Commit 6c0ee7b4 authored by Hangbin Liu's avatar Hangbin Liu Committed by Jakub Kicinski

selftests/net: convert fib_rule_tests.sh to run it in unique namespace

Here is the test result after conversion.

 ]# ./fib_rule_tests.sh

     TEST: rule6 check: oif redirect to table                  [ OK ]

     ...

     TEST: rule4 dsfield tcp connect (dsfield 0x07)            [ OK ]

 Tests passed:  66
 Tests failed:   0
Acked-by: default avatarDavid Ahern <dsahern@kernel.org>
Signed-off-by: default avatarHangbin Liu <liuhangbin@gmail.com>
Link: https://lore.kernel.org/r/20231213060856.4030084-12-liuhangbin@gmail.comSigned-off-by: default avatarJakub Kicinski <kuba@kernel.org>
parent 3a06833b
...@@ -3,14 +3,9 @@ ...@@ -3,14 +3,9 @@
# This test is for checking IPv4 and IPv6 FIB rules API # This test is for checking IPv4 and IPv6 FIB rules API
# Kselftest framework requirement - SKIP code is 4. source lib.sh
ksft_skip=4
ret=0 ret=0
PAUSE_ON_FAIL=${PAUSE_ON_FAIL:=no} PAUSE_ON_FAIL=${PAUSE_ON_FAIL:=no}
IP="ip -netns testns"
IP_PEER="ip -netns peerns"
RTABLE=100 RTABLE=100
RTABLE_PEER=101 RTABLE_PEER=101
...@@ -84,8 +79,8 @@ check_nettest() ...@@ -84,8 +79,8 @@ check_nettest()
setup() setup()
{ {
set -e set -e
ip netns add testns setup_ns testns
$IP link set dev lo up IP="ip -netns $testns"
$IP link add dummy0 type dummy $IP link add dummy0 type dummy
$IP link set dev dummy0 up $IP link set dev dummy0 up
...@@ -98,18 +93,19 @@ setup() ...@@ -98,18 +93,19 @@ setup()
cleanup() cleanup()
{ {
$IP link del dev dummy0 &> /dev/null $IP link del dev dummy0 &> /dev/null
ip netns del testns cleanup_ns $testns
} }
setup_peer() setup_peer()
{ {
set -e set -e
ip netns add peerns setup_ns peerns
IP_PEER="ip -netns $peerns"
$IP_PEER link set dev lo up $IP_PEER link set dev lo up
ip link add name veth0 netns testns type veth \ ip link add name veth0 netns $testns type veth \
peer name veth1 netns peerns peer name veth1 netns $peerns
$IP link set dev veth0 up $IP link set dev veth0 up
$IP_PEER link set dev veth1 up $IP_PEER link set dev veth1 up
...@@ -131,7 +127,7 @@ setup_peer() ...@@ -131,7 +127,7 @@ setup_peer()
cleanup_peer() cleanup_peer()
{ {
$IP link del dev veth0 $IP link del dev veth0
ip netns del peerns ip netns del $peerns
} }
fib_check_iproute_support() fib_check_iproute_support()
...@@ -270,11 +266,11 @@ fib_rule6_connect_test() ...@@ -270,11 +266,11 @@ fib_rule6_connect_test()
# (Not-ECT: 0, ECT(1): 1, ECT(0): 2, CE: 3). # (Not-ECT: 0, ECT(1): 1, ECT(0): 2, CE: 3).
# The ECN bits shouldn't influence the result of the test. # The ECN bits shouldn't influence the result of the test.
for dsfield in 0x04 0x05 0x06 0x07; do for dsfield in 0x04 0x05 0x06 0x07; do
nettest -q -6 -B -t 5 -N testns -O peerns -U -D \ nettest -q -6 -B -t 5 -N $testns -O $peerns -U -D \
-Q "${dsfield}" -l 2001:db8::1:11 -r 2001:db8::1:11 -Q "${dsfield}" -l 2001:db8::1:11 -r 2001:db8::1:11
log_test $? 0 "rule6 dsfield udp connect (dsfield ${dsfield})" log_test $? 0 "rule6 dsfield udp connect (dsfield ${dsfield})"
nettest -q -6 -B -t 5 -N testns -O peerns -Q "${dsfield}" \ nettest -q -6 -B -t 5 -N $testns -O $peerns -Q "${dsfield}" \
-l 2001:db8::1:11 -r 2001:db8::1:11 -l 2001:db8::1:11 -r 2001:db8::1:11
log_test $? 0 "rule6 dsfield tcp connect (dsfield ${dsfield})" log_test $? 0 "rule6 dsfield tcp connect (dsfield ${dsfield})"
done done
...@@ -337,11 +333,11 @@ fib_rule4_test() ...@@ -337,11 +333,11 @@ fib_rule4_test()
# need enable forwarding and disable rp_filter temporarily as all the # need enable forwarding and disable rp_filter temporarily as all the
# addresses are in the same subnet and egress device == ingress device. # addresses are in the same subnet and egress device == ingress device.
ip netns exec testns sysctl -qw net.ipv4.ip_forward=1 ip netns exec $testns sysctl -qw net.ipv4.ip_forward=1
ip netns exec testns sysctl -qw net.ipv4.conf.$DEV.rp_filter=0 ip netns exec $testns sysctl -qw net.ipv4.conf.$DEV.rp_filter=0
match="from $SRC_IP iif $DEV" match="from $SRC_IP iif $DEV"
fib_rule4_test_match_n_redirect "$match" "$match" "iif redirect to table" fib_rule4_test_match_n_redirect "$match" "$match" "iif redirect to table"
ip netns exec testns sysctl -qw net.ipv4.ip_forward=0 ip netns exec $testns sysctl -qw net.ipv4.ip_forward=0
# Reject dsfield (tos) options which have ECN bits set # Reject dsfield (tos) options which have ECN bits set
for cnt in $(seq 1 3); do for cnt in $(seq 1 3); do
...@@ -407,11 +403,11 @@ fib_rule4_connect_test() ...@@ -407,11 +403,11 @@ fib_rule4_connect_test()
# (Not-ECT: 0, ECT(1): 1, ECT(0): 2, CE: 3). # (Not-ECT: 0, ECT(1): 1, ECT(0): 2, CE: 3).
# The ECN bits shouldn't influence the result of the test. # The ECN bits shouldn't influence the result of the test.
for dsfield in 0x04 0x05 0x06 0x07; do for dsfield in 0x04 0x05 0x06 0x07; do
nettest -q -B -t 5 -N testns -O peerns -D -U -Q "${dsfield}" \ nettest -q -B -t 5 -N $testns -O $peerns -D -U -Q "${dsfield}" \
-l 198.51.100.11 -r 198.51.100.11 -l 198.51.100.11 -r 198.51.100.11
log_test $? 0 "rule4 dsfield udp connect (dsfield ${dsfield})" log_test $? 0 "rule4 dsfield udp connect (dsfield ${dsfield})"
nettest -q -B -t 5 -N testns -O peerns -Q "${dsfield}" \ nettest -q -B -t 5 -N $testns -O $peerns -Q "${dsfield}" \
-l 198.51.100.11 -r 198.51.100.11 -l 198.51.100.11 -r 198.51.100.11
log_test $? 0 "rule4 dsfield tcp connect (dsfield ${dsfield})" log_test $? 0 "rule4 dsfield tcp connect (dsfield ${dsfield})"
done done
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment