Improve support for CPqD and parameterize tests

Changes:

- Made device_type a test_params so it can be controller from the
  command line and can be used to switch between device-specific
  behavior. The current device types are:

  pmc:
    To work with the PMC OLT.
    On this device when the inner VLAN tag is popped, the device actually
    emits a frame with VLAN tag 0 and PCP 0. Or, put it another way,
    the way to emit a frame with a zero VLAN tag and zero PCP is to pop
    the vlan header. Weird.

  cpqd:
    User-space switch which cannot receive zero-tagged vlans
    due to kernel limitations.
    On this device when a frame arrives with a VLAN tag 0 and PCP 0,
    the kernel removes the VLAN header before the frame is passed to the
    user-space switch. Wireshark/tcpdump still shows the header, but
    not the app. This is addressed in the tests with not expecting
    a VLAN header in such cases.

  normal:
    This is intended for "per-the-books" openflow switches
    that do exactly what the flow rules say

- Adjusted some of the test-cases to support the 3 device types

- IGMP packet generator using scapy.
  This is still work in progress, but this is a fairly accurate IGMP
  pkt generator using scapy. The membership query is considered complete,
  but the fields for the memberhip reports still need to be added.

  There is a simple self-test at the end of the lib which can be executed
  by just running 'python IGMP.py'

- Added verbage to README.md how to run on CPqD

- Added command line option -u to olt-topo to bring up mininet with
  user-space reference switch CPqD

