Merge branch 'dsa-selftests'
Vladimir Oltean says: ==================== DSA selftests When working on complex new features or reworks it becomes increasingly difficult to ensure there aren't regressions being introduced, and therefore it would be nice if we could go over the functionality we already have and write some tests for it. Verbally I know from Tobias Waldekranz that he has been working on some selftests for DSA, yet I have never seen them, so here I am adding some tests I have written which have been useful for me. The list is by no means complete (it only covers elementary functionality), but it's still good to have as a starting point. I also borrowed some refactoring changes from Joachim Wiberg that he submitted for his "net: bridge: forwarding of unknown IPv4/IPv6/MAC BUM traffic" series, but not the entirety of his selftests. I now think that his selftests have some overlap with bridge_vlan_unaware.sh and bridge_vlan_aware.sh and they should be more tightly integrated with each other - yet I didn't do that either :). Another issue I had with his selftests was that they jumped straight ahead to configure brport flags on br0 (a radical new idea still at RFC status) while we have bigger problems, and we don't have nearly enough coverage for the *existing* functionality. One idea introduced here which I haven't seen before is the symlinking of relevant forwarding selftests to the selftests/drivers/net/<my-driver>/ folder, plus a forwarding.config file. I think there's some value in having things structured this way, since the forwarding dir has so many selftests that aren't relevant to DSA that it is a bit difficult to find the ones that are. While searching for applications that I could use for multicast testing (not my domain of interest/knowledge really), I found Joachim Wiberg's mtools, mcjoin and omping, and I tried them all with various degrees of success. In particular, I was going to use mcjoin, but I faced some issues getting IPv6 multicast traffic to work in a VRF, and I bothered David Ahern about it here: https://lore.kernel.org/netdev/97eaffb8-2125-834e-641f-c99c097b6ee2@gmail.com/t/ It seems that the problem is that this application should use SO_BINDTODEVICE, yet it doesn't. So I ended up patching the bare-bones mtools (msend, mreceive) forked by Joachim from the University of Virginia's Multimedia Networks Group to include IPv6 support, and to use SO_BINDTODEVICE. This is what I'm using now for IPv6. Note that mausezahn doesn't appear to do a particularly good job of supporting IPv6 really, and I needed a program to emit the actual IP_ADD_MEMBERSHIP calls, for dev_mc_add(), so I could test RX filtering. Crafting the IGMP/MLD reports by hand doesn't really do the trick. While extremely bare-bones, the mreceive application now seems to do what I need it to. Feedback appreciated, it is very likely that I could have done things in a better way. ==================== Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
commit
cfc1d91a7d
1
tools/testing/selftests/drivers/net/dsa/bridge_locked_port.sh
Symbolic link
1
tools/testing/selftests/drivers/net/dsa/bridge_locked_port.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../../../net/forwarding/bridge_locked_port.sh
|
1
tools/testing/selftests/drivers/net/dsa/bridge_mdb.sh
Symbolic link
1
tools/testing/selftests/drivers/net/dsa/bridge_mdb.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../../../net/forwarding/bridge_mdb.sh
|
1
tools/testing/selftests/drivers/net/dsa/bridge_mld.sh
Symbolic link
1
tools/testing/selftests/drivers/net/dsa/bridge_mld.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../../../net/forwarding/bridge_mld.sh
|
1
tools/testing/selftests/drivers/net/dsa/bridge_vlan_aware.sh
Symbolic link
1
tools/testing/selftests/drivers/net/dsa/bridge_vlan_aware.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../../../net/forwarding/bridge_vlan_aware.sh
