3 # This test is for checking rtnetlink callpaths, and get as much coverage as possible.
9 # Kselftest framework requirement - SKIP code is 4.
12 # set global exit status, but never reset nonzero one.
15 if [ $ret -eq 0 ]; then
20 # same but inverted -- used when command must fail for test to pass
30 ip link add name
"$devdummy" type dummy
32 ip link
set "$devdummy" up
38 ip link del dev
"$devdummy"
47 ip netconf show dev
"$dev" > /dev
/null
51 ip
-$f netconf show dev
"$dev" > /dev
/null
55 if [ $ret -ne 0 ] ;then
56 echo "FAIL: ip netconf show $dev"
57 test $r -eq 0 && ret
=0
62 # add a bridge with vlans on top
66 vlandev
="testbr-vlan1"
69 ip link add name
"$devbr" type bridge
72 ip link
set dev
"$devdummy" master
"$devbr"
75 ip link
set "$devbr" up
78 ip link add link
"$devbr" name
"$vlandev" type vlan id
1
80 ip addr add dev
"$vlandev" 10.200.7.23/30
82 ip
-6 addr add dev
"$vlandev" dead
:42::1234/64
84 ip
-d link
> /dev
/null
86 ip r s t all
> /dev
/null
89 for name
in "$devbr" "$vlandev" "$devdummy" ; do
90 kci_test_netconf
"$name"
93 ip
-6 addr del dev
"$vlandev" dead
:42::1234/64
96 ip link del dev
"$vlandev"
98 ip link del dev
"$devbr"
101 if [ $ret -ne 0 ];then
102 echo "FAIL: bridge setup"
105 echo "PASS: bridge setup"
116 ip tunnel add
$gredev mode gre remote
$rem local $loc ttl
1
118 ip link
set $gredev up
120 ip addr add
10.23.7.10 dev
$gredev
122 ip route add
10.23.8.0/30 dev
$gredev
124 ip addr add dev
"$devdummy" 10.23.7.11/24
131 kci_test_netconf
"$gredev"
133 ip addr del dev
"$devdummy" 10.23.7.11/24
139 if [ $ret -ne 0 ];then
140 echo "FAIL: gre tunnel endpoint"
143 echo "PASS: gre tunnel endpoint"
146 # tc uses rtnetlink too, for full tc testing
147 # please see tools/testing/selftests/tc-testing.
153 tc qdisc add dev
"$dev" root handle
1: htb
155 tc class add dev
"$dev" parent
1: classid
1:10 htb rate
1mbit
157 tc filter add dev
"$dev" parent
1:0 prio
5 handle ffe
: protocol ip u32 divisor
256
159 tc filter add dev
"$dev" parent
1:0 prio
5 handle ffd
: protocol ip u32 divisor
256
161 tc filter add dev
"$dev" parent
1:0 prio
5 handle ffc
: protocol ip u32 divisor
256
163 tc filter add dev
"$dev" protocol ip parent
1: prio
5 handle ffe
:2:3 u32 ht ffe
:2: match ip src
10.0.0.3 flowid
1:10
165 tc filter add dev
"$dev" protocol ip parent
1: prio
5 handle ffe
:2:2 u32 ht ffe
:2: match ip src
10.0.0.2 flowid
1:10
167 tc filter show dev
"$dev" parent
1:0 > /dev
/null
169 tc filter del dev
"$dev" protocol ip parent
1: prio
5 handle ffe
:2:3 u32
171 tc filter show dev
"$dev" parent
1:0 > /dev
/null
173 tc qdisc del dev
"$dev" root handle
1: htb
176 if [ $ret -ne 0 ];then
177 echo "FAIL: tc htb hierarchy"
180 echo "PASS: tc htb hierarchy"
184 kci_test_polrouting
()
187 ip rule add fwmark
1 lookup
100
189 ip route add
local 0.0.0.0/0 dev lo table
100
191 ip r s t all
> /dev
/null
193 ip rule del fwmark
1 lookup
100
195 ip route del
local 0.0.0.0/0 dev lo table
100
198 if [ $ret -ne 0 ];then
199 echo "FAIL: policy route test"
202 echo "PASS: policy routing"
207 local hash_policy
=$
(sysctl
-n net.ipv4.fib_multipath_hash_policy
)
211 ip route get
127.0.0.1 > /dev
/null
213 ip route get
127.0.0.1 dev
"$devdummy" > /dev
/null
215 ip route get
::1 > /dev
/null
217 ip route get fe80
::1 dev
"$devdummy" > /dev
/null
219 ip route get
127.0.0.1 from
