mlxsw does not support VXLAN devices with a physical device attached and vetoes such configurations upon enslavement to an offloaded bridge. Commit0ce1822c2a("vxlan: add adjacent link to limit depth level") changed the VXLAN device to be an upper of the physical device which causes mlxsw to veto the creation of the VXLAN device with "Unknown upper device type". This is OK as this configuration is not supported, but it prevents us from testing bad flows involving the enslavement of VXLAN devices with a physical device to a bridge, regardless if the physical device is an mlxsw netdev or not. Adjust the test to use a dummy device as a physical device instead of a mlxsw netdev. Fixes:0ce1822c2a("vxlan: add adjacent link to limit depth level") Signed-off-by: Ido Schimmel <idosch@mellanox.com> Acked-by: Jiri Pirko <jiri@mellanox.com> Signed-off-by: David S. Miller <davem@davemloft.net>
1126 lines
28 KiB
Bash
Executable File
1126 lines
28 KiB
Bash
Executable File
#!/bin/bash
|
|
# SPDX-License-Identifier: GPL-2.0
|
|
#
|
|
# Test various aspects of VxLAN offloading which are specific to mlxsw, such
|
|
# as sanitization of invalid configurations and offload indication.
|
|
|
|
lib_dir=$(dirname $0)/../../../net/forwarding
|
|
|
|
ALL_TESTS="sanitization_test offload_indication_test \
|
|
sanitization_vlan_aware_test offload_indication_vlan_aware_test"
|
|
NUM_NETIFS=2
|
|
source $lib_dir/lib.sh
|
|
|
|
setup_prepare()
|
|
{
|
|
swp1=${NETIFS[p1]}
|
|
swp2=${NETIFS[p2]}
|
|
|
|
ip link set dev $swp1 up
|
|
ip link set dev $swp2 up
|
|
}
|
|
|
|
cleanup()
|
|
{
|
|
pre_cleanup
|
|
|
|
ip link set dev $swp2 down
|
|
ip link set dev $swp1 down
|
|
}
|
|
|
|
sanitization_single_dev_test_pass()
|
|
{
|
|
ip link set dev $swp1 master br0
|
|
check_err $?
|
|
ip link set dev vxlan0 master br0
|
|
check_err $?
|
|
|
|
ip link set dev $swp1 nomaster
|
|
|
|
ip link set dev $swp1 master br0
|
|
check_err $?
|
|
}
|
|
|
|
sanitization_single_dev_test_fail()
|
|
{
|
|
ip link set dev $swp1 master br0
|
|
check_err $?
|
|
ip link set dev vxlan0 master br0 &> /dev/null
|
|
check_fail $?
|
|
|
|
ip link set dev $swp1 nomaster
|
|
|
|
ip link set dev vxlan0 master br0
|
|
check_err $?
|
|
ip link set dev $swp1 master br0 &> /dev/null
|
|
check_fail $?
|
|
}
|
|
|
|
sanitization_single_dev_valid_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
sanitization_single_dev_test_pass
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device - valid configuration"
|
|
}
|
|
|
|
sanitization_single_dev_vlan_aware_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0 vlan_filtering 1
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
sanitization_single_dev_test_pass
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with a vlan-aware bridge"
|
|
}
|
|
|
|
sanitization_single_dev_mcast_enabled_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
sanitization_single_dev_test_fail
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with a multicast enabled bridge"
|
|
}
|
|
|
|
sanitization_single_dev_mcast_group_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
ip link add name dummy1 up type dummy
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789 \
|
|
dev dummy1 group 239.0.0.1
|
|
|
|
sanitization_single_dev_test_fail
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev dummy1
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with a multicast group"
|
|
}
|
|
|
|
sanitization_single_dev_no_local_ip_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit dstport 4789
|
|
|
|
sanitization_single_dev_test_fail
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with no local ip"
|
|
}
|
|
|
|