|
1
tools/testing/selftests/drivers/net/dsa/bridge_vlan_mcast.sh
Symbolic link
1
tools/testing/selftests/drivers/net/dsa/bridge_vlan_mcast.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../../../net/forwarding/bridge_vlan_mcast.sh
|
1
tools/testing/selftests/drivers/net/dsa/bridge_vlan_unaware.sh
Symbolic link
1
tools/testing/selftests/drivers/net/dsa/bridge_vlan_unaware.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../../../net/forwarding/bridge_vlan_unaware.sh
|
@ -0,0 +1,2 @@
|
||||
NETIF_CREATE=no
|
||||
STABLE_MAC_ADDRS=yes
|
1
tools/testing/selftests/drivers/net/dsa/lib.sh
Symbolic link
1
tools/testing/selftests/drivers/net/dsa/lib.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../../../net/forwarding/lib.sh
|
1
tools/testing/selftests/drivers/net/dsa/local_termination.sh
Symbolic link
1
tools/testing/selftests/drivers/net/dsa/local_termination.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../../../net/forwarding/local_termination.sh
|
1
tools/testing/selftests/drivers/net/dsa/no_forwarding.sh
Symbolic link
1
tools/testing/selftests/drivers/net/dsa/no_forwarding.sh
Symbolic link
@ -0,0 +1 @@
|
||||
../../../net/forwarding/no_forwarding.sh
|
@ -215,15 +215,15 @@ test_vlan_pop()
|
||||
|
||||
sleep 1
|
||||
|
||||
tcpdump_stop
|
||||
tcpdump_stop $eth2
|
||||
|
||||
if tcpdump_show | grep -q "$eth3_mac > $eth2_mac, ethertype IPv4"; then
|
||||
if tcpdump_show $eth2 | grep -q "$eth3_mac > $eth2_mac, ethertype IPv4"; then
|
||||
echo "OK"
|
||||
else
|
||||
echo "FAIL"
|
||||
fi
|
||||
|
||||
tcpdump_cleanup
|
||||
tcpdump_cleanup $eth2
|
||||
}
|
||||
|
||||
test_vlan_push()
|
||||
@ -236,15 +236,15 @@ test_vlan_push()
|
||||
|
||||
sleep 1
|
||||
|
||||
tcpdump_stop
|
||||
tcpdump_stop $eth3.100
|
||||
|
||||
if tcpdump_show | grep -q "$eth2_mac > $eth3_mac"; then
|
||||
if tcpdump_show $eth3.100 | grep -q "$eth2_mac > $eth3_mac"; then
|
||||
echo "OK"
|
||||
else
|
||||
echo "FAIL"
|
||||
fi
|
||||
|
||||
tcpdump_cleanup
|
||||
tcpdump_cleanup $eth3.100
|
||||
}
|
||||
|
||||
test_vlan_ingress_modify()
|
||||
@ -267,15 +267,15 @@ test_vlan_ingress_modify()
|
||||
|
||||
sleep 1
|
||||
|
||||
tcpdump_stop
|
||||
tcpdump_stop $eth2
|
||||
|
||||
if tcpdump_show | grep -q "$eth3_mac > $eth2_mac, .* vlan 300"; then
|
||||
if tcpdump_show $eth2 | grep -q "$eth3_mac > $eth2_mac, .* vlan 300"; then
|
||||
echo "OK"
|
||||
else
|
||||
echo "FAIL"
|
||||
fi
|
||||
|
||||
tcpdump_cleanup
|
||||
tcpdump_cleanup $eth2
|
||||
|
||||
tc filter del dev $eth0 ingress chain $(IS1 2) pref 3
|
||||
|
||||
@ -305,15 +305,15 @@ test_vlan_egress_modify()
|
||||
|
||||
sleep 1
|
||||
|
||||
tcpdump_stop
|
||||
tcpdump_stop $eth2
|
||||
|
||||
if tcpdump_show | grep -q "$eth3_mac > $eth2_mac, .* vlan 300"; then
|
||||
if tcpdump_show $eth2 | grep -q "$eth3_mac > $eth2_mac, .* vlan 300"; then
|
||||
echo "OK"
|
||||
else
|
||||
echo "FAIL"
|
||||
fi
|
||||
|
||||
tcpdump_cleanup
|
||||
tcpdump_cleanup $eth2
|
||||
|
||||
tc filter del dev $eth1 egress chain $(ES0) pref 3
|
||||
tc qdisc del dev $eth1 clsact
|
||||
|
112
tools/testing/selftests/net/forwarding/lib.sh
Normal file → Executable file
112
tools/testing/selftests/net/forwarding/lib.sh
Normal file → Executable file
@ -27,6 +27,9 @@ INTERFACE_TIMEOUT=${INTERFACE_TIMEOUT:=600}
|
||||
LOW_AGEING_TIME=${LOW_AGEING_TIME:=1000}
|
||||
REQUIRE_JQ=${REQUIRE_JQ:=yes}
|
||||
REQUIRE_MZ=${REQUIRE_MZ:=yes}
|
||||
REQUIRE_MTOOLS=${REQUIRE_MTOOLS:=no}
|
||||
STABLE_MAC_ADDRS=${STABLE_MAC_ADDRS:=no}
|
||||
TCPDUMP_EXTRA_FLAGS=${TCPDUMP_EXTRA_FLAGS:=}
|
||||
|
||||
relative_path="${BASH_SOURCE%/*}"
|
||||
if [[ "$relative_path" == "${BASH_SOURCE}" ]]; then
|
||||
@ -159,6 +162,12 @@ fi
|
||||
if [[ "$REQUIRE_MZ" = "yes" ]]; then
|
||||
require_command $MZ
|
||||
fi
|
||||
if [[ "$REQUIRE_MTOOLS" = "yes" ]]; then
|
||||
# https://github.com/vladimiroltean/mtools/
|
||||
