rtnetlink.sh 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023
  1. #!/bin/bash
  2. #
  3. # This test is for checking rtnetlink callpaths, and get as much coverage as possible.
  4. #
  5. # set -e
  6. devdummy="test-dummy0"
  7. ret=0
  8. # Kselftest framework requirement - SKIP code is 4.
  9. ksft_skip=4
  10. # set global exit status, but never reset nonzero one.
  11. check_err()
  12. {
  13. if [ $ret -eq 0 ]; then
  14. ret=$1
  15. fi
  16. }
  17. # same but inverted -- used when command must fail for test to pass
  18. check_fail()
  19. {
  20. if [ $1 -eq 0 ]; then
  21. ret=1
  22. fi
  23. }
  24. kci_add_dummy()
  25. {
  26. ip link add name "$devdummy" type dummy
  27. check_err $?
  28. ip link set "$devdummy" up
  29. check_err $?
  30. }
  31. kci_del_dummy()
  32. {
  33. ip link del dev "$devdummy"
  34. check_err $?
  35. }
  36. kci_test_netconf()
  37. {
  38. dev="$1"
  39. r=$ret
  40. ip netconf show dev "$dev" > /dev/null
  41. check_err $?
  42. for f in 4 6; do
  43. ip -$f netconf show dev "$dev" > /dev/null
  44. check_err $?
  45. done
  46. if [ $ret -ne 0 ] ;then
  47. echo "FAIL: ip netconf show $dev"
  48. test $r -eq 0 && ret=0
  49. return 1
  50. fi
  51. }
  52. # add a bridge with vlans on top
  53. kci_test_bridge()
  54. {
  55. devbr="test-br0"
  56. vlandev="testbr-vlan1"
  57. ret=0
  58. ip link add name "$devbr" type bridge
  59. check_err $?
  60. ip link set dev "$devdummy" master "$devbr"
  61. check_err $?
  62. ip link set "$devbr" up
  63. check_err $?
  64. ip link add link "$devbr" name "$vlandev" type vlan id 1
  65. check_err $?
  66. ip addr add dev "$vlandev" 10.200.7.23/30
  67. check_err $?
  68. ip -6 addr add dev "$vlandev" dead:42::1234/64
  69. check_err $?
  70. ip -d link > /dev/null
  71. check_err $?
  72. ip r s t all > /dev/null
  73. check_err $?
  74. for name in "$devbr" "$vlandev" "$devdummy" ; do
  75. kci_test_netconf "$name"
  76. done
  77. ip -6 addr del dev "$vlandev" dead:42::1234/64
  78. check_err $?
  79. ip link del dev "$vlandev"
  80. check_err $?
  81. ip link del dev "$devbr"
  82. check_err $?
  83. if [ $ret -ne 0 ];then
  84. echo "FAIL: bridge setup"
  85. return 1
  86. fi
  87. echo "PASS: bridge setup"
  88. }
  89. kci_test_gre()
  90. {
  91. gredev=neta
  92. rem=10.42.42.1
  93. loc=10.0.0.1
  94. ret=0
  95. ip tunnel add $gredev mode gre remote $rem local $loc ttl 1
  96. check_err $?
  97. ip link set $gredev up
  98. check_err $?
  99. ip addr add 10.23.7.10 dev $gredev
  100. check_err $?
  101. ip route add 10.23.8.0/30 dev $gredev
  102. check_err $?
  103. ip addr add dev "$devdummy" 10.23.7.11/24
  104. check_err $?
  105. ip link > /dev/null
  106. check_err $?
  107. ip addr > /dev/null
  108. check_err $?
  109. kci_test_netconf "$gredev"
  110. ip addr del dev "$devdummy" 10.23.7.11/24
  111. check_err $?
  112. ip link del $gredev
  113. check_err $?
  114. if [ $ret -ne 0 ];then
  115. echo "FAIL: gre tunnel endpoint"
  116. return 1
  117. fi
  118. echo "PASS: gre tunnel endpoint"
  119. }
  120. # tc uses rtnetlink too, for full tc testing
  121. # please see tools/testing/selftests/tc-testing.
  122. kci_test_tc()
  123. {
  124. dev=lo
  125. ret=0
  126. tc qdisc add dev "$dev" root handle 1: htb
  127. check_err $?
  128. tc class add dev "$dev" parent 1: classid 1:10 htb rate 1mbit
  129. check_err $?
  130. tc filter add dev "$dev" parent 1:0 prio 5 handle ffe: protocol ip u32 divisor 256
  131. check_err $?
  132. tc filter add dev "$dev" parent 1:0 prio 5 handle ffd: protocol ip u32 divisor 256
  133. check_err $?
  134. tc filter add dev "$dev" parent 1:0 prio 5 handle ffc: protocol ip u32 divisor 256
  135. check_err $?
  136. tc filter add dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:3 u32 ht ffe:2: match ip src 10.0.0.3 flowid 1:10
  137. check_err $?
  138. tc filter add dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:2 u32 ht ffe:2: match ip src 10.0.0.2 flowid 1:10
  139. check_err $?
  140. tc filter show dev "$dev" parent 1:0 > /dev/null
  141. check_err $?
  142. tc filter del dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:3 u32
  143. check_err $?
  144. tc filter show dev "$dev" parent 1:0 > /dev/null
  145. check_err $?
  146. tc qdisc del dev "$dev" root handle 1: htb
  147. check_err $?
  148. if [ $ret -ne 0 ];then
  149. echo "FAIL: tc htb hierarchy"
  150. return 1
  151. fi
  152. echo "PASS: tc htb hierarchy"
  153. }
  154. kci_test_polrouting()
  155. {
  156. ret=0
  157. ip rule add fwmark 1 lookup 100
  158. check_err $?
  159. ip route add local 0.0.0.0/0 dev lo table 100
  160. check_err $?
  161. ip r s t all > /dev/null
  162. check_err $?
  163. ip rule del fwmark 1 lookup 100
  164. check_err $?
  165. ip route del local 0.0.0.0/0 dev lo table 100
  166. check_err $?
  167. if [ $ret -ne 0 ];then
  168. echo "FAIL: policy route test"
  169. return 1
  170. fi
  171. echo "PASS: policy routing"
  172. }
  173. kci_test_route_get()
  174. {
  175. ret=0
  176. ip route get 127.0.0.1 > /dev/null
  177. check_err $?
  178. ip route get 127.0.0.1 dev "$devdummy" > /dev/null
  179. check_err $?
  180. ip route get ::1 > /dev/null
  181. check_err $?
  182. ip route get fe80::1 dev "$devdummy" > /dev/null
  183. check_err $?
  184. ip route get 127.0.0.1 from 127.0.0.1 oif lo tos 0x1 mark 0x1 > /dev/null
  185. check_err $?
  186. ip route get ::1 from ::1 iif lo oif lo tos 0x1 mark 0x1 > /dev/null
  187. check_err $?
  188. ip addr add dev "$devdummy" 10.23.7.11/24
  189. check_err $?
  190. ip route get 10.23.7.11 from 10.23.7.12 iif "$devdummy" > /dev/null
  191. check_err $?
  192. ip addr del dev "$devdummy" 10.23.7.11/24
  193. check_err $?
  194. if [ $ret -ne 0 ];then
  195. echo "FAIL: route get"
  196. return 1
  197. fi
  198. echo "PASS: route get"
  199. }
  200. kci_test_addrlft()
  201. {
  202. for i in $(seq 10 100) ;do
  203. lft=$(((RANDOM%3) + 1))
  204. ip addr add 10.23.11.$i/32 dev "$devdummy" preferred_lft $lft valid_lft $((lft+1))
  205. check_err $?
  206. done
  207. sleep 5
  208. ip addr show dev "$devdummy" | grep "10.23.11."
  209. if [ $? -eq 0 ]; then
  210. echo "FAIL: preferred_lft addresses remaining"
  211. check_err 1
  212. return
  213. fi
  214. echo "PASS: preferred_lft addresses have expired"
  215. }
  216. kci_test_addrlabel()
  217. {
  218. ret=0
  219. ip addrlabel add prefix dead::/64 dev lo label 1
  220. check_err $?