- Fixed mixed tab/space use in olt.py

Conflicts:
	olt.py

Change-Id: I23553c228c20614c5e97e097fad4c578817d62c3
diff --git a/IGMP.py b/IGMP.py
new file mode 100644
index 0000000..a747d09
--- /dev/null
+++ b/IGMP.py
@@ -0,0 +1,210 @@
+from socket import *
+from struct import *
+from scapy.all import *
+from itertools import *
+
+IGMP_TYPE_MEMBERSHIP_QUERY     = 0x11
+IGMP_TYPE_V3_MEMBERSHIP_REPORT = 0x22
+IGMP_TYPE_V1_MEMBERSHIP_REPORT = 0x12
+IGMP_TYPE_V2_MEMBERSHIP_REPORT = 0x16
+IGMP_TYPE_V2_LEAVE_GROUP       = 0x17
+
+IGMP_V3_GR_TYPE_INCLUDE           = 0x01
+IGMP_V3_GR_TYPE_EXCLUDE           = 0x02
+IGMP_V3_GR_TYPE_CHANGE_TO_INCLUDE = 0x03
+IGMP_V3_GR_TYPE_CHANGE_TO_EXCLUDE = 0x04
+IGMP_V3_GR_TYPE_ALLOW_NEW         = 0x05
+IGMP_V3_GR_TYPE_BLOCK_OLD         = 0x06
+
+"""
+IGMPV3_ALL_ROUTERS = '224.0.0.22'
+IGMPv3 = 3
+IP_SRC = '1.2.3.4'
+ETHERTYPE_IP = 0x0800
+IGMP_DST_MAC = "01:00:5e:00:01:01"
+IGMP_SRC_MAC = "5a:e1:ac:ec:4d:a1"
+"""
+
+class IGMPv3(Packet):
+
+    name = "IGMPv3"
+
+    igmp_v3_types = {
+        IGMP_TYPE_MEMBERSHIP_QUERY: "Membership Query",
+        IGMP_TYPE_V3_MEMBERSHIP_REPORT: " Version 3 Mebership Report",
+        IGMP_TYPE_V2_MEMBERSHIP_REPORT: " Version 2 Mebership Report",
+        IGMP_TYPE_V1_MEMBERSHIP_REPORT: " Version 1 Mebership Report",
+        IGMP_TYPE_V2_LEAVE_GROUP: "Version 2 Leave Group"
+    }
+
+    fields_desc = [
+        ByteEnumField("type", IGMP_TYPE_MEMBERSHIP_QUERY, igmp_v3_types),
+        ByteField("max_resp_code", 0),
+        XShortField("checksum", None),
+        #IPField("group_address", "0.0.0.0"),
+
+        # membership query fields
+        ConditionalField(IPField("gaddr", "0.0.0.0"), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+        ConditionalField(BitField("resv", 0, 4), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+        ConditionalField(BitField("s", 0, 1), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+        ConditionalField(BitField("qrv", 0, 3), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+        ConditionalField(ByteField("qqic", 0), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+        ConditionalField(FieldLenField("numsrc", None, count_of="srcs"), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY),
+        ConditionalField(FieldListField("srcs", None, IPField("src", "0.0.0.0"), "numsrc"), lambda pkt: pkt.type == IGMP_TYPE_MEMBERSHIP_QUERY)
+
+        # membership report fields
+        # TODO
+
+    ]
+
+    def post_build(self, pkt, payload):
+
+        pkt += payload
+
+        if self.type in [IGMP_TYPE_V3_MEMBERSHIP_REPORT,]: # max_resp_code field is reserved (0)
+            mrc = 0
+        else:
+            mrc = self.encode_float(self.max_resp_code)
+        pkt = pkt[:1] + chr(mrc) + pkt[2:]
+
+        if self.checksum is None:
+            chksum = checksum(pkt)
+            pkt = pkt[:2] + chr(chksum >> 8) + chr(chksum & 0xff) + pkt[4:]
+
+        return pkt
+
+    def encode_float(self, value):
+        """Encode max response time value per RFC 3376."""
+        if value < 128:
+            return value
+        if value > 31743:
+            return 255
+        exp = 0
+        value >>= 3
+        while value > 31:
+            exp += 1
+            value >>= 1
+        return 0x80 | (exp << 4) | (value & 0xf)
+
+
+    def decode_float(self, code):
+        if code < 128:
+            return code
+        mant = code & 0xf
+        exp = (code >> 4) & 0x7
+        return (mant | 0x10) << (exp + 3)
+
+    @staticmethod
+    def is_valid_mcaddr(ip):
+        byte1 = atol(ip) >> 24 & 0xff
+        return (byte1 & 0xf0) == 0xe0
+
+    @staticmethod
+    def fixup(pkt):
+        """Fixes up the underlying IP() and Ether() headers."""
