Commit 04cc99d9 authored by Ido Schimmel's avatar Ido Schimmel Committed by David S. Miller

selftests: mlxsw: Do not hard code trap group name

It can be derived dynamically from the trap's name, so drop it.
Signed-off-by: default avatarIdo Schimmel <idosch@mellanox.com>
Reviewed-by: default avatarJiri Pirko <jiri@mellanox.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 84e0d835
...@@ -107,7 +107,7 @@ ingress_flow_action_drop_test() ...@@ -107,7 +107,7 @@ ingress_flow_action_drop_test()
RET=0 RET=0
devlink_trap_drop_test ingress_flow_action_drop acl_drops $swp2 101 devlink_trap_drop_test ingress_flow_action_drop $swp2 101
log_test "ingress_flow_action_drop" log_test "ingress_flow_action_drop"
...@@ -132,7 +132,7 @@ egress_flow_action_drop_test() ...@@ -132,7 +132,7 @@ egress_flow_action_drop_test()
RET=0 RET=0
devlink_trap_drop_test egress_flow_action_drop acl_drops $swp2 102 devlink_trap_drop_test egress_flow_action_drop $swp2 102
log_test "egress_flow_action_drop" log_test "egress_flow_action_drop"
......
...@@ -96,7 +96,6 @@ source_mac_is_multicast_test() ...@@ -96,7 +96,6 @@ source_mac_is_multicast_test()
{ {
local trap_name="source_mac_is_multicast" local trap_name="source_mac_is_multicast"
local smac=01:02:03:04:05:06 local smac=01:02:03:04:05:06
local group_name="l2_drops"
local mz_pid local mz_pid
tc filter add dev $swp2 egress protocol ip pref 1 handle 101 \ tc filter add dev $swp2 egress protocol ip pref 1 handle 101 \
...@@ -107,7 +106,7 @@ source_mac_is_multicast_test() ...@@ -107,7 +106,7 @@ source_mac_is_multicast_test()
RET=0 RET=0
devlink_trap_drop_test $trap_name $group_name $swp2 101 devlink_trap_drop_test $trap_name $swp2 101
log_test "Source MAC is multicast" log_test "Source MAC is multicast"
...@@ -118,7 +117,6 @@ __vlan_tag_mismatch_test() ...@@ -118,7 +117,6 @@ __vlan_tag_mismatch_test()
{ {
local trap_name="vlan_tag_mismatch" local trap_name="vlan_tag_mismatch"
local dmac=de:ad:be:ef:13:37 local dmac=de:ad:be:ef:13:37
local group_name="l2_drops"
local opt=$1; shift local opt=$1; shift
local mz_pid local mz_pid
...@@ -132,7 +130,7 @@ __vlan_tag_mismatch_test() ...@@ -132,7 +130,7 @@ __vlan_tag_mismatch_test()
$MZ $h1 "$opt" -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q & $MZ $h1 "$opt" -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $swp2 101 devlink_trap_drop_test $trap_name $swp2 101
# Add PVID and make sure packets are no longer dropped. # Add PVID and make sure packets are no longer dropped.
bridge vlan add vid 1 dev $swp1 pvid untagged master bridge vlan add vid 1 dev $swp1 pvid untagged master
...@@ -140,7 +138,7 @@ __vlan_tag_mismatch_test() ...@@ -140,7 +138,7 @@ __vlan_tag_mismatch_test()
devlink_trap_stats_idle_test $trap_name devlink_trap_stats_idle_test $trap_name
check_err $? "Trap stats not idle when packets should not be dropped" check_err $? "Trap stats not idle when packets should not be dropped"
devlink_trap_group_stats_idle_test $group_name devlink_trap_group_stats_idle_test $(devlink_trap_group_get $trap_name)
check_err $? "Trap group stats not idle with when packets should not be dropped" check_err $? "Trap group stats not idle with when packets should not be dropped"
tc_check_packets "dev $swp2 egress" 101 0 tc_check_packets "dev $swp2 egress" 101 0
...@@ -179,7 +177,6 @@ ingress_vlan_filter_test() ...@@ -179,7 +177,6 @@ ingress_vlan_filter_test()
{ {
local trap_name="ingress_vlan_filter" local trap_name="ingress_vlan_filter"
local dmac=de:ad:be:ef:13:37 local dmac=de:ad:be:ef:13:37
local group_name="l2_drops"
local mz_pid local mz_pid
local vid=10 local vid=10
...@@ -193,7 +190,7 @@ ingress_vlan_filter_test() ...@@ -193,7 +190,7 @@ ingress_vlan_filter_test()
$MZ $h1 -Q $vid -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q & $MZ $h1 -Q $vid -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $swp2 101 devlink_trap_drop_test $trap_name $swp2 101
# Add the VLAN on the bridge port and make sure packets are no longer # Add the VLAN on the bridge port and make sure packets are no longer