127.0.0.1 oif lo tos
0x1 mark
0x1 > /dev
/null
221 ip route get
::1 from
::1 iif lo oif lo tos
0x1 mark
0x1 > /dev
/null
223 ip addr add dev
"$devdummy" 10.23.7.11/24
225 ip route get
10.23.7.11 from
10.23.7.12 iif
"$devdummy" > /dev
/null
227 ip route add
10.23.8.0/24 \
228 nexthop via
10.23.7.13 dev
"$devdummy" \
229 nexthop via
10.23.7.14 dev
"$devdummy"
231 sysctl
-wq net.ipv4.fib_multipath_hash_policy
=0
232 ip route get
10.23.8.11 > /dev
/null
234 sysctl
-wq net.ipv4.fib_multipath_hash_policy
=1
235 ip route get
10.23.8.11 > /dev
/null
237 sysctl
-wq net.ipv4.fib_multipath_hash_policy
="$hash_policy"
238 ip route del
10.23.8.0/24
240 ip addr del dev
"$devdummy" 10.23.7.11/24
243 if [ $ret -ne 0 ];then
244 echo "FAIL: route get"
248 echo "PASS: route get"
253 for i
in $
(seq 10 100) ;do
254 lft
=$
(((RANDOM
%3) + 1))
255 ip addr add
10.23.11.
$i/32 dev
"$devdummy" preferred_lft
$lft valid_lft $
((lft
+1))
261 ip addr show dev
"$devdummy" |
grep "10.23.11."
262 if [ $?
-eq 0 ]; then
263 echo "FAIL: preferred_lft addresses remaining"
268 echo "PASS: preferred_lft addresses have expired"
271 kci_test_promote_secondaries
()
273 promote
=$
(sysctl
-n net.ipv4.conf.
$devdummy.promote_secondaries
)
275 sysctl
-q net.ipv4.conf.
$devdummy.promote_secondaries
=1
277 for i
in $
(seq 2 254);do
279 ip
-f inet addr add
$IP/16 brd
+ dev
"$devdummy"
280 ifconfig
"$devdummy" $IP netmask
255.255.0.0
283 ip addr flush dev
"$devdummy"
285 [ $promote -eq 0 ] && sysctl
-q net.ipv4.conf.
$devdummy.promote_secondaries
=0
287 echo "PASS: promote_secondaries complete"
294 ip addrlabel add prefix dead
::/64 dev lo label
1
297 ip addrlabel list |
grep -q "prefix dead::/64 dev lo label 1"
300 ip addrlabel del prefix dead
::/64 dev lo label
1 2> /dev
/null
303 ip addrlabel add prefix dead
::/64 label
1 2> /dev
/null
306 ip addrlabel del prefix dead
::/64 label
1 2> /dev
/null
309 # concurrent add/delete
310 for i
in $
(seq 1 1000); do
311 ip addrlabel add prefix
1c3
::/64 label
12345 2>/dev
/null
314 for i
in $
(seq 1 1000); do
315 ip addrlabel del prefix
1c3
::/64 label
12345 2>/dev
/null
320 ip addrlabel del prefix
1c3
::/64 label
12345 2>/dev
/null
322 if [ $ret -ne 0 ];then
323 echo "FAIL: ipv6 addrlabel"
327 echo "PASS: ipv6 addrlabel"
334 syspathname
="/sys/class/net/$devdummy/ifalias"
336 ip link
set dev
"$devdummy" alias "$namewant"
339 if [ $ret -ne 0 ]; then
340 echo "FAIL: cannot set interface alias of $devdummy to $namewant"
344 ip link show
"$devdummy" |
grep -q "alias $namewant"
347 if [ -r "$syspathname" ] ; then
348 read namehave
< "$syspathname"
349 if [ "$namewant" != "$namehave" ]; then
350 echo "FAIL: did set ifalias $namewant but got $namehave"
355 echo "$namewant" > "$syspathname"
356 ip link show
"$devdummy" |
grep -q "alias $namewant"
359 # sysfs interface allows to delete alias again
360 echo "" > "$syspathname"
362 ip link show
"$devdummy" |
grep -q "alias $namewant"
365 for i
in $
(seq 1 100); do
366 uuidgen
> "$syspathname" &
371 # re-add the alias -- kernel should free mem when dummy dev is removed
372 ip link
set dev
"$devdummy" alias "$namewant"
376 if [ $ret -ne 0 ]; then
377 echo "FAIL: set interface alias $devdummy to $namewant"
381 echo "PASS: set ifalias $namewant for $devdummy"
389 ip link show
type vrf
2>/dev
/null
390 if [ $?