# patched for IPv6 support
|
||||
require_command msend
|
||||
require_command mreceive
|
||||
fi
|
||||
|
||||
if [[ ! -v NUM_NETIFS ]]; then
|
||||
echo "SKIP: importer does not define \"NUM_NETIFS\""
|
||||
@ -214,10 +223,41 @@ create_netif()
|
||||
esac
|
||||
}
|
||||
|
||||
declare -A MAC_ADDR_ORIG
|
||||
mac_addr_prepare()
|
||||
{
|
||||
local new_addr=
|
||||
local dev=
|
||||
|
||||
for ((i = 1; i <= NUM_NETIFS; ++i)); do
|
||||
dev=${NETIFS[p$i]}
|
||||
new_addr=$(printf "00:01:02:03:04:%02x" $i)
|
||||
|
||||
MAC_ADDR_ORIG["$dev"]=$(ip -j link show dev $dev | jq -e '.[].address')
|
||||
# Strip quotes
|
||||
MAC_ADDR_ORIG["$dev"]=${MAC_ADDR_ORIG["$dev"]//\"/}
|
||||
ip link set dev $dev address $new_addr
|
||||
done
|
||||
}
|
||||
|
||||
mac_addr_restore()
|
||||
{
|
||||
local dev=
|
||||
|
||||
for ((i = 1; i <= NUM_NETIFS; ++i)); do
|
||||
dev=${NETIFS[p$i]}
|
||||
ip link set dev $dev address ${MAC_ADDR_ORIG["$dev"]}
|
||||
done
|
||||
}
|
||||
|
||||
if [[ "$NETIF_CREATE" = "yes" ]]; then
|
||||
create_netif
|
||||
fi
|
||||
|
||||
if [[ "$STABLE_MAC_ADDRS" = "yes" ]]; then
|
||||
mac_addr_prepare
|
||||
fi
|
||||
|
||||
for ((i = 1; i <= NUM_NETIFS; ++i)); do
|
||||
ip link show dev ${NETIFS[p$i]} &> /dev/null
|
||||
if [[ $? -ne 0 ]]; then
|
||||
@ -503,6 +543,10 @@ pre_cleanup()
|
||||
echo "Pausing before cleanup, hit any key to continue"
|
||||
read
|
||||
fi
|
||||
|
||||
if [[ "$STABLE_MAC_ADDRS" = "yes" ]]; then
|
||||
mac_addr_restore
|
||||
fi
|
||||
}
|
||||
|
||||
vrf_prepare()
|
||||
@ -824,6 +868,15 @@ mac_get()
|
||||
ip -j link show dev $if_name | jq -r '.[]["address"]'
|
||||
}
|
||||
|
||||
ipv6_lladdr_get()
|
||||
{
|
||||
local if_name=$1
|
||||
|
||||
ip -j addr show dev $if_name | \
|
||||
jq -r '.[]["addr_info"][] | select(.scope == "link").local' | \
|
||||
head -1
|
||||
}
|
||||
|
||||
bridge_ageing_time_get()
|
||||
{
|
||||
local bridge=$1
|
||||
@ -1349,13 +1402,17 @@ stop_traffic()
|
||||
{ kill %% && wait %%; } 2>/dev/null
|
||||
}
|
||||
|
||||
declare -A cappid
|
||||
declare -A capfile
|
||||
declare -A capout
|
||||
|
||||
tcpdump_start()
|
||||
{
|
||||
local if_name=$1; shift
|
||||
local ns=$1; shift
|
||||
|
||||
capfile=$(mktemp)
|
||||
capout=$(mktemp)
|
||||
capfile[$if_name]=$(mktemp)
|
||||
capout[$if_name]=$(mktemp)
|
||||
|
||||
if [ -z $ns ]; then
|
||||
ns_cmd=""
|
||||
@ -1369,27 +1426,35 @@ tcpdump_start()
|
||||
capuser="-Z $SUDO_USER"
|
||||
fi
|
||||
|
||||
$ns_cmd tcpdump -e -n -Q in -i $if_name \
|
||||
-s 65535 -B 32768 $capuser -w $capfile > "$capout" 2>&1 &
|
||||
cappid=$!
|
||||
$ns_cmd tcpdump $TCPDUMP_EXTRA_FLAGS -e -n -Q in -i $if_name \
|
||||
-s 65535 -B 32768 $capuser -w ${capfile[$if_name]} \
|
||||
> "${capout[$if_name]}" 2>&1 &
|
||||
cappid[$if_name]=$!
|
||||
|
||||
sleep 1
|
||||
}
|
||||
|
||||
tcpdump_stop()
|
||||
{
|
||||
$ns_cmd kill $cappid
|
||||
local if_name=$1
|
||||
local pid=${cappid[$if_name]}
|
||||
|
||||
$ns_cmd kill "$pid" && wait "$pid"
|
||||
sleep 1
|
||||
}
|
||||
|
||||
tcpdump_cleanup()
|
||||
{
|
||||
rm $capfile $capout
|
||||
local if_name=$1
|
||||
|
||||
rm ${capfile[$if_name]} ${capout[$if_name]}
|
||||
}
|
||||
|
||||
tcpdump_show()
|
||||
{
|
||||
tcpdump -e -n -r $capfile 2>&1
|
||||
local if_name=$1
|
||||
|
||||
tcpdump -e -n -r ${capfile[$if_name]} 2>&1
|
||||
}
|
||||
|
||||
# return 0 if the packet wasn't seen on host2_if or 1 if it was
|
||||
@ -1499,6 +1564,37 @@ brmcast_check_sg_state()
|
||||
done
|
||||
}
|
||||
|
||||
mc_join()
|
||||
{
|
||||
local if_name=$1
|
||||
local group=$2
|
||||
local vrf_name=$(master_name_get $if_name)
|
||||
|
||||
# We don't care about actual reception, just about joining the
|
||||
# IP multicast group and adding the L2 address to the device's
|
||||
# MAC filtering table
|
||||
ip vrf exec $vrf_name \
|
||||
mreceive -g $group -I $if_name > /dev/null 2>&1 &
|
||||
mreceive_pid=$!