+        assert pkt.haslayer(IGMPv3), "This packet is not an IGMPv4 packet; cannot fix it up"
+
+        igmp = pkt.getlayer(IGMPv3)
+
+        if pkt.haslayer(IP):
+            ip = pkt.getlayer(IP)
+            ip.ttl = 1
+            ip.proto = 2
+            ip.tos = 0xc0
+            ip.options = [IPOption_Router_Alert()]
+
+            if igmp.type == IGMP_TYPE_MEMBERSHIP_QUERY:
+                if igmp.gaddr == "0.0.0.0":
+                    ip.dst = "224.0.0.1"
+                else:
+                    assert IGMPv3.is_valid_mcaddr(igmp.gaddr), "IGMP membership query with invalid mcast address"
+                    ip.dst = igmp.gaddr
+
+            elif igmp.type == IGMP_TYPE_V2_LEAVE_GROUP and IGMPv3.is_valid_mcaddr(igmp.gaddr):
+                ip.dst = "224.0.0.2"
+
+            elif (igmp.type in (IGMP_TYPE_V1_MEMBERSHIP_REPORT, IGMP_TYPE_V2_MEMBERSHIP_REPORT) and
+                  IGMPv3.is_valid_mcaddr(igmp.gaddr)):
+                ip.dst = igmp.gaddr
+
+           # We do not need to fixup the ether layer, it is done by scapy
+           #
+           # if pkt.haslayer(Ether):
+           #     eth = pkt.getlayer(Ether)
+           #     ip_long = atol(ip.dst)
+           #     ether.dst = '01:00:5e:%02x:%02x:%02x' % ( (ip_long >> 16) & 0x7f, (ip_long >> 8) & 0xff, ip_long & 0xff )
+
+
+        return pkt
+
+
+class IGMPv3gr(Packet):
+
+    name = "IGMPv3gr"
+
+    igmp_v3_gr_types = {
+        IGMP_V3_GR_TYPE_INCLUDE: "Include Mode",
+        IGMP_V3_GR_TYPE_EXCLUDE: "Exclude Mode",
+        IGMP_V3_GR_TYPE_CHANGE_TO_INCLUDE: "Change to Include Mode",
+        IGMP_V3_GR_TYPE_CHANGE_TO_EXCLUDE: "Change to Exclude Mode",
+        IGMP_V3_GR_TYPE_ALLOW_NEW: "Allow New Sources",
+        IGMP_V3_GR_TYPE_BLOCK_OLD: "Block Old Sources"
+    }
+
+    fields_desc = [
+        ByteEnumField("rtype", IGMP_V3_GR_TYPE_INCLUDE, igmp_v3_gr_types),
+        ByteField("aux_data_len", 0),
+        FieldLenField("numsrc", None, "sources"),
+        IPField("mcast_addr", "0.0.0.0"),
+        FieldListField("sources", None, IPField("src", "0.0.0.0"), "numsrc")
+    ]
+
+    def post_build(self, pkt, payload):
+        pkt += payload
+        if self.aux_data_len != 0:
+            print "WARNING: Auxiliary Data Length must be zero (0)"
+        return pkt
+
+
+bind_layers(IP,       IGMPv3,   frag=0, proto=2, ttl=1, tos=0xc0)
+bind_layers(IGMPv3,   IGMPv3gr, frag=0, proto=2)
+bind_layers(IGMPv3gr, IGMPv3gr, frag=0, proto=2)
+
+
+if __name__ == "__main__":
+
+    print "test float encoding"
+    from math import log
+    max_expected_error = 1.0 / (2<<3) # four bit precision
+    p = IGMPv3()
+    for v in range(0, 31745):
+        c = p.encode_float(v)
+        d = p.decode_float(c)
+        rel_err = float(v-d)/v if v!=0 else 0.0
+        assert rel_err <= max_expected_error
+
+    print "construct membership query - general query"
+    mq = IGMPv3(type=IGMP_TYPE_MEMBERSHIP_QUERY, max_resp_code=120)
+    hexdump(str(mq))
+
+    print "construct membership query - group-specific query"
+    mq = IGMPv3(type=IGMP_TYPE_MEMBERSHIP_QUERY, max_resp_code=120, gaddr="224.0.0.1")
+    hexdump(str(mq))
+
+    print "construct membership query - group-and-source-specific query"
+    mq = IGMPv3(type=IGMP_TYPE_MEMBERSHIP_QUERY, max_resp_code=120, gaddr="224.0.0.1")
+    mq.srcs = ['1.2.3.4', '5.6.7.8']
+    hexdump(str(mq))
+
+    print "fixup"
+    mq = IGMPv3(type=IGMP_TYPE_MEMBERSHIP_QUERY)
+    mq.srcs = ['1.2.3.4', '5.6.7.8']
+    pkt = Ether() / IP() / mq
+    print "before fixup:"
+    hexdump(str(pkt))
+
+    print "after fixup:"
+    IGMPv3.fixup(pkt)
+    hexdump(str(pkt))
+
+    print "all ok"
diff --git a/README.md b/README.md
index fa736c3..2d94053 100644
--- a/README.md
+++ b/README.md
@@ -40,7 +40,7 @@
 First install Mininet and its dependencies.
 
