| #!/bin/bash |
| # SPDX-License-Identifier: GPL-2.0 |
| |
| ALL_TESTS=" |
| locked_port_ipv4 |
| locked_port_ipv6 |
| locked_port_vlan |
| locked_port_mab |
| locked_port_mab_roam |
| locked_port_mab_config |
| locked_port_mab_flush |
| " |
| |
| NUM_NETIFS=4 |
| CHECK_TC="no" |
| source lib.sh |
| |
| h1_create() |
| { |
| simple_if_init $h1 192.0.2.1/24 2001:db8:1::1/64 |
| vlan_create $h1 100 v$h1 198.51.100.1/24 |
| } |
| |
| h1_destroy() |
| { |
| vlan_destroy $h1 100 |
| simple_if_fini $h1 192.0.2.1/24 2001:db8:1::1/64 |
| } |
| |
| h2_create() |
| { |
| simple_if_init $h2 192.0.2.2/24 2001:db8:1::2/64 |
| vlan_create $h2 100 v$h2 198.51.100.2/24 |
| } |
| |
| h2_destroy() |
| { |
| vlan_destroy $h2 100 |
| simple_if_fini $h2 192.0.2.2/24 2001:db8:1::2/64 |
| } |
| |
| switch_create() |
| { |
| ip link add dev br0 type bridge vlan_filtering 1 |
| |
| ip link set dev $swp1 master br0 |
| ip link set dev $swp2 master br0 |
| |
| bridge link set dev $swp1 learning off |
| |
| ip link set dev br0 up |
| ip link set dev $swp1 up |
| ip link set dev $swp2 up |
| } |
| |
| switch_destroy() |
| { |
| ip link set dev $swp2 down |
| ip link set dev $swp1 down |
| |
| ip link del dev br0 |
| } |
| |
| setup_prepare() |
| { |
| h1=${NETIFS[p1]} |
| swp1=${NETIFS[p2]} |
| |
| swp2=${NETIFS[p3]} |
| h2=${NETIFS[p4]} |
| |
| vrf_prepare |
| |
| h1_create |
| h2_create |
| |
| switch_create |
| } |
| |
| cleanup() |
| { |
| pre_cleanup |
| |
| switch_destroy |
| |
| h2_destroy |
| h1_destroy |
| |
| vrf_cleanup |
| } |
| |
| locked_port_ipv4() |
| { |
| RET=0 |
| |
| check_locked_port_support || return 0 |
| |
| ping_do $h1 192.0.2.2 |
| check_err $? "Ping did not work before locking port" |
| |
| bridge link set dev $swp1 locked on |
| |
| ping_do $h1 192.0.2.2 |
| check_fail $? "Ping worked after locking port, but before adding FDB entry" |
| |
| bridge fdb add `mac_get $h1` dev $swp1 master static |
| |
| ping_do $h1 192.0.2.2 |
| check_err $? "Ping did not work after locking port and adding FDB entry" |
| |
| bridge link set dev $swp1 locked off |
| bridge fdb del `mac_get $h1` dev $swp1 master static |
| |
| ping_do $h1 192.0.2.2 |
| check_err $? "Ping did not work after unlocking port and removing FDB entry." |
| |
| log_test "Locked port ipv4" |
| } |
| |
| locked_port_vlan() |
| { |
| RET=0 |
| |
| check_locked_port_support || return 0 |
| |
| bridge vlan add vid 100 dev $swp1 |
| bridge vlan add vid 100 dev $swp2 |
| |
| ping_do $h1.100 198.51.100.2 |
| check_err $? "Ping through vlan did not work before locking port" |
| |
| bridge link set dev $swp1 locked on |
| ping_do $h1.100 198.51.100.2 |
| check_fail $? "Ping through vlan worked after locking port, but before adding FDB entry" |
| |
| bridge fdb add `mac_get $h1` dev $swp1 vlan 100 master static |
| |
| ping_do $h1.100 198.51.100.2 |
| check_err $? "Ping through vlan did not work after locking port and adding FDB entry" |
| |
| bridge link set dev $swp1 locked off |
| bridge fdb del `mac_get $h1` dev $swp1 vlan 100 master static |
| |
| ping_do $h1.100 198.51.100.2 |