|
||||
|
||||
sleep 1
|
||||
}
|
||||
|
||||
mc_leave()
|
||||
{
|
||||
kill "$mreceive_pid" && wait "$mreceive_pid"
|
||||
}
|
||||
|
||||
mc_send()
|
||||
{
|
||||
local if_name=$1
|
||||
local groups=$2
|
||||
local vrf_name=$(master_name_get $if_name)
|
||||
|
||||
ip vrf exec $vrf_name \
|
||||
msend -g $groups -I $if_name -c 1 > /dev/null 2>&1
|
||||
}
|
||||
|
||||
start_ip_monitor()
|
||||
{
|
||||
local mtype=$1; shift
|
||||
|
299
tools/testing/selftests/net/forwarding/local_termination.sh
Executable file
299
tools/testing/selftests/net/forwarding/local_termination.sh
Executable file
@ -0,0 +1,299 @@
|
||||
#!/bin/bash
|
||||
# SPDX-License-Identifier: GPL-2.0
|
||||
|
||||
ALL_TESTS="standalone bridge"
|
||||
NUM_NETIFS=2
|
||||
PING_COUNT=1
|
||||
REQUIRE_MTOOLS=yes
|
||||
REQUIRE_MZ=no
|
||||
|
||||
source lib.sh
|
||||
|
||||
H1_IPV4="192.0.2.1"
|
||||
H2_IPV4="192.0.2.2"
|
||||
H1_IPV6="2001:db8:1::1"
|
||||
H2_IPV6="2001:db8:1::2"
|
||||
|
||||
BRIDGE_ADDR="00:00:de:ad:be:ee"
|
||||
MACVLAN_ADDR="00:00:de:ad:be:ef"
|
||||
UNKNOWN_UC_ADDR1="de:ad:be:ef:ee:03"
|
||||
UNKNOWN_UC_ADDR2="de:ad:be:ef:ee:04"
|
||||
UNKNOWN_UC_ADDR3="de:ad:be:ef:ee:05"
|
||||
JOINED_IPV4_MC_ADDR="225.1.2.3"
|
||||
UNKNOWN_IPV4_MC_ADDR1="225.1.2.4"
|
||||
UNKNOWN_IPV4_MC_ADDR2="225.1.2.5"
|
||||
UNKNOWN_IPV4_MC_ADDR3="225.1.2.6"
|
||||
JOINED_IPV6_MC_ADDR="ff2e::0102:0304"
|
||||
UNKNOWN_IPV6_MC_ADDR1="ff2e::0102:0305"
|
||||
UNKNOWN_IPV6_MC_ADDR2="ff2e::0102:0306"
|
||||
UNKNOWN_IPV6_MC_ADDR3="ff2e::0102:0307"
|
||||
|
||||
JOINED_MACV4_MC_ADDR="01:00:5e:01:02:03"
|
||||
UNKNOWN_MACV4_MC_ADDR1="01:00:5e:01:02:04"
|
||||
UNKNOWN_MACV4_MC_ADDR2="01:00:5e:01:02:05"
|
||||
UNKNOWN_MACV4_MC_ADDR3="01:00:5e:01:02:06"
|
||||
JOINED_MACV6_MC_ADDR="33:33:01:02:03:04"
|
||||
UNKNOWN_MACV6_MC_ADDR1="33:33:01:02:03:05"
|
||||
UNKNOWN_MACV6_MC_ADDR2="33:33:01:02:03:06"
|
||||
UNKNOWN_MACV6_MC_ADDR3="33:33:01:02:03:07"
|
||||
|
||||
NON_IP_MC="01:02:03:04:05:06"
|
||||
NON_IP_PKT="00:04 48:45:4c:4f"
|
||||
BC="ff:ff:ff:ff:ff:ff"
|
||||
|
||||
# Disable promisc to ensure we don't receive unknown MAC DA packets
|
||||
export TCPDUMP_EXTRA_FLAGS="-pl"
|
||||
|
||||
h1=${NETIFS[p1]}
|
||||
h2=${NETIFS[p2]}
|
||||
|
||||
send_non_ip()
|
||||
{
|
||||
local if_name=$1
|
||||
local smac=$2
|
||||
local dmac=$3
|
||||
|
||||
$MZ -q $if_name "$dmac $smac $NON_IP_PKT"
|
||||
}
|
||||
|
||||
send_uc_ipv4()
|
||||
{
|
||||
local if_name=$1
|
||||
local dmac=$2
|
||||
|
||||
ip neigh add $H2_IPV4 lladdr $dmac dev $if_name
|
||||
ping_do $if_name $H2_IPV4
|
||||
ip neigh del $H2_IPV4 dev $if_name
|
||||
}
|
||||
|
||||
check_rcv()
|
||||
{
|
||||
local if_name=$1
|
||||
local type=$2
|
||||
local pattern=$3
|
||||
local should_receive=$4
|
||||
local should_fail=
|
||||
|
||||
[ $should_receive = true ] && should_fail=0 || should_fail=1
|
||||
RET=0
|
||||
|
||||
tcpdump_show $if_name | grep -q "$pattern"
|
||||
|
||||
check_err_fail "$should_fail" "$?" "reception"
|
||||
|
||||
log_test "$if_name: $type"
|
||||
}
|
||||
|
||||
mc_route_prepare()
|
||||
{
|
||||
local if_name=$1
|
||||
local vrf_name=$(master_name_get $if_name)
|
||||
|
||||
ip route add 225.100.1.0/24 dev $if_name vrf $vrf_name
|
||||
