rtnetlink.sh 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002
  1. #!/bin/bash
  2. #
  3. # This test is for checking rtnetlink callpaths, and get as much coverage as possible.
  4. #
  5. # set -e
  6. devdummy="test-dummy0"
  7. ret=0
  8. # Kselftest framework requirement - SKIP code is 4.
  9. ksft_skip=4
  10. # set global exit status, but never reset nonzero one.
  11. check_err()
  12. {
  13. if [ $ret -eq 0 ]; then
  14. ret=$1
  15. fi
  16. }
  17. # same but inverted -- used when command must fail for test to pass
  18. check_fail()
  19. {
  20. if [ $1 -eq 0 ]; then
  21. ret=1
  22. fi
  23. }
  24. kci_add_dummy()
  25. {
  26. ip link add name "$devdummy" type dummy
  27. check_err $?
  28. ip link set "$devdummy" up
  29. check_err $?
  30. }
  31. kci_del_dummy()
  32. {
  33. ip link del dev "$devdummy"
  34. check_err $?
  35. }
  36. kci_test_netconf()
  37. {
  38. dev="$1"
  39. r=$ret
  40. ip netconf show dev "$dev" > /dev/null
  41. check_err $?
  42. for f in 4 6; do
  43. ip -$f netconf show dev "$dev" > /dev/null
  44. check_err $?
  45. done
  46. if [ $ret -ne 0 ] ;then
  47. echo "FAIL: ip netconf show $dev"
  48. test $r -eq 0 && ret=0
  49. return 1
  50. fi
  51. }
  52. # add a bridge with vlans on top
  53. kci_test_bridge()
  54. {
  55. devbr="test-br0"
  56. vlandev="testbr-vlan1"
  57. ret=0
  58. ip link add name "$devbr" type bridge
  59. check_err $?
  60. ip link set dev "$devdummy" master "$devbr"
  61. check_err $?
  62. ip link set "$devbr" up
  63. check_err $?
  64. ip link add link "$devbr" name "$vlandev" type vlan id 1
  65. check_err $?
  66. ip addr add dev "$vlandev" 10.200.7.23/30
  67. check_err $?
  68. ip -6 addr add dev "$vlandev" dead:42::1234/64
  69. check_err $?
  70. ip -d link > /dev/null
  71. check_err $?
  72. ip r s t all > /dev/null
  73. check_err $?
  74. for name in "$devbr" "$vlandev" "$devdummy" ; do
  75. kci_test_netconf "$name"
  76. done
  77. ip -6 addr del dev "$vlandev" dead:42::1234/64
  78. check_err $?
  79. ip link del dev "$vlandev"
  80. check_err $?
  81. ip link del dev "$devbr"
  82. check_err $?
  83. if [ $ret -ne 0 ];then
  84. echo "FAIL: bridge setup"
  85. return 1
  86. fi
  87. echo "PASS: bridge setup"
  88. }
  89. kci_test_gre()
  90. {
  91. gredev=neta
  92. rem=10.42.42.1
  93. loc=10.0.0.1
  94. ret=0
  95. ip tunnel add $gredev mode gre remote $rem local $loc ttl 1
  96. check_err $?
  97. ip link set $gredev up
  98. check_err $?
  99. ip addr add 10.23.7.10 dev $gredev
  100. check_err $?
  101. ip route add 10.23.8.0/30 dev $gredev
  102. check_err $?
  103. ip addr add dev "$devdummy" 10.23.7.11/24
  104. check_err $?
  105. ip link > /dev/null
  106. check_err $?
  107. ip addr > /dev/null
  108. check_err $?
  109. kci_test_netconf "$gredev"
  110. ip addr del dev "$devdummy" 10.23.7.11/24
  111. check_err $?
  112. ip link del $gredev
  113. check_err $?
  114. if [ $ret -ne 0 ];then
  115. echo "FAIL: gre tunnel endpoint"
  116. return 1
  117. fi
  118. echo "PASS: gre tunnel endpoint"
  119. }
  120. # tc uses rtnetlink too, for full tc testing
  121. # please see tools/testing/selftests/tc-testing.