 Then start the switch:
-     
+
     sudo olt-oftest/olt-topo.py
 
 Now you can run the tests on the OVS switch using:
@@ -48,3 +48,30 @@
     sudo ./oftest/oft --test-dir=olt-oftest/ -i 1@h1-eth0 -i 129@h129-eth0 --port 6633 -V 1.3
 
 ---
+
+# Running on CPqD soft-switch
+
+The above script can be used to start a mininet topology using the CPqD reference soft switch. CPqD can be installed with
+the Mininet installer using the following mode of the install script:
+
+    git clone git://github.com/mininet/mininet
+    ./mininet/utils/install.sh -n3fxw
+
+For further information on how to install CPqD, please refer to, e.g., https://github.com/CPqD/ofsoftswitch13/wiki/OpenFlow-1.3-Tutorial
+
+Once CPqD and mininet are installed, start the topology using:
+
+    sudo ./olt-oftest/olt-topo.py -u
+
+Now you can run the tests on the switch using:
+
+    sudo ./oftest/oft --test-dir=olt-oftest/ -i 1@h1-eth0 -i 2@h2-eth0 -i 3@h129-eth0 --port 6633 -V 1.3 \
+        -t "onu_port=1;onu_port2=2;olt_port=3;device_type='cpqd'"
+
+Please note that as of this writing, the following tests known to fail:
+
+    olt.TestGroupForwarding ... FAIL
+    olt.TestGroupModForwarding ... FAIL
+    olt.TestMeter ... FAIL
+    olt.TestCyclingDoubleVlan ... FAIL
+
diff --git a/olt-topo.py b/olt-topo.py
index 581084c..118e464 100755
--- a/olt-topo.py
+++ b/olt-topo.py
@@ -1,12 +1,17 @@
 #!/usr/bin/python
 
+import sys
+
 from mininet.topo import Topo
-from mininet.node import RemoteController
+from mininet.node import RemoteController, UserSwitch
 from mininet.net import Mininet
 from mininet.util import irange
 from mininet.cli import CLI
 from mininet.log import setLogLevel
 
+from optparse import OptionParser
+
+
 class OltTopo( Topo ):
     "Single switch with OLT port 129 and configurable number of ONU ports"
 
@@ -22,10 +27,23 @@
         self.addLink( olt_port, switch, port2=129 )
 
 if __name__ == '__main__':
-    setLogLevel('debug')
-    topo = OltTopo(k=2)
 
-    net = Mininet( topo=topo, controller=RemoteController )
+    parser = OptionParser()
+    parser.add_option("-u", "--user-switch", dest="user_switch", action="store_true",
+                      default=False, help="use given user mode switch (CPqD) or mininet")
+    (options, args) = parser.parse_args()
+
+    kargs = {}
+
+    if options.user_switch:
+        kargs['switch'] = UserSwitch
+
+    setLogLevel('debug')
+
+    topo = OltTopo()
+    topo.build(k=2)
+
+    net = Mininet( topo=topo, controller=RemoteController, **kargs )
 
     net.start()
 
diff --git a/olt.py b/olt.py
index 82b520f..71aadb6 100644
--- a/olt.py
+++ b/olt.py
@@ -1,6 +1,7 @@
 '''
 OFTests for functionality needed from the OLT.
 '''
+
 import logging
 from __builtin__ import xrange
 from oftest import config
@@ -13,9 +14,16 @@
 
 from oftest.testutils import *
 
-onu_port = test_param_get("onu_port", 130)
-onu_port2 = test_param_get("onu_port2", 130)
-olt_port = test_param_get("olt_port", 258)
+from IGMP import IGMPv3
+
+# These parameters can be altered from the command line using the -t or --test-params= options.
+# Example: -t 'onu_port=129;olt_port=288;device_type=pmc'
+#
+onu_port    = test_param_get("onu_port", 130)
+onu_port2   = test_param_get("onu_port2", 131)
+olt_port    = test_param_get("olt_port", 258)
+device_type = test_param_get("device_type", "normal") # options: "normal", "pmc", "cpqd"
+logging.info("device_type: %s" % device_type)
 
 
 def double_vlan_udp_packet(pktlen=100,
@@ -70,9 +78,9 @@
               scapy.UDP(sport=udp_sport, dport=udp_dport)
     else:
         if not ip_options:
-            pkt = scapy.Ether(dst=eth_dst, src=eth_src) / \
-                  scapy.IP(src=ip_src, dst=ip_dst, tos=ip_tos, ttl=ip_ttl, ihl=ip_ihl) / \
-                  scapy.UDP(sport=udp_sport, dport=udp_dport)
+            pkt = scapy.Ether(dst=eth_dst, src=eth_src)/ \
+                scapy.IP(src=ip_src, dst=ip_dst, tos=ip_tos, ttl=ip_ttl, ihl=ip_ihl)/ \
+                scapy.UDP(sport=udp_sport, dport=udp_dport)
 
         else:
             pkt = scapy.Ether(dst=eth_dst, src=eth_src) / \
@@ -83,7 +91,6 @@
 
     return pkt
 
-
 def testPacketIn(self, match, parsed_pkt):
     delete_all_flows(self.controller)
 
