xref: /linux/tools/testing/selftests/net/rtnetlink.sh (revision 0d3b051adbb72ed81956447d0d1e54d5943ee6f5)
1#!/bin/bash
2#
3# This test is for checking rtnetlink callpaths, and get as much coverage as possible.
4#
5# set -e
6
7devdummy="test-dummy0"
8
9# Kselftest framework requirement - SKIP code is 4.
10ksft_skip=4
11
12# set global exit status, but never reset nonzero one.
13check_err()
14{
15	if [ $ret -eq 0 ]; then
16		ret=$1
17	fi
18}
19
20# same but inverted -- used when command must fail for test to pass
21check_fail()
22{
23	if [ $1 -eq 0 ]; then
24		ret=1
25	fi
26}
27
28kci_add_dummy()
29{
30	ip link add name "$devdummy" type dummy
31	check_err $?
32	ip link set "$devdummy" up
33	check_err $?
34}
35
36kci_del_dummy()
37{
38	ip link del dev "$devdummy"
39	check_err $?
40}
41
42kci_test_netconf()
43{
44	dev="$1"
45	r=$ret
46
47	ip netconf show dev "$dev" > /dev/null
48	check_err $?
49
50	for f in 4 6; do
51		ip -$f netconf show dev "$dev" > /dev/null
52		check_err $?
53	done
54
55	if [ $ret -ne 0 ] ;then
56		echo "FAIL: ip netconf show $dev"
57		test $r -eq 0 && ret=0
58		return 1
59	fi
60}
61
62# add a bridge with vlans on top
63kci_test_bridge()
64{
65	devbr="test-br0"
66	vlandev="testbr-vlan1"
67
68	local ret=0
69	ip link add name "$devbr" type bridge
70	check_err $?
71
72	ip link set dev "$devdummy" master "$devbr"
73	check_err $?
74
75	ip link set "$devbr" up
76	check_err $?
77
78	ip link add link "$devbr" name "$vlandev" type vlan id 1
79	check_err $?
80	ip addr add dev "$vlandev" 10.200.7.23/30
81	check_err $?
82	ip -6 addr add dev "$vlandev" dead:42::1234/64
83	check_err $?
84	ip -d link > /dev/null
85	check_err $?
86	ip r s t all > /dev/null
87	check_err $?
88
89	for name in "$devbr" "$vlandev" "$devdummy" ; do
90		kci_test_netconf "$name"
91	done
92
93	ip -6 addr del dev "$vlandev" dead:42::1234/64
94	check_err $?
95
96	ip link del dev "$vlandev"
97	check_err $?
98	ip link del dev "$devbr"
99	check_err $?
100
101	if [ $ret -ne 0 ];then
102		echo "FAIL: bridge setup"
103		return 1
104	fi
105	echo "PASS: bridge setup"
106
107}
108
109kci_test_gre()
110{
111	gredev=neta
112	rem=10.42.42.1
113	loc=10.0.0.1
114
115	local ret=0
116	ip tunnel add $gredev mode gre remote $rem local $loc ttl 1
117	check_err $?
118	ip link set $gredev up
119	check_err $?
120	ip addr add 10.23.7.10 dev $gredev
121	check_err $?
122	ip route add 10.23.8.0/30 dev $gredev
123	check_err $?
124	ip addr add dev "$devdummy" 10.23.7.11/24
125	check_err $?
126	ip link > /dev/null
127	check_err $?
128	ip addr > /dev/null
129	check_err $?
130
131	kci_test_netconf "$gredev"
132
133	ip addr del dev "$devdummy" 10.23.7.11/24
134	check_err $?
135
136	ip link del $gredev
137	check_err $?
138
139	if [ $ret -ne 0 ];then
140		echo "FAIL: gre tunnel endpoint"
141		return 1
142	fi
143	echo "PASS: gre tunnel endpoint"
144}
145
146# tc uses rtnetlink too, for full tc testing
147# please see tools/testing/selftests/tc-testing.
148kci_test_tc()
149{
150	dev=lo
151	local ret=0
152
153	tc qdisc add dev "$dev" root handle 1: htb
154	check_err $?
155	tc class add dev "$dev" parent 1: classid 1:10 htb rate 1mbit
156	check_err $?
157	tc filter add dev "$dev" parent 1:0 prio 5 handle ffe: protocol ip u32 divisor 256
158	check_err $?
159	tc filter add dev "$dev" parent 1:0 prio 5 handle ffd: protocol ip u32 divisor 256
160	check_err $?
161	tc filter add dev "$dev" parent 1:0 prio 5 handle ffc: protocol ip u32 divisor 256
162	check_err $?
163	tc filter add dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:3 u32 ht ffe:2: match ip src 10.0.0.3 flowid 1:10
164	check_err $?
165	tc filter add dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:2 u32 ht ffe:2: match ip src 10.0.0.2 flowid 1:10
166	check_err $?
167	tc filter show dev "$dev" parent  1:0 > /dev/null
168	check_err $?
169	tc filter del dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:3 u32
170	check_err $?
171	tc filter show dev "$dev" parent  1:0 > /dev/null
172	check_err $?
173	tc qdisc del dev "$dev" root handle 1: htb
174	check_err $?
175
176	if [ $ret -ne 0 ];then
177		echo "FAIL: tc htb hierarchy"
178		return 1
179	fi
180	echo "PASS: tc htb hierarchy"
181
182}
183
184kci_test_polrouting()
185{
186	local ret=0
187	ip rule add fwmark 1 lookup 100
188	check_err $?