  122. kci_test_tc()
  123. {
  124. dev=lo
  125. ret=0
  126. tc qdisc add dev "$dev" root handle 1: htb
  127. check_err $?
  128. tc class add dev "$dev" parent 1: classid 1:10 htb rate 1mbit
  129. check_err $?
  130. tc filter add dev "$dev" parent 1:0 prio 5 handle ffe: protocol ip u32 divisor 256
  131. check_err $?
  132. tc filter add dev "$dev" parent 1:0 prio 5 handle ffd: protocol ip u32 divisor 256
  133. check_err $?
  134. tc filter add dev "$dev" parent 1:0 prio 5 handle ffc: protocol ip u32 divisor 256
  135. check_err $?
  136. tc filter add dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:3 u32 ht ffe:2: match ip src 10.0.0.3 flowid 1:10
  137. check_err $?
  138. tc filter add dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:2 u32 ht ffe:2: match ip src 10.0.0.2 flowid 1:10
  139. check_err $?
  140. tc filter show dev "$dev" parent 1:0 > /dev/null
  141. check_err $?
  142. tc filter del dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:3 u32
  143. check_err $?
  144. tc filter show dev "$dev" parent 1:0 > /dev/null
  145. check_err $?
  146. tc qdisc del dev "$dev" root handle 1: htb
  147. check_err $?
  148. if [ $ret -ne 0 ];then
  149. echo "FAIL: tc htb hierarchy"
  150. return 1
  151. fi
  152. echo "PASS: tc htb hierarchy"
  153. }
  154. kci_test_polrouting()
  155. {
  156. ret=0
  157. ip rule add fwmark 1 lookup 100
  158. check_err $?
  159. ip route add local 0.0.0.0/0 dev lo table 100
  160. check_err $?
  161. ip r s t all > /dev/null
  162. check_err $?
  163. ip rule del fwmark 1 lookup 100
  164. check_err $?
  165. ip route del local 0.0.0.0/0 dev lo table 100
  166. check_err $?
  167. if [ $ret -ne 0 ];then
  168. echo "FAIL: policy route test"
  169. return 1
  170. fi
  171. echo "PASS: policy routing"
  172. }
  173. kci_test_route_get()
  174. {
  175. ret=0
  176. ip route get 127.0.0.1 > /dev/null
  177. check_err $?
  178. ip route get 127.0.0.1 dev "$devdummy" > /dev/null
  179. check_err $?
  180. ip route get ::1 > /dev/null
  181. check_err $?
  182. ip route get fe80::1 dev "$devdummy" > /dev/null
  183. check_err $?
  184. ip route get 127.0.0.1 from 127.0.0.1 oif lo tos 0x1 mark 0x1 > /dev/null
  185. check_err $?
  186. ip route get ::1 from ::1 iif lo oif lo tos 0x1 mark 0x1 > /dev/null
  187. check_err $?
  188. ip addr add dev "$devdummy" 10.23.7.11/24
  189. check_err $?
  190. ip route get 10.23.7.11 from 10.23.7.12 iif "$devdummy" > /dev/null
  191. check_err $?
  192. ip addr del dev "$devdummy" 10.23.7.11/24
  193. check_err $?
  194. if [ $ret -ne 0 ];then
  195. echo "FAIL: route get"
  196. return 1
  197. fi
  198. echo "PASS: route get"
  199. }
  200. kci_test_addrlabel()
  201. {
  202. ret=0
  203. ip addrlabel add prefix dead::/64 dev lo label 1
  204. check_err $?
  205. ip addrlabel list |grep -q "prefix dead::/64 dev lo label 1"
  206. check_err $?
  207. ip addrlabel del prefix dead::/64 dev lo label 1 2> /dev/null
  208. check_err $?
  209. ip addrlabel add prefix dead::/64 label 1 2> /dev/null
  210. check_err $?
  211. ip addrlabel del prefix dead::/64 label 1 2> /dev/null
  212. check_err $?