sanitization_single_dev_local_ipv6_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 2001:db8::1 dstport 4789
|
|
|
|
sanitization_single_dev_test_fail
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with local ipv6 address"
|
|
}
|
|
|
|
sanitization_single_dev_learning_enabled_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 learning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
sanitization_single_dev_test_pass
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with learning enabled"
|
|
}
|
|
|
|
sanitization_single_dev_local_interface_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
ip link add name dummy1 up type dummy
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789 dev dummy1
|
|
|
|
sanitization_single_dev_test_fail
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev dummy1
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with local interface"
|
|
}
|
|
|
|
sanitization_single_dev_port_range_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789 \
|
|
srcport 4000 5000
|
|
|
|
sanitization_single_dev_test_fail
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with udp source port range"
|
|
}
|
|
|
|
sanitization_single_dev_tos_static_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos 20 local 198.51.100.1 dstport 4789
|
|
|
|
sanitization_single_dev_test_fail
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with static tos"
|
|
}
|
|
|
|
sanitization_single_dev_ttl_inherit_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl inherit tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
sanitization_single_dev_test_fail
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with inherit ttl"
|
|
}
|
|
|
|
sanitization_single_dev_udp_checksum_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning udpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
sanitization_single_dev_test_fail
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
|
|
log_test "vxlan device with udp checksum"
|
|
}
|
|
|
|
sanitization_single_dev_test()
|
|
{
|
|
# These tests make sure that we correctly sanitize VxLAN device
|
|
# configurations we do not support
|
|
sanitization_single_dev_valid_test
|
|
sanitization_single_dev_vlan_aware_test
|
|
sanitization_single_dev_mcast_enabled_test
|
|
sanitization_single_dev_mcast_group_test
|
|
sanitization_single_dev_no_local_ip_test
|
|
sanitization_single_dev_local_ipv6_test
|
|
sanitization_single_dev_learning_enabled_test
|
|
sanitization_single_dev_local_interface_test
|
|
sanitization_single_dev_port_range_test
|
|
sanitization_single_dev_tos_static_test
|
|
sanitization_single_dev_ttl_inherit_test
|
|
sanitization_single_dev_udp_checksum_test
|
|
}
|
|
|
|
sanitization_multi_devs_test_pass()
|
|
{
|
|
ip link set dev $swp1 master br0
|
|
check_err $?
|
|
ip link set dev vxlan0 master br0
|
|
check_err $?
|
|
ip link set dev $swp2 master br1
|
|
check_err $?
|
|
ip link set dev vxlan1 master br1
|
|
check_err $?
|
|
|
|
ip link set dev $swp2 nomaster
|
|
ip link set dev $swp1 nomaster
|
|
|
|
ip link set dev $swp1 master br0
|
|
check_err $?
|
|
ip link set dev $swp2 master br1
|
|
check_err $?
|
|
}
|
|
|
|
sanitization_multi_devs_test_fail()
|
|
{
|
|
ip link set dev $swp1 master br0
|
|
check_err $?
|
|
ip link set dev vxlan0 master br0
|
|
check_err $?
|
|
ip link set dev $swp2 master br1
|
|
check_err $?
|
|
ip link set dev vxlan1 master br1 &> /dev/null
|
|
check_fail $?
|
|
|
|
ip link set dev $swp2 nomaster
|
|
ip link set dev $swp1 nomaster
|
|
|
|
ip link set dev vxlan1 master br1
|
|
check_err $?
|
|
ip link set dev $swp1 master br0
|
|
check_err $?
|
|
ip link set dev $swp2 master br1 &> /dev/null
|
|
check_fail $?
|
|
}
|
|
|
|
sanitization_multi_devs_valid_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
ip link add dev br1 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
ip link add name vxlan1 up type vxlan id 20 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
sanitization_multi_devs_test_pass
|
|
|
|
ip link del dev vxlan1
|
|
ip link del dev vxlan0
|
|
ip link del dev br1
|
|
ip link del dev br0
|
|
|
|
log_test "multiple vxlan devices - valid configuration"
|
|
}
|
|
|
|
sanitization_multi_devs_ttl_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
ip link add dev br1 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
ip link add name vxlan1 up type vxlan id 20 nolearning noudpcsum \
|
|
ttl 40 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
sanitization_multi_devs_test_fail
|
|
|
|
ip link del dev vxlan1
|
|
ip link del dev vxlan0
|
|
ip link del dev br1
|
|
ip link del dev br0
|
|
|
|
log_test "multiple vxlan devices with different ttl"
|
|
}
|
|
|
|
sanitization_multi_devs_udp_dstport_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
ip link add dev br1 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
ip link add name vxlan1 up type vxlan id 20 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 5789
|
|
|
|
sanitization_multi_devs_test_fail
|
|
|
|
ip link del dev vxlan1
|
|
ip link del dev vxlan0
|
|
ip link del dev br1
|
|
ip link del dev br0
|
|
|
|
log_test "multiple vxlan devices with different udp destination port"
|
|
}
|
|
|
|
sanitization_multi_devs_local_ip_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0
|
|
ip link add dev br1 type bridge mcast_snooping 0
|
|
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
ip link add name vxlan1 up type vxlan id 20 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.2 dstport 4789
|
|
|
|
sanitization_multi_devs_test_fail
|
|
|
|
ip link del dev vxlan1
|
|
ip link del dev vxlan0
|
|
ip link del dev br1
|
|
ip link del dev br0
|
|
|
|
log_test "multiple vxlan devices with different local ip"
|
|
}
|
|
|
|
sanitization_multi_devs_test()
|
|
{
|
|
# The device has a single VTEP, which means all the VxLAN devices
|
|
# we offload must share certain properties such as source IP and
|
|
# UDP destination port. These tests make sure that we forbid
|
|
# configurations that violate this limitation
|
|
sanitization_multi_devs_valid_test
|
|
sanitization_multi_devs_ttl_test
|
|
sanitization_multi_devs_udp_dstport_test
|
|
sanitization_multi_devs_local_ip_test
|
|
}
|
|
|
|
sanitization_test()
|
|
{
|
|
sanitization_single_dev_test
|
|
sanitization_multi_devs_test
|
|
}
|
|
|
|
offload_indication_setup_create()
|
|
{
|
|
# Create a simple setup with two bridges, each with a VxLAN device
|
|
# and one local port
|
|
ip link add name br0 up type bridge mcast_snooping 0
|
|
ip link add name br1 up type bridge mcast_snooping 0
|
|
|
|
ip link set dev $swp1 master br0
|
|
ip link set dev $swp2 master br1
|
|
|
|
ip address add 198.51.100.1/32 dev lo
|
|
|
|
ip link add name vxlan0 up master br0 type vxlan id 10 nolearning \
|
|
noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
ip link add name vxlan1 up master br1 type vxlan id 20 nolearning \
|
|
noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
}
|
|
|
|
offload_indication_setup_destroy()
|
|
{
|
|
ip link del dev vxlan1
|
|
ip link del dev vxlan0
|
|
|
|
ip address del 198.51.100.1/32 dev lo
|
|
|
|
ip link set dev $swp2 nomaster
|
|
ip link set dev $swp1 nomaster
|
|
|
|
ip link del dev br1
|
|
ip link del dev br0
|
|
}
|
|
|
|
offload_indication_fdb_flood_test()
|
|
{
|
|
RET=0
|
|
|
|
bridge fdb append 00:00:00:00:00:00 dev vxlan0 self dst 198.51.100.2
|
|
|
|
bridge fdb show brport vxlan0 | grep 00:00:00:00:00:00 \
|
|
| grep -q offload
|
|
check_err $?
|
|
|
|
bridge fdb del 00:00:00:00:00:00 dev vxlan0 self
|
|
|
|
log_test "vxlan flood entry offload indication"
|
|
}
|
|
|
|
offload_indication_fdb_bridge_test()
|
|
{
|
|
RET=0
|
|
|
|
bridge fdb add de:ad:be:ef:13:37 dev vxlan0 self master static \
|
|
dst 198.51.100.2
|
|
|
|
bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep self \
|
|
| grep -q offload
|
|
check_err $?
|
|
bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep -v self \
|
|
| grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan entry offload indication - initial state"
|
|
|
|
# Remove FDB entry from the bridge driver and check that corresponding
|
|
# entry in the VxLAN driver is not marked as offloaded
|
|
RET=0
|
|
|
|
bridge fdb del de:ad:be:ef:13:37 dev vxlan0 master
|
|
bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep self \
|
|
| grep -q offload
|
|
check_fail $?
