIT_UNTIL([grep "listening" erspan_mirror6_error]) +NETNS_START_TCPDUMP([mirror], [-c 3 -neei mirror ip6[[42:2]]=0x88be], [erspan_mirror6]) NS_CHECK_EXEC([foo1], [ping6 -q -c 3 -i 0.3 -w 2 2002::2 | FORMAT_PING], \ [0], [dnl 3 packets transmitted, 3 received, 0% packet loss, time 0ms ]) OVS_WAIT_UNTIL([ - n_packets=$(grep "gre-proto-0x88be" -c erspan_mirror6.pcap) + n_packets=$(grep "gre-proto-0x88be" -c erspan_mirror6.tcpdump) test "${n_packets}" = "3" ]) -killall tcpdump - uuid=$(fetch_column nb:mirror _uuid name="mirror3") ovn-nbctl --wait=hv set mirror $uuid type=gre -NS_CHECK_EXEC([mirror], [tcpdump -c 3 -l -neei mirror proto GRE > gre_mirror6.pcap 2>gre_mirror6_error &]) -OVS_WAIT_UNTIL([grep "listening" gre_mirror6_error]) +NETNS_START_TCPDUMP([mirror], [-c 3 -neei mirror proto GRE], [gre2_mirror6]) NS_CHECK_EXEC([foo1], [ping6 -q -c 3 -i 0.3 -w 2 2002::2 | FORMAT_PING], \ [0], [dnl @@ -11443,12 +11385,10 @@ NS_CHECK_EXEC([foo1], [ping6 -q -c 3 -i 0.3 -w 2 2002::2 | FORMAT_PING], \ ]) OVS_WAIT_UNTIL([ - n_packets=$(grep "GRE" -c gre_mirror6.pcap) + n_packets=$(grep "GRE" -c gre2_mirror6.tcpdump) test "${n_packets}" = "3" ]) -killall tcpdump - OVS_APP_EXIT_AND_WAIT([ovn-controller]) as ovn-sb