# dropped. # dropped.
...@@ -202,7 +199,7 @@ ingress_vlan_filter_test() ...@@ -202,7 +199,7 @@ ingress_vlan_filter_test()
devlink_trap_stats_idle_test $trap_name devlink_trap_stats_idle_test $trap_name
check_err $? "Trap stats not idle when packets should not be dropped" check_err $? "Trap stats not idle when packets should not be dropped"
devlink_trap_group_stats_idle_test $group_name devlink_trap_group_stats_idle_test $(devlink_trap_group_get $trap_name)
check_err $? "Trap group stats not idle with when packets should not be dropped" check_err $? "Trap group stats not idle with when packets should not be dropped"
tc_check_packets "dev $swp2 egress" 101 0 tc_check_packets "dev $swp2 egress" 101 0
...@@ -222,7 +219,6 @@ __ingress_stp_filter_test() ...@@ -222,7 +219,6 @@ __ingress_stp_filter_test()
{ {
local trap_name="ingress_spanning_tree_filter" local trap_name="ingress_spanning_tree_filter"
local dmac=de:ad:be:ef:13:37 local dmac=de:ad:be:ef:13:37
local group_name="l2_drops"
local state=$1; shift local state=$1; shift
local mz_pid local mz_pid
local vid=20 local vid=20
...@@ -237,7 +233,7 @@ __ingress_stp_filter_test() ...@@ -237,7 +233,7 @@ __ingress_stp_filter_test()
$MZ $h1 -Q $vid -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q & $MZ $h1 -Q $vid -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $swp2 101 devlink_trap_drop_test $trap_name $swp2 101
# Change STP state to forwarding and make sure packets are no longer # Change STP state to forwarding and make sure packets are no longer
# dropped. # dropped.
...@@ -246,7 +242,7 @@ __ingress_stp_filter_test() ...@@ -246,7 +242,7 @@ __ingress_stp_filter_test()
devlink_trap_stats_idle_test $trap_name devlink_trap_stats_idle_test $trap_name
check_err $? "Trap stats not idle when packets should not be dropped" check_err $? "Trap stats not idle when packets should not be dropped"
devlink_trap_group_stats_idle_test $group_name devlink_trap_group_stats_idle_test $(devlink_trap_group_get $trap_name)
check_err $? "Trap group stats not idle with when packets should not be dropped" check_err $? "Trap group stats not idle with when packets should not be dropped"
tc_check_packets "dev $swp2 egress" 101 0 tc_check_packets "dev $swp2 egress" 101 0
...@@ -292,7 +288,6 @@ port_list_is_empty_uc_test() ...@@ -292,7 +288,6 @@ port_list_is_empty_uc_test()
{ {
local trap_name="port_list_is_empty" local trap_name="port_list_is_empty"
local dmac=de:ad:be:ef:13:37 local dmac=de:ad:be:ef:13:37
local group_name="l2_drops"
local mz_pid local mz_pid
# Disable unicast flooding on both ports, so that packets cannot egress # Disable unicast flooding on both ports, so that packets cannot egress
...@@ -308,7 +303,7 @@ port_list_is_empty_uc_test() ...@@ -308,7 +303,7 @@ port_list_is_empty_uc_test()
$MZ $h1 -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q & $MZ $h1 -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $swp2 101 devlink_trap_drop_test $trap_name $swp2 101