189	ip route add local 0.0.0.0/0 dev lo table 100
190	check_err $?
191	ip r s t all > /dev/null
192	check_err $?
193	ip rule del fwmark 1 lookup 100
194	check_err $?
195	ip route del local 0.0.0.0/0 dev lo table 100
196	check_err $?
197
198	if [ $ret -ne 0 ];then
199		echo "FAIL: policy route test"
200		return 1
201	fi
202	echo "PASS: policy routing"
203}
204
205kci_test_route_get()
206{
207	local hash_policy=$(sysctl -n net.ipv4.fib_multipath_hash_policy)
208
209	local ret=0
210
211	ip route get 127.0.0.1 > /dev/null
212	check_err $?
213	ip route get 127.0.0.1 dev "$devdummy" > /dev/null
214	check_err $?
215	ip route get ::1 > /dev/null
216	check_err $?
217	ip route get fe80::1 dev "$devdummy" > /dev/null
218	check_err $?
219	ip route get 127.0.0.1 from 127.0.0.1 oif lo tos 0x1 mark 0x1 > /dev/null
220	check_err $?
221	ip route get ::1 from ::1 iif lo oif lo tos 0x1 mark 0x1 > /dev/null
222	check_err $?
223	ip addr add dev "$devdummy" 10.23.7.11/24
224	check_err $?
225	ip route get 10.23.7.11 from 10.23.7.12 iif "$devdummy" > /dev/null
226	check_err $?
227	ip route add 10.23.8.0/24 \
228		nexthop via 10.23.7.13 dev "$devdummy" \
229		nexthop via 10.23.7.14 dev "$devdummy"
230	check_err $?
231	sysctl -wq net.ipv4.fib_multipath_hash_policy=0
232	ip route get 10.23.8.11 > /dev/null
233	check_err $?
234	sysctl -wq net.ipv4.fib_multipath_hash_policy=1
235	ip route get 10.23.8.11 > /dev/null
236	check_err $?
237	sysctl -wq net.ipv4.fib_multipath_hash_policy="$hash_policy"
238	ip route del 10.23.8.0/24
239	check_err $?
240	ip addr del dev "$devdummy" 10.23.7.11/24
241	check_err $?
242
243	if [ $ret -ne 0 ];then
244		echo "FAIL: route get"
245		return 1
246	fi
247
248	echo "PASS: route get"
249}
250
251kci_test_addrlft()
252{
253	for i in $(seq 10 100) ;do
254		lft=$(((RANDOM%3) + 1))
255		ip addr add 10.23.11.$i/32 dev "$devdummy" preferred_lft $lft valid_lft $((lft+1))
256		check_err $?
257	done
258
259	sleep 5
260
261	ip addr show dev "$devdummy" | grep "10.23.11."
262	if [ $? -eq 0 ]; then
263		echo "FAIL: preferred_lft addresses remaining"
264		check_err 1
265		return
266	fi
267
268	echo "PASS: preferred_lft addresses have expired"
269}
270
271kci_test_promote_secondaries()
272{
273	promote=$(sysctl -n net.ipv4.conf.$devdummy.promote_secondaries)
274
275	sysctl -q net.ipv4.conf.$devdummy.promote_secondaries=1
276
277	for i in $(seq 2 254);do
278		IP="10.23.11.$i"
279		ip -f inet addr add $IP/16 brd + dev "$devdummy"
280		ifconfig "$devdummy" $IP netmask 255.255.0.0
281	done
282
283	ip addr flush dev "$devdummy"
284
285	[ $promote -eq 0 ] && sysctl -q net.ipv4.conf.$devdummy.promote_secondaries=0
286
287	echo "PASS: promote_secondaries complete"
288}
289
290kci_test_addrlabel()
291{
292	local ret=0
293
294	ip addrlabel add prefix dead::/64 dev lo label 1
295	check_err $?
296
297	ip addrlabel list |grep -q "prefix dead::/64 dev lo label 1"
298	check_err $?
299
300	ip addrlabel del prefix dead::/64 dev lo label 1 2> /dev/null
301	check_err $?
302
303	ip addrlabel add prefix dead::/64 label 1 2> /dev/null
304	check_err $?
305
306	ip addrlabel del prefix dead::/64 label 1 2> /dev/null
307	check_err $?
308
309	# concurrent add/delete
310	for i in $(seq 1 1000); do
311		ip addrlabel add prefix 1c3::/64 label 12345 2>/dev/null
312	done &
313
314	for i in $(seq 1 1000); do
315		ip addrlabel del prefix 1c3::/64 label 12345 2>/dev/null
316	done
317
318	wait
319
320	ip addrlabel del prefix 1c3::/64 label 12345 2>/dev/null
321
322	if [ $ret -ne 0 ];then
323		echo "FAIL: ipv6 addrlabel"
324		return 1
325	fi
326
327	echo "PASS: ipv6 addrlabel"
328}
329
330kci_test_ifalias()
331{
332	local ret=0
333	namewant=$(uuidgen)
334	syspathname="/sys/class/net/$devdummy/ifalias"
335
336	ip link set dev "$devdummy" alias "$namewant"
337	check_err $?
338
339	if [ $ret -ne 0 ]; then
340		echo "FAIL: cannot set interface alias of $devdummy to $namewant"
341		return 1
342	fi
343
344	ip link show "$devdummy" | grep -q "alias $namewant"
345	check_err $?