@@ -116,13 +123,10 @@
 
 
 def buildIgmp(payload):
-    ether = scapy.Ether(src="00:01:02:03:04:05")
-    ip = scapy.IP(src="1.2.3.4")
-    payload.igmpize(ip, ether)
-    pkt = ether / ip / payload
+    pkt = pkt = IGMPv3.fixup(scapy.Ether() / scapy.IP() / payload)
     if len(pkt) < 60:
         pad_len = 60 - len(pkt)
-        pad = scapy.PAD()
+        pad = scapy.scapy.layers.l2.Padding()
         pad.load = '\x00' * pad_len
         pkt = pkt / pad
     return pkt
@@ -142,8 +146,19 @@
         testPacketIn(self, match, pkt)
 
 
+class ARPPacketIn(base_tests.SimpleDataPlane):
+    """Verify packet-ins are sent for ARP packets """
 
+    def runTest(self):
+        logging.info("Running ARP Packet In test")
 
+        match = ofp.match()
+        match.oxm_list.append(ofp.oxm.eth_type(0x0806))
+
+        # Use ethertype 0x0806
+        pkt = simple_eth_packet(eth_type=0x0806)
+
+        testPacketIn(self, match, pkt)
 
 
 class IGMPPacketIn(base_tests.SimpleDataPlane):
@@ -156,7 +171,7 @@
         match.oxm_list.append(ofp.oxm.eth_type(0x800))
         match.oxm_list.append(ofp.oxm.ip_proto(2))
 
-        pkt = scapy.Ether(dst='01:00:5E:7F:FF:FF', src='00:00:00:00:00:01') / \
+        pkt = scapy.Ether(dst='01:00:5E:7F:FF:FF', src='00:00:00:00:00:01')/ \
               scapy.IP(src='10.0.0.1', dst='10.0.0.2', ttl=60, tos=0, id=0, proto=2)
 
         pkt = pkt / ("0" * (100 - len(pkt)))
@@ -170,26 +185,26 @@
     def runTest(self):
         logging.info("Running IGMP query packet out")
 
-        igmp = scapy.IGMP(type=0x11, gaddr="224.0.0.1")
+        igmp = IGMPv3()  # by default this is a query
         pkt = buildIgmp(igmp)
 
-        msg = ofp.message.packet_out()
-        msg.in_port = ofp.OFPP_CONTROLLER
-        msg.buffer_id = 0xffffffff
-        msg.data = str(pkt)
-        msg.actions = [ofp.action.output(
-            port=onu_port,
-            max_len=ofp.OFPCML_NO_BUFFER)]
-        time.sleep(1)
+        msg = ofp.message.packet_out(
+            in_port=ofp.OFPP_CONTROLLER,
+            actions=[ofp.action.output(port=onu_port)],
+            buffer_id=ofp.OFP_NO_BUFFER,
+            data=str(pkt))
 
         self.controller.message_send(msg)
 
+        rv = self.controller.message_send(msg)
+        self.assertTrue(rv == 0, "Error sending put message")
         verify_no_errors(self.controller)
 
         verify_packet(self, pkt, onu_port)
 