ip -6 route add ff2e::/64 dev $if_name vrf $vrf_name
|
||||
}
|
||||
|
||||
mc_route_destroy()
|
||||
{
|
||||
local if_name=$1
|
||||
local vrf_name=$(master_name_get $if_name)
|
||||
|
||||
ip route del 225.100.1.0/24 dev $if_name vrf $vrf_name
|
||||
ip -6 route del ff2e::/64 dev $if_name vrf $vrf_name
|
||||
}
|
||||
|
||||
run_test()
|
||||
{
|
||||
local rcv_if_name=$1
|
||||
local smac=$(mac_get $h1)
|
||||
local rcv_dmac=$(mac_get $rcv_if_name)
|
||||
|
||||
tcpdump_start $rcv_if_name
|
||||
|
||||
mc_route_prepare $h1
|
||||
mc_route_prepare $rcv_if_name
|
||||
|
||||
send_uc_ipv4 $h1 $rcv_dmac
|
||||
send_uc_ipv4 $h1 $MACVLAN_ADDR
|
||||
send_uc_ipv4 $h1 $UNKNOWN_UC_ADDR1
|
||||
|
||||
ip link set dev $rcv_if_name promisc on
|
||||
send_uc_ipv4 $h1 $UNKNOWN_UC_ADDR2
|
||||
mc_send $h1 $UNKNOWN_IPV4_MC_ADDR2
|
||||
mc_send $h1 $UNKNOWN_IPV6_MC_ADDR2
|
||||
ip link set dev $rcv_if_name promisc off
|
||||
|
||||
mc_join $rcv_if_name $JOINED_IPV4_MC_ADDR
|
||||
mc_send $h1 $JOINED_IPV4_MC_ADDR
|
||||
mc_leave
|
||||
|
||||
mc_join $rcv_if_name $JOINED_IPV6_MC_ADDR
|
||||
mc_send $h1 $JOINED_IPV6_MC_ADDR
|
||||
mc_leave
|
||||
|
||||
mc_send $h1 $UNKNOWN_IPV4_MC_ADDR1
|
||||
mc_send $h1 $UNKNOWN_IPV6_MC_ADDR1
|
||||
|
||||
ip link set dev $rcv_if_name allmulticast on
|
||||
send_uc_ipv4 $h1 $UNKNOWN_UC_ADDR3
|
||||
mc_send $h1 $UNKNOWN_IPV4_MC_ADDR3
|
||||
mc_send $h1 $UNKNOWN_IPV6_MC_ADDR3
|
||||
ip link set dev $rcv_if_name allmulticast off
|
||||
|
||||
mc_route_destroy $rcv_if_name
|
||||
mc_route_destroy $h1
|
||||
|
||||
sleep 1
|
||||
|
||||
tcpdump_stop $rcv_if_name
|
||||
|
||||
check_rcv $rcv_if_name "Unicast IPv4 to primary MAC address" \
|
||||
"$smac > $rcv_dmac, ethertype IPv4 (0x0800)" \
|
||||
true
|
||||
|
||||
check_rcv $rcv_if_name "Unicast IPv4 to macvlan MAC address" \
|
||||
"$smac > $MACVLAN_ADDR, ethertype IPv4 (0x0800)" \
|
||||
true
|
||||
|
||||
check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address" \
|
||||
"$smac > $UNKNOWN_UC_ADDR1, ethertype IPv4 (0x0800)" \
|
||||
false
|
||||
|
||||
check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address, promisc" \
|
||||
"$smac > $UNKNOWN_UC_ADDR2, ethertype IPv4 (0x0800)" \
|
||||
true
|
||||
|
||||
check_rcv $rcv_if_name "Unicast IPv4 to unknown MAC address, allmulti" \
|
||||
"$smac > $UNKNOWN_UC_ADDR3, ethertype IPv4 (0x0800)" \
|
||||
false
|
||||
|
||||
check_rcv $rcv_if_name "Multicast IPv4 to joined group" \
|
||||
"$smac > $JOINED_MACV4_MC_ADDR, ethertype IPv4 (0x0800)" \
|
||||
true
|
||||
|
||||
check_rcv $rcv_if_name "Multicast IPv4 to unknown group" \
|
||||
"$smac > $UNKNOWN_MACV4_MC_ADDR1, ethertype IPv4 (0x0800)" \
|
||||
false
|
||||
|
||||
check_rcv $rcv_if_name "Multicast IPv4 to unknown group, promisc" \
|
||||
"$smac > $UNKNOWN_MACV4_MC_ADDR2, ethertype IPv4 (0x0800)" \
|
||||
true
|
||||
|
||||
check_rcv $rcv_if_name "Multicast IPv4 to unknown group, allmulti" \
|
||||
"$smac > $UNKNOWN_MACV4_MC_ADDR3, ethertype IPv4 (0x0800)" \
|
||||
true
|
||||
|
||||
check_rcv $rcv_if_name "Multicast IPv6 to joined group" \
|
||||
"$smac > $JOINED_MACV6_MC_ADDR, ethertype IPv6 (0x86dd)" \
|
||||
true
|
||||
|
||||
check_rcv $rcv_if_name "Multicast IPv6 to unknown group" \
|
||||