| check_err $? "Ping through vlan did not work after unlocking port and removing FDB entry" |
| |
| bridge vlan del vid 100 dev $swp1 |
| bridge vlan del vid 100 dev $swp2 |
| log_test "Locked port vlan" |
| } |
| |
| locked_port_ipv6() |
| { |
| RET=0 |
| check_locked_port_support || return 0 |
| |
| ping6_do $h1 2001:db8:1::2 |
| check_err $? "Ping6 did not work before locking port" |
| |
| bridge link set dev $swp1 locked on |
| |
| ping6_do $h1 2001:db8:1::2 |
| check_fail $? "Ping6 worked after locking port, but before adding FDB entry" |
| |
| bridge fdb add `mac_get $h1` dev $swp1 master static |
| ping6_do $h1 2001:db8:1::2 |
| check_err $? "Ping6 did not work after locking port and adding FDB entry" |
| |
| bridge link set dev $swp1 locked off |
| bridge fdb del `mac_get $h1` dev $swp1 master static |
| |
| ping6_do $h1 2001:db8:1::2 |
| check_err $? "Ping6 did not work after unlocking port and removing FDB entry" |
| |
| log_test "Locked port ipv6" |
| } |
| |
| locked_port_mab() |
| { |
| RET=0 |
| check_port_mab_support || return 0 |
| |
| ping_do $h1 192.0.2.2 |
| check_err $? "Ping did not work before locking port" |
| |
| bridge link set dev $swp1 learning on locked on |
| |
| ping_do $h1 192.0.2.2 |
| check_fail $? "Ping worked on a locked port without an FDB entry" |
| |
| bridge fdb get `mac_get $h1` br br0 vlan 1 &> /dev/null |
| check_fail $? "FDB entry created before enabling MAB" |
| |
| bridge link set dev $swp1 learning on locked on mab on |
| |
| ping_do $h1 192.0.2.2 |
| check_fail $? "Ping worked on MAB enabled port without an FDB entry" |
| |
| bridge fdb get `mac_get $h1` br br0 vlan 1 | grep "dev $swp1" | grep -q "locked" |
| check_err $? "Locked FDB entry not created" |
| |
| bridge fdb replace `mac_get $h1` dev $swp1 master static |
| |
| ping_do $h1 192.0.2.2 |
| check_err $? "Ping did not work after replacing FDB entry" |
| |
| bridge fdb get `mac_get $h1` br br0 vlan 1 | grep "dev $swp1" | grep -q "locked" |
| check_fail $? "FDB entry marked as locked after replacement" |
| |
| bridge fdb del `mac_get $h1` dev $swp1 master |
| bridge link set dev $swp1 learning off locked off mab off |
| |
| log_test "Locked port MAB" |
| } |
| |
| # Check that entries cannot roam to a locked port, but that entries can roam |
| # to an unlocked port. |
| locked_port_mab_roam() |
| { |
| local mac=a0:b0:c0:c0:b0:a0 |
| |
| RET=0 |
| check_port_mab_support || return 0 |
| |
| bridge link set dev $swp1 learning on locked on mab on |
| |
| $MZ $h1 -q -c 5 -d 100msec -t udp -a $mac -b rand |
| bridge fdb get $mac br br0 vlan 1 | grep "dev $swp1" | grep -q "locked" |
| check_err $? "No locked entry on first injection" |
| |
| $MZ $h2 -q -c 5 -d 100msec -t udp -a $mac -b rand |
| bridge fdb get $mac br br0 vlan 1 | grep -q "dev $swp2" |
| check_err $? "Entry did not roam to an unlocked port" |
| |
| bridge fdb get $mac br br0 vlan 1 | grep -q "locked" |
| check_fail $? "Entry roamed with locked flag on" |
| |
| $MZ $h1 -q -c 5 -d 100msec -t udp -a $mac -b rand |
| bridge fdb get $mac br br0 vlan 1 | grep -q "dev $swp1" |
| check_fail $? "Entry roamed back to locked port" |
| |
