1 #!/bin/bash 2 # SPDX-License-Identifier: GPL-2.0 3 4 lib_dir=$(dirname $0)/../../../net/forwarding 5 6 ALL_TESTS=" 7 shared_block_drop_test 8 egress_redirect_test 9 multi_mirror_test 10 matchall_sample_egress_test 11 matchall_mirror_behind_flower_ingress_test 12 matchall_sample_behind_flower_ingress_test 13 matchall_mirror_behind_flower_egress_test 14 matchall_proto_match_test 15 police_limits_test 16 multi_police_test 17 " 18 NUM_NETIFS=2 19 20 source $lib_dir/tc_common.sh 21 source $lib_dir/lib.sh 22 source $lib_dir/devlink_lib.sh 23 source mlxsw_lib.sh 24 25 switch_create() 26 { 27 simple_if_init $swp1 192.0.2.1/24 28 simple_if_init $swp2 192.0.2.2/24 29 } 30 31 switch_destroy() 32 { 33 simple_if_fini $swp2 192.0.2.2/24 34 simple_if_fini $swp1 192.0.2.1/24 35 } 36 37 shared_block_drop_test() 38 { 39 RET=0 40 41 # It is forbidden in mlxsw driver to have mixed-bound 42 # shared block with a drop rule. 43 44 tc qdisc add dev $swp1 ingress_block 22 clsact 45 check_err $? "Failed to create clsact with ingress block" 46 47 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 48 skip_sw dst_ip 192.0.2.2 action drop 49 check_err $? "Failed to add drop rule to ingress bound block" 50 51 tc qdisc add dev $swp2 ingress_block 22 clsact 52 check_err $? "Failed to create another clsact with ingress shared block" 53 54 tc qdisc del dev $swp2 clsact 55 56 tc qdisc add dev $swp2 egress_block 22 clsact 57 check_fail $? "Incorrect success to create another clsact with egress shared block" 58 59 tc filter del block 22 protocol ip pref 1 handle 101 flower 60 61 tc qdisc add dev $swp2 egress_block 22 clsact 62 check_err $? "Failed to create another clsact with egress shared block after blocker drop rule removed" 63 64 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 65 skip_sw dst_ip 192.0.2.2 action drop 66 check_fail $? "Incorrect success to add drop rule to mixed bound block" 67 68 tc qdisc del dev $swp1 clsact 69 70 tc qdisc add dev $swp1 egress_block 22 clsact 71 check_err $? "Failed to create another clsact with egress shared block" 72 73 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 74 skip_sw dst_ip 192.0.2.2 action drop 75 check_err $? "Failed to add drop rule to egress bound shared block" 76 77 tc filter del block 22 protocol ip pref 1 handle 101 flower 78 79 tc qdisc del dev $swp2 clsact 80 tc qdisc del dev $swp1 clsact 81 82 log_test "shared block drop" 83 } 84 85 egress_redirect_test() 86 { 87 RET=0 88 89 # It is forbidden in mlxsw driver to have mirred redirect on 90 # egress-bound block. 91 92 tc qdisc add dev $swp1 ingress_block 22 clsact 93 check_err $? "Failed to create clsact with ingress block" 94 95 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 96 skip_sw dst_ip 192.0.2.2 \ 97 action mirred egress redirect dev $swp2 98 check_err $? "Failed to add redirect rule to ingress bound block" 99 100 tc qdisc add dev $swp2 ingress_block 22 clsact 101 check_err $? "Failed to create another clsact with ingress shared block" 102 103 tc qdisc del dev $swp2 clsact 104 105 tc qdisc add dev $swp2 egress_block 22 clsact 106 check_fail $? "Incorrect success to create another clsact with egress shared block" 107 108 tc filter del block 22 protocol ip pref 1 handle 101 flower 109 110 tc qdisc add dev $swp2 egress_block 22 clsact 111 check_err $? "Failed to create another clsact with egress shared block after blocker redirect rule removed" 112 113 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 114 skip_sw dst_ip 192.0.2.2 \ 115 action mirred egress redirect dev $swp2 116 check_fail $? "Incorrect success to add redirect rule to mixed bound block" 117 118 tc qdisc del dev $swp1 clsact 119 120 tc qdisc add dev $swp1 egress_block 22 clsact 121 check_err $? "Failed to create another clsact with egress shared block" 122 123 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 124 skip_sw dst_ip 192.0.2.2 \ 125 action mirred egress redirect dev $swp2 126 check_fail $? "Incorrect success to add redirect rule to egress bound shared block" 127 128 tc qdisc del dev $swp2 clsact 129 130 tc filter add block 22 protocol ip pref 1 handle 101 flower \ 131 skip_sw dst_ip 192.0.2.2 \ 132 action mirred egress redirect dev $swp2 133 check_fail $? "Incorrect success to add redirect rule to egress bound block" 134 135 tc qdisc