# Allow packets to be flooded to one port. # Allow packets to be flooded to one port.
ip link set dev $swp2 type bridge_slave flood on ip link set dev $swp2 type bridge_slave flood on
...@@ -316,7 +311,7 @@ port_list_is_empty_uc_test() ...@@ -316,7 +311,7 @@ port_list_is_empty_uc_test()
devlink_trap_stats_idle_test $trap_name devlink_trap_stats_idle_test $trap_name
check_err $? "Trap stats not idle when packets should not be dropped" check_err $? "Trap stats not idle when packets should not be dropped"
devlink_trap_group_stats_idle_test $group_name devlink_trap_group_stats_idle_test $(devlink_trap_group_get $trap_name)
check_err $? "Trap group stats not idle with when packets should not be dropped" check_err $? "Trap group stats not idle with when packets should not be dropped"
tc_check_packets "dev $swp2 egress" 101 0 tc_check_packets "dev $swp2 egress" 101 0
...@@ -335,7 +330,6 @@ port_list_is_empty_mc_test() ...@@ -335,7 +330,6 @@ port_list_is_empty_mc_test()
{ {
local trap_name="port_list_is_empty" local trap_name="port_list_is_empty"
local dmac=01:00:5e:00:00:01 local dmac=01:00:5e:00:00:01
local group_name="l2_drops"
local dip=239.0.0.1 local dip=239.0.0.1
local mz_pid local mz_pid
...@@ -354,7 +348,7 @@ port_list_is_empty_mc_test() ...@@ -354,7 +348,7 @@ port_list_is_empty_mc_test()
$MZ $h1 -c 0 -p 100 -a own -b $dmac -t ip -B $dip -d 1msec -q & $MZ $h1 -c 0 -p 100 -a own -b $dmac -t ip -B $dip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $swp2 101 devlink_trap_drop_test $trap_name $swp2 101
# Allow packets to be flooded to one port. # Allow packets to be flooded to one port.
ip link set dev $swp2 type bridge_slave mcast_flood on ip link set dev $swp2 type bridge_slave mcast_flood on
...@@ -362,7 +356,7 @@ port_list_is_empty_mc_test() ...@@ -362,7 +356,7 @@ port_list_is_empty_mc_test()
devlink_trap_stats_idle_test $trap_name devlink_trap_stats_idle_test $trap_name
check_err $? "Trap stats not idle when packets should not be dropped" check_err $? "Trap stats not idle when packets should not be dropped"
devlink_trap_group_stats_idle_test $group_name devlink_trap_group_stats_idle_test $(devlink_trap_group_get $trap_name)
check_err $? "Trap group stats not idle with when packets should not be dropped" check_err $? "Trap group stats not idle with when packets should not be dropped"
tc_check_packets "dev $swp2 egress" 101 0 tc_check_packets "dev $swp2 egress" 101 0
...@@ -387,7 +381,6 @@ port_loopback_filter_uc_test() ...@@ -387,7 +381,6 @@ port_loopback_filter_uc_test()
{ {
local trap_name="port_loopback_filter" local trap_name="port_loopback_filter"
local dmac=de:ad:be:ef:13:37 local dmac=de:ad:be:ef:13:37
local group_name="l2_drops"
local mz_pid local mz_pid
# Make sure packets can only egress the input port. # Make sure packets can only egress the input port.
...@@ -401,7 +394,7 @@ port_loopback_filter_uc_test() ...@@ -401,7 +394,7 @@ port_loopback_filter_uc_test()
$MZ $h1 -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q & $MZ $h1 -c 0 -p 100 -a own -b $dmac -t ip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $swp2 101 devlink_trap_drop_test $trap_name $swp2 101
# Allow packets to be flooded. # Allow packets to be flooded.
ip link set dev $swp2 type bridge_slave flood on ip link set dev $swp2 type bridge_slave flood on
...@@ -409,7 +402,7 @@ port_loopback_filter_uc_test() ...@@ -409,7 +402,7 @@ port_loopback_filter_uc_test()
devlink_trap_stats_idle_test $trap_name devlink_trap_stats_idle_test $trap_name
check_err $? "Trap stats not idle when packets should not be dropped" check_err $? "Trap stats not idle when packets should not be dropped"
devlink_trap_group_stats_idle_test $group_name devlink_trap_group_stats_idle_test $(devlink_trap_group_get $trap_name)
check_err $? "Trap group stats not idle with when packets should not be dropped" check_err $? "Trap group stats not idle with when packets should not be dropped"
tc_check_packets "dev $swp2 egress" 101 0 tc_check_packets "dev $swp2 egress" 101 0
......