-ne 0 ]; then
391 echo "SKIP: vrf: iproute2 too old"
395 ip link add
"$vrfname" type vrf table
10
397 if [ $ret -ne 0 ];then
398 echo "FAIL: can't add vrf interface, skipping test"
402 ip
-br link show
type vrf |
grep -q "$vrfname"
404 if [ $ret -ne 0 ];then
405 echo "FAIL: created vrf device not found"
409 ip link
set dev
"$vrfname" up
412 ip link
set dev
"$devdummy" master
"$vrfname"
414 ip link del dev
"$vrfname"
417 if [ $ret -ne 0 ];then
425 kci_test_encap_vxlan
()
432 ip
-netns "$testns" link add
"$vxlan" type vxlan id
42 group
239.1.1.1 \
433 dev
"$devdummy" dstport
4789 2>/dev
/null
434 if [ $?
-ne 0 ]; then
435 echo "FAIL: can't add vxlan interface, skipping test"
440 ip
-netns "$testns" addr add
10.2.11.49/24 dev
"$vxlan"
443 ip
-netns "$testns" link
set up dev
"$vxlan"
446 ip
-netns "$testns" link add link
"$vxlan" name
"$vlan" type vlan id
1
449 # changelink testcases
450 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan vni
43 2>/dev
/null
453 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan group ffe5
::5 dev
"$devdummy" 2>/dev
/null
456 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan ttl inherit
2>/dev
/null
459 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan ttl
64
462 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan nolearning
465 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan proxy
2>/dev
/null
468 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan norsc
2>/dev
/null
471 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan l2miss
2>/dev
/null
474 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan l3miss
2>/dev
/null
477 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan external
2>/dev
/null
480 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan udpcsum
2>/dev
/null
483 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan udp6zerocsumtx
2>/dev
/null
486 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan udp6zerocsumrx
2>/dev
/null
489 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan remcsumtx
2>/dev
/null
492 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan remcsumrx
2>/dev
/null
495 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan gbp
2>/dev
/null
498 ip
-netns "$testns" link
set dev
"$vxlan" type vxlan gpe
2>/dev
/null
501 ip
-netns "$testns" link del
"$vxlan"
504 if [ $ret -ne 0 ]; then
517 ip fou
help 2>&1 |
grep -q 'Usage: ip fou'
519 echo "SKIP: fou: iproute2 too old"
523 ip
-netns "$testns" fou add port
7777 ipproto
47 2>/dev
/null
525 echo "FAIL: can't add fou port 7777, skipping test"
529 ip
-netns "$testns" fou add port
8888 ipproto
4
532 ip
-netns "$testns" fou del port
9999 2>/dev
/null
535 ip
-netns "$testns" fou del port
7777
538 if [ $ret -ne 0 ]; then
546 # test various encap methods, use netns to avoid unwanted interference
552 ip netns add
"$testns"
553 if [ $?
-ne 0 ]; then
554 echo "SKIP encap tests: cannot add net namespace $testns"
558 ip
-netns "$testns" link
set lo up
561 ip
-netns "$testns" link add name
"$devdummy" type dummy
563 ip
-netns "$testns" link
set "$devdummy" up
566 kci_test_encap_vxlan
"$testns"
568 kci_test_encap_fou
"$testns"
571 ip netns del
"$testns"
577 msname
="test_macsec0"
580 ip macsec
help 2>&1 |
grep -q "^Usage: ip macsec"
581 if [ $?
