#!/bin/bash # SPDX-License-Identifier: GPL-2.0 # This test is designed for testing the new VRF strict_mode functionality. # Kselftest framework requirement - SKIP code is 4. ksft_skip=4 ret=0 # identifies the "init" network namespace which is often called root network # namespace. INIT_NETNS_NAME="init" PAUSE_ON_FAIL=${PAUSE_ON_FAIL:=no} log_test() { local rc=$1 local expected=$2 local msg="$3" if [ ${rc} -eq ${expected} ]; then nsuccess=$((nsuccess+1)) printf "\n TEST: %-60s [ OK ]\n" "${msg}" else ret=1 nfail=$((nfail+1)) printf "\n TEST: %-60s [FAIL]\n" "${msg}" if [ "${PAUSE_ON_FAIL}" = "yes" ]; then echo echo "hit enter to continue, 'q' to quit" read a [ "$a" = "q" ] && exit 1 fi fi } print_log_test_results() { if [ "$TESTS" != "none" ]; then printf "\nTests passed: %3d\n" ${nsuccess} printf "Tests failed: %3d\n" ${nfail} fi } log_section() { echo echo "################################################################################" echo "TEST SECTION: $*" echo "################################################################################" } ip_expand_args() { local nsname=$1 local nsarg="" if [ "${nsname}" != "${INIT_NETNS_NAME}" ]; then nsarg="-netns ${nsname}" fi echo "${nsarg}" } vrf_count() { local nsname=$1 local nsarg="$(ip_expand_args ${nsname})" ip ${nsarg} -o link show type vrf | wc -l } count_vrf_by_table_id() { local nsname=$1 local tableid=$2 local nsarg="$(ip_expand_args ${nsname})" ip ${nsarg} -d -o link show type vrf | grep "table ${tableid}" | wc -l } add_vrf() { local nsname=$1 local vrfname=$2 local vrftable=$3 local nsarg="$(ip_expand_args ${nsname})" ip ${nsarg} link add ${vrfname} type vrf table ${vrftable} &>/dev/null } add_vrf_and_check() { local nsname=$1 local vrfname=$2 local vrftable=$3 local cnt local rc add_vrf ${nsname} ${vrfname} ${vrftable}; rc=$? cnt=$(count_vrf_by_table_id ${nsname} ${vrftable}) log_test ${rc} 0 "${nsname}: add vrf ${vrfname}, ${cnt} vrfs for table ${vrftable}" } add_vrf_and_check_fail() { local nsname=$1 local vrfname=$2 local vrftable=$3 local cnt local rc add_vrf ${nsname} ${vrfname} ${vrftable}; rc=$? cnt=$(count_vrf_by_table_id ${nsname} ${vrftable}) log_test ${rc} 2 "${nsname}: CANNOT add vrf ${vrfname}, ${cnt} vrfs for table ${vrftable}" } del_vrf_and_check() { local nsname=$1 local vrfname=$2 local nsarg="$(ip_expand_args ${nsname})" ip ${nsarg} link del ${vrfname} log_test $? 0 "${nsname}: remove vrf ${vrfname}" } config_vrf_and_check() { local nsname=$1 local addr=$2 local vrfname=$3 local nsarg="$(ip_expand_args ${nsname})" ip ${nsarg} link set dev ${vrfname} up && \ ip ${nsarg} addr add ${addr} dev ${vrfname} log_test $? 0 "${nsname}: vrf ${vrfname} up, addr ${addr}" } read_strict_mode() { local nsname=$1 local rval local rc=0 local nsexec="" if [ "${nsname}" != "${INIT_NETNS_NAME}" ]; then # a custom network namespace is provided nsexec="ip netns exec ${nsname}" fi rval="$(${nsexec} bash -c "cat /proc/sys/net/vrf/strict_mode" | \ grep -E "^[0-1]$")" &> /dev/null if [ $? -ne 0 ]; then # set errors rval=255 rc=1 fi # on success, rval can be only 0 or 1; on error, rval is equal to 255 echo ${rval} return ${rc} } read_strict_mode_compare_and_check() { local nsname=$1 local expected=$2 local res res="$(read_strict_mode ${nsname})" log_test ${res} ${expected} "${nsname}: check strict_mode=${res}" } set_strict_mode() { local nsname=$1 local val=$2 local nsexec="" if [ "${nsname}" != "${INIT_NETNS_NAME}" ]; then # a custom network namespace is provided nsexec="ip netns exec ${nsname}" fi ${nsexec} bash -c "echo ${val} >/proc/sys/net/vrf/strict_mode" &>/dev/null } enable_strict_mode() { local nsname=$1 set_strict_mode ${nsname} 1 } disable_strict_mode() { local nsname=$1 set_strict_mode ${nsname} 0 } disable_strict_mode_and_check() { local nsname=$1 disable_strict_mode ${nsname} log_test $? 0 "${nsname}: disable strict_mode (=0)" } enable_strict_mode_and_check() { local nsname=$1 enable_strict_mode ${nsname} log_test $? 0 "${nsname}: enable strict_mode (=1)" } enable_strict_mode_and_check_fail() { local nsname=$1 enable_strict_mode ${nsname} log_test $? 1 "${nsname}: CANNOT enable strict_mode" } strict_mode_check_default() { local nsname=$1 local strictmode local vrfcnt vrfcnt=$(vrf_count ${nsname}) strictmode=$(read_strict_mode ${nsname}) log_test ${strictmode} 0 "${nsname}: strict_mode=0 by default, ${vrfcnt} vrfs" } setup() { modprobe vrf ip netns add testns ip netns exec testns ip link set lo up } cleanup() { ip netns del testns 2>/dev/null ip link del vrf100 2>/dev/null ip link del vrf101 2>/dev/null ip link del vrf102 2>/dev/null echo 0 >/proc/sys/net/vrf/strict_mode 2>/dev/null } vrf_strict_mode_tests_init() { vrf_strict_mode_check_support init strict_mode_check_default init add_vrf_and_check init vrf100 100 config_vrf_and_check init 172.16.100.1/24 vrf100 enable_strict_mode_and_check init add_vrf_and_check_fail init vrf101 100 disable_strict_mode_and_check init add_vrf_and_check init vrf101 100 config_vrf_and_check init 172.16.101.1/24 vrf101 enable_strict_mode_and_check_fail init del_vrf_and_check init vrf101 enable_strict_mode_and_check init add_vrf_and_check init vrf102 102 config_vrf_and_check init 172.16.102.1/24 vrf102 # the strict_modle is enabled in the init } vrf_strict_mode_tests_testns() { vrf_strict_mode_check_support testns strict_mode_check_default testns enable_strict_mode_and_check testns add_vrf_and_check testns vrf100 100 config_vrf_and_check testns 10.0.100.1/24 vrf100 add_vrf_and_check_fail testns vrf101 100 add_vrf_and_check_fail testns vrf102 100 add_vrf_and_check testns vrf200 200 disable_strict_mode_and_check testns add_vrf_and_check testns vrf101 100 add_vrf_and_check testns vrf102 100 #the strict_mode is disabled in the testns } vrf_strict_mode_tests_mix() { read_strict_mode_compare_and_check init 1 read_strict_mode_compare_and_check testns 0 del_vrf_and_check testns vrf101 del_vrf_and_check testns vrf102 disable_strict_mode_and_check init enable_strict_mode_and_check testns enable_strict_mode_and_check init enable_strict_mode_and_check init disable_strict_mode_and_check testns disable_strict_mode_and_check testns read_strict_mode_compare_and_check init 1 read_strict_mode_compare_and_check testns 0 } vrf_strict_mode_tests() { log_section "VRF strict_mode test on init network namespace" vrf_strict_mode_tests_init log_section "VRF strict_mode test on testns network namespace" vrf_strict_mode_tests_testns log_section "VRF strict_mode test mixing init and testns network namespaces" vrf_strict_mode_tests_mix } vrf_strict_mode_check_support() { local nsname=$1 local output local rc output="$(lsmod | grep '^vrf' | awk '{print $1}')" if [ -z "${output}" ]; then modinfo vrf || return $? fi # we do not care about the value of the strict_mode; we only check if # the strict_mode parameter is available or not. read_strict_mode ${nsname} &>/dev/null; rc=$? log_test ${rc} 0 "${nsname}: net.vrf.strict_mode is available" return ${rc} } if [ "$(id -u)" -ne 0 ];then echo "SKIP: Need root privileges" exit $ksft_skip fi if [ ! -x "$(command -v ip)" ]; then echo "SKIP: Could not run test without ip tool" exit $ksft_skip fi modprobe vrf &>/dev/null if [ ! -e /proc/sys/net/vrf/strict_mode ]; then echo "SKIP: vrf sysctl does not exist" exit $ksft_skip fi cleanup &> /dev/null setup vrf_strict_mode_tests cleanup print_log_test_results exit $ret