...@@ -161,7 +161,6 @@ ping_check() ...@@ -161,7 +161,6 @@ ping_check()
non_ip_test() non_ip_test()
{ {
local trap_name="non_ip" local trap_name="non_ip"
local group_name="l3_drops"
local mz_pid local mz_pid
RET=0 RET=0
...@@ -176,7 +175,7 @@ non_ip_test() ...@@ -176,7 +175,7 @@ non_ip_test()
00:00 de:ad:be:ef" & 00:00 de:ad:be:ef" &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "Non IP" log_test "Non IP"
...@@ -190,7 +189,6 @@ __uc_dip_over_mc_dmac_test() ...@@ -190,7 +189,6 @@ __uc_dip_over_mc_dmac_test()
local dip=$1; shift local dip=$1; shift
local flags=${1:-""}; shift local flags=${1:-""}; shift
local trap_name="uc_dip_over_mc_dmac" local trap_name="uc_dip_over_mc_dmac"
local group_name="l3_drops"
local dmac=01:02:03:04:05:06 local dmac=01:02:03:04:05:06
local mz_pid local mz_pid
...@@ -206,7 +204,7 @@ __uc_dip_over_mc_dmac_test() ...@@ -206,7 +204,7 @@ __uc_dip_over_mc_dmac_test()
-B $dip -d 1msec -q & -B $dip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "Unicast destination IP over multicast destination MAC: $desc" log_test "Unicast destination IP over multicast destination MAC: $desc"
...@@ -227,7 +225,6 @@ __sip_is_loopback_test() ...@@ -227,7 +225,6 @@ __sip_is_loopback_test()
local dip=$1; shift local dip=$1; shift
local flags=${1:-""}; shift local flags=${1:-""}; shift
local trap_name="sip_is_loopback_address" local trap_name="sip_is_loopback_address"
local group_name="l3_drops"
local mz_pid local mz_pid
RET=0 RET=0
...@@ -242,7 +239,7 @@ __sip_is_loopback_test() ...@@ -242,7 +239,7 @@ __sip_is_loopback_test()
-b $rp1mac -B $dip -d 1msec -q & -b $rp1mac -B $dip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "Source IP is loopback address: $desc" log_test "Source IP is loopback address: $desc"
...@@ -262,7 +259,6 @@ __dip_is_loopback_test() ...@@ -262,7 +259,6 @@ __dip_is_loopback_test()
local dip=$1; shift local dip=$1; shift
local flags=${1:-""}; shift local flags=${1:-""}; shift
local trap_name="dip_is_loopback_address" local trap_name="dip_is_loopback_address"
local group_name="l3_drops"
local mz_pid local mz_pid
RET=0 RET=0
...@@ -277,7 +273,7 @@ __dip_is_loopback_test() ...@@ -277,7 +273,7 @@ __dip_is_loopback_test()
-B $dip -d 1msec -q & -B $dip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "Destination IP is loopback address: $desc" log_test "Destination IP is loopback address: $desc"
...@@ -298,7 +294,6 @@ __sip_is_mc_test() ...@@ -298,7 +294,6 @@ __sip_is_mc_test()
local dip=$1; shift local dip=$1; shift
local flags=${1:-""}; shift local flags=${1:-""}; shift
local trap_name="sip_is_mc" local trap_name="sip_is_mc"
local group_name="l3_drops"
local mz_pid local mz_pid
RET=0 RET=0
...@@ -313,7 +308,7 @@ __sip_is_mc_test() ...@@ -313,7 +308,7 @@ __sip_is_mc_test()
-b $rp1mac -B $dip -d 1msec -q & -b $rp1mac -B $dip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "Source IP is multicast: $desc" log_test "Source IP is multicast: $desc"
...@@ -329,7 +324,6 @@ sip_is_mc_test() ...@@ -329,7 +324,6 @@ sip_is_mc_test()
ipv4_sip_is_limited_bc_test() ipv4_sip_is_limited_bc_test()
{ {
local trap_name="ipv4_sip_is_limited_bc" local trap_name="ipv4_sip_is_limited_bc"
local group_name="l3_drops"
local sip=255.255.255.255 local sip=255.255.255.255
local mz_pid local mz_pid
...@@ -345,7 +339,7 @@ ipv4_sip_is_limited_bc_test() ...@@ -345,7 +339,7 @@ ipv4_sip_is_limited_bc_test()
-B $h2_ipv4 -d 1msec -q & -B $h2_ipv4 -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "IPv4 source IP is limited broadcast" log_test "IPv4 source IP is limited broadcast"
...@@ -382,7 +376,6 @@ __ipv4_header_corrupted_test() ...@@ -382,7 +376,6 @@ __ipv4_header_corrupted_test()
local ihl=$1; shift local ihl=$1; shift
local checksum=$1; shift local checksum=$1; shift
local trap_name="ip_header_corrupted" local trap_name="ip_header_corrupted"
local group_name="l3_drops"
local payload local payload
local mz_pid local mz_pid