 
 class TestMeter(base_tests.SimpleDataPlane):
+
     def runTest(self):
         logging.info("Running Meter tests")
         dropMeterBand = ofp.meter_band.drop(rate=640)
@@ -211,9 +226,8 @@
             match=match,
             instructions=[
                 ofp.instruction.apply_actions(
-                    actions=[ofp.action.output(port=olt_port)]
-                ),
-                ofp.instruction.meter(meter_id=1)
+                    actions=[ofp.action.output(port=olt_port)]),
+                ofp.instruction.meter(meter_id = 1)
             ],
             buffer_id=ofp.OFP_NO_BUFFER,
             priority=1000)
@@ -232,9 +246,8 @@
             match=match,
             instructions=[
                 ofp.instruction.apply_actions(
-                    actions=[ofp.action.output(port=onu_port)]
-                ),
-                ofp.instruction.meter(meter_id=1)
+                    actions=[ofp.action.output(port=onu_port)]),
+                ofp.instruction.meter(meter_id = 1)
             ],
             buffer_id=ofp.OFP_NO_BUFFER,
             priority=1000)
@@ -292,25 +305,35 @@
         # PUSH
         match = ofp.match()
         match.oxm_list.append(ofp.oxm.in_port(onu_port))
-        match.oxm_list.append(ofp.oxm.vlan_vid_masked(value=ofp.OFPVID_PRESENT, value_mask=ofp.OFPVID_PRESENT))
-        match.oxm_list.append(ofp.oxm.vlan_pcp(value=0))
+        if device_type == "cpqd":
+            match.oxm_list.append(ofp.oxm.vlan_vid(value=ofp.OFPVID_NONE))
+            actions = [
+                ofp.action.push_vlan(ethertype=0x8100),
+                ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | vlan_id)),
+                ofp.action.set_field(ofp.oxm.vlan_pcp(0)),
+                ofp.action.output(port=olt_port)
+            ]
+        else:  # pmc, normal
+            match.oxm_list.append(ofp.oxm.vlan_vid_masked(value=ofp.OFPVID_PRESENT, value_mask=ofp.OFPVID_PRESENT))
+            match.oxm_list.append(ofp.oxm.vlan_pcp(value = 0))
+            actions = [
+                ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | vlan_id)),
+                ofp.action.set_field(ofp.oxm.vlan_pcp(0)),
+                ofp.action.output(port=olt_port)
+            ]
 
         request = ofp.message.flow_add(
             table_id=test_param_get("table", 0),
             cookie=42,
             match=match,
-            instructions=[
-                ofp.instruction.apply_actions(
-                    actions=[
-                        ofp.action.push_vlan(ethertype=0x8100),
-                        ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | vlan_id)),
-                        ofp.action.set_field(ofp.oxm.vlan_pcp(0)),
-                        ofp.action.output(port=olt_port)])],
+            instructions=[ofp.instruction.apply_actions(actions=actions)],
             buffer_id=ofp.OFP_NO_BUFFER,
             priority=1000)
 
         logging.info("Inserting flow tagging upstream")
         self.controller.message_send(request)
+        do_barrier(self.controller)
+        verify_no_errors(self.controller)
 
         # POP
         match = ofp.match()
@@ -332,6 +355,8 @@
         logging.info("Inserting flow tagging downstream")
         self.controller.message_send(request)
         do_barrier(self.controller)
+        verify_no_errors(self.controller)
+
         time.sleep(5)
 
         inPkt = simple_udp_packet(dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
@@ -348,7 +373,10 @@
 
         inPkt = simple_udp_packet(pktlen=104, dl_vlan_enable=True,
                                   vlan_vid=vlan_id, vlan_pcp=0, dl_vlan_cfi=0)
-        outPkt = simple_udp_packet(pktlen=104, dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
+        if device_type == 'pmc':
+            outPkt = simple_udp_packet(pktlen=104, dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
+        else:  # "normal", "cpqd""
+            outPkt = simple_udp_packet(pktlen=100)
 
         # Send tagged packet in the OLT port and expect untagged packet out the OLT port
         self.dataplane.send(olt_port, str(inPkt))
@@ -385,6 +413,7 @@
 
 
 class TestGroupAdd(base_tests.SimpleDataPlane):
+
     def runTest(self):
         logging.info("Running Group tests")
         delete_all_flows(self.controller)
@@ -420,6 +449,7 @@
 
 
 class TestGroupMod(base_tests.SimpleDataPlane):
+
     def runTest(self):
         logging.info("Running Group tests")
         delete_all_flows(self.controller)
@@ -471,6 +501,7 @@
 
 
 class TestDuplicateGroup(base_tests.SimpleDataPlane):
+
     def runTest(self):
         logging.info("Running Group tests")
         delete_all_flows(self.controller)
@@ -506,6 +537,7 @@
 
 
 class TestGroupAndFlow(base_tests.SimpleDataPlane):
+
     def runTest(self):
         logging.info("Running Group tests")
         delete_all_flows(self.controller)
@@ -554,7 +586,7 @@
         do_barrier(self.controller)
         verify_no_errors(self.controller)
 