  213. # concurrent add/delete
  214. for i in $(seq 1 1000); do
  215. ip addrlabel add prefix 1c3::/64 label 12345 2>/dev/null
  216. done &
  217. for i in $(seq 1 1000); do
  218. ip addrlabel del prefix 1c3::/64 label 12345 2>/dev/null
  219. done
  220. wait
  221. ip addrlabel del prefix 1c3::/64 label 12345 2>/dev/null
  222. if [ $ret -ne 0 ];then
  223. echo "FAIL: ipv6 addrlabel"
  224. return 1
  225. fi
  226. echo "PASS: ipv6 addrlabel"
  227. }
  228. kci_test_ifalias()
  229. {
  230. ret=0
  231. namewant=$(uuidgen)
  232. syspathname="/sys/class/net/$devdummy/ifalias"
  233. ip link set dev "$devdummy" alias "$namewant"
  234. check_err $?
  235. if [ $ret -ne 0 ]; then
  236. echo "FAIL: cannot set interface alias of $devdummy to $namewant"
  237. return 1
  238. fi
  239. ip link show "$devdummy" | grep -q "alias $namewant"
  240. check_err $?
  241. if [ -r "$syspathname" ] ; then
  242. read namehave < "$syspathname"
  243. if [ "$namewant" != "$namehave" ]; then
  244. echo "FAIL: did set ifalias $namewant but got $namehave"
  245. return 1
  246. fi
  247. namewant=$(uuidgen)
  248. echo "$namewant" > "$syspathname"
  249. ip link show "$devdummy" | grep -q "alias $namewant"
  250. check_err $?
  251. # sysfs interface allows to delete alias again
  252. echo "" > "$syspathname"
  253. ip link show "$devdummy" | grep -q "alias $namewant"
  254. check_fail $?
  255. for i in $(seq 1 100); do
  256. uuidgen > "$syspathname" &
  257. done
  258. wait
  259. # re-add the alias -- kernel should free mem when dummy dev is removed
  260. ip link set dev "$devdummy" alias "$namewant"
  261. check_err $?
  262. fi
  263. if [ $ret -ne 0 ]; then
  264. echo "FAIL: set interface alias $devdummy to $namewant"
  265. return 1
  266. fi
  267. echo "PASS: set ifalias $namewant for $devdummy"
  268. }
  269. kci_test_vrf()
  270. {
  271. vrfname="test-vrf"
  272. ret=0
  273. ip link show type vrf 2>/dev/null
  274. if [ $? -ne 0 ]; then
  275. echo "SKIP: vrf: iproute2 too old"
  276. return $ksft_skip
  277. fi
  278. ip link add "$vrfname" type vrf table 10
  279. check_err $?
  280. if [ $ret -ne 0 ];then
  281. echo "FAIL: can't add vrf interface, skipping test"
  282. return 0
  283. fi
  284. ip -br link show type vrf | grep -q "$vrfname"
  285. check_err $?
  286. if [ $ret -ne 0 ];then
  287. echo "FAIL: created vrf device not found"
  288. return 1
  289. fi
  290. ip link set dev "$vrfname" up
  291. check_err $?
  292. ip link set dev "$devdummy" master "$vrfname"
  293. check_err $?
  294. ip link del dev "$vrfname"
  295. check_err $?
  296. if [ $ret -ne 0 ];then
  297. echo "FAIL: vrf"
  298. return 1
  299. fi
  300. echo "PASS: vrf"
  301. }
  302. kci_test_encap_vxlan()
  303. {
  304. ret=0
  305. vxlan="test-vxlan0"
  306. vlan="test-vlan0"
  307. testns="$1"
  308. ip netns exec "$testns" ip link add "$vxlan" type vxlan id 42 group 239.1.1.1 \
  309. dev "$devdummy" dstport 4789 2>/dev/null
  310. if [ $? -ne 0 ]; then
  311. echo "FAIL: can't add vxlan interface, skipping test"
  312. return 0
  313. fi
  314. check_err $?
  315. ip netns exec "$testns" ip addr add 10.2.11.49/24 dev "$vxlan"
  316. check_err $?