...@@ -399,7 +392,7 @@ __ipv4_header_corrupted_test() ...@@ -399,7 +392,7 @@ __ipv4_header_corrupted_test()
$MZ $h1 -c 0 -d 1msec -a $h1mac -b $rp1mac -q p=$payload & $MZ $h1 -c 0 -d 1msec -a $h1mac -b $rp1mac -q p=$payload &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "IP header corrupted: $desc: IPv4" log_test "IP header corrupted: $desc: IPv4"
...@@ -429,7 +422,6 @@ __ipv6_header_corrupted_test() ...@@ -429,7 +422,6 @@ __ipv6_header_corrupted_test()
local desc=$1; shift local desc=$1; shift
local ipver=$1; shift local ipver=$1; shift
local trap_name="ip_header_corrupted" local trap_name="ip_header_corrupted"
local group_name="l3_drops"
local payload local payload
local mz_pid local mz_pid
...@@ -446,7 +438,7 @@ __ipv6_header_corrupted_test() ...@@ -446,7 +438,7 @@ __ipv6_header_corrupted_test()
$MZ $h1 -c 0 -d 1msec -a $h1mac -b $rp1mac -q p=$payload & $MZ $h1 -c 0 -d 1msec -a $h1mac -b $rp1mac -q p=$payload &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "IP header corrupted: $desc: IPv6" log_test "IP header corrupted: $desc: IPv6"
...@@ -469,7 +461,6 @@ ip_header_corrupted_test() ...@@ -469,7 +461,6 @@ ip_header_corrupted_test()
ipv6_mc_dip_reserved_scope_test() ipv6_mc_dip_reserved_scope_test()
{ {
local trap_name="ipv6_mc_dip_reserved_scope" local trap_name="ipv6_mc_dip_reserved_scope"
local group_name="l3_drops"
local dip=FF00:: local dip=FF00::
local mz_pid local mz_pid
...@@ -485,7 +476,7 @@ ipv6_mc_dip_reserved_scope_test() ...@@ -485,7 +476,7 @@ ipv6_mc_dip_reserved_scope_test()
"33:33:00:00:00:00" -B $dip -d 1msec -q & "33:33:00:00:00:00" -B $dip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "IPv6 multicast destination IP reserved scope" log_test "IPv6 multicast destination IP reserved scope"
...@@ -495,7 +486,6 @@ ipv6_mc_dip_reserved_scope_test() ...@@ -495,7 +486,6 @@ ipv6_mc_dip_reserved_scope_test()
ipv6_mc_dip_interface_local_scope_test() ipv6_mc_dip_interface_local_scope_test()
{ {
local trap_name="ipv6_mc_dip_interface_local_scope" local trap_name="ipv6_mc_dip_interface_local_scope"
local group_name="l3_drops"
local dip=FF01:: local dip=FF01::
local mz_pid local mz_pid
...@@ -511,7 +501,7 @@ ipv6_mc_dip_interface_local_scope_test() ...@@ -511,7 +501,7 @@ ipv6_mc_dip_interface_local_scope_test()
"33:33:00:00:00:00" -B $dip -d 1msec -q & "33:33:00:00:00:00" -B $dip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "IPv6 multicast destination IP interface-local scope" log_test "IPv6 multicast destination IP interface-local scope"
...@@ -526,7 +516,6 @@ __blackhole_route_test() ...@@ -526,7 +516,6 @@ __blackhole_route_test()
local dip=$1; shift local dip=$1; shift
local ip_proto=${1:-"icmp"}; shift local ip_proto=${1:-"icmp"}; shift
local trap_name="blackhole_route" local trap_name="blackhole_route"
local group_name="l3_drops"
local mz_pid local mz_pid
RET=0 RET=0
...@@ -542,7 +531,7 @@ __blackhole_route_test() ...@@ -542,7 +531,7 @@ __blackhole_route_test()
-B $dip -d 1msec -q & -B $dip -d 1msec -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $rp2 101 devlink_trap_drop_test $trap_name $rp2 101
log_test "Blackhole route: IPv$flags" log_test "Blackhole route: IPv$flags"
devlink_trap_drop_cleanup $mz_pid $rp2 $proto 1 101 devlink_trap_drop_cleanup $mz_pid $rp2 $proto 1 101
...@@ -558,7 +547,6 @@ blackhole_route_test() ...@@ -558,7 +547,6 @@ blackhole_route_test()
irif_disabled_test() irif_disabled_test()
{ {
local trap_name="irif_disabled" local trap_name="irif_disabled"
local group_name="l3_drops"
local t0_packets t0_bytes local t0_packets t0_bytes
local t1_packets t1_bytes local t1_packets t1_bytes
local mz_pid local mz_pid
...@@ -613,7 +601,6 @@ irif_disabled_test() ...@@ -613,7 +601,6 @@ irif_disabled_test()
erif_disabled_test() erif_disabled_test()
{ {
local trap_name="erif_disabled" local trap_name="erif_disabled"
local group_name="l3_drops"
local t0_packets t0_bytes local t0_packets t0_bytes
local t1_packets t1_bytes local t1_packets t1_bytes
local mz_pid local mz_pid
......