-        # Add the group and flow back, test it we can first remove group and then remove the flow. 
+        # Add the group and flow back, test it we can first remove group and then remove the flow.
         '''group_add = createAllGroupAdd(test_group_id, ports=[onu_port])
         self.controller.message_send(group_add)
 
@@ -571,6 +603,7 @@
 
 
 class TestGroupForwarding(base_tests.SimpleDataPlane):
+
     def runTest(self):
         logging.info("Running Group datapath forwarding tests")
         delete_all_flows(self.controller)
@@ -615,7 +648,7 @@
         verify_packet(self, outPkt, onu_port)
 
 
-        # Now put 2 ONU ports in the group and test that the input packet is 
+        # Now put 2 ONU ports in the group and test that the input packet is
         # duplicated out both ports
         group_mod = createAllGroupMod(test_group_id, ports=[onu_port, onu_port2])
         self.controller.message_send(group_mod)
@@ -641,6 +674,7 @@
 
 
 class TestGroupModForwarding(base_tests.SimpleDataPlane):
+
     def runTest(self):
         logging.info("Running datapath forwarding tests for group mod")
         delete_all_flows(self.controller)
@@ -696,7 +730,7 @@
         verify_no_packet(self, outPkt, onu_port)
         verify_packet(self, outPkt, onu_port2)
 
-        # Now remove all ports in the group and test that the input packet is no longer forwarded to any port 
+        # Now remove all ports in the group and test that the input packet is no longer forwarded to any port
         group_mod = createAllGroupMod(test_group_id, ports=[])
         self.controller.message_send(group_mod)
         do_barrier(self.controller)
@@ -707,6 +741,7 @@
 
 
 class TransparentVlanTest(base_tests.SimpleDataPlane):
+
     def runTest(self):
         logging.info("Running transparent vlan tests")
         delete_all_flows(self.controller)
@@ -754,9 +789,11 @@
         time.sleep(2)
 
         inPkt = simple_udp_packet(dl_vlan_enable=True, vlan_vid=vlan_id, vlan_pcp=0)
+
         # upstream
         self.dataplane.send(onu_port, str(inPkt))
         verify_packet(self, inPkt, olt_port)
+
         # downstream
         self.dataplane.send(olt_port, str(inPkt))
         verify_packet(self, inPkt, onu_port)
@@ -803,20 +840,21 @@
 
 
 class DoubleVlanTest(base_tests.SimpleDataPlane):
+
     def runTest(self):
         logging.info("Running double vlan tests")
         delete_all_flows(self.controller)
 
         c_vlan_id = 100
         s_vlan_id = 102
-        # upstream flow rule
-        installDoubleTaggingRule(s_vlan_id, c_vlan_id, self.controller)
+
+        installDoubleTaggingRules(s_vlan_id, c_vlan_id, self.controller)
 
         # It takes some time for flows to propagate down to the data plane
         time.sleep(10)
-        testPacketFlow(self, c_vlan_id, s_vlan_id)
 
-        time.sleep(2)
+        # Test packet flows
+        testPacketFlow(self, c_vlan_id, s_vlan_id)
 
         # clean up the test
         delete_all_flows(self.controller)
@@ -874,8 +912,9 @@
 
 def testPacketFlow(test, c_vlan_id, s_vlan_id):
 
-    incorrectTagPkt = simple_udp_packet(pktlen=100, dl_vlan_enable=True, vlan_vid=100, vlan_pcp=0)
-    untaggedPkt = simple_udp_packet(pktlen=100, dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
+    incorrectTagPkt = simple_udp_packet(pktlen=100, dl_vlan_enable=True, vlan_vid=100, vlan_pcp=1)
+    zeroTaggedPkt = simple_udp_packet(pktlen=100, dl_vlan_enable=True, vlan_vid=0, vlan_pcp=0)
+    untaggedPkt = simple_udp_packet(pktlen=96)
 
     upstreamDoubleTaggedPkt = double_vlan_udp_packet(pktlen=104, dl_vlan_enable=True,
                                                      c_vlan_vid=c_vlan_id,
@@ -884,32 +923,48 @@
 
     logging.info("Testing s-tag %d, c-tag %d" % (s_vlan_id, c_vlan_id))
 
