aboutsummaryrefslogtreecommitdiffstats
path: root/tools/testing/selftests/net/forwarding/tc_shblocks.sh
blob: 772e00ac3230473cfedc11a60a3e1a5b026f42b5 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
#!/bin/bash
# SPDX-License-Identifier: GPL-2.0

ALL_TESTS="shared_block_test match_indev_test"
NUM_NETIFS=4
source tc_common.sh
source lib.sh

tcflags="skip_hw"

h1_create()
{
	simple_if_init $h1 192.0.2.1/24
}

h1_destroy()
{
	simple_if_fini $h1 192.0.2.1/24
}

h2_create()
{
	simple_if_init $h2 192.0.2.1/24
}

h2_destroy()
{
	simple_if_fini $h2 192.0.2.1/24
}

switch_create()
{
	simple_if_init $swp1 192.0.2.2/24
	tc qdisc add dev $swp1 ingress_block 22 egress_block 23 clsact

	simple_if_init $swp2 192.0.2.2/24
	tc qdisc add dev $swp2 ingress_block 22 egress_block 23 clsact
}

switch_destroy()
{
	tc qdisc del dev $swp2 clsact
	simple_if_fini $swp2 192.0.2.2/24

	tc qdisc del dev $swp1 clsact
	simple_if_fini $swp1 192.0.2.2/24
}

shared_block_test()
{
	RET=0

	tc filter add block 22 protocol ip pref 1 handle 101 flower \
		$tcflags dst_ip 192.0.2.2 action drop

	$MZ $h1 -c 1 -p 64 -a $h1mac -b $swmac -A 192.0.2.1 -B 192.0.2.2 \
		-t ip -q

	tc_check_packets "block 22" 101 1
	check_err $? "Did not match first incoming packet on a block"

	$MZ $h2 -c 1 -p 64 -a $h2mac -b $swmac -A 192.0.2.1 -B 192.0.2.2 \
		-t ip -q

	tc_check_packets "block 22" 101 2
	check_err $? "Did not match second incoming packet on a block"

	tc filter del block 22 protocol ip pref 1 handle 101 flower

	log_test "shared block ($tcflags)"
}

match_indev_test()
{
	RET=0

	tc filter add block 22 protocol ip pref 1 handle 101 flower \
		$tcflags indev $swp1 dst_mac $swmac action drop
	tc filter add block 22 protocol ip pref 2 handle 102 flower \
		$tcflags indev $swp2 dst_mac $swmac action drop

	$MZ $h1 -c 1 -p 64 -a $h1mac -b $swmac -A 192.0.2.1 -B 192.0.2.2 \
		-t ip -q

	tc_check_packets "block 22" 101 1
	check_err $? "Did not match first incoming packet on a block"

	$MZ $h2 -c 1 -p 64 -a $h2mac -b $swmac -A 192.0.2.1 -B 192.0.2.2 \
		-t ip -q

	tc_check_packets "block 22" 102 1
	check_err $? "Did not match second incoming packet on a block"

	tc filter del block 22 protocol ip pref 1 handle 101 flower
	tc filter del block 22 protocol ip pref 2 handle 102 flower

	log_test "indev match ($tcflags)"
}

setup_prepare()
{
	h1=${NETIFS[p1]}
	swp1=${NETIFS[p2]}

	swp2=${NETIFS[p3]}
	h2=${NETIFS[p4]}

	h1mac=$(mac_get $h1)
	h2mac=$(mac_get $h2)

	swmac=$(mac_get $swp1)
	swp2origmac=$(mac_get $swp2)
	ip link set $swp2 address $swmac

	vrf_prepare

	h1_create
	h2_create
	switch_create
}

cleanup()
{
	pre_cleanup

	switch_destroy
	h2_destroy
	h1_destroy

	vrf_cleanup

	ip link set $swp2 address $swp2origmac
}

check_tc_shblock_support

trap cleanup EXIT

setup_prepare
setup_wait

tests_run

tc_offload_check
if [[ $? -ne 0 ]]; then
	log_info "Could not test offloaded functionality"
else
	tcflags="skip_sw"
	tests_run
fi

exit $EXIT_STATUS