...@@ -169,7 +169,6 @@ trap_action_check() ...@@ -169,7 +169,6 @@ trap_action_check()
mtu_value_is_too_small_test() mtu_value_is_too_small_test()
{ {
local trap_name="mtu_value_is_too_small" local trap_name="mtu_value_is_too_small"
local group_name="l3_drops"
local expected_action="trap" local expected_action="trap"
local mz_pid local mz_pid
...@@ -191,7 +190,7 @@ mtu_value_is_too_small_test() ...@@ -191,7 +190,7 @@ mtu_value_is_too_small_test()
-B 198.51.100.1 -q & -B 198.51.100.1 -q &
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
tc_check_packets_hitting "dev $h1 ingress" 101 tc_check_packets_hitting "dev $h1 ingress" 101
check_err $? "Packets were not received to h1" check_err $? "Packets were not received to h1"
...@@ -208,7 +207,6 @@ __ttl_value_is_too_small_test() ...@@ -208,7 +207,6 @@ __ttl_value_is_too_small_test()
{ {
local ttl_val=$1; shift local ttl_val=$1; shift
local trap_name="ttl_value_is_too_small" local trap_name="ttl_value_is_too_small"
local group_name="l3_drops"
local expected_action="trap" local expected_action="trap"
local mz_pid local mz_pid
...@@ -227,7 +225,7 @@ __ttl_value_is_too_small_test() ...@@ -227,7 +225,7 @@ __ttl_value_is_too_small_test()
-b $rp1mac -B 198.51.100.1 -q & -b $rp1mac -B 198.51.100.1 -q &
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
tc_check_packets_hitting "dev $h1 ingress" 101 tc_check_packets_hitting "dev $h1 ingress" 101
check_err $? "Packets were not received to h1" check_err $? "Packets were not received to h1"
...@@ -271,7 +269,6 @@ __mc_reverse_path_forwarding_test() ...@@ -271,7 +269,6 @@ __mc_reverse_path_forwarding_test()
local proto=$1; shift local proto=$1; shift
local flags=${1:-""}; shift local flags=${1:-""}; shift
local trap_name="mc_reverse_path_forwarding" local trap_name="mc_reverse_path_forwarding"
local group_name="l3_drops"
local expected_action="trap" local expected_action="trap"
local mz_pid local mz_pid
...@@ -292,7 +289,7 @@ __mc_reverse_path_forwarding_test() ...@@ -292,7 +289,7 @@ __mc_reverse_path_forwarding_test()
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
tc_check_packets "dev $rp2 egress" 101 0 tc_check_packets "dev $rp2 egress" 101 0
check_err $? "Packets were not dropped" check_err $? "Packets were not dropped"
...@@ -322,7 +319,6 @@ __reject_route_test() ...@@ -322,7 +319,6 @@ __reject_route_test()
local unreachable=$1; shift local unreachable=$1; shift
local flags=${1:-""}; shift local flags=${1:-""}; shift
local trap_name="reject_route" local trap_name="reject_route"
local group_name="l3_drops"
local expected_action="trap" local expected_action="trap"
local mz_pid local mz_pid
...@@ -341,7 +337,7 @@ __reject_route_test() ...@@ -341,7 +337,7 @@ __reject_route_test()
-B $dst_ip -q & -B $dst_ip -q &
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
tc_check_packets_hitting "dev $h1 ingress" 101 tc_check_packets_hitting "dev $h1 ingress" 101
check_err $? "ICMP packet was not received to h1" check_err $? "ICMP packet was not received to h1"
...@@ -370,7 +366,6 @@ __host_miss_test() ...@@ -370,7 +366,6 @@ __host_miss_test()
local desc=$1; shift local desc=$1; shift
local dip=$1; shift local dip=$1; shift
local trap_name="unresolved_neigh" local trap_name="unresolved_neigh"
local group_name="l3_drops"
local expected_action="trap" local expected_action="trap"
local mz_pid local mz_pid
...@@ -405,7 +400,6 @@ __invalid_nexthop_test() ...@@ -405,7 +400,6 @@ __invalid_nexthop_test()
local subnet=$1; shift local subnet=$1; shift
local via_add=$1; shift local via_add=$1; shift
local trap_name="unresolved_neigh" local trap_name="unresolved_neigh"
local group_name="l3_drops"
local expected_action="trap" local expected_action="trap"
local mz_pid local mz_pid
...@@ -494,7 +488,6 @@ vrf_without_routes_destroy() ...@@ -494,7 +488,6 @@ vrf_without_routes_destroy()
ipv4_lpm_miss_test() ipv4_lpm_miss_test()
{ {
local trap_name="ipv4_lpm_miss" local trap_name="ipv4_lpm_miss"
local group_name="l3_drops"
local expected_action="trap" local expected_action="trap"
local mz_pid local mz_pid
...@@ -511,7 +504,7 @@ ipv4_lpm_miss_test() ...@@ -511,7 +504,7 @@ ipv4_lpm_miss_test()
-B 203.0.113.1 -q & -B 203.0.113.1 -q &
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
log_test "LPM miss: IPv4" log_test "LPM miss: IPv4"
...@@ -522,7 +515,6 @@ ipv4_lpm_miss_test() ...@@ -522,7 +515,6 @@ ipv4_lpm_miss_test()
ipv6_lpm_miss_test() ipv6_lpm_miss_test()
{ {
local trap_name="ipv6_lpm_miss" local trap_name="ipv6_lpm_miss"
local group_name="l3_drops"
local expected_action="trap" local expected_action="trap"
local mz_pid local mz_pid
...@@ -539,7 +531,7 @@ ipv6_lpm_miss_test() ...@@ -539,7 +531,7 @@ ipv6_lpm_miss_test()
-B 2001:db8::1 -q & -B 2001:db8::1 -q &
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
log_test "LPM miss: IPv6" log_test "LPM miss: IPv6"
......
...@@ -140,7 +140,6 @@ ecn_payload_get() ...@@ -140,7 +140,6 @@ ecn_payload_get()
ecn_decap_test() ecn_decap_test()
{ {
local trap_name="decap_error" local trap_name="decap_error"
local group_name="tunnel_drops"
local desc=$1; shift local desc=$1; shift
local ecn_desc=$1; shift local ecn_desc=$1; shift
local outer_tos=$1; shift local outer_tos=$1; shift
...@@ -161,7 +160,7 @@ ecn_decap_test() ...@@ -161,7 +160,7 @@ ecn_decap_test()
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
tc_check_packets "dev $swp1 egress" 101 0 tc_check_packets "dev $swp1 egress" 101 0
check_err $? "Packets were not dropped" check_err $? "Packets were not dropped"
...@@ -200,7 +199,6 @@ ipip_payload_get() ...@@ -200,7 +199,6 @@ ipip_payload_get()
no_matching_tunnel_test() no_matching_tunnel_test()
{ {
local trap_name="decap_error" local trap_name="decap_error"
local group_name="tunnel_drops"
local desc=$1; shift local desc=$1; shift
local sip=$1; shift local sip=$1; shift
local mz_pid local mz_pid
...@@ -218,7 +216,7 @@ no_matching_tunnel_test() ...@@ -218,7 +216,7 @@ no_matching_tunnel_test()
-A $sip -B 192.0.2.65 -t ip len=48,proto=47,p=$payload -q & -A $sip -B 192.0.2.65 -t ip len=48,proto=47,p=$payload -q &
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
tc_check_packets "dev $swp1 egress" 101 0 tc_check_packets "dev $swp1 egress" 101 0
check_err $? "Packets were not dropped" check_err $? "Packets were not dropped"
......
