Server IP : 13.213.54.232 / Your IP : 216.73.216.72 Web Server : Apache/2.4.52 (Ubuntu) System : Linux ip-172-31-17-110 6.8.0-1029-aws #31~22.04.1-Ubuntu SMP Thu Apr 24 21:16:18 UTC 2025 x86_64 User : www-data ( 33) PHP Version : 7.1.33-67+ubuntu22.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /lib/modules/6.8.0-1031-aws/build/tools/testing/selftests/drivers/net/mlxsw/ |
Upload File : |
#!/bin/bash # SPDX-License-Identifier: GPL-2.0 # # Test a "one-armed router" [1] scenario. Packets forwarded between H1 and H2 # should be forwarded by the ASIC, but also trapped so that ICMP redirect # packets could be potentially generated. # # 1. https://en.wikipedia.org/wiki/One-armed_router # # +---------------------------------+ # | H1 (vrf) | # | + $h1 | # | | 192.0.2.1/24 | # | | 2001:db8:1::1/64 | # | | | # | | default via 192.0.2.2 | # | | default via 2001:db8:1::2 | # +----|----------------------------+ # | # +----|----------------------------------------------------------------------+ # | SW | | # | +--|--------------------------------------------------------------------+ | # | | + $swp1 BR0 (802.1d) | | # | | | | # | | 192.0.2.2/24 | | # | | 2001:db8:1::2/64 | | # | | 198.51.100.2/24 | | # | | 2001:db8:2::2/64 | | # | | | | # | | + $swp2 | | # | +--|--------------------------------------------------------------------+ | # | | | # +----|----------------------------------------------------------------------+ # | # +----|----------------------------+ # | | default via 198.51.100.2 | # | | default via 2001:db8:2::2 | # | | | # | | 2001:db8:2::1/64 | # | | 198.51.100.1/24 | # | + $h2 | # | H2 (vrf) | # +---------------------------------+ lib_dir=$(dirname $0)/../../../net/forwarding ALL_TESTS="ping_ipv4 ping_ipv6 fwd_mark_ipv4 fwd_mark_ipv6" NUM_NETIFS=4 source $lib_dir/tc_common.sh source $lib_dir/lib.sh h1_create() { simple_if_init $h1 192.0.2.1/24 2001:db8:1::1/64 ip -4 route add default vrf v$h1 nexthop via 192.0.2.2 ip -6 route add default vrf v$h1 nexthop via 2001:db8:1::2 } h1_destroy() { ip -6 route del default vrf v$h1 nexthop via 2001:db8:1::2 ip -4 route del default vrf v$h1 nexthop via 192.0.2.2 simple_if_fini $h1 192.0.2.1/24 2001:db8:1::1/64 } h2_create() { simple_if_init $h2 198.51.100.1/24 2001:db8:2::1/64 ip -4 route add default vrf v$h2 nexthop via 198.51.100.2 ip -6 route add default vrf v$h2 nexthop via 2001:db8:2::2 } h2_destroy() { ip -6 route del default vrf v$h2 nexthop via 2001:db8:2::2 ip -4 route del default vrf v$h2 nexthop via 198.51.100.2 simple_if_fini $h2 198.51.100.1/24 2001:db8:2::1/64 } switch_create() { ip link add name br0 address $(mac_get $swp1) \ type bridge mcast_snooping 0 ip link set dev br0 up ip link set dev $swp1 master br0 ip link set dev $swp1 up ip link set dev $swp2 master br0 ip link set dev $swp2 up tc qdisc add dev $swp1 clsact tc qdisc add dev $swp2 clsact __addr_add_del br0 add 192.0.2.2/24 2001:db8:1::2/64 __addr_add_del br0 add 198.51.100.2/24 2001:db8:2::2/64 } switch_destroy() { __addr_add_del br0 del 198.51.100.2/24 2001:db8:2::2/64 __addr_add_del br0 del 192.0.2.2/24 2001:db8:1::2/64 tc qdisc del dev $swp2 clsact tc qdisc del dev $swp1 clsact