  317. ip netns exec "$testns" ip link set up dev "$vxlan"
  318. check_err $?
  319. ip netns exec "$testns" ip link add link "$vxlan" name "$vlan" type vlan id 1
  320. check_err $?
  321. ip netns exec "$testns" ip link del "$vxlan"
  322. check_err $?
  323. if [ $ret -ne 0 ]; then
  324. echo "FAIL: vxlan"
  325. return 1
  326. fi
  327. echo "PASS: vxlan"
  328. }
  329. kci_test_encap_fou()
  330. {
  331. ret=0
  332. name="test-fou"
  333. testns="$1"
  334. ip fou help 2>&1 |grep -q 'Usage: ip fou'
  335. if [ $? -ne 0 ];then
  336. echo "SKIP: fou: iproute2 too old"
  337. return $ksft_skip
  338. fi
  339. ip netns exec "$testns" ip fou add port 7777 ipproto 47 2>/dev/null
  340. if [ $? -ne 0 ];then
  341. echo "FAIL: can't add fou port 7777, skipping test"
  342. return 1
  343. fi
  344. ip netns exec "$testns" ip fou add port 8888 ipproto 4
  345. check_err $?
  346. ip netns exec "$testns" ip fou del port 9999 2>/dev/null
  347. check_fail $?
  348. ip netns exec "$testns" ip fou del port 7777
  349. check_err $?
  350. if [ $ret -ne 0 ]; then
  351. echo "FAIL: fou"
  352. return 1
  353. fi
  354. echo "PASS: fou"
  355. }
  356. # test various encap methods, use netns to avoid unwanted interference
  357. kci_test_encap()
  358. {
  359. testns="testns"
  360. ret=0
  361. ip netns add "$testns"
  362. if [ $? -ne 0 ]; then
  363. echo "SKIP encap tests: cannot add net namespace $testns"
  364. return $ksft_skip
  365. fi
  366. ip netns exec "$testns" ip link set lo up
  367. check_err $?
  368. ip netns exec "$testns" ip link add name "$devdummy" type dummy
  369. check_err $?
  370. ip netns exec "$testns" ip link set "$devdummy" up
  371. check_err $?
  372. kci_test_encap_vxlan "$testns"
  373. kci_test_encap_fou "$testns"
  374. ip netns del "$testns"
  375. }
  376. kci_test_macsec()
  377. {
  378. msname="test_macsec0"
  379. ret=0
  380. ip macsec help 2>&1 | grep -q "^Usage: ip macsec"
  381. if [ $? -ne 0 ]; then
  382. echo "SKIP: macsec: iproute2 too old"
  383. return $ksft_skip
  384. fi
  385. ip link add link "$devdummy" "$msname" type macsec port 42 encrypt on
  386. check_err $?
  387. if [ $ret -ne 0 ];then
  388. echo "FAIL: can't add macsec interface, skipping test"
  389. return 1
  390. fi
  391. ip macsec add "$msname" tx sa 0 pn 1024 on key 01 12345678901234567890123456789012
  392. check_err $?
  393. ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef"
  394. check_err $?
  395. ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef" sa 0 pn 1 on key 00 0123456789abcdef0123456789abcdef
  396. check_err $?
  397. ip macsec show > /dev/null
  398. check_err $?
  399. ip link del dev "$msname"
  400. check_err $?
  401. if [ $ret -ne 0 ];then
  402. echo "FAIL: macsec"
  403. return 1
  404. fi
  405. echo "PASS: macsec"
  406. }
  407. #-------------------------------------------------------------------
  408. # Example commands
  409. # ip x s add proto esp src 14.0.0.52 dst 14.0.0.70 \
  410. # spi 0x07 mode transport reqid 0x07 replay-window 32 \
  411. # aead 'rfc4106(gcm(aes))' 1234567890123456dcba 128 \
  412. # sel src 14.0.0.52/24 dst 14.0.0.70/24
  413. # ip x p add dir out src 14.0.0.52/24 dst 14.0.0.70/24 \
  414. # tmpl proto esp src 14.0.0.52 dst 14.0.0.70 \
  415. # spi 0x07 mode transport reqid 0x07
  416. #
  417. # Subcommands not tested
  418. # ip x s update
  419. # ip x s allocspi
  420. # ip x s deleteall
  421. # ip x p update
  422. # ip x p deleteall
  423. # ip x p set
  424. #-------------------------------------------------------------------
  425. kci_test_ipsec()
  426. {
  427. ret=0
  428. algo="aead rfc4106(gcm(aes)) 0x3132333435363738393031323334353664636261 128"
  429. srcip=192.168.123.1
  430. dstip=192.168.123.2
  431. spi=7
  432. ip addr add $srcip dev $devdummy
  433. # flush to be sure there's nothing configured
  434. ip x s flush ; ip x p flush
  435. check_err $?
  436. # start the monitor in the background
  437. tmpfile=`mktemp /var/run/ipsectestXXX`
  438. mpid=`(ip x m > $tmpfile & echo $!) 2>/dev/null`
  439. sleep 0.2
  440. ipsecid="proto esp src $srcip dst $dstip spi 0x07"
  441. ip x s add $ipsecid \
  442. mode transport reqid 0x07 replay-window 32 \
  443. $algo sel src $srcip/24 dst $dstip/24
  444. check_err $?
  445. lines=`ip x s list | grep $srcip | grep $dstip | wc -l`
  446. test $lines -eq 2
  447. check_err $?
  448. ip x s count | grep -q "SAD count 1"
  449. check_err $?
  450. lines=`ip x s get $ipsecid | grep $srcip | grep $dstip | wc -l`
  451. test $lines -eq 2
  452. check_err $?
  453. ip x s delete $ipsecid
  454. check_err $?
  455. lines=`ip x s list | wc -l`
  456. test $lines -eq 0
  457. check_err $?
  458. ipsecsel="dir out src $srcip/24 dst $dstip/24"
  459. ip x p add $ipsecsel \
  460. tmpl proto esp src $srcip dst $dstip \
  461. spi 0x07 mode transport reqid 0x07
  462. check_err $?
  463. lines=`ip x p list | grep $srcip | grep $dstip | wc -l`
  464. test $lines -eq 2
  465. check_err $?
  466. ip x p count | grep -q "SPD IN 0 OUT 1 FWD 0"
  467. check_err $?
  468. lines=`ip x p get $ipsecsel | grep $srcip | grep $dstip | wc -l`
  469. test $lines -eq 2
  470. check_err $?
  471. ip x p delete $ipsecsel
  472. check_err $?
  473. lines=`ip x p list | wc -l`
  474. test $lines -eq 0
  475. check_err $?
  476. # check the monitor results
  477. kill $mpid
  478. lines=`wc -l $tmpfile | cut "-d " -f1`
  479. test $lines -eq 20
  480. check_err $?
  481. rm -rf $tmpfile
  482. # clean up any leftovers
  483. ip x s flush
  484. check_err $?
  485. ip x p flush
  486. check_err $?
  487. ip addr del $srcip/32 dev $devdummy
  488. if [ $ret -ne 0 ]; then
  489. echo "FAIL: ipsec"
  490. return 1
  491. fi
  492. echo "PASS: ipsec"
  493. }
  494. #-------------------------------------------------------------------
  495. # Example commands
  496. # ip x s add proto esp src 14.0.0.52 dst 14.0.0.70 \
  497. # spi 0x07 mode transport reqid 0x07 replay-window 32 \
  498. # aead 'rfc4106(gcm(aes))' 1234567890123456dcba 128 \
  499. # sel src 14.0.0.52/24 dst 14.0.0.70/24
  500. # offload dev sim1 dir out
  501. # ip x p add dir out src 14.0.0.52/24 dst 14.0.0.70/24 \
  502. # tmpl proto esp src 14.0.0.52 dst 14.0.0.70 \
  503. # spi 0x07 mode transport reqid 0x07
  504. #
  505. #-------------------------------------------------------------------
  506. kci_test_ipsec_offload()
  507. {
  508. ret=0
  509. algo="aead rfc4106(gcm(aes)) 0x3132333435363738393031323334353664636261 128"
  510. srcip=192.168.123.3
  511. dstip=192.168.123.4
  512. dev=simx1
  513. sysfsd=/sys/kernel/debug/netdevsim/$dev
  514. sysfsf=$sysfsd/ipsec
  515. # setup netdevsim since dummydev doesn't have offload support
  516. modprobe netdevsim
  517. check_err $?
  518. if [ $ret -ne 0 ]; then
  519. echo "FAIL: ipsec_offload can't load netdevsim"
  520. return 1
  521. fi
  522. ip link add $dev type netdevsim
  523. ip addr add $srcip dev $dev
  524. ip link set $dev up
  525. if [ ! -d $sysfsd ] ; then
  526. echo "FAIL: ipsec_offload can't create device $dev"
  527. return 1
  528. fi
  529. if [ ! -f $sysfsf ] ; then
  530. echo "FAIL: ipsec_offload netdevsim doesn't support IPsec offload"
  531. return 1
  532. fi
  533. # flush to be sure there's nothing configured
  534. ip x s flush ; ip x p flush
  535. # create offloaded SAs, both in and out
  536. ip x p add dir out src $srcip/24 dst $dstip/24 \
  537. tmpl proto esp src $srcip dst $dstip spi 9 \
  538. mode transport reqid 42
  539. check_err $?
  540. ip x p add dir out src $dstip/24 dst $srcip/24 \
  541. tmpl proto esp src $dstip dst $srcip spi 9 \
  542. mode transport reqid 42
  543. check_err $?
  544. ip x s add proto esp src $srcip dst $dstip spi 9 \
  545. mode transport reqid 42 $algo sel src $srcip/24 dst $dstip/24 \
  546. offload dev $dev dir out
  547. check_err $?
  548. ip x s add proto esp src $dstip dst $srcip spi 9 \
  549. mode transport reqid 42 $algo sel src $dstip/24 dst $srcip/24 \
  550. offload dev $dev dir in
  551. check_err $?
  552. if [ $ret -ne 0 ]; then
  553. echo "FAIL: ipsec_offload can't create SA"
  554. return 1
  555. fi
  556. # does offload show up in ip output
  557. lines=`ip x s list | grep -c "crypto offload parameters: dev $dev dir"`
  558. if [ $lines -ne 2 ] ; then
  559. echo "FAIL: ipsec_offload SA offload missing from list output"
  560. check_err 1
  561. fi
  562. # use ping to exercise the Tx path
  563. ping -I $dev -c 3 -W 1 -i 0 $dstip >/dev/null
  564. # does driver have correct offload info
  565. diff $sysfsf - << EOF
  566. SA count=2 tx=3
  567. sa[0] tx ipaddr=0x00000000 00000000 00000000 00000000
  568. sa[0] spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1
  569. sa[0] key=0x34333231 38373635 32313039 36353433
  570. sa[1] rx ipaddr=0x00000000 00000000 00000000 037ba8c0
  571. sa[1] spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1
  572. sa[1] key=0x34333231 38373635 32313039 36353433
  573. EOF
  574. if [ $? -ne 0 ] ; then
  575. echo "FAIL: ipsec_offload incorrect driver data"
  576. check_err 1
  577. fi
  578. # does offload get removed from driver
  579. ip x s flush
  580. ip x p flush
  581. lines=`grep -c "SA count=0" $sysfsf`
  582. if [ $lines -ne 1 ] ; then
  583. echo "FAIL: ipsec_offload SA not removed from driver"
  584. check_err 1
  585. fi
  586. # clean up any leftovers
  587. ip link del $dev
  588. rmmod netdevsim
  589. if [ $ret -ne 0 ]; then
  590. echo "FAIL: ipsec_offload"
  591. return 1
  592. fi
  593. echo "PASS: ipsec_offload"
  594. }
  595. kci_test_gretap()
  596. {
  597. testns="testns"
  598. DEV_NS=gretap00
  599. ret=0
  600. ip netns add "$testns"
  601. if [ $? -ne 0 ]; then
  602. echo "SKIP gretap tests: cannot add net namespace $testns"
  603. return $ksft_skip
  604. fi
  605. ip link help gretap 2>&1 | grep -q "^Usage:"
  606. if [ $? -ne 0 ];then
  607. echo "SKIP: gretap: iproute2 too old"
  608. ip netns del "$testns"
  609. return $ksft_skip
  610. fi
  611. # test native tunnel
  612. ip netns exec "$testns" ip link add dev "$DEV_NS" type gretap seq \
  613. key 102 local 172.16.1.100 remote 172.16.1.200
  614. check_err $?
  615. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  616. check_err $?
  617. ip netns exec "$testns" ip link set dev $DEV_NS up
  618. check_err $?
  619. ip netns exec "$testns" ip link del "$DEV_NS"
  620. check_err $?
  621. # test external mode
  622. ip netns exec "$testns" ip link add dev "$DEV_NS" type gretap external
  623. check_err $?
  624. ip netns exec "$testns" ip link del "$DEV_NS"
  625. check_err $?
  626. if [ $ret -ne 0 ]; then
  627. echo "FAIL: gretap"
  628. ip netns del "$testns"
  629. return 1
  630. fi
  631. echo "PASS: gretap"
  632. ip netns del "$testns"
  633. }
  634. kci_test_ip6gretap()
  635. {
  636. testns="testns"
  637. DEV_NS=ip6gretap00
  638. ret=0
  639. ip netns add "$testns"
  640. if [ $? -ne 0 ]; then
  641. echo "SKIP ip6gretap tests: cannot add net namespace $testns"
  642. return $ksft_skip
  643. fi
  644. ip link help ip6gretap 2>&1 | grep -q "^Usage:"
  645. if [ $? -ne 0 ];then
  646. echo "SKIP: ip6gretap: iproute2 too old"
  647. ip netns del "$testns"
  648. return $ksft_skip
  649. fi
  650. # test native tunnel
  651. ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6gretap seq \
  652. key 102 local fc00:100::1 remote fc00:100::2
  653. check_err $?
  654. ip netns exec "$testns" ip addr add dev "$DEV_NS" fc00:200::1/96
  655. check_err $?
  656. ip netns exec "$testns" ip link set dev $DEV_NS up
  657. check_err $?
  658. ip netns exec "$testns" ip link del "$DEV_NS"
  659. check_err $?
  660. # test external mode
  661. ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6gretap external
  662. check_err $?
  663. ip netns exec "$testns" ip link del "$DEV_NS"
  664. check_err $?
  665. if [ $ret -ne 0 ]; then
  666. echo "FAIL: ip6gretap"
  667. ip netns del "$testns"
  668. return 1
  669. fi
  670. echo "PASS: ip6gretap"
  671. ip netns del "$testns"
  672. }
  673. kci_test_erspan()
  674. {
  675. testns="testns"
  676. DEV_NS=erspan00
  677. ret=0
  678. ip link help erspan 2>&1 | grep -q "^Usage:"
  679. if [ $? -ne 0 ];then
  680. echo "SKIP: erspan: iproute2 too old"
  681. return $ksft_skip
  682. fi
  683. ip netns add "$testns"
  684. if [ $? -ne 0 ]; then
  685. echo "SKIP erspan tests: cannot add net namespace $testns"
  686. return $ksft_skip
  687. fi
  688. # test native tunnel erspan v1
  689. ip netns exec "$testns" ip link add dev "$DEV_NS" type erspan seq \
  690. key 102 local 172.16.1.100 remote 172.16.1.200 \
  691. erspan_ver 1 erspan 488
  692. check_err $?
  693. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  694. check_err $?
  695. ip netns exec "$testns" ip link set dev $DEV_NS up
  696. check_err $?
  697. ip netns exec "$testns" ip link del "$DEV_NS"
  698. check_err $?
  699. # test native tunnel erspan v2
  700. ip netns exec "$testns" ip link add dev "$DEV_NS" type erspan seq \
  701. key 102 local 172.16.1.100 remote 172.16.1.200 \
  702. erspan_ver 2 erspan_dir ingress erspan_hwid 7
  703. check_err $?
  704. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  705. check_err $?
  706. ip netns exec "$testns" ip link set dev $DEV_NS up
  707. check_err $?
  708. ip netns exec "$testns" ip link del "$DEV_NS"
  709. check_err $?
  710. # test external mode
  711. ip netns exec "$testns" ip link add dev "$DEV_NS" type erspan external
  712. check_err $?
  713. ip netns exec "$testns" ip link del "$DEV_NS"
  714. check_err $?
  715. if [ $ret -ne 0 ]; then
  716. echo "FAIL: erspan"
  717. ip netns del "$testns"
  718. return 1
  719. fi
  720. echo "PASS: erspan"
  721. ip netns del "$testns"
  722. }
  723. kci_test_ip6erspan()
  724. {
  725. testns="testns"
  726. DEV_NS=ip6erspan00
  727. ret=0
  728. ip link help ip6erspan 2>&1 | grep -q "^Usage:"
  729. if [ $? -ne 0 ];then
  730. echo "SKIP: ip6erspan: iproute2 too old"
  731. return $ksft_skip
  732. fi
  733. ip netns add "$testns"
  734. if [ $? -ne 0 ]; then
  735. echo "SKIP ip6erspan tests: cannot add net namespace $testns"
  736. return $ksft_skip
  737. fi
  738. # test native tunnel ip6erspan v1
  739. ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6erspan seq \
  740. key 102 local fc00:100::1 remote fc00:100::2 \
  741. erspan_ver 1 erspan 488
  742. check_err $?
  743. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  744. check_err $?
  745. ip netns exec "$testns" ip link set dev $DEV_NS up
  746. check_err $?
  747. ip netns exec "$testns" ip link del "$DEV_NS"
  748. check_err $?
  749. # test native tunnel ip6erspan v2
  750. ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6erspan seq \
  751. key 102 local fc00:100::1 remote fc00:100::2 \
  752. erspan_ver 2 erspan_dir ingress erspan_hwid 7
  753. check_err $?
  754. ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
  755. check_err $?
  756. ip netns exec "$testns" ip link set dev $DEV_NS up
  757. check_err $?
  758. ip netns exec "$testns" ip link del "$DEV_NS"
  759. check_err $?
  760. # test external mode
  761. ip netns exec "$testns" ip link add dev "$DEV_NS" \
  762. type ip6erspan external
  763. check_err $?
  764. ip netns exec "$testns" ip link del "$DEV_NS"
  765. check_err $?
  766. if [ $ret -ne 0 ]; then
  767. echo "FAIL: ip6erspan"
  768. ip netns del "$testns"
  769. return 1
  770. fi
  771. echo "PASS: ip6erspan"
  772. ip netns del "$testns"
  773. }
  774. kci_test_rtnl()
  775. {
  776. kci_add_dummy
  777. if [ $ret -ne 0 ];then
  778. echo "FAIL: cannot add dummy interface"
  779. return 1
  780. fi
  781. kci_test_polrouting
  782. kci_test_route_get
  783. kci_test_tc
  784. kci_test_gre
  785. kci_test_gretap
  786. kci_test_ip6gretap
  787. kci_test_erspan
  788. kci_test_ip6erspan
  789. kci_test_bridge
  790. kci_test_addrlabel
  791. kci_test_ifalias
  792. kci_test_vrf
  793. kci_test_encap
  794. kci_test_macsec
  795. kci_test_ipsec
  796. kci_test_ipsec_offload
  797. kci_del_dummy
  798. }
  799. #check for needed privileges
  800. if [ "$(id -u)" -ne 0 ];then
  801. echo "SKIP: Need root privileges"
  802. exit $ksft_skip
  803. fi
  804. for x in ip tc;do
  805. $x -Version 2>/dev/null >/dev/null
  806. if [ $? -ne 0 ];then
  807. echo "SKIP: Could not run test without the $x tool"
  808. exit $ksft_skip
  809. fi
  810. done
  811. kci_test_rtnl
  812. exit $ret