346
347	if [ -r "$syspathname" ] ; then
348		read namehave < "$syspathname"
349		if [ "$namewant" != "$namehave" ]; then
350			echo "FAIL: did set ifalias $namewant but got $namehave"
351			return 1
352		fi
353
354		namewant=$(uuidgen)
355		echo "$namewant" > "$syspathname"
356	        ip link show "$devdummy" | grep -q "alias $namewant"
357		check_err $?
358
359		# sysfs interface allows to delete alias again
360		echo "" > "$syspathname"
361
362	        ip link show "$devdummy" | grep -q "alias $namewant"
363		check_fail $?
364
365		for i in $(seq 1 100); do
366			uuidgen > "$syspathname" &
367		done
368
369		wait
370
371		# re-add the alias -- kernel should free mem when dummy dev is removed
372		ip link set dev "$devdummy" alias "$namewant"
373		check_err $?
374	fi
375
376	if [ $ret -ne 0 ]; then
377		echo "FAIL: set interface alias $devdummy to $namewant"
378		return 1
379	fi
380
381	echo "PASS: set ifalias $namewant for $devdummy"
382}
383
384kci_test_vrf()
385{
386	vrfname="test-vrf"
387	local ret=0
388
389	ip link show type vrf 2>/dev/null
390	if [ $? -ne 0 ]; then
391		echo "SKIP: vrf: iproute2 too old"
392		return $ksft_skip
393	fi
394
395	ip link add "$vrfname" type vrf table 10
396	check_err $?
397	if [ $ret -ne 0 ];then
398		echo "FAIL: can't add vrf interface, skipping test"
399		return 0
400	fi
401
402	ip -br link show type vrf | grep -q "$vrfname"
403	check_err $?
404	if [ $ret -ne 0 ];then
405		echo "FAIL: created vrf device not found"
406		return 1
407	fi
408
409	ip link set dev "$vrfname" up
410	check_err $?
411
412	ip link set dev "$devdummy" master "$vrfname"
413	check_err $?
414	ip link del dev "$vrfname"
415	check_err $?
416
417	if [ $ret -ne 0 ];then
418		echo "FAIL: vrf"
419		return 1
420	fi
421
422	echo "PASS: vrf"
423}
424
425kci_test_encap_vxlan()
426{
427	local ret=0
428	vxlan="test-vxlan0"
429	vlan="test-vlan0"
430	testns="$1"
431
432	ip -netns "$testns" link add "$vxlan" type vxlan id 42 group 239.1.1.1 \
433		dev "$devdummy" dstport 4789 2>/dev/null
434	if [ $? -ne 0 ]; then
435		echo "FAIL: can't add vxlan interface, skipping test"
436		return 0
437	fi
438	check_err $?
439
440	ip -netns "$testns" addr add 10.2.11.49/24 dev "$vxlan"
441	check_err $?
442
443	ip -netns "$testns" link set up dev "$vxlan"
444	check_err $?
445
446	ip -netns "$testns" link add link "$vxlan" name "$vlan" type vlan id 1
447	check_err $?
448
449	# changelink testcases
450	ip -netns "$testns" link set dev "$vxlan" type vxlan vni 43 2>/dev/null
451	check_fail $?
452
453	ip -netns "$testns" link set dev "$vxlan" type vxlan group ffe5::5 dev "$devdummy" 2>/dev/null
454	check_fail $?
455
456	ip -netns "$testns" link set dev "$vxlan" type vxlan ttl inherit 2>/dev/null
457	check_fail $?
458
459	ip -netns "$testns" link set dev "$vxlan" type vxlan ttl 64
460	check_err $?
461
462	ip -netns "$testns" link set dev "$vxlan" type vxlan nolearning
463	check_err $?
464
465	ip -netns "$testns" link set dev "$vxlan" type vxlan proxy 2>/dev/null
466	check_fail $?
467
468	ip -netns "$testns" link set dev "$vxlan" type vxlan norsc 2>/dev/null
469	check_fail $?
470
471	ip -netns "$testns" link set dev "$vxlan" type vxlan l2miss 2>/dev/null
472	check_fail $?
473
474	ip -netns "$testns" link set dev "$vxlan" type vxlan l3miss 2>/dev/null
475	check_fail $?
476
477	ip -netns "$testns" link set dev "$vxlan" type vxlan external 2>/dev/null
478	check_fail $?
479
480	ip -netns "$testns" link set dev "$vxlan" type vxlan udpcsum 2>/dev/null
481	check_fail $?
482
483	ip -netns "$testns" link set dev "$vxlan" type vxlan udp6zerocsumtx 2>/dev/null
484	check_fail $?
485
486	ip -netns "$testns" link set dev "$vxlan" type vxlan udp6zerocsumrx 2>/dev/null
487	check_fail $?
488
489	ip -netns "$testns" link set dev "$vxlan" type vxlan remcsumtx 2>/dev/null
490	check_fail $?
491
492	ip -netns "$testns" link set dev "$vxlan" type vxlan remcsumrx 2>/dev/null
493	check_fail $?
494
495	ip -netns "$testns" link set dev "$vxlan" type vxlan gbp 2>/dev/null
496	check_fail $?
497
498	ip -netns "$testns" link set dev "$vxlan" type vxlan gpe 2>/dev/null
499	check_fail $?
500
501	ip -netns "$testns" link del "$vxlan"
502	check_err $?
503
504	if [ $ret -ne 0 ]; then
505		echo "FAIL: vxlan"
506		return 1
507	fi
508	echo "PASS: vxlan"
509}
510
511kci_test_encap_fou()
512{
513	local ret=0
514	name="test-fou"
515	testns="$1"
516
517	ip fou help 2>&1 |grep -q 'Usage: ip fou'
518	if [ $? -ne 0 ];then
519		echo "SKIP: fou: iproute2 too old"
520		return $ksft_skip
521	fi
522
523	if ! /sbin/modprobe -q -n fou; then
524		echo "SKIP: module fou is not found"
525		return $ksft_skip
526	fi
527	/sbin/modprobe -q fou
528	ip -netns "$testns" fou add port 7777 ipproto 47 2>/dev/null
529	if [ $? -ne 0 ];then
530		echo "FAIL: can't add fou port 7777, skipping test"
531		return 1
532	fi
533
534	ip -netns "$testns" fou add port 8888 ipproto 4
535	check_err $?
536
537	ip -netns "$testns" fou del port 9999 2>/dev/null
538	check_fail $?
539
540	ip -netns "$testns" fou del port 7777
541	check_err $?
542
543	if [ $ret -ne 0 ]; then
544		echo "FAIL: fou"
545		return 1
546	fi
547
548	echo "PASS: fou"
549}
550
551# test various encap methods, use netns to avoid unwanted interference
552kci_test_encap()
553{
554	testns="testns"
555	local ret=0
556
557	ip netns add "$testns"
558	if [ $? -ne 0 ]; then
559		echo "SKIP encap tests: cannot add net namespace $testns"
560		return $ksft_skip
561	fi
562
563	ip -netns "$testns" link set lo up
564	check_err $?
565
566	ip -netns "$testns" link add name "$devdummy" type dummy
567	check_err $?
568	ip -netns "$testns" link set "$devdummy" up
569	check_err $?
570
571	kci_test_encap_vxlan "$testns"
572	check_err $?
573	kci_test_encap_fou "$testns"
574	check_err $?
575
576	ip netns del "$testns"
577	return $ret
578}
579
580kci_test_macsec()
581{
582	msname="test_macsec0"
583	local ret=0
584
585	ip macsec help 2>&1 | grep -q "^Usage: ip macsec"
586	if [ $? -ne 0 ]; then
587		echo "SKIP: macsec: iproute2 too old"
588		return $ksft_skip
589	fi
590
591	ip link add link "$devdummy" "$msname" type macsec port 42 encrypt on
592	check_err $?
593	if [ $ret -ne 0 ];then
594		echo "FAIL: can't add macsec interface, skipping test"
595		return 1
596	fi
597
598	ip macsec add "$msname" tx sa 0 pn 1024 on key 01 12345678901234567890123456789012
599	check_err $?
600
601	ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef"
602	check_err $?
603
604	ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef" sa 0 pn 1 on key 00 0123456789abcdef0123456789abcdef
605	check_err $?
606
607	ip macsec show > /dev/null
608	check_err $?
609
610	ip link del dev "$msname"
611	check_err $?
612
613	if [ $ret -ne 0 ];then
614		echo "FAIL: macsec"
615		return 1
616	fi
617
618	echo "PASS: macsec"
619}
620
621#-------------------------------------------------------------------
622# Example commands
623#   ip x s add proto esp src 14.0.0.52 dst 14.0.0.70 \
624#            spi 0x07 mode transport reqid 0x07 replay-window 32 \
625#            aead 'rfc4106(gcm(aes))' 1234567890123456dcba 128 \
626#            sel src 14.0.0.52/24 dst 14.0.0.70/24
627#   ip x p add dir out src 14.0.0.52/24 dst 14.0.0.70/24 \
628#            tmpl proto esp src 14.0.0.52 dst 14.0.0.70 \
629#            spi 0x07 mode transport reqid 0x07
630#
631# Subcommands not tested
632#    ip x s update
633#    ip x s allocspi
634#    ip x s deleteall
635#    ip x p update
636#    ip x p deleteall
637#    ip x p set
638#-------------------------------------------------------------------
639kci_test_ipsec()
640{
641	local ret=0
642	algo="aead rfc4106(gcm(aes)) 0x3132333435363738393031323334353664636261 128"
643	srcip=192.168.123.1
644	dstip=192.168.123.2
645	spi=7
646
647	ip addr add $srcip dev $devdummy
648
649	# flush to be sure there's nothing configured
650	ip x s flush ; ip x p flush
651	check_err $?
652
653	# start the monitor in the background
654	tmpfile=`mktemp /var/run/ipsectestXXX`
655	mpid=`(ip x m > $tmpfile & echo $!) 2>/dev/null`
656	sleep 0.2
657
658	ipsecid="proto esp src $srcip dst $dstip spi 0x07"
659	ip x s add $ipsecid \
660            mode transport reqid 0x07 replay-window 32 \
661            $algo sel src $srcip/24 dst $dstip/24
662	check_err $?
663
664	lines=`ip x s list | grep $srcip | grep $dstip | wc -l`
665	test $lines -eq 2
666	check_err $?
667
668	ip x s count | grep -q "SAD count 1"
669	check_err $?
670
671	lines=`ip x s get $ipsecid | grep $srcip | grep $dstip | wc -l`
672	test $lines -eq 2
673	check_err $?
674
675	ip x s delete $ipsecid
676	check_err $?
677
678	lines=`ip x s list | wc -l`
679	test $lines -eq 0
680	check_err $?
