Server IP : 104.21.38.3 / Your IP : 172.68.164.132 Web Server : Apache System : Linux krdc-ubuntu-s-2vcpu-4gb-amd-blr1-01.localdomain 5.15.0-142-generic #152-Ubuntu SMP Mon May 19 10:54:31 UTC 2025 x86_64 User : www ( 1000) PHP Version : 7.4.33 Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/src/linux-headers-5.15.0-143/tools/testing/selftests/net/forwarding/ |
Upload File : |
#!/bin/bash # SPDX-License-Identifier: GPL-2.0 ALL_TESTS="shared_block_test match_indev_test" NUM_NETIFS=4 source tc_common.sh source lib.sh tcflags="skip_hw" h1_create() { simple_if_init $h1 192.0.2.1/24 } h1_destroy() { simple_if_fini $h1 192.0.2.1/24 } h2_create() { simple_if_init $h2 192.0.2.1/24 } h2_destroy() { simple_if_fini $h2 192.0.2.1/24 } switch_create() { simple_if_init $swp1 192.0.2.2/24 tc qdisc add dev $swp1 ingress_block 22 egress_block 23 clsact simple_if_init $swp2 192.0.2.2/24 tc qdisc add dev $swp2 ingress_block 22 egress_block 23 clsact } switch_destroy() { tc qdisc del dev $swp2 clsact simple_if_fini $swp2 192.0.2.2/24 tc qdisc del dev $swp1 clsact simple_if_fini $swp1 192.0.2.2/24 } shared_block_test() { RET=0 tc filter add block 22 protocol ip pref 1 handle 101 flower \ $tcflags dst_ip 192.0.2.2 action drop $MZ $h1 -c 1 -p 64 -a $h1mac -b $swmac -A 192.0.2.1 -B 192.0.2.2 \ -t ip -q tc_check_packets "block 22" 101 1 check_err $? "Did not match first incoming packet on a block" $MZ $h2 -c 1 -p 64 -a $h2mac -b $swmac -A 192.0.2.1 -B 192.0.2.2 \ -t ip -q tc_check_packets "block 22" 101 2 check_err $? "Did not match second incoming packet on a block" tc filter del block 22 protocol ip pref 1 handle 101 flower log_test "shared block ($tcflags)" } match_indev_test() { RET=0 tc filter add block 22 protocol ip pref 1 handle 101 flower \ $tcflags indev $swp1 dst_mac $swmac action drop tc filter add block 22 protocol ip pref 2 handle 102 flower \ $tcflags indev $swp2 dst_mac $swmac action drop $MZ $h1 -c 1 -p 64 -a $h1mac -b $swmac -A 192.0.2.1 -B 192.0.2.2 \ -t ip -q tc_check_packets "block 22" 101 1 check_err $? "Did not match first incoming packet on a block" $MZ $h2 -c 1 -p 64 -a $h2mac -b $swmac -A 192.0.2.1 -B 192.0.2.2 \ -t ip -q tc_check_packets "block 22" 102 1 check_err $? "Did not match second incoming packet on a block" tc filter del block 22 protocol ip pref 1 handle 101 flower tc filter del block 22 protocol ip pref 2 handle 102 flower log_test "indev match ($tcflags)" } setup_prepare() { h1=${NETIFS[p1]} swp1=${NETIFS[p2]} swp2=${NETIFS[p3]} h2=${NETIFS[p4]} h1mac=$(mac_get $h1) h2mac=$(mac_get $h2) swmac=$(mac_get $swp1) swp2origmac=$(mac_get $swp2) ip link set $swp2 address $swmac vrf_prepare h1_create h2_create switch_create } cleanup() { pre_cleanup switch_destroy h2_destroy h1_destroy vrf_cleanup ip link set $swp2 address $swp2origmac } check_tc_shblock_support trap cleanup EXIT setup_prepare setup_wait tests_run tc_offload_check if [[ $? -ne 0 ]]; then log_info "Could not test offloaded functionality" else tcflags="skip_sw" tests_run fi exit $EXIT_STATUS