|
|
|
|
log_test "vxlan entry offload indication - after removal from bridge"
|
|
|
|
# Add the FDB entry back to the bridge driver and make sure it is
|
|
# marked as offloaded in both drivers
|
|
RET=0
|
|
|
|
bridge fdb add de:ad:be:ef:13:37 dev vxlan0 master static
|
|
bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep self \
|
|
| grep -q offload
|
|
check_err $?
|
|
bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep -v self \
|
|
| grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan entry offload indication - after re-add to bridge"
|
|
|
|
# Remove FDB entry from the VxLAN driver and check that corresponding
|
|
# entry in the bridge driver is not marked as offloaded
|
|
RET=0
|
|
|
|
bridge fdb del de:ad:be:ef:13:37 dev vxlan0 self
|
|
bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep -v self \
|
|
| grep -q offload
|
|
check_fail $?
|
|
|
|
log_test "vxlan entry offload indication - after removal from vxlan"
|
|
|
|
# Add the FDB entry back to the VxLAN driver and make sure it is
|
|
# marked as offloaded in both drivers
|
|
RET=0
|
|
|
|
bridge fdb add de:ad:be:ef:13:37 dev vxlan0 self dst 198.51.100.2
|
|
bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep self \
|
|
| grep -q offload
|
|
check_err $?
|
|
bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep -v self \
|
|
| grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan entry offload indication - after re-add to vxlan"
|
|
|
|
bridge fdb del de:ad:be:ef:13:37 dev vxlan0 self master
|
|
}
|
|
|
|
offload_indication_fdb_test()
|
|
{
|
|
offload_indication_fdb_flood_test
|
|
offload_indication_fdb_bridge_test
|
|
}
|
|
|
|
offload_indication_decap_route_test()
|
|
{
|
|
RET=0
|
|
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
ip link set dev vxlan0 down
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
ip link set dev vxlan1 down
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_fail $?
|
|
|
|
log_test "vxlan decap route - vxlan device down"
|
|
|
|
RET=0
|
|
|
|
ip link set dev vxlan1 up
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
ip link set dev vxlan0 up
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan decap route - vxlan device up"
|
|
|
|
RET=0
|
|
|
|
ip address delete 198.51.100.1/32 dev lo
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_fail $?
|
|
|
|
ip address add 198.51.100.1/32 dev lo
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan decap route - add local route"
|
|
|
|
RET=0
|
|
|
|
ip link set dev $swp1 nomaster
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
ip link set dev $swp2 nomaster
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_fail $?
|
|
|
|
ip link set dev $swp1 master br0
|
|
ip link set dev $swp2 master br1
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan decap route - local ports enslavement"
|
|
|
|
RET=0
|
|
|
|
ip link del dev br0
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
ip link del dev br1
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_fail $?
|
|
|
|
log_test "vxlan decap route - bridge device deletion"
|
|
|
|
RET=0
|
|
|
|
ip link add name br0 up type bridge mcast_snooping 0
|
|
ip link add name br1 up type bridge mcast_snooping 0
|
|
ip link set dev $swp1 master br0
|
|
ip link set dev $swp2 master br1
|
|
ip link set dev vxlan0 master br0
|
|
ip link set dev vxlan1 master br1
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
ip link del dev vxlan0
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
ip link del dev vxlan1
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_fail $?
|
|
|
|
log_test "vxlan decap route - vxlan device deletion"
|
|
|
|
ip link add name vxlan0 up master br0 type vxlan id 10 nolearning \
|
|
noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
ip link add name vxlan1 up master br1 type vxlan id 20 nolearning \
|
|
noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
}
|
|
|
|
check_fdb_offloaded()
|
|
{
|
|
local mac=00:11:22:33:44:55
|
|
local zmac=00:00:00:00:00:00
|
|
|
|
bridge fdb show dev vxlan0 | grep $mac | grep self | grep -q offload
|
|
check_err $?
|
|
bridge fdb show dev vxlan0 | grep $mac | grep master | grep -q offload
|
|
check_err $?
|
|
|
|
bridge fdb show dev vxlan0 | grep $zmac | grep self | grep -q offload
|
|
check_err $?