681
682	ipsecsel="dir out src $srcip/24 dst $dstip/24"
683	ip x p add $ipsecsel \
684		    tmpl proto esp src $srcip dst $dstip \
685		    spi 0x07 mode transport reqid 0x07
686	check_err $?
687
688	lines=`ip x p list | grep $srcip | grep $dstip | wc -l`
689	test $lines -eq 2
690	check_err $?
691
692	ip x p count | grep -q "SPD IN  0 OUT 1 FWD 0"
693	check_err $?
694
695	lines=`ip x p get $ipsecsel | grep $srcip | grep $dstip | wc -l`
696	test $lines -eq 2
697	check_err $?
698
699	ip x p delete $ipsecsel
700	check_err $?
701
702	lines=`ip x p list | wc -l`
703	test $lines -eq 0
704	check_err $?
705
706	# check the monitor results
707	kill $mpid
708	lines=`wc -l $tmpfile | cut "-d " -f1`
709	test $lines -eq 20
710	check_err $?
711	rm -rf $tmpfile
712
713	# clean up any leftovers
714	ip x s flush
715	check_err $?
716	ip x p flush
717	check_err $?
718	ip addr del $srcip/32 dev $devdummy
719
720	if [ $ret -ne 0 ]; then
721		echo "FAIL: ipsec"
722		return 1
723	fi
724	echo "PASS: ipsec"
725}
726
727#-------------------------------------------------------------------
728# Example commands
729#   ip x s add proto esp src 14.0.0.52 dst 14.0.0.70 \
730#            spi 0x07 mode transport reqid 0x07 replay-window 32 \
731#            aead 'rfc4106(gcm(aes))' 1234567890123456dcba 128 \
732#            sel src 14.0.0.52/24 dst 14.0.0.70/24
733#            offload dev sim1 dir out
734#   ip x p add dir out src 14.0.0.52/24 dst 14.0.0.70/24 \
735#            tmpl proto esp src 14.0.0.52 dst 14.0.0.70 \
736#            spi 0x07 mode transport reqid 0x07
737#
738#-------------------------------------------------------------------
739kci_test_ipsec_offload()
740{
741	local ret=0
742	algo="aead rfc4106(gcm(aes)) 0x3132333435363738393031323334353664636261 128"
743	srcip=192.168.123.3
744	dstip=192.168.123.4
745	sysfsd=/sys/kernel/debug/netdevsim/netdevsim0/ports/0/
746	sysfsf=$sysfsd/ipsec
747	sysfsnet=/sys/bus/netdevsim/devices/netdevsim0/net/
748	probed=false
749
750	# setup netdevsim since dummydev doesn't have offload support
751	if [ ! -w /sys/bus/netdevsim/new_device ] ; then
752		modprobe -q netdevsim
753		check_err $?
754		if [ $ret -ne 0 ]; then
755			echo "SKIP: ipsec_offload can't load netdevsim"
756			return $ksft_skip
757		fi
758		probed=true
759	fi
760
761	echo "0" > /sys/bus/netdevsim/new_device
762	while [ ! -d $sysfsnet ] ; do :; done
763	udevadm settle
764	dev=`ls $sysfsnet`
765
766	ip addr add $srcip dev $dev
767	ip link set $dev up
768	if [ ! -d $sysfsd ] ; then
769		echo "FAIL: ipsec_offload can't create device $dev"
770		return 1
771	fi
772	if [ ! -f $sysfsf ] ; then
773		echo "FAIL: ipsec_offload netdevsim doesn't support IPsec offload"
774		return 1
775	fi
776
777	# flush to be sure there's nothing configured
778	ip x s flush ; ip x p flush
779
780	# create offloaded SAs, both in and out
781	ip x p add dir out src $srcip/24 dst $dstip/24 \
782	    tmpl proto esp src $srcip dst $dstip spi 9 \
783	    mode transport reqid 42
784	check_err $?
785	ip x p add dir out src $dstip/24 dst $srcip/24 \
786	    tmpl proto esp src $dstip dst $srcip spi 9 \
787	    mode transport reqid 42
788	check_err $?
789
790	ip x s add proto esp src $srcip dst $dstip spi 9 \
791	    mode transport reqid 42 $algo sel src $srcip/24 dst $dstip/24 \
792	    offload dev $dev dir out
793	check_err $?
794	ip x s add proto esp src $dstip dst $srcip spi 9 \
795	    mode transport reqid 42 $algo sel src $dstip/24 dst $srcip/24 \
796	    offload dev $dev dir in
797	check_err $?
798	if [ $ret -ne 0 ]; then
799		echo "FAIL: ipsec_offload can't create SA"
800		return 1
801	fi
802
803	# does offload show up in ip output
804	lines=`ip x s list | grep -c "crypto offload parameters: dev $dev dir"`
805	if [ $lines -ne 2 ] ; then
806		echo "FAIL: ipsec_offload SA offload missing from list output"
807		check_err 1
808	fi
809
810	# use ping to exercise the Tx path
811	ping -I $dev -c 3 -W 1 -i 0 $dstip >/dev/null
812
813	# does driver have correct offload info
814	diff $sysfsf - << EOF
815SA count=2 tx=3
816sa[0] tx ipaddr=0x00000000 00000000 00000000 00000000
817sa[0]    spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1
818sa[0]    key=0x34333231 38373635 32313039 36353433
819sa[1] rx ipaddr=0x00000000 00000000 00000000 037ba8c0
820sa[1]    spi=0x00000009 proto=0x32 salt=0x61626364 crypt=1
821sa[1]    key=0x34333231 38373635 32313039 36353433
822EOF
823	if [ $? -ne 0 ] ; then
824		echo "FAIL: ipsec_offload incorrect driver data"
825		check_err 1
826	fi
827
828	# does offload get removed from driver
829	ip x s flush
830	ip x p flush
831	lines=`grep -c "SA count=0" $sysfsf`
832	if [ $lines -ne 1 ] ; then
833		echo "FAIL: ipsec_offload SA not removed from driver"
834		check_err 1
835	fi
836
837	# clean up any leftovers
838	$probed && rmmod netdevsim
839
840	if [ $ret -ne 0 ]; then
841		echo "FAIL: ipsec_offload"
842		return 1
843	fi
844	echo "PASS: ipsec_offload"
845}
846
847kci_test_gretap()
848{
849	testns="testns"
850	DEV_NS=gretap00
851	local ret=0
852
853	ip netns add "$testns"
854	if [ $? -ne 0 ]; then
855		echo "SKIP gretap tests: cannot add net namespace $testns"
856		return $ksft_skip
857	fi
858
859	ip link help gretap 2>&1 | grep -q "^Usage:"
860	if [ $? -ne 0 ];then
861		echo "SKIP: gretap: iproute2 too old"
862		ip netns del "$testns"
863		return $ksft_skip
864	fi
865
866	# test native tunnel
867	ip -netns "$testns" link add dev "$DEV_NS" type gretap seq \
868		key 102 local 172.16.1.100 remote 172.16.1.200
869	check_err $?
870
871	ip -netns "$testns" addr add dev "$DEV_NS" 10.1.1.100/24
872	check_err $?
873
874	ip -netns "$testns" link set dev $DEV_NS up
875	check_err $?
876
877	ip -netns "$testns" link del "$DEV_NS"
878	check_err $?
879
880	# test external mode
881	ip -netns "$testns" link add dev "$DEV_NS" type gretap external
882	check_err $?
883
884	ip -netns "$testns" link del "$DEV_NS"
885	check_err $?
886
887	if [ $ret -ne 0 ]; then
888		echo "FAIL: gretap"
889		ip netns del "$testns"
890		return 1
891	fi
892	echo "PASS: gretap"
893
894	ip netns del "$testns"
895}
896
897kci_test_ip6gretap()
898{
899	testns="testns"
900	DEV_NS=ip6gretap00
901	local ret=0
902
903	ip netns add "$testns"
904	if [ $? -ne 0 ]; then
905		echo "SKIP ip6gretap tests: cannot add net namespace $testns"
906		return $ksft_skip
907	fi
908
909	ip link help ip6gretap 2>&1 | grep -q "^Usage:"
910	if [ $? -ne 0 ];then
911		echo "SKIP: ip6gretap: iproute2 too old"
912		ip netns del "$testns"
913		return $ksft_skip
914	fi
915
916	# test native tunnel
917	ip -netns "$testns" link add dev "$DEV_NS" type ip6gretap seq \
918		key 102 local fc00:100::1 remote fc00:100::2
919	check_err $?
920
921	ip -netns "$testns" addr add dev "$DEV_NS" fc00:200::1/96
922	check_err $?
923
924	ip -netns "$testns" link set dev $DEV_NS up
925	check_err $?
926
927	ip -netns "$testns" link del "$DEV_NS"
928	check_err $?
929
930	# test external mode
931	ip -netns "$testns" link add dev "$DEV_NS" type ip6gretap external
932	check_err $?
933
934	ip -netns "$testns" link del "$DEV_NS"
935	check_err $?
936
937	if [ $ret -ne 0 ]; then
938		echo "FAIL: ip6gretap"
939		ip netns del "$testns"
940		return 1
941	fi
942	echo "PASS: ip6gretap"
943
944	ip netns del "$testns"
945}
946
947kci_test_erspan()
948{
949	testns="testns"
950	DEV_NS=erspan00
951	local ret=0
952
953	ip link help erspan 2>&1 | grep -q "^Usage:"
954	if [ $? -ne 0 ];then
955		echo "SKIP: erspan: iproute2 too old"
956		return $ksft_skip
957	fi
958
959	ip netns add "$testns"
960	if [ $? -ne 0 ]; then
961		echo "SKIP erspan tests: cannot add net namespace $testns"
962		return $ksft_skip
963	fi
964
965	# test native tunnel erspan v1
966	ip -netns "$testns" link add dev "$DEV_NS" type erspan seq \
967		key 102 local 172.16.1.100 remote 172.16.1.200 \
968		erspan_ver 1 erspan 488
969	check_err $?
970
971	ip -netns "$testns" addr add dev "$DEV_NS" 10.1.1.100/24
972	check_err $?
973
974	ip -netns "$testns" link set dev $DEV_NS up
975	check_err $?
976
977	ip -netns "$testns" link del "$DEV_NS"
978	check_err $?
979
980	# test native tunnel erspan v2
981	ip -netns "$testns" link add dev "$DEV_NS" type erspan seq \
982		key 102 local 172.16.1.100 remote 172.16.1.200 \
983		erspan_ver 2 erspan_dir ingress erspan_hwid 7
984	check_err $?
985
986	ip -netns "$testns" addr add dev "$DEV_NS" 10.1.1.100/24
987	check_err $?
988
989	ip -netns "$testns" link set dev $DEV_NS up
990	check_err $?
991
992	ip -netns "$testns" link del "$DEV_NS"
993	check_err $?
994
995	# test external mode
996	ip -netns "$testns" link add dev "$DEV_NS" type erspan external
997	check_err $?
998
999	ip -netns "$testns" link del "$DEV_NS"
1000	check_err $?
1001
1002	if [ $ret -ne 0 ]; then
1003		echo "FAIL: erspan"
1004		ip netns del "$testns"
1005		return 1
1006	fi
1007	echo "PASS: erspan"
1008
1009	ip netns del "$testns"
1010}
1011
1012kci_test_ip6erspan()
1013{
1014	testns="testns"
1015	DEV_NS=ip6erspan00
1016	local ret=0
1017
1018	ip link help ip6erspan 2>&1 | grep -q "^Usage:"
1019	if [ $? -ne 0 ];then
1020		echo "SKIP: ip6erspan: iproute2 too old"
1021		return $ksft_skip
1022	fi
1023
1024	ip netns add "$testns"
1025	if [ $? -ne 0 ]; then
1026		echo "SKIP ip6erspan tests: cannot add net namespace $testns"
1027		return $ksft_skip
1028	fi
1029
1030	# test native tunnel ip6erspan v1
1031	ip -netns "$testns" link add dev "$DEV_NS" type ip6erspan seq \
1032		key 102 local fc00:100::1 remote fc00:100::2 \
1033		erspan_ver 1 erspan 488
1034	check_err $?
1035
1036	ip -netns "$testns" addr add dev "$DEV_NS" 10.1.1.100/24
1037	check_err $?
1038
1039	ip -netns "$testns" link set dev $DEV_NS up
1040	check_err $?
1041
1042	ip -netns "$testns" link del "$DEV_NS"
1043	check_err $?
1044
1045	# test native tunnel ip6erspan v2
1046	ip -netns "$testns" link add dev "$DEV_NS" type ip6erspan seq \
1047		key 102 local fc00:100::1 remote fc00:100::2 \
1048		erspan_ver 2 erspan_dir ingress erspan_hwid 7
1049	check_err $?
1050
1051	ip -netns "$testns" addr add dev "$DEV_NS" 10.1.1.100/24
1052	check_err $?
1053
1054	ip -netns "$testns" link set dev $DEV_NS up
1055	check_err $?
1056
1057	ip -netns "$testns" link del "$DEV_NS"
1058	check_err $?
1059
1060	# test external mode
1061	ip -netns "$testns" link add dev "$DEV_NS" \
1062		type ip6erspan external
1063	check_err $?
1064
1065	ip -netns "$testns" link del "$DEV_NS"
1066	check_err $?
1067
1068	if [ $ret -ne 0 ]; then
1069		echo "FAIL: ip6erspan"
1070		ip netns del "$testns"
1071		return 1
1072	fi
1073	echo "PASS: ip6erspan"
1074
1075	ip netns del "$testns"
1076}
1077
1078kci_test_fdb_get()
1079{
1080	IP="ip -netns testns"
1081	BRIDGE="bridge -netns testns"
1082	brdev="test-br0"
1083	vxlandev="vxlan10"
1084	test_mac=de:ad:be:ef:13:37
1085	localip="10.0.2.2"
1086	dstip="10.0.2.3"
1087	local ret=0
1088
1089	bridge fdb help 2>&1 |grep -q 'bridge fdb get'
1090	if [ $? -ne 0 ];then
1091		echo "SKIP: fdb get tests: iproute2 too old"
1092		return $ksft_skip
1093	fi
1094
1095	ip netns add testns
1096	if [ $? -ne 0 ]; then
1097		echo "SKIP fdb get tests: cannot add net namespace $testns"
1098		return $ksft_skip
1099	fi
1100
1101	$IP link add "$vxlandev" type vxlan id 10 local $localip \
1102                dstport 4789 2>/dev/null
1103	check_err $?
1104	$IP link add name "$brdev" type bridge &>/dev/null
1105	check_err $?
1106	$IP link set dev "$vxlandev" master "$brdev" &>/dev/null
1107	check_err $?
1108	$BRIDGE fdb add $test_mac dev "$vxlandev" master &>/dev/null
1109	check_err $?
1110	$BRIDGE fdb add $test_mac dev "$vxlandev" dst $dstip self &>/dev/null
1111	check_err $?
1112
1113	$BRIDGE fdb get $test_mac brport "$vxlandev" 2>/dev/null | grep -q "dev $vxlandev master $brdev"
1114	check_err $?
1115	$BRIDGE fdb get $test_mac br "$brdev" 2>/dev/null | grep -q "dev $vxlandev master $brdev"
1116	check_err $?
1117	$BRIDGE fdb get $test_mac dev "$vxlandev" self 2>/dev/null | grep -q "dev $vxlandev dst $dstip"
1118	check_err $?
1119
1120	ip netns del testns &>/dev/null
1121
1122	if [ $ret -ne 0 ]; then
1123		echo "FAIL: bridge fdb get"
1124		return 1
1125	fi
1126
1127	echo "PASS: bridge fdb get"
1128}
1129
1130kci_test_neigh_get()
1131{
1132	dstmac=de:ad:be:ef:13:37
1133	dstip=10.0.2.4
1134	dstip6=dead::2
1135	local ret=0
1136
1137	ip neigh help 2>&1 |grep -q 'ip neigh get'
1138	if [ $? -ne 0 ];then
1139		echo "SKIP: fdb get tests: iproute2 too old"
1140		return $ksft_skip
1141	fi
1142
1143	# ipv4
1144	ip neigh add $dstip lladdr $dstmac dev "$devdummy"  > /dev/null
1145	check_err $?
1146	ip neigh get $dstip dev "$devdummy" 2> /dev/null | grep -q "$dstmac"
1147	check_err $?
1148	ip neigh del $dstip lladdr $dstmac dev "$devdummy"  > /dev/null
1149	check_err $?
1150
1151	# ipv4 proxy
1152	ip neigh add proxy $dstip dev "$devdummy" > /dev/null
1153	check_err $?
1154	ip neigh get proxy $dstip dev "$devdummy" 2>/dev/null | grep -q "$dstip"
1155	check_err $?
1156	ip neigh del proxy $dstip dev "$devdummy" > /dev/null
1157	check_err $?
1158
1159	# ipv6
1160	ip neigh add $dstip6 lladdr $dstmac dev "$devdummy"  > /dev/null
1161	check_err $?
1162	ip neigh get $dstip6 dev "$devdummy" 2> /dev/null | grep -q "$dstmac"
1163	check_err $?
1164	ip neigh del $dstip6 lladdr $dstmac dev "$devdummy"  > /dev/null
1165	check_err $?
1166
1167	# ipv6 proxy
1168	ip neigh add proxy $dstip6 dev "$devdummy" > /dev/null
1169	check_err $?
1170	ip neigh get proxy $dstip6 dev "$devdummy" 2>/dev/null | grep -q "$dstip6"
1171	check_err $?
1172	ip neigh del proxy $dstip6 dev "$devdummy" > /dev/null
1173	check_err $?
1174
1175	if [ $ret -ne 0 ];then
1176		echo "FAIL: neigh get"
1177		return 1
1178	fi
1179
1180	echo "PASS: neigh get"
1181}
1182
1183kci_test_bridge_parent_id()
1184{
1185	local ret=0
1186	sysfsnet=/sys/bus/netdevsim/devices/netdevsim
1187	probed=false
1188
1189	if [ ! -w /sys/bus/netdevsim/new_device ] ; then
1190		modprobe -q netdevsim
1191		check_err $?
1192		if [ $ret -ne 0 ]; then
1193			echo "SKIP: bridge_parent_id can't load netdevsim"
1194			return $ksft_skip
1195		fi
1196		probed=true
1197	fi
1198
1199	echo "10 1" > /sys/bus/netdevsim/new_device
1200	while [ ! -d ${sysfsnet}10 ] ; do :; done
1201	echo "20 1" > /sys/bus/netdevsim/new_device
1202	while [ ! -d ${sysfsnet}20 ] ; do :; done
1203	udevadm settle
1204	dev10=`ls ${sysfsnet}10/net/`
1205	dev20=`ls ${sysfsnet}20/net/`
1206
1207	ip link add name test-bond0 type bond mode 802.3ad
1208	ip link set dev $dev10 master test-bond0
1209	ip link set dev $dev20 master test-bond0
1210	ip link add name test-br0 type bridge
1211	ip link set dev test-bond0 master test-br0
1212	check_err $?
1213
1214	# clean up any leftovers
1215	ip link del dev test-br0
1216	ip link del dev test-bond0
1217	echo 20 > /sys/bus/netdevsim/del_device
1218	echo 10 > /sys/bus/netdevsim/del_device
1219	$probed && rmmod netdevsim
1220
1221	if [ $ret -ne 0 ]; then
1222		echo "FAIL: bridge_parent_id"
1223		return 1
1224	fi
1225	echo "PASS: bridge_parent_id"
1226}
1227
1228kci_test_rtnl()
1229{
1230	local ret=0
1231	kci_add_dummy
1232	if [ $ret -ne 0 ];then
1233		echo "FAIL: cannot add dummy interface"
1234		return 1
1235	fi
1236
1237	kci_test_polrouting
1238	check_err $?
1239	kci_test_route_get
1240	check_err $?
1241	kci_test_addrlft
1242	check_err $?
1243	kci_test_promote_secondaries
1244	check_err $?
1245	kci_test_tc
1246	check_err $?
1247	kci_test_gre
1248	check_err $?
1249	kci_test_gretap
1250	check_err $?
1251	kci_test_ip6gretap
1252	check_err $?
1253	kci_test_erspan
1254	check_err $?
1255	kci_test_ip6erspan
1256	check_err $?
1257	kci_test_bridge
1258	check_err $?
1259	kci_test_addrlabel
1260	check_err $?
1261	kci_test_ifalias
1262	check_err $?
1263	kci_test_vrf
1264	check_err $?
1265	kci_test_encap
1266	check_err $?
1267	kci_test_macsec
1268	check_err $?
1269	kci_test_ipsec
1270	check_err $?
1271	kci_test_ipsec_offload
1272	check_err $?
1273	kci_test_fdb_get
1274	check_err $?
1275	kci_test_neigh_get
1276	check_err $?
1277	kci_test_bridge_parent_id
1278	check_err $?
1279
1280	kci_del_dummy
1281	return $ret
1282}
1283
1284#check for needed privileges
1285if [ "$(id -u)" -ne 0 ];then
1286	echo "SKIP: Need root privileges"
1287	exit $ksft_skip
1288fi
1289
1290for x in ip tc;do
1291	$x -Version 2>/dev/null >/dev/null
1292	if [ $? -ne 0 ];then
1293		echo "SKIP: Could not run test without the $x tool"
1294		exit $ksft_skip
1295	fi
1296done
1297
1298kci_test_rtnl
1299
1300exit $?
1301