...@@ -159,7 +159,6 @@ ecn_payload_get() ...@@ -159,7 +159,6 @@ ecn_payload_get()
ecn_decap_test() ecn_decap_test()
{ {
local trap_name="decap_error" local trap_name="decap_error"
local group_name="tunnel_drops"
local desc=$1; shift local desc=$1; shift
local ecn_desc=$1; shift local ecn_desc=$1; shift
local outer_tos=$1; shift local outer_tos=$1; shift
...@@ -177,7 +176,7 @@ ecn_decap_test() ...@@ -177,7 +176,7 @@ ecn_decap_test()
-t udp sp=12345,dp=$VXPORT,tos=$outer_tos,p=$payload -q & -t udp sp=12345,dp=$VXPORT,tos=$outer_tos,p=$payload -q &
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
tc_check_packets "dev $swp1 egress" 101 0 tc_check_packets "dev $swp1 egress" 101 0
check_err $? "Packets were not dropped" check_err $? "Packets were not dropped"
...@@ -228,7 +227,6 @@ short_payload_get() ...@@ -228,7 +227,6 @@ short_payload_get()
corrupted_packet_test() corrupted_packet_test()
{ {
local trap_name="decap_error" local trap_name="decap_error"
local group_name="tunnel_drops"
local desc=$1; shift local desc=$1; shift
local payload_get=$1; shift local payload_get=$1; shift
local mz_pid local mz_pid
...@@ -246,7 +244,7 @@ corrupted_packet_test() ...@@ -246,7 +244,7 @@ corrupted_packet_test()
-B 192.0.2.17 -t udp sp=12345,dp=$VXPORT,p=$payload -q & -B 192.0.2.17 -t udp sp=12345,dp=$VXPORT,p=$payload -q &
mz_pid=$! mz_pid=$!
devlink_trap_exception_test $trap_name $group_name devlink_trap_exception_test $trap_name
tc_check_packets "dev $swp1 egress" 101 0 tc_check_packets "dev $swp1 egress" 101 0
check_err $? "Packets were not dropped" check_err $? "Packets were not dropped"
...@@ -297,7 +295,6 @@ mc_smac_payload_get() ...@@ -297,7 +295,6 @@ mc_smac_payload_get()
overlay_smac_is_mc_test() overlay_smac_is_mc_test()
{ {
local trap_name="overlay_smac_is_mc" local trap_name="overlay_smac_is_mc"
local group_name="tunnel_drops"
local mz_pid local mz_pid
RET=0 RET=0
...@@ -314,7 +311,7 @@ overlay_smac_is_mc_test() ...@@ -314,7 +311,7 @@ overlay_smac_is_mc_test()
-B 192.0.2.17 -t udp sp=12345,dp=$VXPORT,p=$payload -q & -B 192.0.2.17 -t udp sp=12345,dp=$VXPORT,p=$payload -q &
mz_pid=$! mz_pid=$!
devlink_trap_drop_test $trap_name $group_name $swp1 101 devlink_trap_drop_test $trap_name $swp1 101
log_test "Overlay source MAC is multicast" log_test "Overlay source MAC is multicast"
......
...@@ -365,7 +365,9 @@ devlink_trap_group_stats_idle_test() ...@@ -365,7 +365,9 @@ devlink_trap_group_stats_idle_test()
devlink_trap_exception_test() devlink_trap_exception_test()
{ {
local trap_name=$1; shift local trap_name=$1; shift
local group_name=$1; shift local group_name
group_name=$(devlink_trap_group_get $trap_name)
devlink_trap_stats_idle_test $trap_name devlink_trap_stats_idle_test $trap_name
check_fail $? "Trap stats idle when packets should have been trapped" check_fail $? "Trap stats idle when packets should have been trapped"
...@@ -377,9 +379,11 @@ devlink_trap_exception_test() ...@@ -377,9 +379,11 @@ devlink_trap_exception_test()
devlink_trap_drop_test() devlink_trap_drop_test()
{ {
local trap_name=$1; shift local trap_name=$1; shift
local group_name=$1; shift
local dev=$1; shift local dev=$1; shift
local handle=$1; shift local handle=$1; shift
local group_name
group_name=$(devlink_trap_group_get $trap_name)
# This is the common part of all the tests. It checks that stats are # This is the common part of all the tests. It checks that stats are
# initially idle, then non-idle after changing the trap action and # initially idle, then non-idle after changing the trap action and
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment