Linux kernel mirror (for testing)
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel
os
linux
1#!/bin/bash
2# SPDX-License-Identifier: GPL-2.0
3#
4# OVS kernel module self tests
5
6trap ovs_exit_sig EXIT TERM INT ERR
7
8# Kselftest framework requirement - SKIP code is 4.
9ksft_skip=4
10
11PAUSE_ON_FAIL=no
12VERBOSE=0
13TRACING=0
14WAIT_TIMEOUT=5
15
16if test "X$KSFT_MACHINE_SLOW" == "Xyes"; then
17 WAIT_TIMEOUT=10
18fi
19
20tests="
21 arp_ping eth-arp: Basic arp ping between two NS
22 ct_connect_v4 ip4-ct-xon: Basic ipv4 tcp connection using ct
23 connect_v4 ip4-xon: Basic ipv4 ping between two NS
24 nat_connect_v4 ip4-nat-xon: Basic ipv4 tcp connection via NAT
25 nat_related_v4 ip4-nat-related: ICMP related matches work with SNAT
26 netlink_checks ovsnl: validate netlink attrs and settings
27 upcall_interfaces ovs: test the upcall interfaces
28 drop_reason drop: test drop reasons are emitted
29 psample psample: Sampling packets with psample"
30
31info() {
32 [ "${ovs_dir}" != "" ] &&
33 echo "`date +"[%m-%d %H:%M:%S]"` $*" >> ${ovs_dir}/debug.log
34 [ $VERBOSE = 0 ] || echo $*
35}
36
37ovs_wait() {
38 info "waiting $WAIT_TIMEOUT s for: $@"
39
40 if "$@" ; then
41 info "wait succeeded immediately"
42 return 0
43 fi
44
45 # A quick re-check helps speed up small races in fast systems.
46 # However, fractional sleeps might not necessarily work.
47 local start=0
48 sleep 0.1 || { sleep 1; start=1; }
49
50 for (( i=start; i<WAIT_TIMEOUT; i++ )); do
51 if "$@" ; then
52 info "wait succeeded after $i seconds"
53 return 0
54 fi
55 sleep 1
56 done
57 info "wait failed after $i seconds"
58 return 1
59}
60
61ovs_base=`pwd`
62sbxs=
63sbx_add () {
64 info "adding sandbox '$1'"
65
66 sbxs="$sbxs $1"
67
68 NO_BIN=0
69
70 # Create sandbox.
71 local d="$ovs_base"/$1
72 if [ -e $d ]; then
73 info "removing $d"
74 rm -rf "$d"
75 fi
76 mkdir "$d" || return 1
77 ovs_setenv $1
78}
79
80ovs_exit_sig() {
81 [ -e ${ovs_dir}/cleanup ] && . "$ovs_dir/cleanup"
82}
83
84on_exit() {
85 echo "$1" > ${ovs_dir}/cleanup.tmp
86 cat ${ovs_dir}/cleanup >> ${ovs_dir}/cleanup.tmp
87 mv ${ovs_dir}/cleanup.tmp ${ovs_dir}/cleanup
88}
89
90ovs_setenv() {
91 sandbox=$1
92
93 ovs_dir=$ovs_base${1:+/$1}; export ovs_dir
94
95 test -e ${ovs_dir}/cleanup || : > ${ovs_dir}/cleanup
96}
97
98ovs_sbx() {
99 if test "X$2" != X; then
100 (ovs_setenv $1; shift;
101 info "run cmd: $@"; "$@" >> ${ovs_dir}/debug.log)
102 else
103 ovs_setenv $1
104 fi
105}
106
107ovs_add_dp () {
108 info "Adding DP/Bridge IF: sbx:$1 dp:$2 {$3, $4, $5}"
109 sbxname="$1"
110 shift
111 ovs_sbx "$sbxname" python3 $ovs_base/ovs-dpctl.py add-dp $*
112 on_exit "ovs_sbx $sbxname python3 $ovs_base/ovs-dpctl.py del-dp $1;"
113}
114
115ovs_add_if () {
116 info "Adding IF to DP: br:$2 if:$3"
117 if [ "$4" != "-u" ]; then
118 ovs_sbx "$1" python3 $ovs_base/ovs-dpctl.py add-if "$2" "$3" \
119 || return 1
120 else
121 python3 $ovs_base/ovs-dpctl.py add-if \
122 -u "$2" "$3" >$ovs_dir/$3.out 2>$ovs_dir/$3.err &
123 pid=$!
124 on_exit "ovs_sbx $1 kill -TERM $pid 2>/dev/null"
125 fi
126}
127
128ovs_del_if () {
129 info "Deleting IF from DP: br:$2 if:$3"
130 ovs_sbx "$1" python3 $ovs_base/ovs-dpctl.py del-if "$2" "$3" || return 1
131}
132
133ovs_netns_spawn_daemon() {
134 sbx=$1
135 shift
136 netns=$1
137 shift
138 if [ "$netns" == "_default" ]; then
139 $* >> $ovs_dir/stdout 2>> $ovs_dir/stderr &
140 else
141 ip netns exec $netns $* >> $ovs_dir/stdout 2>> $ovs_dir/stderr &
142 fi
143 pid=$!
144 ovs_sbx "$sbx" on_exit "kill -TERM $pid 2>/dev/null"
145}
146
147ovs_spawn_daemon() {
148 sbx=$1
149 shift
150 ovs_netns_spawn_daemon $sbx "_default" $*
151}
152
153ovs_add_netns_and_veths () {
154 info "Adding netns attached: sbx:$1 dp:$2 {$3, $4, $5}"
155 ovs_sbx "$1" ip netns add "$3" || return 1
156 on_exit "ovs_sbx $1 ip netns del $3"
157 ovs_sbx "$1" ip link add "$4" type veth peer name "$5" || return 1
158 on_exit "ovs_sbx $1 ip link del $4 >/dev/null 2>&1"
159 ovs_sbx "$1" ip link set "$4" up || return 1
160 ovs_sbx "$1" ip link set "$5" netns "$3" || return 1
161 ovs_sbx "$1" ip netns exec "$3" ip link set "$5" up || return 1
162
163 if [ "$6" != "" ]; then
164 ovs_sbx "$1" ip netns exec "$3" ip addr add "$6" dev "$5" \
165 || return 1
166 fi
167
168 if [ "$7" != "-u" ]; then
169 ovs_add_if "$1" "$2" "$4" || return 1
170 else
171 ovs_add_if "$1" "$2" "$4" -u || return 1
172 fi
173
174 [ $TRACING -eq 1 ] && ovs_netns_spawn_daemon "$1" "$ns" \
175 tcpdump -i any -s 65535
176
177 return 0
178}
179
180ovs_add_flow () {
181 info "Adding flow to DP: sbx:$1 br:$2 flow:$3 act:$4"
182 ovs_sbx "$1" python3 $ovs_base/ovs-dpctl.py add-flow "$2" "$3" "$4"
183 if [ $? -ne 0 ]; then
184 info "Flow [ $3 : $4 ] failed"
185 return 1
186 fi
187 return 0
188}
189
190ovs_del_flows () {
191 info "Deleting all flows from DP: sbx:$1 br:$2"
192 ovs_sbx "$1" python3 $ovs_base/ovs-dpctl.py del-flows "$2"
193 return 0
194}
195
196ovs_drop_record_and_run () {
197 local sbx=$1
198 shift
199
200 perf record -a -q -e skb:kfree_skb -o ${ovs_dir}/perf.data $* \
201 >> ${ovs_dir}/stdout 2>> ${ovs_dir}/stderr
202 return $?
203}
204
205ovs_drop_reason_count()
206{
207 local reason=$1
208
209 local perf_output=`perf script -i ${ovs_dir}/perf.data -F trace:event,trace`
210 local pattern="skb:kfree_skb:.*reason: $reason"
211
212 return `echo "$perf_output" | grep "$pattern" | wc -l`
213}
214
215ovs_test_flow_fails () {
216 ERR_MSG="Flow actions may not be safe on all matching packets"
217
218 PRE_TEST=$(dmesg | grep -c "${ERR_MSG}")
219 ovs_add_flow $@ &> /dev/null $@ && return 1
220 POST_TEST=$(dmesg | grep -c "${ERR_MSG}")
221
222 if [ "$PRE_TEST" == "$POST_TEST" ]; then
223 return 1
224 fi
225 return 0
226}
227
228usage() {
229 echo
230 echo "$0 [OPTIONS] [TEST]..."
231 echo "If no TEST argument is given, all tests will be run."
232 echo
233 echo "Options"
234 echo " -t: capture traffic via tcpdump"
235 echo " -v: verbose"
236 echo " -p: pause on failure"
237 echo
238 echo "Available tests${tests}"
239 exit 1
240}
241
242
243# psample test
244# - use psample to observe packets
245test_psample() {
246 sbx_add "test_psample" || return $?
247
248 # Add a datapath with per-vport dispatching.
249 ovs_add_dp "test_psample" psample -V 2:1 || return 1
250
251 info "create namespaces"
252 ovs_add_netns_and_veths "test_psample" "psample" \
253 client c0 c1 172.31.110.10/24 -u || return 1
254 ovs_add_netns_and_veths "test_psample" "psample" \
255 server s0 s1 172.31.110.20/24 -u || return 1
256
257 # Check if psample actions can be configured.
258 ovs_add_flow "test_psample" psample \
259 'in_port(1),eth(),eth_type(0x0806),arp()' 'psample(group=1)' &> /dev/null
260 if [ $? == 1 ]; then
261 info "no support for psample - skipping"
262 ovs_exit_sig
263 return $ksft_skip
264 fi
265
266 ovs_del_flows "test_psample" psample
267
268 # Test action verification.
269 OLDIFS=$IFS
270 IFS='*'
271 min_key='in_port(1),eth(),eth_type(0x0800),ipv4()'
272 for testcase in \
273 "cookie to large"*"psample(group=1,cookie=1615141312111009080706050403020100)" \
274 "no group with cookie"*"psample(cookie=abcd)" \
275 "no group"*"psample()";
276 do
277 set -- $testcase;
278 ovs_test_flow_fails "test_psample" psample $min_key $2
279 if [ $? == 1 ]; then
280 info "failed - $1"
281 return 1
282 fi
283 done
284 IFS=$OLDIFS
285
286 ovs_del_flows "test_psample" psample
287 # Allow ARP
288 ovs_add_flow "test_psample" psample \
289 'in_port(1),eth(),eth_type(0x0806),arp()' '2' || return 1
290 ovs_add_flow "test_psample" psample \
291 'in_port(2),eth(),eth_type(0x0806),arp()' '1' || return 1
292
293 # Sample first 14 bytes of all traffic.
294 ovs_add_flow "test_psample" psample \
295 "in_port(1),eth(),eth_type(0x0800),ipv4()" \
296 "trunc(14),psample(group=1,cookie=c0ffee),2"
297
298 # Sample all traffic. In this case, use a sample() action with both
299 # psample and an upcall emulating simultaneous local sampling and
300 # sFlow / IPFIX.
301 nlpid=$(grep -E "listening on upcall packet handler" \
302 $ovs_dir/s0.out | cut -d ":" -f 2 | tr -d ' ')
303
304 ovs_add_flow "test_psample" psample \
305 "in_port(2),eth(),eth_type(0x0800),ipv4()" \
306 "sample(sample=100%,actions(psample(group=2,cookie=eeff0c),userspace(pid=${nlpid},userdata=eeff0c))),1"
307
308 # Record psample data.
309 ovs_spawn_daemon "test_psample" python3 $ovs_base/ovs-dpctl.py psample-events
310 ovs_wait grep -q "listening for psample events" ${ovs_dir}/stdout
311
312 # Send a single ping.
313 ovs_sbx "test_psample" ip netns exec client ping -I c1 172.31.110.20 -c 1 || return 1
314
315 # We should have received one userspace action upcall and 2 psample packets.
316 ovs_wait grep -q "userspace action command" $ovs_dir/s0.out || return 1
317
318 # client -> server samples should only contain the first 14 bytes of the packet.
319 ovs_wait grep -qE "rate:4294967295,group:1,cookie:c0ffee data:[0-9a-f]{28}$" \
320 $ovs_dir/stdout || return 1
321
322 ovs_wait grep -q "rate:4294967295,group:2,cookie:eeff0c" $ovs_dir/stdout || return 1
323
324 return 0
325}
326
327# drop_reason test
328# - drop packets and verify the right drop reason is reported
329test_drop_reason() {
330 which perf >/dev/null 2>&1 || return $ksft_skip
331
332 sbx_add "test_drop_reason" || return $?
333
334 ovs_add_dp "test_drop_reason" dropreason || return 1
335
336 info "create namespaces"
337 for ns in client server; do
338 ovs_add_netns_and_veths "test_drop_reason" "dropreason" "$ns" \
339 "${ns:0:1}0" "${ns:0:1}1" || return 1
340 done
341
342 # Setup client namespace
343 ip netns exec client ip addr add 172.31.110.10/24 dev c1
344 ip netns exec client ip link set c1 up
345
346 # Setup server namespace
347 ip netns exec server ip addr add 172.31.110.20/24 dev s1
348 ip netns exec server ip link set s1 up
349
350 # Check if drop reasons can be sent
351 ovs_add_flow "test_drop_reason" dropreason \
352 'in_port(1),eth(),eth_type(0x0806),arp()' 'drop(10)' 2>/dev/null
353 if [ $? == 1 ]; then
354 info "no support for drop reasons - skipping"
355 ovs_exit_sig
356 return $ksft_skip
357 fi
358
359 ovs_del_flows "test_drop_reason" dropreason
360
361 # Allow ARP
362 ovs_add_flow "test_drop_reason" dropreason \
363 'in_port(1),eth(),eth_type(0x0806),arp()' '2' || return 1
364 ovs_add_flow "test_drop_reason" dropreason \
365 'in_port(2),eth(),eth_type(0x0806),arp()' '1' || return 1
366
367 # Allow client ICMP traffic but drop return path
368 ovs_add_flow "test_drop_reason" dropreason \
369 "in_port(1),eth(),eth_type(0x0800),ipv4(src=172.31.110.10,proto=1),icmp()" '2'
370 ovs_add_flow "test_drop_reason" dropreason \
371 "in_port(2),eth(),eth_type(0x0800),ipv4(src=172.31.110.20,proto=1),icmp()" 'drop'
372
373 ovs_drop_record_and_run "test_drop_reason" ip netns exec client ping -c 2 172.31.110.20
374 ovs_drop_reason_count 0x30001 # OVS_DROP_FLOW_ACTION
375 if [[ "$?" -ne "2" ]]; then
376 info "Did not detect expected drops: $?"
377 return 1
378 fi
379
380 # Drop UDP 6000 traffic with an explicit action and an error code.
381 ovs_add_flow "test_drop_reason" dropreason \
382 "in_port(1),eth(),eth_type(0x0800),ipv4(src=172.31.110.10,proto=17),udp(dst=6000)" \
383 'drop(42)'
384 # Drop UDP 7000 traffic with an explicit action with no error code.
385 ovs_add_flow "test_drop_reason" dropreason \
386 "in_port(1),eth(),eth_type(0x0800),ipv4(src=172.31.110.10,proto=17),udp(dst=7000)" \
387 'drop(0)'
388
389 ovs_drop_record_and_run \
390 "test_drop_reason" ip netns exec client nc -i 1 -zuv 172.31.110.20 6000
391 ovs_drop_reason_count 0x30004 # OVS_DROP_EXPLICIT_ACTION_ERROR
392 if [[ "$?" -ne "1" ]]; then
393 info "Did not detect expected explicit error drops: $?"
394 return 1
395 fi
396
397 ovs_drop_record_and_run \
398 "test_drop_reason" ip netns exec client nc -i 1 -zuv 172.31.110.20 7000
399 ovs_drop_reason_count 0x30003 # OVS_DROP_EXPLICIT_ACTION
400 if [[ "$?" -ne "1" ]]; then
401 info "Did not detect expected explicit drops: $?"
402 return 1
403 fi
404
405 return 0
406}
407
408# arp_ping test
409# - client has 1500 byte MTU
410# - server has 1500 byte MTU
411# - send ARP ping between two ns
412test_arp_ping () {
413
414 which arping >/dev/null 2>&1 || return $ksft_skip
415
416 sbx_add "test_arp_ping" || return $?
417
418 ovs_add_dp "test_arp_ping" arpping || return 1
419
420 info "create namespaces"
421 for ns in client server; do
422 ovs_add_netns_and_veths "test_arp_ping" "arpping" "$ns" \
423 "${ns:0:1}0" "${ns:0:1}1" || return 1
424 done
425
426 # Setup client namespace
427 ip netns exec client ip addr add 172.31.110.10/24 dev c1
428 ip netns exec client ip link set c1 up
429 HW_CLIENT=`ip netns exec client ip link show dev c1 | grep -E 'link/ether [0-9a-f:]+' | awk '{print $2;}'`
430 info "Client hwaddr: $HW_CLIENT"
431
432 # Setup server namespace
433 ip netns exec server ip addr add 172.31.110.20/24 dev s1
434 ip netns exec server ip link set s1 up
435 HW_SERVER=`ip netns exec server ip link show dev s1 | grep -E 'link/ether [0-9a-f:]+' | awk '{print $2;}'`
436 info "Server hwaddr: $HW_SERVER"
437
438 ovs_add_flow "test_arp_ping" arpping \
439 "in_port(1),eth(),eth_type(0x0806),arp(sip=172.31.110.10,tip=172.31.110.20,sha=$HW_CLIENT,tha=ff:ff:ff:ff:ff:ff)" '2' || return 1
440 ovs_add_flow "test_arp_ping" arpping \
441 "in_port(2),eth(),eth_type(0x0806),arp()" '1' || return 1
442
443 ovs_sbx "test_arp_ping" ip netns exec client arping -I c1 172.31.110.20 -c 1 || return 1
444
445 return 0
446}
447
448# ct_connect_v4 test
449# - client has 1500 byte MTU
450# - server has 1500 byte MTU
451# - use ICMP to ping in each direction
452# - only allow CT state stuff to pass through new in c -> s
453test_ct_connect_v4 () {
454
455 which nc >/dev/null 2>/dev/null || return $ksft_skip
456
457 sbx_add "test_ct_connect_v4" || return $?
458
459 ovs_add_dp "test_ct_connect_v4" ct4 || return 1
460 info "create namespaces"
461 for ns in client server; do
462 ovs_add_netns_and_veths "test_ct_connect_v4" "ct4" "$ns" \
463 "${ns:0:1}0" "${ns:0:1}1" || return 1
464 done
465
466 ip netns exec client ip addr add 172.31.110.10/24 dev c1
467 ip netns exec client ip link set c1 up
468 ip netns exec server ip addr add 172.31.110.20/24 dev s1
469 ip netns exec server ip link set s1 up
470
471 # Add forwarding for ARP and ip packets - completely wildcarded
472 ovs_add_flow "test_ct_connect_v4" ct4 \
473 'in_port(1),eth(),eth_type(0x0806),arp()' '2' || return 1
474 ovs_add_flow "test_ct_connect_v4" ct4 \
475 'in_port(2),eth(),eth_type(0x0806),arp()' '1' || return 1
476 ovs_add_flow "test_ct_connect_v4" ct4 \
477 'ct_state(-trk),eth(),eth_type(0x0800),ipv4()' \
478 'ct(commit),recirc(0x1)' || return 1
479 ovs_add_flow "test_ct_connect_v4" ct4 \
480 'recirc_id(0x1),ct_state(+trk+new),in_port(1),eth(),eth_type(0x0800),ipv4(src=172.31.110.10)' \
481 '2' || return 1
482 ovs_add_flow "test_ct_connect_v4" ct4 \
483 'recirc_id(0x1),ct_state(+trk+est),in_port(1),eth(),eth_type(0x0800),ipv4(src=172.31.110.10)' \
484 '2' || return 1
485 ovs_add_flow "test_ct_connect_v4" ct4 \
486 'recirc_id(0x1),ct_state(+trk+est),in_port(2),eth(),eth_type(0x0800),ipv4(dst=172.31.110.10)' \
487 '1' || return 1
488 ovs_add_flow "test_ct_connect_v4" ct4 \
489 'recirc_id(0x1),ct_state(+trk+inv),eth(),eth_type(0x0800),ipv4()' 'drop' || \
490 return 1
491
492 # do a ping
493 ovs_sbx "test_ct_connect_v4" ip netns exec client ping 172.31.110.20 -c 3 || return 1
494
495 # create an echo server in 'server'
496 echo "server" | \
497 ovs_netns_spawn_daemon "test_ct_connect_v4" "server" \
498 nc -lvnp 4443
499 ovs_sbx "test_ct_connect_v4" ip netns exec client nc -i 1 -zv 172.31.110.20 4443 || return 1
500
501 # Now test in the other direction (should fail)
502 echo "client" | \
503 ovs_netns_spawn_daemon "test_ct_connect_v4" "client" \
504 nc -lvnp 4443
505 ovs_sbx "test_ct_connect_v4" ip netns exec client nc -i 1 -zv 172.31.110.10 4443
506 if [ $? == 0 ]; then
507 info "ct connect to client was successful"
508 return 1
509 fi
510
511 info "done..."
512 return 0
513}
514
515# connect_v4 test
516# - client has 1500 byte MTU
517# - server has 1500 byte MTU
518# - use ICMP to ping in each direction
519test_connect_v4 () {
520
521 sbx_add "test_connect_v4" || return $?
522
523 ovs_add_dp "test_connect_v4" cv4 || return 1
524
525 info "create namespaces"
526 for ns in client server; do
527 ovs_add_netns_and_veths "test_connect_v4" "cv4" "$ns" \
528 "${ns:0:1}0" "${ns:0:1}1" || return 1
529 done
530
531
532 ip netns exec client ip addr add 172.31.110.10/24 dev c1
533 ip netns exec client ip link set c1 up
534 ip netns exec server ip addr add 172.31.110.20/24 dev s1
535 ip netns exec server ip link set s1 up
536
537 # Add forwarding for ARP and ip packets - completely wildcarded
538 ovs_add_flow "test_connect_v4" cv4 \
539 'in_port(1),eth(),eth_type(0x0806),arp()' '2' || return 1
540 ovs_add_flow "test_connect_v4" cv4 \
541 'in_port(2),eth(),eth_type(0x0806),arp()' '1' || return 1
542 ovs_add_flow "test_connect_v4" cv4 \
543 'in_port(1),eth(),eth_type(0x0800),ipv4(src=172.31.110.10)' '2' || return 1
544 ovs_add_flow "test_connect_v4" cv4 \
545 'in_port(2),eth(),eth_type(0x0800),ipv4(src=172.31.110.20)' '1' || return 1
546
547 # do a ping
548 ovs_sbx "test_connect_v4" ip netns exec client ping 172.31.110.20 -c 3 || return 1
549
550 info "done..."
551 return 0
552}
553
554# nat_connect_v4 test
555# - client has 1500 byte MTU
556# - server has 1500 byte MTU
557# - use ICMP to ping in each direction
558# - only allow CT state stuff to pass through new in c -> s
559test_nat_connect_v4 () {
560 which nc >/dev/null 2>/dev/null || return $ksft_skip
561
562 sbx_add "test_nat_connect_v4" || return $?
563
564 ovs_add_dp "test_nat_connect_v4" nat4 || return 1
565 info "create namespaces"
566 for ns in client server; do
567 ovs_add_netns_and_veths "test_nat_connect_v4" "nat4" "$ns" \
568 "${ns:0:1}0" "${ns:0:1}1" || return 1
569 done
570
571 ip netns exec client ip addr add 172.31.110.10/24 dev c1
572 ip netns exec client ip link set c1 up
573 ip netns exec server ip addr add 172.31.110.20/24 dev s1
574 ip netns exec server ip link set s1 up
575
576 ip netns exec client ip route add default via 172.31.110.20
577
578 ovs_add_flow "test_nat_connect_v4" nat4 \
579 'in_port(1),eth(),eth_type(0x0806),arp()' '2' || return 1
580 ovs_add_flow "test_nat_connect_v4" nat4 \
581 'in_port(2),eth(),eth_type(0x0806),arp()' '1' || return 1
582 ovs_add_flow "test_nat_connect_v4" nat4 \
583 "ct_state(-trk),in_port(1),eth(),eth_type(0x0800),ipv4(dst=192.168.0.20)" \
584 "ct(commit,nat(dst=172.31.110.20)),recirc(0x1)"
585 ovs_add_flow "test_nat_connect_v4" nat4 \
586 "ct_state(-trk),in_port(2),eth(),eth_type(0x0800),ipv4()" \
587 "ct(commit,nat),recirc(0x2)"
588
589 ovs_add_flow "test_nat_connect_v4" nat4 \
590 "recirc_id(0x1),ct_state(+trk-inv),in_port(1),eth(),eth_type(0x0800),ipv4()" "2"
591 ovs_add_flow "test_nat_connect_v4" nat4 \
592 "recirc_id(0x2),ct_state(+trk-inv),in_port(2),eth(),eth_type(0x0800),ipv4()" "1"
593
594 # do a ping
595 ovs_sbx "test_nat_connect_v4" ip netns exec client ping 192.168.0.20 -c 3 || return 1
596
597 # create an echo server in 'server'
598 echo "server" | \
599 ovs_netns_spawn_daemon "test_nat_connect_v4" "server" \
600 nc -lvnp 4443
601 ovs_sbx "test_nat_connect_v4" ip netns exec client nc -i 1 -zv 192.168.0.20 4443 || return 1
602
603 # Now test in the other direction (should fail)
604 echo "client" | \
605 ovs_netns_spawn_daemon "test_nat_connect_v4" "client" \
606 nc -lvnp 4443
607 ovs_sbx "test_nat_connect_v4" ip netns exec client nc -i 1 -zv 172.31.110.10 4443
608 if [ $? == 0 ]; then
609 info "connect to client was successful"
610 return 1
611 fi
612
613 info "done..."
614 return 0
615}
616
617# nat_related_v4 test
618# - client->server ip packets go via SNAT
619# - client solicits ICMP destination unreachable packet from server
620# - undo NAT for ICMP reply and test dst ip has been updated
621test_nat_related_v4 () {
622 which nc >/dev/null 2>/dev/null || return $ksft_skip
623
624 sbx_add "test_nat_related_v4" || return $?
625
626 ovs_add_dp "test_nat_related_v4" natrelated4 || return 1
627 info "create namespaces"
628 for ns in client server; do
629 ovs_add_netns_and_veths "test_nat_related_v4" "natrelated4" "$ns" \
630 "${ns:0:1}0" "${ns:0:1}1" || return 1
631 done
632
633 ip netns exec client ip addr add 172.31.110.10/24 dev c1
634 ip netns exec client ip link set c1 up
635 ip netns exec server ip addr add 172.31.110.20/24 dev s1
636 ip netns exec server ip link set s1 up
637
638 ip netns exec server ip route add 192.168.0.20/32 via 172.31.110.10
639
640 # Allow ARP
641 ovs_add_flow "test_nat_related_v4" natrelated4 \
642 "in_port(1),eth(),eth_type(0x0806),arp()" "2" || return 1
643 ovs_add_flow "test_nat_related_v4" natrelated4 \
644 "in_port(2),eth(),eth_type(0x0806),arp()" "1" || return 1
645
646 # Allow IP traffic from client->server, rewrite source IP with SNAT to 192.168.0.20
647 ovs_add_flow "test_nat_related_v4" natrelated4 \
648 "ct_state(-trk),in_port(1),eth(),eth_type(0x0800),ipv4(dst=172.31.110.20)" \
649 "ct(commit,nat(src=192.168.0.20)),recirc(0x1)" || return 1
650 ovs_add_flow "test_nat_related_v4" natrelated4 \
651 "recirc_id(0x1),ct_state(+trk-inv),in_port(1),eth(),eth_type(0x0800),ipv4()" \
652 "2" || return 1
653
654 # Allow related ICMP responses back from server and undo NAT to restore original IP
655 # Drop any ICMP related packets where dst ip hasn't been restored back to original IP
656 ovs_add_flow "test_nat_related_v4" natrelated4 \
657 "ct_state(-trk),in_port(2),eth(),eth_type(0x0800),ipv4()" \
658 "ct(commit,nat),recirc(0x2)" || return 1
659 ovs_add_flow "test_nat_related_v4" natrelated4 \
660 "recirc_id(0x2),ct_state(+rel+trk),in_port(2),eth(),eth_type(0x0800),ipv4(src=172.31.110.20,dst=172.31.110.10,proto=1),icmp()" \
661 "1" || return 1
662 ovs_add_flow "test_nat_related_v4" natrelated4 \
663 "recirc_id(0x2),ct_state(+rel+trk),in_port(2),eth(),eth_type(0x0800),ipv4(dst=192.168.0.20,proto=1),icmp()" \
664 "drop" || return 1
665
666 # Solicit destination unreachable response from server
667 ovs_sbx "test_nat_related_v4" ip netns exec client \
668 bash -c "echo a | nc -u -w 1 172.31.110.20 10000"
669
670 # Check to make sure no packets matched the drop rule with incorrect dst ip
671 python3 "$ovs_base/ovs-dpctl.py" dump-flows natrelated4 \
672 | grep "drop" | grep "packets:0" >/dev/null || return 1
673
674 info "done..."
675 return 0
676}
677
678# netlink_validation
679# - Create a dp
680# - check no warning with "old version" simulation
681test_netlink_checks () {
682 sbx_add "test_netlink_checks" || return 1
683
684 info "setting up new DP"
685 ovs_add_dp "test_netlink_checks" nv0 || return 1
686 # now try again
687 PRE_TEST=$(dmesg | grep -E "RIP: [0-9a-fA-Fx]+:ovs_dp_cmd_new\+")
688 ovs_add_dp "test_netlink_checks" nv0 -V 0 || return 1
689 POST_TEST=$(dmesg | grep -E "RIP: [0-9a-fA-Fx]+:ovs_dp_cmd_new\+")
690 if [ "$PRE_TEST" != "$POST_TEST" ]; then
691 info "failed - gen warning"
692 return 1
693 fi
694
695 ovs_add_netns_and_veths "test_netlink_checks" nv0 left left0 l0 || \
696 return 1
697 ovs_add_netns_and_veths "test_netlink_checks" nv0 right right0 r0 || \
698 return 1
699 [ $(python3 $ovs_base/ovs-dpctl.py show nv0 | grep port | \
700 wc -l) == 3 ] || \
701 return 1
702 ovs_del_if "test_netlink_checks" nv0 right0 || return 1
703 [ $(python3 $ovs_base/ovs-dpctl.py show nv0 | grep port | \
704 wc -l) == 2 ] || \
705 return 1
706
707 info "Checking clone depth"
708 ERR_MSG="Flow actions may not be safe on all matching packets"
709 PRE_TEST=$(dmesg | grep -c "${ERR_MSG}")
710 ovs_add_flow "test_netlink_checks" nv0 \
711 'in_port(1),eth(),eth_type(0x800),ipv4()' \
712 'clone(clone(clone(clone(clone(clone(clone(clone(clone(clone(clone(clone(clone(clone(clone(clone(clone(drop)))))))))))))))))' \
713 >/dev/null 2>&1 && return 1
714 POST_TEST=$(dmesg | grep -c "${ERR_MSG}")
715
716 if [ "$PRE_TEST" == "$POST_TEST" ]; then
717 info "failed - clone depth too large"
718 return 1
719 fi
720
721 PRE_TEST=$(dmesg | grep -c "${ERR_MSG}")
722 ovs_add_flow "test_netlink_checks" nv0 \
723 'in_port(1),eth(),eth_type(0x0806),arp()' 'drop(0),2' \
724 &> /dev/null && return 1
725 POST_TEST=$(dmesg | grep -c "${ERR_MSG}")
726 if [ "$PRE_TEST" == "$POST_TEST" ]; then
727 info "failed - error not generated"
728 return 1
729 fi
730 return 0
731}
732
733test_upcall_interfaces() {
734 sbx_add "test_upcall_interfaces" || return 1
735
736 info "setting up new DP"
737 ovs_add_dp "test_upcall_interfaces" ui0 -V 2:1 || return 1
738
739 ovs_add_netns_and_veths "test_upcall_interfaces" ui0 upc left0 l0 \
740 172.31.110.1/24 -u || return 1
741
742 ovs_wait grep -q "listening on upcall packet handler" ${ovs_dir}/left0.out
743
744 info "sending arping"
745 ip netns exec upc arping -I l0 172.31.110.20 -c 1 \
746 >$ovs_dir/arping.stdout 2>$ovs_dir/arping.stderr
747
748 grep -E "MISS upcall\[0/yes\]: .*arp\(sip=172.31.110.1,tip=172.31.110.20,op=1,sha=" $ovs_dir/left0.out >/dev/null 2>&1 || return 1
749 return 0
750}
751
752run_test() {
753 (
754 tname="$1"
755 tdesc="$2"
756
757 if python3 ovs-dpctl.py -h 2>&1 | \
758 grep -E "Need to (install|upgrade) the python" >/dev/null 2>&1; then
759 stdbuf -o0 printf "TEST: %-60s [PYLIB]\n" "${tdesc}"
760 return $ksft_skip
761 fi
762
763 python3 ovs-dpctl.py show >/dev/null 2>&1 || \
764 echo "[DPCTL] show exception."
765
766 if ! lsmod | grep openvswitch >/dev/null 2>&1; then
767 stdbuf -o0 printf "TEST: %-60s [NOMOD]\n" "${tdesc}"
768 return $ksft_skip
769 fi
770
771 printf "TEST: %-60s [START]\n" "${tname}"
772
773 unset IFS
774
775 eval test_${tname}
776 ret=$?
777
778 if [ $ret -eq 0 ]; then
779 printf "TEST: %-60s [ OK ]\n" "${tdesc}"
780 ovs_exit_sig
781 rm -rf "$ovs_dir"
782 elif [ $ret -eq 1 ]; then
783 printf "TEST: %-60s [FAIL]\n" "${tdesc}"
784 if [ "${PAUSE_ON_FAIL}" = "yes" ]; then
785 echo
786 echo "Pausing. Logs in $ovs_dir/. Hit enter to continue"
787 read a
788 fi
789 ovs_exit_sig
790 [ "${PAUSE_ON_FAIL}" = "yes" ] || rm -rf "$ovs_dir"
791 exit 1
792 elif [ $ret -eq $ksft_skip ]; then
793 printf "TEST: %-60s [SKIP]\n" "${tdesc}"
794 elif [ $ret -eq 2 ]; then
795 rm -rf test_${tname}
796 run_test "$1" "$2"
797 fi
798
799 return $ret
800 )
801 ret=$?
802 case $ret in
803 0)
804 [ $all_skipped = true ] && [ $exitcode=$ksft_skip ] && exitcode=0
805 all_skipped=false
806 ;;
807 $ksft_skip)
808 [ $all_skipped = true ] && exitcode=$ksft_skip
809 ;;
810 *)
811 all_skipped=false
812 exitcode=1
813 ;;
814 esac
815
816 return $ret
817}
818
819
820exitcode=0
821desc=0
822all_skipped=true
823
824while getopts :pvt o
825do
826 case $o in
827 p) PAUSE_ON_FAIL=yes;;
828 v) VERBOSE=1;;
829 t) if which tcpdump > /dev/null 2>&1; then
830 TRACING=1
831 else
832 echo "=== tcpdump not available, tracing disabled"
833 fi
834 ;;
835 *) usage;;
836 esac
837done
838shift $(($OPTIND-1))
839
840IFS="
841"
842
843for arg do
844 # Check first that all requested tests are available before running any
845 command -v > /dev/null "test_${arg}" || { echo "=== Test ${arg} not found"; usage; }
846done
847
848name=""
849desc=""
850for t in ${tests}; do
851 [ "${name}" = "" ] && name="${t}" && continue
852 [ "${desc}" = "" ] && desc="${t}"
853
854 run_this=1
855 for arg do
856 [ "${arg}" != "${arg#--*}" ] && continue
857 [ "${arg}" = "${name}" ] && run_this=1 && break
858 run_this=0
859 done
860 if [ $run_this -eq 1 ]; then
861 run_test "${name}" "${desc}"
862 fi
863 name=""
864 desc=""
865done
866
867exit ${exitcode}