-ne 0 ]; then
582 echo "SKIP: macsec: iproute2 too old"
586 ip link add link
"$devdummy" "$msname" type macsec port
42 encrypt on
588 if [ $ret -ne 0 ];then
589 echo "FAIL: can't add macsec interface, skipping test"
593 ip macsec add
"$msname" tx sa
0 pn
1024 on key
01 12345678901234567890123456789012
596 ip macsec add
"$msname" rx port
1234 address
"1c:ed:de:ad:be:ef"
599 ip macsec add
"$msname" rx port
1234 address
"1c:ed:de:ad:be:ef" sa
0 pn
1 on key
00 0123456789abcdef0123456789abcdef
602 ip macsec show
> /dev
/null
605 ip link del dev
"$msname"
608 if [ $ret -ne 0 ];then
616 #-------------------------------------------------------------------
618 # ip x s add proto esp src 14.0.0.52 dst 14.0.0.70 \
619 # spi 0x07 mode transport reqid 0x07 replay-window 32 \
620 # aead 'rfc4106(gcm(aes))' 1234567890123456dcba 128 \
621 # sel src 14.0.0.52/24 dst 14.0.0.70/24
622 # ip x p add dir out src 14.0.0.52/24 dst 14.0.0.70/24 \
623 # tmpl proto esp src 14.0.0.52 dst 14.0.0.70 \
624 # spi 0x07 mode transport reqid 0x07
626 # Subcommands not tested
633 #-------------------------------------------------------------------
637 algo
="aead rfc4106(gcm(aes)) 0x3132333435363738393031323334353664636261 128"
642 ip addr add
$srcip dev
$devdummy
644 # flush to be sure there's nothing configured
645 ip x s flush
; ip x p flush
648 # start the monitor in the background
649 tmpfile
=`mktemp /var/run/ipsectestXXX`
650 mpid
=`(ip x m > $tmpfile & echo $!) 2>/dev/null`
653 ipsecid
="proto esp src $srcip dst $dstip spi 0x07"
654 ip x s add
$ipsecid \
655 mode transport reqid
0x07 replay-window
32 \
656 $algo sel src
$srcip/24 dst
$dstip/24
659 lines
=`ip x s list | grep $srcip | grep $dstip | wc -l`
663 ip x s count |
grep -q "SAD count 1"
666 lines
=`ip x s get $ipsecid | grep $srcip | grep $dstip | wc -l`
670 ip x s delete
$ipsecid
673 lines
=`ip x s list | wc -l`
677 ipsecsel
="dir out src $srcip/24 dst $dstip/24"
678 ip x p add
$ipsecsel \
679 tmpl proto esp src
$srcip dst
$dstip \
680 spi
0x07 mode transport reqid
0x07
683 lines
=`ip x p list | grep $srcip | grep $dstip | wc -l`
687 ip x p count |
grep -q "SPD IN 0 OUT 1 FWD 0"
690 lines
=`ip x p get $ipsecsel | grep $srcip | grep $dstip | wc -l`
694 ip x p delete
$ipsecsel
697 lines
=`ip x p list | wc -l`
701 # check the monitor results
703 lines
=`wc -l $tmpfile | cut "-d " -f1`
708 # clean up any leftovers
713 ip addr del
$srcip/32 dev
$devdummy
715 if [ $ret -ne 0 ]; then
722 #-------------------------------------------------------------------
724 # ip x s add proto esp src 14.0.0.52 dst 14.0.0.70 \
725 # spi 0x07 mode transport reqid 0x07 replay-window 32 \
726 # aead 'rfc4106(gcm(aes))' 1234567890123456dcba 128 \
727 # sel src 14.0.0.52/24 dst 14.0.0.70/24
728 # offload dev sim1 dir out
729 # ip x p add dir out src 14.0.0.52/24 dst 14.0.0.70/24 \
730 # tmpl proto esp src 14.0.0.52 dst 14.0.0.70 \
731 # spi 0x07 mode transport reqid 0x07
733 #-------------------------------------------------------------------
734 kci_test_ipsec_offload
()
737 algo
="aead rfc4106(gcm(aes)) 0x3132333435363738393031323334353664636261 128"
740 sysfsd
=/sys
/kernel
/debug
/netdevsim
/netdevsim
0/ports
/0/
742 sysfsnet
=/sys
/bus
/netdevsim
/devices
/netdevsim
0/net
/
745 # setup netdevsim since dummydev doesn't have offload support
746 if [ ! -w /sys
/bus
/netdevsim
/new_device
] ; then
747 modprobe
-q netdevsim
749 if [ $ret -ne 0 ]; then
750 echo "SKIP: ipsec_offload can't load netdevsim"
756 echo "0" > /sys
/bus
/netdevsim
/new_device
757 while [ ! -d $sysfsnet ] ; do :; done
761 ip addr add
$srcip dev
$dev
763 if [ ! -d $sysfsd ] ; then
764 echo "FAIL: ipsec_offload can't create device $dev"
767 if [ ! -f $sysfsf ] ; then
768 echo "FAIL: ipsec_offload netdevsim doesn't support IPsec offload"
772 # flush to be sure there's nothing configured
773 ip x s flush
; ip x p flush
775 # create offloaded SAs, both in and out
776 ip x p add dir out src
$srcip/24 dst
$dstip/24 \
777 tmpl proto esp src
$srcip dst
$dstip spi
9 \
778 mode transport reqid
42
780 ip x p add dir out src
$dstip/24 dst
$srcip/24 \
781 tmpl proto esp src
$dstip dst
$srcip spi
9 \
782 mode transport reqid
42
785 ip x s add proto esp src
$srcip dst
$dstip spi
9 \
786 mode transport reqid
42 $algo sel src
$srcip/24 dst
$dstip/24 \
787 offload dev
$dev dir out
789 ip x s add proto esp src
$dstip dst
$srcip spi
9 \
790 mode transport reqid
42 $algo sel src
$dstip/24 dst
$srcip/24 \
791 offload dev
$dev dir
in
793 if [ $ret -ne 0 ]; then
794 echo "FAIL: ipsec_offload can't create SA"
798 # does offload show up in ip output
799 lines
=`ip x s list | grep -c "crypto offload parameters: dev $dev dir"`
800 if [ $lines -ne 2 ] ; then
801 echo "FAIL: ipsec_offload SA offload missing from list output"
805 # use ping to exercise the Tx path
806 ping -I $dev -c 3 -W 1 -i 0 $dstip >/dev
/null
808 # does driver have correct offload info
809 diff $sysfsf - << EOF
811 sa[0] tx ipaddr=0x00000000 00000000 00000000 00000000
812 sa[0] spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1
813 sa[0] key=0x34333231 38373635 32313039 36353433
814 sa[1] rx ipaddr=0x00000000 00000000 00000000 037ba8c0
815 sa[1] spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1
816 sa[1] key=0x34333231 38373635 32313039 36353433
818 if [ $?
-ne 0 ] ; then
819 echo "FAIL: ipsec_offload incorrect driver data"
823 # does offload get removed from driver
826 lines
=`grep -c "SA count=0" $sysfsf`
827 if [ $lines -ne 1 ] ; then
828 echo "FAIL: ipsec_offload SA not removed from driver"
832 # clean up any leftovers
833 $probed && rmmod netdevsim
835 if [ $ret -ne 0 ]; then
836 echo "FAIL: ipsec_offload"
839 echo "PASS: ipsec_offload"
848 ip netns add
"$testns"
849 if [ $?
-ne 0 ]; then
850 echo "SKIP gretap tests: cannot add net namespace $testns"
854 ip link
help gretap
2>&1 |
grep -q "^Usage:"
856 echo "SKIP: gretap: iproute2 too old"
857 ip netns del
"$testns"
862 ip
-netns "$testns" link add dev
"$DEV_NS" type gretap
seq \
863 key
102 local 172.16.1.100 remote
172.16.1.200
866 ip
-netns "$testns" addr add dev
"$DEV_NS" 10.1.1.100/24
869 ip
-netns "$testns" link
set dev
$DEV_NS up
872 ip
-netns "$testns" link del
"$DEV_NS"
876 ip
-netns "$testns" link add dev
"$DEV_NS" type gretap external
879 ip
-netns "$testns" link del
"$DEV_NS"
882 if [ $ret -ne 0 ]; then
884 ip netns del
"$testns"
889 ip netns del
"$testns"
898 ip netns add
"$testns"
899 if [ $?