  221. ip addrlabel list |grep -q "prefix dead::/64 dev lo label 1"
  222. check_err $?
  223. ip addrlabel del prefix dead::/64 dev lo label 1 2> /dev/null
  224. check_err $?
  225. ip addrlabel add prefix dead::/64 label 1 2> /dev/null
  226. check_err $?
  227. ip addrlabel del prefix dead::/64 label 1 2> /dev/null
  228. check_err $?
  229. # concurrent add/delete
  230. for i in $(seq 1 1000); do
  231. ip addrlabel add prefix 1c3::/64 label 12345 2>/dev/null
  232. done &
  233. for i in $(seq 1 1000); do
  234. ip addrlabel del prefix 1c3::/64 label 12345 2>/dev/null
  235. done
  236. wait
  237. ip addrlabel del prefix 1c3::/64 label 12345 2>/dev/null
  238. if [ $ret -ne 0 ];then
  239. echo "FAIL: ipv6 addrlabel"
  240. return 1
  241. fi
  242. echo "PASS: ipv6 addrlabel"
  243. }
  244. kci_test_ifalias()
  245. {
  246. ret=0
  247. namewant=$(uuidgen)
  248. syspathname="/sys/class/net/$devdummy/ifalias"
  249. ip link set dev "$devdummy" alias "$namewant"
  250. check_err $?
  251. if [ $ret -ne 0 ]; then
  252. echo "FAIL: cannot set interface alias of $devdummy to $namewant"
  253. return 1
  254. fi
  255. ip link show "$devdummy" | grep -q "alias $namewant"
  256. check_err $?
  257. if [ -r "$syspathname" ] ; then
  258. read namehave < "$syspathname"
  259. if [ "$namewant" != "$namehave" ]; then
  260. echo "FAIL: did set ifalias $namewant but got $namehave"
  261. return 1
  262. fi
  263. namewant=$(uuidgen)
  264. echo "$namewant" > "$syspathname"
  265. ip link show "$devdummy" | grep -q "alias $namewant"
  266. check_err $?
  267. # sysfs interface allows to delete alias again
  268. echo "" > "$syspathname"
  269. ip link show "$devdummy" | grep -q "alias $namewant"
  270. check_fail $?
  271. for i in $(seq 1 100); do
  272. uuidgen > "$syspathname" &
  273. done
  274. wait
  275. # re-add the alias -- kernel should free mem when dummy dev is removed
  276. ip link set dev "$devdummy" alias "$namewant"
  277. check_err $?
  278. fi
  279. if [ $ret -ne 0 ]; then
  280. echo "FAIL: set interface alias $devdummy to $namewant"
  281. return 1
  282. fi
  283. echo "PASS: set ifalias $namewant for $devdummy"
  284. }
  285. kci_test_vrf()
  286. {
  287. vrfname="test-vrf"
  288. ret=0
  289. ip link show type vrf 2>/dev/null
  290. if [ $? -ne 0 ]; then
  291. echo "SKIP: vrf: iproute2 too old"
  292. return $ksft_skip
  293. fi
  294. ip link add "$vrfname" type vrf table 10
  295. check_err $?
  296. if [ $ret -ne 0 ];then
  297. echo "FAIL: can't add vrf interface, skipping test"
  298. return 0
  299. fi
  300. ip -br link show type vrf | grep -q "$vrfname"
  301. check_err $?
  302. if [ $ret -ne 0 ];then
  303. echo "FAIL: created vrf device not found"
  304. return 1
  305. fi
  306. ip link set dev "$vrfname" up
  307. check_err $?
  308. ip link set dev "$devdummy" master "$vrfname"
  309. check_err $?
  310. ip link del dev "$vrfname"
  311. check_err $?
  312. if [ $ret -ne 0 ];then
  313. echo "FAIL: vrf"
  314. return 1
  315. fi
  316. echo "PASS: vrf"
  317. }
  318. kci_test_encap_vxlan()
  319. {
  320. ret=0
  321. vxlan="test-vxlan0"
  322. vlan="test-vlan0"
  323. testns="$1"
  324. ip netns exec "$testns" ip link add "$vxlan" type vxlan id 42 group 239.1.1.1 \
  325. dev "$devdummy" dstport 4789 2>/dev/null
  326. if [ $? -ne 0 ]; then
  327. echo "FAIL: can't add vxlan interface, skipping test"
  328. return 0
  329. fi
  330. check_err $?