ip link set dev $swp2 down ip link set dev $swp2 nomaster ip link set dev $swp1 down ip link set dev $swp1 nomaster ip link set dev br0 down ip link del dev br0 } ping_ipv4() { ping_test $h1 198.51.100.1 ": h1->h2" } ping_ipv6() { ping6_test $h1 2001:db8:2::1 ": h1->h2" } fwd_mark_ipv4() { # Transmit packets from H1 to H2 and make sure they are trapped at # swp1 due to loopback error, but only forwarded by the ASIC through # swp2 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 flower \ skip_hw dst_ip 198.51.100.1 ip_proto udp dst_port 52768 \ action pass tc filter add dev $swp2 egress protocol ip pref 1 handle 101 flower \ skip_hw dst_ip 198.51.100.1 ip_proto udp dst_port 52768 \ action pass tc filter add dev $swp2 egress protocol ip pref 2 handle 102 flower \ skip_sw dst_ip 198.51.100.1 ip_proto udp dst_port 52768 \ action pass ip vrf exec v$h1 $MZ $h1 -c 10 -d 100msec -p 64 -A 192.0.2.1 \ -B 198.51.100.1 -t udp dp=52768,sp=42768 -q RET=0 tc_check_packets "dev $swp1 ingress" 101 10 check_err $? log_test "fwd mark: trapping IPv4 packets due to LBERROR" RET=0 tc_check_packets "dev $swp2 egress" 101 0 check_err $? log_test "fwd mark: forwarding IPv4 packets in software" RET=0 tc_check_packets "dev $swp2 egress" 102 10 check_err $? log_test "fwd mark: forwarding IPv4 packets in hardware" tc filter del dev $swp2 egress protocol ip pref 2 handle 102 flower tc filter del dev $swp2 egress protocol ip pref 1 handle 101 flower tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower } fwd_mark_ipv6() { tc filter add dev $swp1 ingress protocol ipv6 pref 1 handle 101 flower \ skip_hw dst_ip 2001:db8:2::1 ip_proto udp dst_port 52768 \ action pass tc filter add dev $swp2 egress protocol ipv6 pref 1 handle 101 flower \ skip_hw dst_ip 2001:db8:2::1 ip_proto udp dst_port 52768 \ action pass tc filter add dev $swp2 egress protocol ipv6 pref 2 handle 102 flower \ skip_sw dst_ip 2001:db8:2::1 ip_proto udp dst_port 52768 \ action pass ip vrf exec v$h1 $MZ $h1 -6 -c 10 -d 100msec -p 64 -A 2001:db8:1::1 \ -B 2001:db8:2::1 -t udp dp=52768,sp=42768 -q RET=0 tc_check_packets "dev $swp1 ingress" 101 10 check_err $? log_test "fwd mark: trapping IPv6 packets due to LBERROR" RET=0 tc_check_packets "dev $swp2 egress" 101 0 check_err $? log_test "fwd mark: forwarding IPv6 packets in software" RET=0 tc_check_packets "dev $swp2 egress" 102 10 check_err $? log_test "fwd mark: forwarding IPv6 packets in hardware" tc filter del dev $swp2 egress protocol ipv6 pref 2 handle 102 flower tc filter del dev $swp2 egress protocol ipv6 pref 1 handle 101 flower tc filter del dev $swp1 ingress protocol ipv6 pref 1 handle 101 flower } setup_prepare() { h1=${NETIFS[p1]} swp1=${NETIFS[p2]} swp2=${NETIFS[p3]} h2=${NETIFS[p4]} vrf_prepare forwarding_enable sysctl_set net.ipv4.conf.all.accept_redirects 0 sysctl_set net.ipv6.conf.all.accept_redirects 0 h1_create h2_create switch_create } cleanup() { pre_cleanup switch_destroy h2_destroy h1_destroy sysctl_restore net.ipv6.conf.all.accept_redirects sysctl_restore net.ipv4.conf.all.accept_redirects forwarding_restore vrf_cleanup } trap cleanup EXIT setup_prepare setup_wait tests_run exit $EXIT_STATUS