-ne 0 ]; then
900 echo "SKIP ip6gretap tests: cannot add net namespace $testns"
904 ip link
help ip6gretap
2>&1 |
grep -q "^Usage:"
906 echo "SKIP: ip6gretap: iproute2 too old"
907 ip netns del
"$testns"
912 ip
-netns "$testns" link add dev
"$DEV_NS" type ip6gretap
seq \
913 key
102 local fc00
:100::1 remote fc00
:100::2
916 ip
-netns "$testns" addr add dev
"$DEV_NS" fc00
:200::1/96
919 ip
-netns "$testns" link
set dev
$DEV_NS up
922 ip
-netns "$testns" link del
"$DEV_NS"
926 ip
-netns "$testns" link add dev
"$DEV_NS" type ip6gretap external
929 ip
-netns "$testns" link del
"$DEV_NS"
932 if [ $ret -ne 0 ]; then
933 echo "FAIL: ip6gretap"
934 ip netns del
"$testns"
937 echo "PASS: ip6gretap"
939 ip netns del
"$testns"
948 ip link
help erspan
2>&1 |
grep -q "^Usage:"
950 echo "SKIP: erspan: iproute2 too old"
954 ip netns add
"$testns"
955 if [ $?
-ne 0 ]; then
956 echo "SKIP erspan tests: cannot add net namespace $testns"
960 # test native tunnel erspan v1
961 ip
-netns "$testns" link add dev
"$DEV_NS" type erspan
seq \
962 key
102 local 172.16.1.100 remote
172.16.1.200 \
963 erspan_ver
1 erspan
488
966 ip
-netns "$testns" addr add dev
"$DEV_NS" 10.1.1.100/24
969 ip
-netns "$testns" link
set dev
$DEV_NS up
972 ip
-netns "$testns" link del
"$DEV_NS"
975 # test native tunnel erspan v2
976 ip
-netns "$testns" link add dev
"$DEV_NS" type erspan
seq \
977 key
102 local 172.16.1.100 remote
172.16.1.200 \
978 erspan_ver
2 erspan_dir ingress erspan_hwid
7
981 ip
-netns "$testns" addr add dev
"$DEV_NS" 10.1.1.100/24
984 ip
-netns "$testns" link
set dev
$DEV_NS up
987 ip
-netns "$testns" link del
"$DEV_NS"
991 ip
-netns "$testns" link add dev
"$DEV_NS" type erspan external
994 ip
-netns "$testns" link del
"$DEV_NS"
997 if [ $ret -ne 0 ]; then
999 ip netns del
"$testns"
1004 ip netns del
"$testns"
1007 kci_test_ip6erspan
()
1013 ip link
help ip6erspan
2>&1 |
grep -q "^Usage:"
1014 if [ $?
-ne 0 ];then
1015 echo "SKIP: ip6erspan: iproute2 too old"
1019 ip netns add
"$testns"
1020 if [ $?
-ne 0 ]; then
1021 echo "SKIP ip6erspan tests: cannot add net namespace $testns"
1025 # test native tunnel ip6erspan v1
1026 ip
-netns "$testns" link add dev
"$DEV_NS" type ip6erspan
seq \
1027 key
102 local fc00
:100::1 remote fc00
:100::2 \
1028 erspan_ver
1 erspan
488
1031 ip
-netns "$testns" addr add dev
"$DEV_NS" 10.1.1.100/24
1034 ip
-netns "$testns" link
set dev
$DEV_NS up
1037 ip
-netns "$testns" link del
"$DEV_NS"
1040 # test native tunnel ip6erspan v2
1041 ip
-netns "$testns" link add dev
"$DEV_NS" type ip6erspan
seq \
1042 key
102 local fc00
:100::1 remote fc00
:100::2 \
1043 erspan_ver
2 erspan_dir ingress erspan_hwid
7
1046 ip
-netns "$testns" addr add dev
"$DEV_NS" 10.1.1.100/24
1049 ip
-netns "$testns" link
set dev
$DEV_NS up
1052 ip
-netns "$testns" link del
"$DEV_NS"
1055 # test external mode
1056 ip
-netns "$testns" link add dev
"$DEV_NS" \
1057 type ip6erspan external
1060 ip
-netns "$testns" link del
"$DEV_NS"
1063 if [ $ret -ne 0 ]; then
1064 echo "FAIL: ip6erspan"
1065 ip netns del
"$testns"
1068 echo "PASS: ip6erspan"
1070 ip netns del
"$testns"
1075 IP
="ip -netns testns"
1076 BRIDGE
="bridge -netns testns"
1079 test_mac
=de
:ad
:be
:ef
:13:37
1084 bridge fdb
help 2>&1 |
grep -q 'bridge fdb get'
1085 if [ $?