|
|
}
|
|
|
|
check_vxlan_fdb_not_offloaded()
|
|
{
|
|
local mac=00:11:22:33:44:55
|
|
local zmac=00:00:00:00:00:00
|
|
|
|
bridge fdb show dev vxlan0 | grep $mac | grep -q self
|
|
check_err $?
|
|
bridge fdb show dev vxlan0 | grep $mac | grep self | grep -q offload
|
|
check_fail $?
|
|
|
|
bridge fdb show dev vxlan0 | grep $zmac | grep -q self
|
|
check_err $?
|
|
bridge fdb show dev vxlan0 | grep $zmac | grep self | grep -q offload
|
|
check_fail $?
|
|
}
|
|
|
|
check_bridge_fdb_not_offloaded()
|
|
{
|
|
local mac=00:11:22:33:44:55
|
|
local zmac=00:00:00:00:00:00
|
|
|
|
bridge fdb show dev vxlan0 | grep $mac | grep -q master
|
|
check_err $?
|
|
bridge fdb show dev vxlan0 | grep $mac | grep master | grep -q offload
|
|
check_fail $?
|
|
}
|
|
|
|
__offload_indication_join_vxlan_first()
|
|
{
|
|
local vid=$1; shift
|
|
|
|
local mac=00:11:22:33:44:55
|
|
local zmac=00:00:00:00:00:00
|
|
|
|
bridge fdb append $zmac dev vxlan0 self dst 198.51.100.2
|
|
|
|
ip link set dev vxlan0 master br0
|
|
bridge fdb add dev vxlan0 $mac self master static dst 198.51.100.2
|
|
|
|
RET=0
|
|
check_vxlan_fdb_not_offloaded
|
|
ip link set dev $swp1 master br0
|
|
sleep .1
|
|
check_fdb_offloaded
|
|
log_test "offload indication - attach vxlan first"
|
|
|
|
RET=0
|
|
ip link set dev vxlan0 down
|
|
check_vxlan_fdb_not_offloaded
|
|
check_bridge_fdb_not_offloaded
|
|
log_test "offload indication - set vxlan down"
|
|
|
|
RET=0
|
|
ip link set dev vxlan0 up
|
|
sleep .1
|
|
check_fdb_offloaded
|
|
log_test "offload indication - set vxlan up"
|
|
|
|
if [[ ! -z $vid ]]; then
|
|
RET=0
|
|
bridge vlan del dev vxlan0 vid $vid
|
|
check_vxlan_fdb_not_offloaded
|
|
check_bridge_fdb_not_offloaded
|
|
log_test "offload indication - delete VLAN"
|
|
|
|
RET=0
|
|
bridge vlan add dev vxlan0 vid $vid
|
|
check_vxlan_fdb_not_offloaded
|
|
check_bridge_fdb_not_offloaded
|
|
log_test "offload indication - add tagged VLAN"
|
|
|
|
RET=0
|
|
bridge vlan add dev vxlan0 vid $vid pvid untagged
|
|
sleep .1
|
|
check_fdb_offloaded
|
|
log_test "offload indication - add pvid/untagged VLAN"
|
|
fi
|
|
|
|
RET=0
|
|
ip link set dev $swp1 nomaster
|
|
check_vxlan_fdb_not_offloaded
|
|
log_test "offload indication - detach port"
|
|
}
|
|
|
|
offload_indication_join_vxlan_first()
|
|
{
|
|
ip link add dev br0 up type bridge mcast_snooping 0
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
__offload_indication_join_vxlan_first
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
}
|
|
|
|
__offload_indication_join_vxlan_last()
|
|
{
|
|
local zmac=00:00:00:00:00:00
|
|
|
|
RET=0
|
|
|
|
bridge fdb append $zmac dev vxlan0 self dst 198.51.100.2
|
|
|
|
ip link set dev $swp1 master br0
|
|
|
|
bridge fdb show dev vxlan0 | grep $zmac | grep self | grep -q offload
|
|
check_fail $?
|
|
|
|
ip link set dev vxlan0 master br0
|
|
|
|
bridge fdb show dev vxlan0 | grep $zmac | grep self | grep -q offload
|
|
check_err $?
|
|
|
|
log_test "offload indication - attach vxlan last"
|
|
}
|
|
|
|
offload_indication_join_vxlan_last()
|
|
{
|
|
ip link add dev br0 up type bridge mcast_snooping 0
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
__offload_indication_join_vxlan_last
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
}
|
|
|
|
offload_indication_test()
|
|
{
|
|
offload_indication_setup_create
|
|
offload_indication_fdb_test
|
|
offload_indication_decap_route_test
|
|
offload_indication_setup_destroy
|
|
|
|
log_info "offload indication - replay & cleanup"
|
|
offload_indication_join_vxlan_first
|
|
offload_indication_join_vxlan_last
|
|
}
|
|
|
|
sanitization_vlan_aware_test()
|
|
{
|
|
RET=0
|
|
|
|
ip link add dev br0 type bridge mcast_snooping 0 vlan_filtering 1
|
|
|
|
ip link add name vxlan10 up master br0 type vxlan id 10 nolearning \
|
|
noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
ip link add name vxlan20 up master br0 type vxlan id 20 nolearning \
|
|
noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
# Test that when each VNI is mapped to a different VLAN we can enslave
|
|
# a port to the bridge
|
|
bridge vlan add vid 10 dev vxlan10 pvid untagged
|
|
bridge vlan add vid 20 dev vxlan20 pvid untagged
|
|
|
|
ip link set dev $swp1 master br0
|
|
check_err $?
|
|
|
|
log_test "vlan-aware - enslavement to vlan-aware bridge"
|
|
|
|
# Try to map both VNIs to the same VLAN and make sure configuration
|
|
# fails
|
|
RET=0
|
|
|
|
bridge vlan add vid 10 dev vxlan20 pvid untagged &> /dev/null
|
|
check_fail $?
|
|
|
|
log_test "vlan-aware - two vnis mapped to the same vlan"
|
|
|
|
# Test that enslavement of a port to a bridge fails when two VNIs
|
|
# are mapped to the same VLAN
|
|
RET=0
|
|
|
|
ip link set dev $swp1 nomaster
|
|
|
|
bridge vlan del vid 20 dev vxlan20 pvid untagged
|
|
bridge vlan add vid 10 dev vxlan20 pvid untagged
|
|
|
|
ip link set dev $swp1 master br0 &> /dev/null
|
|
check_fail $?
|
|
|
|
log_test "vlan-aware - failed enslavement to vlan-aware bridge"
|
|
|
|
bridge vlan del vid 10 dev vxlan20
|
|
bridge vlan add vid 20 dev vxlan20 pvid untagged
|
|
|
|
# Test that offloading of an unsupported tunnel fails when it is
|
|
# triggered by addition of VLAN to a local port
|
|
RET=0
|
|
|
|
# TOS must be set to inherit
|
|
ip link set dev vxlan10 type vxlan tos 42
|
|
|
|
ip link set dev $swp1 master br0
|
|
bridge vlan add vid 10 dev $swp1 &> /dev/null
|
|
check_fail $?