  331. ip netns exec "$testns" ip addr add 10.2.11.49/24 dev "$vxlan"
  332. check_err $?
  333. ip netns exec "$testns" ip link set up dev "$vxlan"
  334. check_err $?
  335. ip netns exec "$testns" ip link add link "$vxlan" name "$vlan" type vlan id 1
  336. check_err $?
  337. ip netns exec "$testns" ip link del "$vxlan"
  338. check_err $?
  339. if [ $ret -ne 0 ]; then
  340. echo "FAIL: vxlan"
  341. return 1
  342. fi
  343. echo "PASS: vxlan"
  344. }
  345. kci_test_encap_fou()
  346. {
  347. ret=0
  348. name="test-fou"
  349. testns="$1"
  350. ip fou help 2>&1 |grep -q 'Usage: ip fou'
  351. if [ $? -ne 0 ];then
  352. echo "SKIP: fou: iproute2 too old"
  353. return $ksft_skip
  354. fi
  355. ip netns exec "$testns" ip fou add port 7777 ipproto 47 2>/dev/null
  356. if [ $? -ne 0 ];then
  357. echo "FAIL: can't add fou port 7777, skipping test"
  358. return 1
  359. fi
  360. ip netns exec "$testns" ip fou add port 8888 ipproto 4
  361. check_err $?
  362. ip netns exec "$testns" ip fou del port 9999 2>/dev/null
  363. check_fail $?
  364. ip netns exec "$testns" ip fou del port 7777
  365. check_err $?
  366. if [ $ret -ne 0 ]; then
  367. echo "FAIL: fou"
  368. return 1
  369. fi
  370. echo "PASS: fou"
  371. }
  372. # test various encap methods, use netns to avoid unwanted interference
  373. kci_test_encap()
  374. {
  375. testns="testns"
  376. ret=0
  377. ip netns add "$testns"
  378. if [ $? -ne 0 ]; then
  379. echo "SKIP encap tests: cannot add net namespace $testns"
  380. return $ksft_skip
  381. fi
  382. ip netns exec "$testns" ip link set lo up
  383. check_err $?
  384. ip netns exec "$testns" ip link add name "$devdummy" type dummy
  385. check_err $?
  386. ip netns exec "$testns" ip link set "$devdummy" up
  387. check_err $?
  388. kci_test_encap_vxlan "$testns"
  389. kci_test_encap_fou "$testns"
  390. ip netns del "$testns"
  391. }
  392. kci_test_macsec()
  393. {
  394. msname="test_macsec0"
  395. ret=0
  396. ip macsec help 2>&1 | grep -q "^Usage: ip macsec"
  397. if [ $? -ne 0 ]; then
  398. echo "SKIP: macsec: iproute2 too old"
  399. return $ksft_skip
  400. fi
  401. ip link add link "$devdummy" "$msname" type macsec port 42 encrypt on
  402. check_err $?
  403. if [ $ret -ne 0 ];then
  404. echo "FAIL: can't add macsec interface, skipping test"
  405. return 1
  406. fi
  407. ip macsec add "$msname" tx sa 0 pn 1024 on key 01 12345678901234567890123456789012
  408. check_err $?
  409. ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef"
  410. check_err $?
  411. ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef" sa 0 pn 1 on key 00 0123456789abcdef0123456789abcdef
  412. check_err $?
  413. ip macsec show > /dev/null
  414. check_err $?
  415. ip link del dev "$msname"
  416. check_err $?
