#!/bin/bash # SPDX-License-Identifier: GPL-2.0 # # Test devlink-trap tunnel exceptions functionality over mlxsw. # Check all exception traps to make sure they are triggered under the right # conditions. # +-------------------------+ # | H1 | # | $h1 + | # | 192.0.2.1/28 | | # +-------------------|-----+ # | # +-------------------|-----+ # | SW1 | | # | $swp1 + | # | 192.0.2.2/28 | # | | # | + g1a (gre) | # | loc=192.0.2.65 | # | rem=192.0.2.66 | # | tos=inherit | # | | # | + $rp1 | # | | 198.51.100.1/28 | # +--|----------------------+ # | # +--|----------------------+ # | | VRF2 | # | + $rp2 | # | 198.51.100.2/28 | # +-------------------------+ lib_dir=$(dirname $0)/../../../net/forwarding ALL_TESTS=" decap_error_test " NUM_NETIFS=4 source $lib_dir/lib.sh source $lib_dir/tc_common.sh source $lib_dir/devlink_lib.sh h1_create() { simple_if_init $h1 192.0.2.1/28 } h1_destroy() { simple_if_fini $h1 192.0.2.1/28 } vrf2_create() { simple_if_init $rp2 198.51.100.2/28 } vrf2_destroy() { simple_if_fini $rp2 198.51.100.2/28 } switch_create() { __addr_add_del $swp1 add 192.0.2.2/28 tc qdisc add dev $swp1 clsact ip link set dev $swp1 up tunnel_create g1 gre 192.0.2.65 192.0.2.66 tos inherit __addr_add_del g1 add 192.0.2.65/32 ip link set dev g1 up __addr_add_del $rp1 add 198.51.100.1/28 ip link set dev $rp1 up } switch_destroy() { ip link set dev $rp1 down __addr_add_del $rp1 del 198.51.100.1/28 ip link set dev g1 down __addr_add_del g1 del 192.0.2.65/32 tunnel_destroy g1 ip link set dev $swp1 down tc qdisc del dev $swp1 clsact __addr_add_del $swp1 del 192.0.2.2/28 } setup_prepare() { h1=${NETIFS[p1]} swp1=${NETIFS[p2]} rp1=${NETIFS[p3]} rp2=${NETIFS[p4]} forwarding_enable vrf_prepare h1_create switch_create vrf2_create } cleanup() { pre_cleanup vrf2_destroy switch_destroy h1_destroy vrf_cleanup forwarding_restore } ecn_payload_get() { p=$(: )"0"$( : GRE flags )"0:00:"$( : Reserved + version )"08:00:"$( : ETH protocol type )"4"$( : IP version )"5:"$( : IHL )"00:"$( : IP TOS )"00:14:"$( : IP total length )"00:00:"$( : IP identification )"20:00:"$( : IP flags + frag off )"30:"$( : IP TTL )"01:"$( : IP proto )"E7:E6:"$( : IP header csum )"C0:00:01:01:"$( : IP saddr : 192.0.1.1 )"C0:00:02:01:"$( : IP daddr : 192.0.2.1 ) echo $p } ecn_decap_test() { local trap_name="decap_error" local desc=$1; shift local ecn_desc=$1; shift local outer_tos=$1; shift local mz_pid RET=0 tc filter add dev $swp1 egress protocol ip pref 1 handle 101 \ flower src_ip 192.0.1.1 dst_ip 192.0.2.1 action pass rp1_mac=$(mac_get $rp1) rp2_mac=$(mac_get $rp2) payload=$(ecn_payload_get) ip vrf exec v$rp2 $MZ $rp2 -c 0 -d 1msec -a $rp2_mac -b $rp1_mac \ -A 192.0.2.66 -B 192.0.2.65 -t ip \ len=48,tos=$outer_tos,proto=47,p=$payload -q & mz_pid=$! devlink_trap_exception_test $trap_name tc_check_packets "dev $swp1 egress" 101 0 check_err $? "Packets were not dropped" log_test "$desc: Inner ECN is not ECT and outer is $ecn_desc" kill $mz_pid && wait $mz_pid &> /dev/null tc filter del dev $swp1 egress protocol ip pref 1 handle 101 flower } ipip_payload_get() { local flags=$1; shift local key=$1; shift p=$(: )"$flags"$( : GRE flags )"0:00:"$( : Reserved + version )"08:00:"$( : ETH protocol type )"$key"$( : Key )"4"$( : IP version )"5:"$( : IHL )"00:"$( : IP TOS )"00:14:"$( : IP total length )"00:00:"$( : IP identification )"20:00:"$( : IP flags + frag off )"30:"$( : IP TTL )"01:"$( : IP proto )"E7:E6:"$( : IP header csum )"C0:00:01:01:"$( : IP saddr : 192.0.1.1 )"C0:00:02:01:"$( : IP daddr : 192.0.2.1 ) echo $p } no_matching_tunnel_test() { local trap_name="decap_error" local desc=$1; shift local sip=$1; shift local mz_pid RET=0 tc filter add dev $swp1 egress protocol ip pref 1 handle 101 \ flower src_ip 192.0.1.1 dst_ip 192.0.2.1 action pass rp1_mac=$(mac_get $rp1) rp2_mac=$(mac_get $rp2) payload=$(ipip_payload_get "$@") ip vrf exec v$rp2 $MZ $rp2 -c 0 -d 1msec -a $rp2_mac -b $rp1_mac \ -A $sip -B 192.0.2.65 -t ip len=48,proto=47,p=$payload -q & mz_pid=$! devlink_trap_exception_test $trap_name tc_check_packets "dev $swp1 egress" 101 0 check_err $? "Packets were not dropped" log_test "$desc" kill $mz_pid && wait $mz_pid &> /dev/null tc filter del dev $swp1 egress protocol ip pref 1 handle 101 flower } decap_error_test() { # Correct source IP - the remote address local sip=192.0.2.66 ecn_decap_test "Decap error" "ECT(1)" 01 ecn_decap_test "Decap error" "ECT(0)" 02 ecn_decap_test "Decap error" "CE" 03 no_matching_tunnel_test "Decap error: Source IP check failed" \ 192.0.2.68 "0" no_matching_tunnel_test \ "Decap error: Key exists but was not expected" $sip "2" ":E9:" # Destroy the tunnel and create new one with key __addr_add_del g1 del 192.0.2.65/32 tunnel_destroy g1 tunnel_create g1 gre 192.0.2.65 192.0.2.66 tos inherit key 233 __addr_add_del g1 add 192.0.2.65/32 no_matching_tunnel_test \ "Decap error: Key does not exist but was expected" $sip "0" no_matching_tunnel_test \ "Decap error: Packet has a wrong key field" $sip "2" "E8:" } trap cleanup EXIT setup_prepare setup_wait tests_run exit $EXIT_STATUS