del dev $swp1 clsact 136 137 log_test "shared block drop" 138 } 139 140 multi_mirror_test() 141 { 142 RET=0 143 144 # It is forbidden in mlxsw driver to have multiple mirror 145 # actions in a single rule. 146 147 tc qdisc add dev $swp1 clsact 148 149 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 flower \ 150 skip_sw dst_ip 192.0.2.2 \ 151 action mirred egress mirror dev $swp2 152 check_err $? "Failed to add rule with single mirror action" 153 154 tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower 155 156 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 flower \ 157 skip_sw dst_ip 192.0.2.2 \ 158 action mirred egress mirror dev $swp2 \ 159 action mirred egress mirror dev $swp1 160 check_fail $? "Incorrect success to add rule with two mirror actions" 161 162 tc qdisc del dev $swp1 clsact 163 164 log_test "multi mirror" 165 } 166 167 matchall_sample_egress_test() 168 { 169 RET=0 170 171 # It is forbidden in mlxsw driver to have matchall with sample action 172 # bound on egress. Spectrum-1 specific restriction 173 mlxsw_only_on_spectrum 1 || return 174 175 tc qdisc add dev $swp1 clsact 176 177 tc filter add dev $swp1 ingress protocol all pref 1 handle 101 \ 178 matchall skip_sw action sample rate 100 group 1 179 check_err $? "Failed to add rule with sample action on ingress" 180 181 tc filter del dev $swp1 ingress protocol all pref 1 handle 101 matchall 182 183 tc filter add dev $swp1 egress protocol all pref 1 handle 101 \ 184 matchall skip_sw action sample rate 100 group 1 185 check_fail $? "Incorrect success to add rule with sample action on egress" 186 187 tc qdisc del dev $swp1 clsact 188 189 log_test "matchall sample egress" 190 } 191 192 matchall_behind_flower_ingress_test() 193 { 194 local action=$1 195 local action_args=$2 196 197 RET=0 198 199 # On ingress, all matchall-mirror and matchall-sample 200 # rules have to be in front of the flower rules 201 202 tc qdisc add dev $swp1 clsact 203 204 tc filter add dev $swp1 ingress protocol ip pref 10 handle 101 flower \ 205 skip_sw dst_ip 192.0.2.2 action drop 206 207 tc filter add dev $swp1 ingress protocol all pref 9 handle 102 \ 208 matchall skip_sw action $action_args 209 check_err $? "Failed to add matchall rule in front of a flower rule" 210 211 tc filter del dev $swp1 ingress protocol all pref 9 handle 102 matchall 212 213 tc filter add dev $swp1 ingress protocol all pref 11 handle 102 \ 214 matchall skip_sw action $action_args 215 check_fail $? "Incorrect success to add matchall rule behind a flower rule" 216 217 tc filter del dev $swp1 ingress protocol ip pref 10 handle 101 flower 218 219 tc filter add dev $swp1 ingress protocol all pref 9 handle 102 \ 220 matchall skip_sw action $action_args 221 222 tc filter add dev $swp1 ingress protocol ip pref 10 handle 101 flower \ 223 skip_sw dst_ip 192.0.2.2 action drop 224 check_err $? "Failed to add flower rule behind a matchall rule" 225 226 tc filter del dev $swp1 ingress protocol ip pref 10 handle 101 flower 227 228 tc filter add dev $swp1 ingress protocol ip pref 8 handle 101 flower \ 229 skip_sw dst_ip 192.0.2.2 action drop 230 check_fail $? "Incorrect success to add flower rule in front of a matchall rule" 231 232 tc qdisc del dev $swp1 clsact 233 234 log_test "matchall $action flower ingress" 235 } 236 237 matchall_mirror_behind_flower_ingress_test() 238 { 239 matchall_behind_flower_ingress_test "mirror" "mirred egress mirror dev $swp2" 240 } 241 242 matchall_sample_behind_flower_ingress_test() 243 { 244 matchall_behind_flower_ingress_test "sample" "sample rate 100 group 1" 245 } 246 247 matchall_behind_flower_egress_test() 248 { 249 local action=$1 250 local action_args=$2 251 252 RET=0 253 254 # On egress, all matchall-mirror rules have to be behind the flower rules 255 256 tc qdisc add dev $swp1 clsact 257 258 tc filter add dev $swp1 egress protocol ip pref 10 handle 101 flower \ 259 skip_sw dst_ip 192.0.2.2 action drop 260 261 tc filter add dev $swp1 egress protocol all pref 11 handle 102 \ 262 matchall skip_sw action $action_args 263 check_err $? "Failed to add matchall rule in front of a flower rule" 264 265 tc filter del dev $swp1 egress protocol all pref 11 handle 102 matchall 266 267 tc filter add dev $swp1 egress protocol all pref 9 handle 102 \ 268 matchall skip_sw action $action_args 269 check_fail $? "Incorrect success to add matchall rule behind a flower rule" 270 271 tc filter del dev $swp1 egress protocol ip pref 10 handle 101 flower 272 273 tc filter add dev $swp1 egress protocol all pref 11 handle 102 \ 274 matchall skip_sw action $action_args 275 276 tc filter add dev $swp1 egress protocol ip pref 10 handle 101 flower \ 277 skip_sw dst_ip 192.0.2.2 action drop 278 check_err $? "Failed to add flower rule behind a matchall rule" 279 280 tc filter del dev $swp1 egress protocol ip pref 10 handle 101 flower 281 282 tc filter add dev $swp1 egress protocol ip pref 12 handle 101 flower \ 283 skip_sw dst_ip 192.0.2.2 action drop 284 check_fail $? "Incorrect success to add flower rule in front of a matchall rule" 285 286 tc qdisc del dev $swp1 clsact 287 288 log_test "matchall $action flower egress" 289 } 290 291 matchall_mirror_behind_flower_egress_test() 292 { 293 matchall_behind_flower_egress_test "mirror" "mirred egress mirror dev $swp2" 294 } 295 296 matchall_proto_match_test() 297 { 298 RET=0 299 300 tc qdisc add dev $swp1 clsact 301 302 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 303 matchall skip_sw \ 304 action sample group 1 rate 100 305 check_fail $? "Incorrect success to add matchall rule with protocol match" 306 307 tc qdisc del dev $swp1 clsact 308 309 log_test "matchall protocol match" 310 } 311 312 police_limits_test() 313 { 314 RET=0 315 316 tc qdisc add dev $swp1 clsact 317 318 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 319 flower skip_sw \ 320 action police rate 0.5kbit burst 1m conform-exceed drop/ok 321 check_fail $? "Incorrect success to add police action with too low rate" 322 323 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 324 flower skip_sw \ 325 action police rate 2.5tbit burst 1g conform-exceed drop/ok 326 check_fail $? "Incorrect success to add police action with too high rate" 327 328 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 329 flower skip_sw \ 330 action police rate 1.5kbit burst 1m conform-exceed drop/ok 331 check_err $? "Failed to add police action with low rate" 332 333 tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower 334 335 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 336 flower skip_sw \ 337 action police rate 1.9tbit burst 1g conform-exceed drop/ok 338 check_err $? "Failed to add police action with high rate" 339 340 tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower 341 342 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 343 flower skip_sw \ 344 action police rate 1.5kbit burst 512b conform-exceed drop/ok 345 check_fail $? "Incorrect success to add police action with too low burst size" 346 347 tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ 348 flower skip_sw \ 349 action police rate 1.5kbit burst 2k conform-exceed drop/ok 350 check_err $? "Failed to add police action with low burst size" 351 352 tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower 353 354 tc qdisc del dev $swp1 clsact 355 356 log_test "police rate and burst limits" 357 } 358 359 multi_police_test() 360 { 361 RET=0 362 363 # It is forbidden in mlxsw driver to have multiple police 364 # actions in a single rule. 365 366 tc qdisc add dev $swp1 clsact 367 368 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 \ 369 flower skip_sw \ 370 action police rate 100mbit burst 100k conform-exceed drop/ok 371 check_err $? "Failed to add rule with single police action" 372 373 tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower 374 375 tc filter add dev $swp1 ingress protocol ip pref 1 handle 101 \ 376 flower skip_sw \ 377 action police rate 100mbit burst 100k conform-exceed drop/pipe \ 378 action police rate 200mbit burst 200k conform-exceed drop/ok 379 check_fail $? "Incorrect success to add rule with two police actions" 380 381 tc qdisc del dev $swp1 clsact 382 383 log_test "multi police" 384 } 385 386 setup_prepare() 387 { 388 swp1=${NETIFS[p1]} 389 swp2=${NETIFS[p2]} 390 391 vrf_prepare 392 393 switch_create 394 } 395 396 cleanup() 397 { 398 pre_cleanup 399 400 switch_destroy 401 402 vrf_cleanup 403 } 404 405 check_tc_shblock_support 406 407 trap cleanup EXIT 408 409 setup_prepare 410 setup_wait 411 412 tests_run 413 414 exit $EXIT_STATUS
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.