  417. if [ $ret -ne 0 ];then
  418. echo "FAIL: macsec"
  419. return 1
  420. fi
  421. echo "PASS: macsec"
  422. }
  423. #-------------------------------------------------------------------
  424. # Example commands
  425. # ip x s add proto esp src 14.0.0.52 dst 14.0.0.70 \
  426. # spi 0x07 mode transport reqid 0x07 replay-window 32 \
  427. # aead 'rfc4106(gcm(aes))' 1234567890123456dcba 128 \
  428. # sel src 14.0.0.52/24 dst 14.0.0.70/24
  429. # ip x p add dir out src 14.0.0.52/24 dst 14.0.0.70/24 \
  430. # tmpl proto esp src 14.0.0.52 dst 14.0.0.70 \
  431. # spi 0x07 mode transport reqid 0x07
  432. #
  433. # Subcommands not tested
  434. # ip x s update
  435. # ip x s allocspi
  436. # ip x s deleteall
  437. # ip x p update
  438. # ip x p deleteall
  439. # ip x p set
  440. #-------------------------------------------------------------------
  441. kci_test_ipsec()
  442. {
  443. ret=0
  444. algo="aead rfc4106(gcm(aes)) 0x3132333435363738393031323334353664636261 128"
  445. srcip=192.168.123.1
  446. dstip=192.168.123.2
  447. spi=7
  448. ip addr add $srcip dev $devdummy
  449. # flush to be sure there's nothing configured
  450. ip x s flush ; ip x p flush
  451. check_err $?
  452. # start the monitor in the background
  453. tmpfile=`mktemp /var/run/ipsectestXXX`
  454. mpid=`(ip x m > $tmpfile & echo $!) 2>/dev/null`
  455. sleep 0.2
  456. ipsecid="proto esp src $srcip dst $dstip spi 0x07"
  457. ip x s add $ipsecid \
  458. mode transport reqid 0x07 replay-window 32 \
  459. $algo sel src $srcip/24 dst $dstip/24
  460. check_err $?
  461. lines=`ip x s list | grep $srcip | grep $dstip | wc -l`
  462. test $lines -eq 2
  463. check_err $?
  464. ip x s count | grep -q "SAD count 1"
  465. check_err $?
  466. lines=`ip x s get $ipsecid | grep $srcip | grep $dstip | wc -l`
  467. test $lines -eq 2
  468. check_err $?
  469. ip x s delete $ipsecid
  470. check_err $?
  471. lines=`ip x s list | wc -l`
  472. test $lines -eq 0
  473. check_err $?
  474. ipsecsel="dir out src $srcip/24 dst $dstip/24"
  475. ip x p add $ipsecsel \
  476. tmpl proto esp src $srcip dst $dstip \
  477. spi 0x07 mode transport reqid 0x07
  478. check_err $?
  479. lines=`ip x p list | grep $srcip | grep $dstip | wc -l`
  480. test $lines -eq 2
  481. check_err $?
  482. ip x p count | grep -q "SPD IN 0 OUT 1 FWD 0"
  483. check_err $?
  484. lines=`ip x p get $ipsecsel | grep $srcip | grep $dstip | wc -l`
  485. test $lines -eq 2
  486. check_err $?
  487. ip x p delete $ipsecsel
  488. check_err $?
  489. lines=`ip x p list | wc -l`
  490. test $lines -eq 0
  491. check_err $?
  492. # check the monitor results
  493. kill $mpid
  494. lines=`wc -l $tmpfile | cut "-d " -f1`
  495. test $lines -eq 20
  496. check_err $?
  497. rm -rf $tmpfile
  498. # clean up any leftovers
  499. ip x s flush
  500. check_err $?
  501. ip x p flush
  502. check_err $?
  503. ip addr del $srcip/32 dev $devdummy
  504. if [ $ret -ne 0 ]; then
  505. echo "FAIL: ipsec"
  506. return 1
  507. fi
  508. echo "PASS: ipsec"
  509. }
  510. #-------------------------------------------------------------------
  511. # Example commands
  512. # ip x s add proto esp src 14.0.0.52 dst 14.0.0.70 \
  513. # spi 0x07 mode transport reqid 0x07 replay-window 32 \
  514. # aead 'rfc4106(gcm(aes))' 1234567890123456dcba 128 \
  515. # sel src 14.0.0.52/24 dst 14.0.0.70/24
  516. # offload dev sim1 dir out
  517. # ip x p add dir out src 14.0.0.52/24 dst 14.0.0.70/24 \
  518. # tmpl proto esp src 14.0.0.52 dst 14.0.0.70 \
  519. # spi 0x07 mode transport reqid 0x07
  520. #
  521. #-------------------------------------------------------------------
  522. kci_test_ipsec_offload()
  523. {
  524. ret=0
  525. algo="aead rfc4106(gcm(aes)) 0x3132333435363738393031323334353664636261 128"
  526. srcip=192.168.123.3
  527. dstip=192.168.123.4
  528. dev=simx1
  529. sysfsd=/sys/kernel/debug/netdevsim/$dev
  530. sysfsf=$sysfsd/ipsec
  531. # setup netdevsim since dummydev doesn't have offload support
  532. modprobe netdevsim
  533. check_err $?