-    test.dataplane.send(onu_port, str(untaggedPkt))
-    verify_packet(test, upstreamDoubleTaggedPkt, olt_port)
+    # test upstream untagged packet got double tag at OLT
+    self.dataplane.send(onu_port, str(zeroTaggedPkt))
+    verify_packet(self, upstreamDoubleTaggedPkt, olt_port)
 
     # test downstream doubletagged packet got untagged at ONU
-    test.dataplane.send(olt_port, str(upstreamDoubleTaggedPkt))
-    verify_packet(test, untaggedPkt, onu_port)
+    self.dataplane.send(olt_port, str(upstreamDoubleTaggedPkt))
+    if device_type == "pmc":
+        verify_packet(self, zeroTaggedPkt, onu_port)
+    else:
+        verify_packet(self, untaggedPkt, onu_port)
 
     # test upstream doubletagged packet got dropped
-    test.dataplane.send(onu_port, str(upstreamDoubleTaggedPkt))
-    verify_no_packet(test, upstreamDoubleTaggedPkt, olt_port)
+    self.dataplane.send(onu_port, str(upstreamDoubleTaggedPkt))
+    verify_no_packet(self, upstreamDoubleTaggedPkt, olt_port)
 
     # test downstream untagged packet got dropped at ONU
-    test.dataplane.send(olt_port, str(untaggedPkt))
-    verify_no_packet(test, untaggedPkt, onu_port)
+    self.dataplane.send(olt_port, str(untaggedPkt))
+    verify_no_packet(self, untaggedPkt, onu_port)
 
     # test upstream icorrectly tagged packet; should get dropped
-    test.dataplane.send(onu_port, str(incorrectTagPkt))
-    verify_no_packet(test, upstreamDoubleTaggedPkt, olt_port)
+    self.dataplane.send(onu_port, str(incorrectTagPkt))
+    verify_no_packet(self, upstreamDoubleTaggedPkt, olt_port)
 
 
-def installDoubleTaggingRule(s_vlan_id, c_vlan_id, controller, cookie  = 42):
+def installDoubleTaggingRules(s_vlan_id, c_vlan_id, controller, cookie=42):
+
     # upstream flow rule
     match = ofp.match()
     match.oxm_list.append(ofp.oxm.in_port(onu_port))
-    match.oxm_list.append(ofp.oxm.vlan_vid(value=ofp.OFPVID_PRESENT))
-    match.oxm_list.append(ofp.oxm.vlan_pcp(value=0))
+    if device_type == "cpqd":
+        match.oxm_list.append(ofp.oxm.vlan_vid(value=ofp.OFPVID_NONE))
+        actions = [
+            ofp.action.push_vlan(ethertype=0x8100),
+            ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | c_vlan_id)),
+            ofp.action.set_field(ofp.oxm.vlan_pcp(0))
+        ]
+    else:  # "pmc", "normal"
+        match.oxm_list.append(ofp.oxm.vlan_vid(value=ofp.OFPVID_PRESENT))
+        match.oxm_list.append(ofp.oxm.vlan_pcp(value=0))
+        actions = [
+            ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | c_vlan_id))
+        ]
     cookie += 1
 
     # push inner vlan (c-vlan) for upstream
@@ -918,9 +973,7 @@
         cookie=cookie,
         match=match,
         instructions=[
-            ofp.instruction.apply_actions(
-                actions=[
-                    ofp.action.set_field(ofp.oxm.vlan_vid(ofp.OFPVID_PRESENT | c_vlan_id))]),
+            ofp.instruction.apply_actions(actions=action),
             ofp.instruction.goto_table(1)],
         buffer_id=ofp.OFP_NO_BUFFER,
         priority=1000)
@@ -999,6 +1052,3 @@
     controller.message_send(request)
     do_barrier(controller)
     verify_no_errors(controller)
-
-
-