-ne 0 ];then
1086 echo "SKIP: fdb get tests: iproute2 too old"
1091 if [ $?
-ne 0 ]; then
1092 echo "SKIP fdb get tests: cannot add net namespace $testns"
1096 $IP link add
"$vxlandev" type vxlan id
10 local $localip \
1097 dstport
4789 2>/dev
/null
1099 $IP link add name
"$brdev" type bridge
&>/dev
/null
1101 $IP link
set dev
"$vxlandev" master
"$brdev" &>/dev
/null
1103 $BRIDGE fdb add
$test_mac dev
"$vxlandev" master
&>/dev
/null
1105 $BRIDGE fdb add
$test_mac dev
"$vxlandev" dst
$dstip self
&>/dev
/null
1108 $BRIDGE fdb get
$test_mac brport
"$vxlandev" 2>/dev
/null |
grep -q "dev $vxlandev master $brdev"
1110 $BRIDGE fdb get
$test_mac br
"$brdev" 2>/dev
/null |
grep -q "dev $vxlandev master $brdev"
1112 $BRIDGE fdb get
$test_mac dev
"$vxlandev" self
2>/dev
/null |
grep -q "dev $vxlandev dst $dstip"
1115 ip netns del testns
&>/dev
/null
1117 if [ $ret -ne 0 ]; then
1118 echo "FAIL: bridge fdb get"
1122 echo "PASS: bridge fdb get"
1125 kci_test_neigh_get
()
1127 dstmac
=de
:ad
:be
:ef
:13:37
1132 ip neigh
help 2>&1 |
grep -q 'ip neigh get'
1133 if [ $?
-ne 0 ];then
1134 echo "SKIP: fdb get tests: iproute2 too old"
1139 ip neigh add
$dstip lladdr
$dstmac dev
"$devdummy" > /dev
/null
1141 ip neigh get
$dstip dev
"$devdummy" 2> /dev
/null |
grep -q "$dstmac"
1143 ip neigh del
$dstip lladdr
$dstmac dev
"$devdummy" > /dev
/null
1147 ip neigh add proxy
$dstip dev
"$devdummy" > /dev
/null
1149 ip neigh get proxy
$dstip dev
"$devdummy" 2>/dev
/null |
grep -q "$dstip"
1151 ip neigh del proxy
$dstip dev
"$devdummy" > /dev
/null
1155 ip neigh add
$dstip6 lladdr
$dstmac dev
"$devdummy" > /dev
/null
1157 ip neigh get
$dstip6 dev
"$devdummy" 2> /dev
/null |
grep -q "$dstmac"
1159 ip neigh del
$dstip6 lladdr
$dstmac dev
"$devdummy" > /dev
/null
1163 ip neigh add proxy
$dstip6 dev
"$devdummy" > /dev
/null
1165 ip neigh get proxy
$dstip6 dev
"$devdummy" 2>/dev
/null |
grep -q "$dstip6"
1167 ip neigh del proxy
$dstip6 dev
"$devdummy" > /dev
/null
1170 if [ $ret -ne 0 ];then
1171 echo "FAIL: neigh get"
1175 echo "PASS: neigh get"
1182 if [ $ret -ne 0 ];then
1183 echo "FAIL: cannot add dummy interface"
1193 kci_test_promote_secondaries
1221 kci_test_ipsec_offload
1232 #check for needed privileges
1233 if [ "$(id -u)" -ne 0 ];then
1234 echo "SKIP: Need root privileges"
1239 $x -Version 2>/dev
/null
>/dev
/null
1240 if [ $?
-ne 0 ];then
1241 echo "SKIP: Could not run test without the $x tool"