  534. if [ $ret -ne 0 ]; then
  535. echo "FAIL: ipsec_offload can't load netdevsim"
  536. return 1
  537. fi
  538. ip link add $dev type netdevsim
  539. ip addr add $srcip dev $dev
  540. ip link set $dev up
  541. if [ ! -d $sysfsd ] ; then
  542. echo "FAIL: ipsec_offload can't create device $dev"
  543. return 1
  544. fi
  545. if [ ! -f $sysfsf ] ; then
  546. echo "FAIL: ipsec_offload netdevsim doesn't support IPsec offload"
  547. return 1
  548. fi
  549. # flush to be sure there's nothing configured
  550. ip x s flush ; ip x p flush
  551. # create offloaded SAs, both in and out
  552. ip x p add dir out src $srcip/24 dst $dstip/24 \
  553. tmpl proto esp src $srcip dst $dstip spi 9 \
  554. mode transport reqid 42
  555. check_err $?
  556. ip x p add dir out src $dstip/24 dst $srcip/24 \
  557. tmpl proto esp src $dstip dst $srcip spi 9 \
  558. mode transport reqid 42
  559. check_err $?
  560. ip x s add proto esp src $srcip dst $dstip spi 9 \
  561. mode transport reqid 42 $algo sel src $srcip/24 dst $dstip/24 \
  562. offload dev $dev dir out
  563. check_err $?
  564. ip x s add proto esp src $dstip dst $srcip spi 9 \
  565. mode transport reqid 42 $algo sel src $dstip/24 dst $srcip/24 \
  566. offload dev $dev dir in
  567. check_err $?
  568. if [ $ret -ne 0 ]; then
  569. echo "FAIL: ipsec_offload can't create SA"
  570. return 1
  571. fi
  572. # does offload show up in ip output
  573. lines=`ip x s list | grep -c "crypto offload parameters: dev $dev dir"`
  574. if [ $lines -ne 2 ] ; then
  575. echo "FAIL: ipsec_offload SA offload missing from list output"
  576. check_err 1
  577. fi
  578. # use ping to exercise the Tx path
  579. ping -I $dev -c 3 -W 1 -i 0 $dstip >/dev/null
  580. # does driver have correct offload info
  581. diff $sysfsf - << EOF
  582. SA count=2 tx=3
  583. sa[0] tx ipaddr=0x00000000 00000000 00000000 00000000
  584. sa[0] spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1
  585. sa[0] key=0x34333231 38373635 32313039 36353433
  586. sa[1] rx ipaddr=0x00000000 00000000 00000000 037ba8c0
  587. sa[1] spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1
  588. sa[1] key=0x34333231 38373635 32313039 36353433
  589. EOF
  590. if [ $? -ne 0 ] ; then
  591. echo "FAIL: ipsec_offload incorrect driver data"
  592. check_err 1
  593. fi
  594. # does offload get removed from driver
  595. ip x s flush
  596. ip x p flush
  597. lines=`grep -c "SA count=0" $sysfsf`
  598. if [ $lines -ne 1 ] ; then
  599. echo "FAIL: ipsec_offload SA not removed from driver"
  600. check_err 1
  601. fi
  602. # clean up any leftovers
  603. ip link del $dev
  604. rmmod netdevsim
  605. if [ $ret -ne 0 ]; then
  606. echo "FAIL: ipsec_offload"
  607. return 1
  608. fi
  609. echo "PASS: ipsec_offload"
  610. }
  611. kci_test_gretap()
  612. {
  613. testns="testns"
  614. DEV_NS=gretap00
  615. ret=0
  616. ip netns add "$testns"
  617. if [ $? -ne 0 ]; then
  618. echo "SKIP gretap tests: cannot add net namespace $testns"
  619. return $ksft_skip
  620. fi
  621. ip link help gretap 2>&1 | grep -q "^Usage:"
  622. if [ $? -ne 0 ];then
  623. echo "SKIP: gretap: iproute2 too old"
  624. ip netns del "$testns"
  625. return $ksft_skip
  626. fi
  627. # test native tunnel
  628. ip netns exec "$testns" ip link add dev "$DEV_NS" type gretap seq \
  629. key 102 local 172.16.1.100 remote 172.16.1.200
  630. check_err $?
  631. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  632. check_err $?
  633. ip netns exec "$testns" ip link set dev $DEV_NS up
  634. check_err $?
  635. ip netns exec "$testns" ip link del "$DEV_NS"
  636. check_err $?
  637. # test external mode
  638. ip netns exec "$testns" ip link add dev "$DEV_NS" type gretap external
  639. check_err $?
  640. ip netns exec "$testns" ip link del "$DEV_NS"
  641. check_err $?
  642. if [ $ret -ne 0 ]; then
  643. echo "FAIL: gretap"
  644. ip netns del "$testns"
  645. return 1
  646. fi
  647. echo "PASS: gretap"
  648. ip netns del "$testns"
  649. }
  650. kci_test_ip6gretap()
  651. {
  652. testns="testns"
  653. DEV_NS=ip6gretap00
  654. ret=0
  655. ip netns add "$testns"
  656. if [ $? -ne 0 ]; then
  657. echo "SKIP ip6gretap tests: cannot add net namespace $testns"
  658. return $ksft_skip
  659. fi
  660. ip link help ip6gretap 2>&1 | grep -q "^Usage:"
  661. if [ $? -ne 0 ];then
  662. echo "SKIP: ip6gretap: iproute2 too old"
  663. ip netns del "$testns"
  664. return $ksft_skip
  665. fi
  666. # test native tunnel
  667. ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6gretap seq \
  668. key 102 local fc00:100::1 remote fc00:100::2
  669. check_err $?
  670. ip netns exec "$testns" ip addr add dev "$DEV_NS" fc00:200::1/96
  671. check_err $?
  672. ip netns exec "$testns" ip link set dev $DEV_NS up
  673. check_err $?
  674. ip netns exec "$testns" ip link del "$DEV_NS"
  675. check_err $?
  676. # test external mode
  677. ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6gretap external
  678. check_err $?
  679. ip netns exec "$testns" ip link del "$DEV_NS"
  680. check_err $?
  681. if [ $ret -ne 0 ]; then
  682. echo "FAIL: ip6gretap"
  683. ip netns del "$testns"
  684. return 1
  685. fi
  686. echo "PASS: ip6gretap"
  687. ip netns del "$testns"
  688. }
  689. kci_test_erspan()
  690. {
  691. testns="testns"
  692. DEV_NS=erspan00
  693. ret=0
  694. ip link help erspan 2>&1 | grep -q "^Usage:"
  695. if [ $? -ne 0 ];then
  696. echo "SKIP: erspan: iproute2 too old"
  697. return $ksft_skip
  698. fi
  699. ip netns add "$testns"
  700. if [ $? -ne 0 ]; then
  701. echo "SKIP erspan tests: cannot add net namespace $testns"
  702. return $ksft_skip
  703. fi
  704. # test native tunnel erspan v1
  705. ip netns exec "$testns" ip link add dev "$DEV_NS" type erspan seq \
  706. key 102 local 172.16.1.100 remote 172.16.1.200 \
  707. erspan_ver 1 erspan 488
  708. check_err $?
  709. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  710. check_err $?
  711. ip netns exec "$testns" ip link set dev $DEV_NS up
  712. check_err $?
  713. ip netns exec "$testns" ip link del "$DEV_NS"
  714. check_err $?
  715. # test native tunnel erspan v2
  716. ip netns exec "$testns" ip link add dev "$DEV_NS" type erspan seq \
  717. key 102 local 172.16.1.100 remote 172.16.1.200 \
  718. erspan_ver 2 erspan_dir ingress erspan_hwid 7
  719. check_err $?
  720. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  721. check_err $?
  722. ip netns exec "$testns" ip link set dev $DEV_NS up
  723. check_err $?
  724. ip netns exec "$testns" ip link del "$DEV_NS"
  725. check_err $?
  726. # test external mode
  727. ip netns exec "$testns" ip link add dev "$DEV_NS" type erspan external
  728. check_err $?
  729. ip netns exec "$testns" ip link del "$DEV_NS"
  730. check_err $?
  731. if [ $ret -ne 0 ]; then
  732. echo "FAIL: erspan"
  733. ip netns del "$testns"
  734. return 1
  735. fi
  736. echo "PASS: erspan"
  737. ip netns del "$testns"
  738. }
  739. kci_test_ip6erspan()
  740. {
  741. testns="testns"
  742. DEV_NS=ip6erspan00
  743. ret=0
  744. ip link help ip6erspan 2>&1 | grep -q "^Usage:"
  745. if [ $? -ne 0 ];then
  746. echo "SKIP: ip6erspan: iproute2 too old"
  747. return $ksft_skip
  748. fi
  749. ip netns add "$testns"
  750. if [ $? -ne 0 ]; then
  751. echo "SKIP ip6erspan tests: cannot add net namespace $testns"
  752. return $ksft_skip
  753. fi
  754. # test native tunnel ip6erspan v1
  755. ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6erspan seq \
  756. key 102 local fc00:100::1 remote fc00:100::2 \
  757. erspan_ver 1 erspan 488
  758. check_err $?
  759. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  760. check_err $?
  761. ip netns exec "$testns" ip link set dev $DEV_NS up
  762. check_err $?
  763. ip netns exec "$testns" ip link del "$DEV_NS"
  764. check_err $?
  765. # test native tunnel ip6erspan v2
  766. ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6erspan seq \
  767. key 102 local fc00:100::1 remote fc00:100::2 \
  768. erspan_ver 2 erspan_dir ingress erspan_hwid 7
  769. check_err $?
  770. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  771. check_err $?
  772. ip netns exec "$testns" ip link set dev $DEV_NS up
  773. check_err $?
  774. ip netns exec "$testns" ip link del "$DEV_NS"
  775. check_err $?
  776. # test external mode
  777. ip netns exec "$testns" ip link add dev "$DEV_NS" \
  778. type ip6erspan external
  779. check_err $?
  780. ip netns exec "$testns" ip link del "$DEV_NS"
  781. check_err $?
  782. if [ $ret -ne 0 ]; then
  783. echo "FAIL: ip6erspan"
  784. ip netns del "$testns"
  785. return 1
  786. fi
  787. echo "PASS: ip6erspan"
  788. ip netns del "$testns"
  789. }
  790. kci_test_rtnl()
  791. {
  792. kci_add_dummy
  793. if [ $ret -ne 0 ];then
  794. echo "FAIL: cannot add dummy interface"
  795. return 1
  796. fi
  797. kci_test_polrouting
  798. kci_test_route_get
  799. kci_test_addrlft
  800. kci_test_tc
  801. kci_test_gre
  802. kci_test_gretap
  803. kci_test_ip6gretap
  804. kci_test_erspan
  805. kci_test_ip6erspan
  806. kci_test_bridge
  807. kci_test_addrlabel
  808. kci_test_ifalias
  809. kci_test_vrf
  810. kci_test_encap
  811. kci_test_macsec
  812. kci_test_ipsec
  813. kci_test_ipsec_offload
  814. kci_del_dummy
  815. }
  816. #check for needed privileges
  817. if [ "$(id -u)" -ne 0 ];then
  818. echo "SKIP: Need root privileges"
  819. exit $ksft_skip
  820. fi
  821. for x in ip tc;do
  822. $x -Version 2>/dev/null >/dev/null
  823. if [ $? -ne 0 ];then
  824. echo "SKIP: Could not run test without the $x tool"
  825. exit $ksft_skip
  826. fi
  827. done
  828. kci_test_rtnl
  829. exit $ret