2 # SPDX-License-Identifier: BSD-3-Clause
3 # Copyright(c) 2020 Intel Corporation
7 A Python program that generates the VXLAN tunnels for this example.
12 DESCRIPTION = 'Table Generator'
14 KEY = '0xaabbccdd{0:04x}'
15 ACTION = 'vxlan_encap'
16 ETHERNET_HEADER = 'ethernet_dst_addr 0xa0a1a2a3{0:04x} ' \
17 'ethernet_src_addr 0xb0b1b2b3{0:04x} ' \
18 'ethernet_ethertype 0x0800'
19 IPV4_HEADER = 'ipv4_ver_ihl 0x45 ' \
21 'ipv4_total_len 50 ' \
22 'ipv4_identification 0 ' \
23 'ipv4_flags_offset 0 ' \
26 'ipv4_hdr_checksum 0x{1:04x} ' \
27 'ipv4_src_addr 0xc0c1{0:04x} ' \
28 'ipv4_dst_addr 0xd0d1{0:04x}'
29 UDP_HEADER = 'udp_src_port 0xe0{0:02x} ' \
30 'udp_dst_port 4789 ' \
33 VXLAN_HEADER = 'vxlan_flags 0 ' \
37 PORT_OUT = 'port_out {0:d}'
39 def ipv4_header_checksum(i):
40 cksum = (0x4500 + 0x0032) + (0x0000 + 0x0000) + (0x4011 + 0x0000) + (0xc0c1 + i) + (0xd0d1 + i)
41 cksum = (cksum & 0xFFFF) + (cksum >> 16)
42 cksum = (cksum & 0xFFFF) + (cksum >> 16)
43 cksum = ~cksum & 0xFFFF
46 def table_generate(n, p):
48 print("match %s action %s %s %s %s %s %s" %
49 (KEY.format(i), ACTION,
50 ETHERNET_HEADER.format(i),
51 IPV4_HEADER.format(i, ipv4_header_checksum(i)),
52 UDP_HEADER.format(i % 256),
53 VXLAN_HEADER.format(i),
54 PORT_OUT.format(i % p)))
56 if __name__ == '__main__':
57 parser = argparse.ArgumentParser(description=DESCRIPTION)
61 help='number of table entries (default: 65536)',
67 help='number of network ports (default: 4)',
71 args = parser.parse_args()
72 table_generate(int(args.n), int(args.p))