| bridge fdb del $mac vlan 1 dev $swp2 master |
| bridge link set dev $swp1 learning off locked off mab off |
| |
| log_test "Locked port MAB roam" |
| } |
| |
| # Check that MAB can only be enabled on a port that is both locked and has |
| # learning enabled. |
| locked_port_mab_config() |
| { |
| RET=0 |
| check_port_mab_support || return 0 |
| |
| bridge link set dev $swp1 learning on locked off mab on &> /dev/null |
| check_fail $? "MAB enabled while port is unlocked" |
| |
| bridge link set dev $swp1 learning off locked on mab on &> /dev/null |
| check_fail $? "MAB enabled while port has learning disabled" |
| |
| bridge link set dev $swp1 learning on locked on mab on |
| check_err $? "Failed to enable MAB when port is locked and has learning enabled" |
| |
| bridge link set dev $swp1 learning off locked off mab off |
| |
| log_test "Locked port MAB configuration" |
| } |
| |
| # Check that locked FDB entries are flushed from a port when MAB is disabled. |
| locked_port_mab_flush() |
| { |
| local locked_mac1=00:01:02:03:04:05 |
| local unlocked_mac1=00:01:02:03:04:06 |
| local locked_mac2=00:01:02:03:04:07 |
| local unlocked_mac2=00:01:02:03:04:08 |
| |
| RET=0 |
| check_port_mab_support || return 0 |
| |
| bridge link set dev $swp1 learning on locked on mab on |
| bridge link set dev $swp2 learning on locked on mab on |
| |
| # Create regular and locked FDB entries on each port. |
| bridge fdb add $unlocked_mac1 dev $swp1 vlan 1 master static |
| bridge fdb add $unlocked_mac2 dev $swp2 vlan 1 master static |
| |
| $MZ $h1 -q -c 5 -d 100msec -t udp -a $locked_mac1 -b rand |
| bridge fdb get $locked_mac1 br br0 vlan 1 | grep "dev $swp1" | \ |
| grep -q "locked" |
| check_err $? "Failed to create locked FDB entry on first port" |
| |
| $MZ $h2 -q -c 5 -d 100msec -t udp -a $locked_mac2 -b rand |
| bridge fdb get $locked_mac2 br br0 vlan 1 | grep "dev $swp2" | \ |
| grep -q "locked" |
| check_err $? "Failed to create locked FDB entry on second port" |
| |
| # Disable MAB on the first port and check that only the first locked |
| # FDB entry was flushed. |
| bridge link set dev $swp1 mab off |
| |
| bridge fdb get $unlocked_mac1 br br0 vlan 1 &> /dev/null |
| check_err $? "Regular FDB entry on first port was flushed after disabling MAB" |
| |
| bridge fdb get $unlocked_mac2 br br0 vlan 1 &> /dev/null |
| check_err $? "Regular FDB entry on second port was flushed after disabling MAB" |
| |
| bridge fdb get $locked_mac1 br br0 vlan 1 &> /dev/null |
| check_fail $? "Locked FDB entry on first port was not flushed after disabling MAB" |
| |
| bridge fdb get $locked_mac2 br br0 vlan 1 &> /dev/null |
| check_err $? "Locked FDB entry on second port was flushed after disabling MAB" |
| |
| bridge fdb del $unlocked_mac2 dev $swp2 vlan 1 master static |
| bridge fdb del $unlocked_mac1 dev $swp1 vlan 1 master static |
| |
| bridge link set dev $swp2 learning on locked off mab off |
| bridge link set dev $swp1 learning off locked off mab off |
| |
| log_test "Locked port MAB FDB flush" |
| } |
| |
| trap cleanup EXIT |
| |
| setup_prepare |
| setup_wait |
| |
| tests_run |
| |
| exit $EXIT_STATUS |