"$smac > $UNKNOWN_MACV6_MC_ADDR1, ethertype IPv6 (0x86dd)" \
|
||||
false
|
||||
|
||||
check_rcv $rcv_if_name "Multicast IPv6 to unknown group, promisc" \
|
||||
"$smac > $UNKNOWN_MACV6_MC_ADDR2, ethertype IPv6 (0x86dd)" \
|
||||
true
|
||||
|
||||
check_rcv $rcv_if_name "Multicast IPv6 to unknown group, allmulti" \
|
||||
"$smac > $UNKNOWN_MACV6_MC_ADDR3, ethertype IPv6 (0x86dd)" \
|
||||
true
|
||||
|
||||
tcpdump_cleanup $rcv_if_name
|
||||
}
|
||||
|
||||
h1_create()
|
||||
{
|
||||
simple_if_init $h1 $H1_IPV4/24 $H1_IPV6/64
|
||||
}
|
||||
|
||||
h1_destroy()
|
||||
{
|
||||
simple_if_fini $h1 $H1_IPV4/24 $H1_IPV6/64
|
||||
}
|
||||
|
||||
h2_create()
|
||||
{
|
||||
simple_if_init $h2 $H2_IPV4/24 $H2_IPV6/64
|
||||
}
|
||||
|
||||
h2_destroy()
|
||||
{
|
||||
simple_if_fini $h2 $H2_IPV4/24 $H2_IPV6/64
|
||||
}
|
||||
|
||||
bridge_create()
|
||||
{
|
||||
ip link add br0 type bridge
|
||||
ip link set br0 address $BRIDGE_ADDR
|
||||
ip link set br0 up
|
||||
|
||||
ip link set $h2 master br0
|
||||
ip link set $h2 up
|
||||
|
||||
simple_if_init br0 $H2_IPV4/24 $H2_IPV6/64
|
||||
}
|
||||
|
||||
bridge_destroy()
|
||||
{
|
||||
simple_if_fini br0 $H2_IPV4/24 $H2_IPV6/64
|
||||
|
||||
ip link del br0
|
||||
}
|
||||
|
||||
standalone()
|
||||
{
|
||||
h1_create
|
||||
h2_create
|
||||
|
||||
ip link add link $h2 name macvlan0 type macvlan mode private
|
||||
ip link set macvlan0 address $MACVLAN_ADDR
|
||||
ip link set macvlan0 up
|
||||
|
||||
run_test $h2
|
||||
|
||||
ip link del macvlan0
|
||||
|
||||
h2_destroy
|
||||
h1_destroy
|
||||
}
|
||||
|
||||
bridge()
|
||||
{
|
||||
h1_create
|
||||
bridge_create
|
||||
|
||||
ip link add link br0 name macvlan0 type macvlan mode private
|
||||
ip link set macvlan0 address $MACVLAN_ADDR
|
||||
ip link set macvlan0 up
|
||||
|
||||
run_test br0
|
||||
|
||||
ip link del macvlan0
|
||||
|
||||
bridge_destroy
|
||||
h1_destroy
|
||||
}
|
||||
|
||||
cleanup()
|
||||
{
|
||||
pre_cleanup
|
||||
vrf_cleanup
|
||||
}
|
||||
|
||||
setup_prepare()
|
||||
{
|
||||
vrf_prepare
|
||||
# setup_wait() needs this
|
||||
ip link set $h1 up
|
||||
ip link set $h2 up
|
||||
}
|
||||
|
||||
trap cleanup EXIT
|
||||
|
||||
setup_prepare
|
||||
setup_wait
|
||||
|
||||
tests_run
|
||||
|
||||
exit $EXIT_STATUS
|
261
tools/testing/selftests/net/forwarding/no_forwarding.sh
Executable file
261
tools/testing/selftests/net/forwarding/no_forwarding.sh
Executable file
@ -0,0 +1,261 @@
|
||||
#!/bin/bash
|
||||
# SPDX-License-Identifier: GPL-2.0
|
||||
|
||||
ALL_TESTS="standalone two_bridges one_bridge_two_pvids"
|
||||
NUM_NETIFS=4
|
||||
|
||||
source lib.sh
|
||||
|
||||
h1=${NETIFS[p1]}
|
||||
h2=${NETIFS[p3]}
|
||||
swp1=${NETIFS[p2]}
|
||||
swp2=${NETIFS[p4]}
|
||||
|
||||
H1_IPV4="192.0.2.1"
|
||||
H2_IPV4="192.0.2.2"
|
||||
H1_IPV6="2001:db8:1::1"
|
||||
H2_IPV6="2001:db8:1::2"
|
||||
|
||||
IPV4_ALLNODES="224.0.0.1"
|
||||
IPV6_ALLNODES="ff02::1"
|
||||
MACV4_ALLNODES="01:00:5e:00:00:01"
|
||||
MACV6_ALLNODES="33:33:00:00:00:01"
|
||||
NON_IP_MC="01:02:03:04:05:06"
|
||||
NON_IP_PKT="00:04 48:45:4c:4f"
|
||||
BC="ff:ff:ff:ff:ff:ff"
|
||||
|
||||
# The full 4K VLAN space is too much to check, so strategically pick some
|
||||
# values which should provide reasonable coverage
|
||||
vids=(0 1 2 5 10 20 50 100 200 500 1000 1000 2000 4000 4094)
|
||||
|
||||
send_non_ip()
|
||||
{
|
||||
local if_name=$1
|
||||
local smac=$2
|
||||
local dmac=$3
|
||||
|
||||
$MZ -q $if_name "$dmac $smac $NON_IP_PKT"
|
||||
}
|
||||
|
||||
send_uc_ipv4()
|
||||
{
|
||||
local if_name=$1
|
||||
local dmac=$2
|
||||
|
||||
ip neigh add $H2_IPV4 lladdr $dmac dev $if_name
|
||||
ping_do $if_name $H2_IPV4
|
||||
ip neigh del $H2_IPV4 dev $if_name
|
||||
}
|
||||
|
||||
send_mc_ipv4()
|
||||
{
|
||||
local if_name=$1
|
||||
|
||||
ping_do $if_name $IPV4_ALLNODES "-I $if_name"
|
||||
}
|
||||
|
||||
send_uc_ipv6()
|
||||
{
|
||||
local if_name=$1
|
||||
local dmac=$2
|
||||
|
||||
ip -6 neigh add $H2_IPV6 lladdr $dmac dev $if_name
|
||||
ping6_do $if_name $H2_IPV6
|
||||
ip -6 neigh del $H2_IPV6 dev $if_name
|
||||
}
|
||||
|
||||
send_mc_ipv6()
|
||||
{
|
||||
local if_name=$1
|
||||
|
||||
ping6_do $if_name $IPV6_ALLNODES%$if_name
|
||||
}
|
||||
|
||||
check_rcv()
|
||||
{
|
||||
local if_name=$1
|
||||
local type=$2
|
||||
local pattern=$3
|
||||
local should_fail=1
|
||||
|
||||
RET=0
|
||||
|
||||
tcpdump_show $if_name | grep -q "$pattern"
|
||||
|
||||
check_err_fail "$should_fail" "$?" "reception"
|
||||
|
||||
log_test "$type"
|
||||
}
|
||||
|
||||
run_test()
|
||||
{
|
||||
local test_name="$1"
|
||||
local smac=$(mac_get $h1)
|
||||
local dmac=$(mac_get $h2)
|
||||
local h1_ipv6_lladdr=$(ipv6_lladdr_get $h1)
|
||||
local vid=
|
||||
|
||||
echo "$test_name: Sending packets"
|
||||
|
||||
tcpdump_start $h2
|
||||
|
||||
send_non_ip $h1 $smac $dmac
|
||||
send_non_ip $h1 $smac $NON_IP_MC
|
||||
send_non_ip $h1 $smac $BC
|
||||
send_uc_ipv4 $h1 $dmac
|
||||
send_mc_ipv4 $h1
|
||||
send_uc_ipv6 $h1 $dmac
|
||||
send_mc_ipv6 $h1
|
||||
|
||||
for vid in "${vids[@]}"; do
|
||||
vlan_create $h1 $vid
|
||||
simple_if_init $h1.$vid $H1_IPV4/24 $H1_IPV6/64
|
||||
|
||||
send_non_ip $h1.$vid $smac $dmac
|
||||
send_non_ip $h1.$vid $smac $NON_IP_MC
|
||||
send_non_ip $h1.$vid $smac $BC
|
||||
send_uc_ipv4 $h1.$vid $dmac
|
||||
send_mc_ipv4 $h1.$vid
|
||||
send_uc_ipv6 $h1.$vid $dmac
|
||||
send_mc_ipv6 $h1.$vid
|
||||
|
||||
simple_if_fini $h1.$vid $H1_IPV4/24 $H1_IPV6/64
|
||||
vlan_destroy $h1 $vid
|
||||
done
|
||||
|
||||
sleep 1
|
||||
|
||||
echo "$test_name: Checking which packets were received"
|
||||
|
||||
tcpdump_stop $h2
|
||||
|
||||
check_rcv $h2 "$test_name: Unicast non-IP untagged" \
|
||||
"$smac > $dmac, 802.3, length 4:"
|
||||
|
||||
check_rcv $h2 "$test_name: Multicast non-IP untagged" \
|
||||
"$smac > $NON_IP_MC, 802.3, length 4:"
|
||||
|
||||
check_rcv $h2 "$test_name: Broadcast non-IP untagged" \
|
||||
"$smac > $BC, 802.3, length 4:"
|
||||
|
||||
check_rcv $h2 "$test_name: Unicast IPv4 untagged" \
|
||||
"$smac > $dmac, ethertype IPv4 (0x0800)"
|
||||
|
||||
check_rcv $h2 "$test_name: Multicast IPv4 untagged" \
|
||||
"$smac > $MACV4_ALLNODES, ethertype IPv4 (0x0800).*: $H1_IPV4 > $IPV4_ALLNODES"
|
||||
|
||||
check_rcv $h2 "$test_name: Unicast IPv6 untagged" \
|
||||
"$smac > $dmac, ethertype IPv6 (0x86dd).*8: $H1_IPV6 > $H2_IPV6"
|
||||
|
||||
check_rcv $h2 "$test_name: Multicast IPv6 untagged" \
|
||||
"$smac > $MACV6_ALLNODES, ethertype IPv6 (0x86dd).*: $h1_ipv6_lladdr > $IPV6_ALLNODES"
|
||||
|
||||
for vid in "${vids[@]}"; do
|
||||
check_rcv $h2 "$test_name: Unicast non-IP VID $vid" \
|
||||
"$smac > $dmac, ethertype 802.1Q (0x8100).*vlan $vid,.*length 4"
|
||||
|
||||
check_rcv $h2 "$test_name: Multicast non-IP VID $vid" \
|
||||
"$smac > $NON_IP_MC, ethertype 802.1Q (0x8100).*vlan $vid,.*length 4"
|
||||
|
||||
check_rcv $h2 "$test_name: Broadcast non-IP VID $vid" \
|
||||
"$smac > $BC, ethertype 802.1Q (0x8100).*vlan $vid,.*length 4"
|
||||
|
||||
check_rcv $h2 "$test_name: Unicast IPv4 VID $vid" \
|
||||
"$smac > $dmac, ethertype 802.1Q (0x8100).*vlan $vid,.*ethertype IPv4 (0x0800), $H1_IPV4 > $H2_IPV4"
|
||||
|
||||
check_rcv $h2 "$test_name: Multicast IPv4 VID $vid" \
|
||||
"$smac > $MACV4_ALLNODES, ethertype 802.1Q (0x8100).*vlan $vid,.*ethertype IPv4 (0x0800), $H1_IPV4 > $IPV4_ALLNODES"
|
||||
|
||||
check_rcv $h2 "$test_name: Unicast IPv6 VID $vid" \
|
||||
"$smac > $dmac, ethertype 802.1Q (0x8100).*vlan $vid,.*ethertype IPv6 (0x86dd), $H1_IPV6 > $H2_IPV6"
|
||||
|
||||
check_rcv $h2 "$test_name: Multicast IPv6 VID $vid" \
|
||||
"$smac > $MACV6_ALLNODES, ethertype 802.1Q (0x8100).*vlan $vid,.*ethertype IPv6 (0x86dd), $h1_ipv6_lladdr > $IPV6_ALLNODES"
|
||||
done
|
||||
|
||||
tcpdump_cleanup $h2
|
||||
}
|
||||
|
||||
standalone()
|
||||
{
|
||||
run_test "Standalone switch ports"
|
||||
}
|
||||
|
||||
two_bridges()
|
||||
{
|
||||
ip link add br0 type bridge && ip link set br0 up
|
||||
ip link add br1 type bridge && ip link set br1 up
|
||||
ip link set $swp1 master br0
|
||||
ip link set $swp2 master br1
|
||||
|
||||
run_test "Switch ports in different bridges"
|
||||
|
||||
ip link del br1
|
||||
ip link del br0
|
||||
}
|
||||
|
||||
one_bridge_two_pvids()
|
||||
{
|
||||
ip link add br0 type bridge vlan_filtering 1 vlan_default_pvid 0
|
||||
ip link set br0 up
|
||||
ip link set $swp1 master br0
|
||||
ip link set $swp2 master br0
|
||||
|
||||
bridge vlan add dev $swp1 vid 1 pvid untagged
|
||||
bridge vlan add dev $swp1 vid 2 pvid untagged
|
||||
|
||||
run_test "Switch ports in VLAN-aware bridge with different PVIDs"
|
||||
|
||||
ip link del br0
|
||||
}
|
||||
|
||||
h1_create()
|
||||
{
|
||||
simple_if_init $h1 $H1_IPV4/24 $H1_IPV6/64
|
||||
}
|
||||
|
||||
h1_destroy()
|
||||
{
|
||||
simple_if_fini $h1 $H1_IPV4/24 $H1_IPV6/64
|
||||
}
|
||||
|
||||
h2_create()
|
||||
{
|
||||
simple_if_init $h2 $H2_IPV4/24 $H2_IPV6/64
|
||||
}
|
||||
|
||||
h2_destroy()
|
||||
{
|
||||
simple_if_fini $h2 $H2_IPV4/24 $H2_IPV6/64
|
||||
}
|
||||
|
||||
cleanup()
|
||||
{
|
||||
pre_cleanup
|
||||
|
||||
h2_destroy
|
||||
h1_destroy
|
||||
|
||||
vrf_cleanup
|
||||
}
|
||||
|
||||
setup_prepare()
|
||||
{
|
||||
vrf_prepare
|
||||
|
||||
h1_create
|
||||
h2_create
|
||||
# we call simple_if_init from the test itself, but setup_wait expects
|
||||
# that we call it from here, and waits until the interfaces are up
|
||||
ip link set dev $swp1 up
|
||||
ip link set dev $swp2 up
|
||||
}
|
||||
|
||||
trap cleanup EXIT
|
||||
|
||||
setup_prepare
|
||||
setup_wait
|
||||
|
||||
tests_run
|
||||
|
||||
exit $EXIT_STATUS
|
Loading…
Reference in New Issue
Block a user