|
|
|
|
log_test "vlan-aware - failed vlan addition to a local port"
|
|
|
|
ip link set dev vxlan10 type vxlan tos inherit
|
|
|
|
ip link del dev vxlan20
|
|
ip link del dev vxlan10
|
|
ip link del dev br0
|
|
}
|
|
|
|
offload_indication_vlan_aware_setup_create()
|
|
{
|
|
# Create a simple setup with two VxLAN devices and a single VLAN-aware
|
|
# bridge
|
|
ip link add name br0 up type bridge mcast_snooping 0 vlan_filtering 1 \
|
|
vlan_default_pvid 0
|
|
|
|
ip link set dev $swp1 master br0
|
|
|
|
bridge vlan add vid 10 dev $swp1
|
|
bridge vlan add vid 20 dev $swp1
|
|
|
|
ip address add 198.51.100.1/32 dev lo
|
|
|
|
ip link add name vxlan10 up master br0 type vxlan id 10 nolearning \
|
|
noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
ip link add name vxlan20 up master br0 type vxlan id 20 nolearning \
|
|
noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
bridge vlan add vid 10 dev vxlan10 pvid untagged
|
|
bridge vlan add vid 20 dev vxlan20 pvid untagged
|
|
}
|
|
|
|
offload_indication_vlan_aware_setup_destroy()
|
|
{
|
|
bridge vlan del vid 20 dev vxlan20
|
|
bridge vlan del vid 10 dev vxlan10
|
|
|
|
ip link del dev vxlan20
|
|
ip link del dev vxlan10
|
|
|
|
ip address del 198.51.100.1/32 dev lo
|
|
|
|
bridge vlan del vid 20 dev $swp1
|
|
bridge vlan del vid 10 dev $swp1
|
|
|
|
ip link set dev $swp1 nomaster
|
|
|
|
ip link del dev br0
|
|
}
|
|
|
|
offload_indication_vlan_aware_fdb_test()
|
|
{
|
|
RET=0
|
|
|
|
log_info "vxlan entry offload indication - vlan-aware"
|
|
|
|
bridge fdb add de:ad:be:ef:13:37 dev vxlan10 self master static \
|
|
dst 198.51.100.2 vlan 10
|
|
|
|
bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep self \
|
|
| grep -q offload
|
|
check_err $?
|
|
bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep -v self \
|
|
| grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan entry offload indication - initial state"
|
|
|
|
# Remove FDB entry from the bridge driver and check that corresponding
|
|
# entry in the VxLAN driver is not marked as offloaded
|
|
RET=0
|
|
|
|
bridge fdb del de:ad:be:ef:13:37 dev vxlan10 master vlan 10
|
|
bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep self \
|
|
| grep -q offload
|
|
check_fail $?
|
|
|
|
log_test "vxlan entry offload indication - after removal from bridge"
|
|
|
|
# Add the FDB entry back to the bridge driver and make sure it is
|
|
# marked as offloaded in both drivers
|
|
RET=0
|
|
|
|
bridge fdb add de:ad:be:ef:13:37 dev vxlan10 master static vlan 10
|
|
bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep self \
|
|
| grep -q offload
|
|
check_err $?
|
|
bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep -v self \
|
|
| grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan entry offload indication - after re-add to bridge"
|
|
|
|
# Remove FDB entry from the VxLAN driver and check that corresponding
|
|
# entry in the bridge driver is not marked as offloaded
|
|
RET=0
|
|
|
|
bridge fdb del de:ad:be:ef:13:37 dev vxlan10 self
|
|
bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep -v self \
|
|
| grep -q offload
|
|
check_fail $?
|
|
|
|
log_test "vxlan entry offload indication - after removal from vxlan"
|
|
|
|
# Add the FDB entry back to the VxLAN driver and make sure it is
|
|
# marked as offloaded in both drivers
|
|
RET=0
|
|
|
|
bridge fdb add de:ad:be:ef:13:37 dev vxlan10 self dst 198.51.100.2
|
|
bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep self \
|
|
| grep -q offload
|
|
check_err $?
|
|
bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep -v self \
|
|
| grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan entry offload indication - after re-add to vxlan"
|
|
|
|
bridge fdb del de:ad:be:ef:13:37 dev vxlan10 self master vlan 10
|
|
}
|
|
|
|
offload_indication_vlan_aware_decap_route_test()
|
|
{
|
|
RET=0
|
|
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
# Toggle PVID flag on one VxLAN device and make sure route is still
|
|
# marked as offloaded
|
|
bridge vlan add vid 10 dev vxlan10 untagged
|
|
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
# Toggle PVID flag on second VxLAN device and make sure route is no
|
|
# longer marked as offloaded
|
|
bridge vlan add vid 20 dev vxlan20 untagged
|
|
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_fail $?
|
|
|
|
# Toggle PVID flag back and make sure route is marked as offloaded
|
|
bridge vlan add vid 10 dev vxlan10 pvid untagged
|
|
bridge vlan add vid 20 dev vxlan20 pvid untagged
|
|
|
|
ip route show table local | grep 198.51.100.1 | grep -q offload
|
|
check_err $?
|
|
|
|
log_test "vxlan decap route - vni map/unmap"
|
|
}
|
|
|
|
offload_indication_vlan_aware_join_vxlan_first()
|
|
{
|
|
ip link add dev br0 up type bridge mcast_snooping 0 \
|
|
vlan_filtering 1 vlan_default_pvid 1
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
__offload_indication_join_vxlan_first 1
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
}
|
|
|
|
offload_indication_vlan_aware_join_vxlan_last()
|
|
{
|
|
ip link add dev br0 up type bridge mcast_snooping 0 \
|
|
vlan_filtering 1 vlan_default_pvid 1
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
__offload_indication_join_vxlan_last
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
}
|
|
|
|
offload_indication_vlan_aware_l3vni_test()
|
|
{
|
|
local zmac=00:00:00:00:00:00
|
|
|
|
RET=0
|
|
|
|
sysctl_set net.ipv6.conf.default.disable_ipv6 1
|
|
ip link add dev br0 up type bridge mcast_snooping 0 \
|
|
vlan_filtering 1 vlan_default_pvid 0
|
|
ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \
|
|
ttl 20 tos inherit local 198.51.100.1 dstport 4789
|
|
|
|
ip link set dev $swp1 master br0
|
|
|
|
# The test will use the offload indication on the FDB entry to
|
|
# understand if the tunnel is offloaded or not
|
|
bridge fdb append $zmac dev vxlan0 self dst 192.0.2.1
|
|
|
|
ip link set dev vxlan0 master br0
|
|
bridge vlan add dev vxlan0 vid 10 pvid untagged
|
|
|
|
# No local port or router port is member in the VLAN, so tunnel should
|
|
# not be offloaded
|
|
bridge fdb show brport vxlan0 | grep $zmac | grep self \
|
|
| grep -q offload
|
|
check_fail $? "vxlan tunnel offloaded when should not"
|
|
|
|
# Configure a VLAN interface and make sure tunnel is offloaded
|
|
ip link add link br0 name br10 up type vlan id 10
|
|
sysctl_set net.ipv6.conf.br10.disable_ipv6 0
|
|
ip -6 address add 2001:db8:1::1/64 dev br10
|
|
bridge fdb show brport vxlan0 | grep $zmac | grep self \
|
|
| grep -q offload
|
|
check_err $? "vxlan tunnel not offloaded when should"
|
|
|
|
# Unlink the VXLAN device, make sure tunnel is no longer offloaded,
|
|
# then add it back to the bridge and make sure it is offloaded
|
|
ip link set dev vxlan0 nomaster
|
|
bridge fdb show brport vxlan0 | grep $zmac | grep self \
|
|
| grep -q offload
|
|
check_fail $? "vxlan tunnel offloaded after unlinked from bridge"
|
|
|
|
ip link set dev vxlan0 master br0
|
|
bridge fdb show brport vxlan0 | grep $zmac | grep self \
|
|
| grep -q offload
|
|
check_fail $? "vxlan tunnel offloaded despite no matching vid"
|
|
|
|
bridge vlan add dev vxlan0 vid 10 pvid untagged
|
|
bridge fdb show brport vxlan0 | grep $zmac | grep self \
|
|
| grep -q offload
|
|
check_err $? "vxlan tunnel not offloaded after adding vid"
|
|
|
|
log_test "vxlan - l3 vni"
|
|
|
|
ip link del dev vxlan0
|
|
ip link del dev br0
|
|
sysctl_restore net.ipv6.conf.default.disable_ipv6
|
|
}
|
|
|
|
offload_indication_vlan_aware_test()
|
|
{
|
|
offload_indication_vlan_aware_setup_create
|
|
offload_indication_vlan_aware_fdb_test
|
|
offload_indication_vlan_aware_decap_route_test
|
|
offload_indication_vlan_aware_setup_destroy
|
|
|
|
log_info "offload indication - replay & cleanup - vlan aware"
|
|
offload_indication_vlan_aware_join_vxlan_first
|
|
offload_indication_vlan_aware_join_vxlan_last
|
|
offload_indication_vlan_aware_l3vni_test
|
|
}
|
|
|
|
trap cleanup EXIT
|
|
|
|
setup_prepare
|
|
setup_wait
|
|
|
|
tests_run
|
|
|
|
exit $EXIT_STATUS
|