#!/bin/bash # SPDX-License-Identifier: GPL-2.0 # # Test various aspects of VxLAN offloading which are specific to mlxsw, such # as sanitization of invalid configurations and offload indication. lib_dir=$(dirname $0)/../../../net/forwarding ALL_TESTS="sanitization_test offload_indication_test \ sanitization_vlan_aware_test offload_indication_vlan_aware_test" NUM_NETIFS=2 source $lib_dir/lib.sh setup_prepare() { swp1=${NETIFS[p1]} swp2=${NETIFS[p2]} ip link set dev $swp1 up ip link set dev $swp2 up } cleanup() { pre_cleanup ip link set dev $swp2 down ip link set dev $swp1 down } sanitization_single_dev_test_pass() { ip link set dev $swp1 master br0 check_err $? ip link set dev vxlan0 master br0 check_err $? ip link set dev $swp1 nomaster ip link set dev $swp1 master br0 check_err $? } sanitization_single_dev_test_fail() { ip link set dev $swp1 master br0 check_err $? ip link set dev vxlan0 master br0 &> /dev/null check_fail $? ip link set dev $swp1 nomaster ip link set dev vxlan0 master br0 check_err $? ip link set dev $swp1 master br0 &> /dev/null check_fail $? } sanitization_single_dev_valid_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 sanitization_single_dev_test_pass ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device - valid configuration" } sanitization_single_dev_vlan_aware_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 vlan_filtering 1 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 sanitization_single_dev_test_pass ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with a vlan-aware bridge" } sanitization_single_dev_mcast_enabled_test() { RET=0 ip link add dev br0 type bridge ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 sanitization_single_dev_test_fail ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with a multicast enabled bridge" } sanitization_single_dev_mcast_group_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 \ dev $swp2 group 239.0.0.1 sanitization_single_dev_test_fail ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with a multicast group" } sanitization_single_dev_no_local_ip_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit dstport 4789 sanitization_single_dev_test_fail ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with no local ip" } sanitization_single_dev_local_ipv6_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 2001:db8::1 dstport 4789 sanitization_single_dev_test_fail ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with local ipv6 address" } sanitization_single_dev_learning_enabled_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 learning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 sanitization_single_dev_test_pass ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with learning enabled" } sanitization_single_dev_local_interface_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 dev $swp2 sanitization_single_dev_test_fail ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with local interface" } sanitization_single_dev_port_range_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 \ srcport 4000 5000 sanitization_single_dev_test_fail ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with udp source port range" } sanitization_single_dev_tos_static_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos 20 local 198.51.100.1 dstport 4789 sanitization_single_dev_test_fail ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with static tos" } sanitization_single_dev_ttl_inherit_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl inherit tos inherit local 198.51.100.1 dstport 4789 sanitization_single_dev_test_fail ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with inherit ttl" } sanitization_single_dev_udp_checksum_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning udpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 sanitization_single_dev_test_fail ip link del dev vxlan0 ip link del dev br0 log_test "vxlan device with udp checksum" } sanitization_single_dev_test() { # These tests make sure that we correctly sanitize VxLAN device # configurations we do not support sanitization_single_dev_valid_test sanitization_single_dev_vlan_aware_test sanitization_single_dev_mcast_enabled_test sanitization_single_dev_mcast_group_test sanitization_single_dev_no_local_ip_test sanitization_single_dev_local_ipv6_test sanitization_single_dev_learning_enabled_test sanitization_single_dev_local_interface_test sanitization_single_dev_port_range_test sanitization_single_dev_tos_static_test sanitization_single_dev_ttl_inherit_test sanitization_single_dev_udp_checksum_test } sanitization_multi_devs_test_pass() { ip link set dev $swp1 master br0 check_err $? ip link set dev vxlan0 master br0 check_err $? ip link set dev $swp2 master br1 check_err $? ip link set dev vxlan1 master br1 check_err $? ip link set dev $swp2 nomaster ip link set dev $swp1 nomaster ip link set dev $swp1 master br0 check_err $? ip link set dev $swp2 master br1 check_err $? } sanitization_multi_devs_test_fail() { ip link set dev $swp1 master br0 check_err $? ip link set dev vxlan0 master br0 check_err $? ip link set dev $swp2 master br1 check_err $? ip link set dev vxlan1 master br1 &> /dev/null check_fail $? ip link set dev $swp2 nomaster ip link set dev $swp1 nomaster ip link set dev vxlan1 master br1 check_err $? ip link set dev $swp1 master br0 check_err $? ip link set dev $swp2 master br1 &> /dev/null check_fail $? } sanitization_multi_devs_valid_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add dev br1 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 ip link add name vxlan1 up type vxlan id 20 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 sanitization_multi_devs_test_pass ip link del dev vxlan1 ip link del dev vxlan0 ip link del dev br1 ip link del dev br0 log_test "multiple vxlan devices - valid configuration" } sanitization_multi_devs_ttl_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add dev br1 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 ip link add name vxlan1 up type vxlan id 20 nolearning noudpcsum \ ttl 40 tos inherit local 198.51.100.1 dstport 4789 sanitization_multi_devs_test_fail ip link del dev vxlan1 ip link del dev vxlan0 ip link del dev br1 ip link del dev br0 log_test "multiple vxlan devices with different ttl" } sanitization_multi_devs_udp_dstport_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add dev br1 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 ip link add name vxlan1 up type vxlan id 20 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 5789 sanitization_multi_devs_test_fail ip link del dev vxlan1 ip link del dev vxlan0 ip link del dev br1 ip link del dev br0 log_test "multiple vxlan devices with different udp destination port" } sanitization_multi_devs_local_ip_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 ip link add dev br1 type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 ip link add name vxlan1 up type vxlan id 20 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.2 dstport 4789 sanitization_multi_devs_test_fail ip link del dev vxlan1 ip link del dev vxlan0 ip link del dev br1 ip link del dev br0 log_test "multiple vxlan devices with different local ip" } sanitization_multi_devs_test() { # The device has a single VTEP, which means all the VxLAN devices # we offload must share certain properties such as source IP and # UDP destination port. These tests make sure that we forbid # configurations that violate this limitation sanitization_multi_devs_valid_test sanitization_multi_devs_ttl_test sanitization_multi_devs_udp_dstport_test sanitization_multi_devs_local_ip_test } sanitization_test() { sanitization_single_dev_test sanitization_multi_devs_test } offload_indication_setup_create() { # Create a simple setup with two bridges, each with a VxLAN device # and one local port ip link add name br0 up type bridge mcast_snooping 0 ip link add name br1 up type bridge mcast_snooping 0 ip link set dev $swp1 master br0 ip link set dev $swp2 master br1 ip address add 198.51.100.1/32 dev lo ip link add name vxlan0 up master br0 type vxlan id 10 nolearning \ noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789 ip link add name vxlan1 up master br1 type vxlan id 20 nolearning \ noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789 } offload_indication_setup_destroy() { ip link del dev vxlan1 ip link del dev vxlan0 ip address del 198.51.100.1/32 dev lo ip link set dev $swp2 nomaster ip link set dev $swp1 nomaster ip link del dev br1 ip link del dev br0 } offload_indication_fdb_flood_test() { RET=0 bridge fdb append 00:00:00:00:00:00 dev vxlan0 self dst 198.51.100.2 bridge fdb show brport vxlan0 | grep 00:00:00:00:00:00 \ | grep -q offload check_err $? bridge fdb del 00:00:00:00:00:00 dev vxlan0 self log_test "vxlan flood entry offload indication" } offload_indication_fdb_bridge_test() { RET=0 bridge fdb add de:ad:be:ef:13:37 dev vxlan0 self master static \ dst 198.51.100.2 bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep self \ | grep -q offload check_err $? bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep -v self \ | grep -q offload check_err $? log_test "vxlan entry offload indication - initial state" # Remove FDB entry from the bridge driver and check that corresponding # entry in the VxLAN driver is not marked as offloaded RET=0 bridge fdb del de:ad:be:ef:13:37 dev vxlan0 master bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep self \ | grep -q offload check_fail $? log_test "vxlan entry offload indication - after removal from bridge" # Add the FDB entry back to the bridge driver and make sure it is # marked as offloaded in both drivers RET=0 bridge fdb add de:ad:be:ef:13:37 dev vxlan0 master static bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep self \ | grep -q offload check_err $? bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep -v self \ | grep -q offload check_err $? log_test "vxlan entry offload indication - after re-add to bridge" # Remove FDB entry from the VxLAN driver and check that corresponding # entry in the bridge driver is not marked as offloaded RET=0 bridge fdb del de:ad:be:ef:13:37 dev vxlan0 self bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep -v self \ | grep -q offload check_fail $? log_test "vxlan entry offload indication - after removal from vxlan" # Add the FDB entry back to the VxLAN driver and make sure it is # marked as offloaded in both drivers RET=0 bridge fdb add de:ad:be:ef:13:37 dev vxlan0 self dst 198.51.100.2 bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep self \ | grep -q offload check_err $? bridge fdb show brport vxlan0 | grep de:ad:be:ef:13:37 | grep -v self \ | grep -q offload check_err $? log_test "vxlan entry offload indication - after re-add to vxlan" bridge fdb del de:ad:be:ef:13:37 dev vxlan0 self master } offload_indication_fdb_test() { offload_indication_fdb_flood_test offload_indication_fdb_bridge_test } offload_indication_decap_route_test() { RET=0 ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? ip link set dev vxlan0 down ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? ip link set dev vxlan1 down ip route show table local | grep 198.51.100.1 | grep -q offload check_fail $? log_test "vxlan decap route - vxlan device down" RET=0 ip link set dev vxlan1 up ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? ip link set dev vxlan0 up ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? log_test "vxlan decap route - vxlan device up" RET=0 ip address delete 198.51.100.1/32 dev lo ip route show table local | grep 198.51.100.1 | grep -q offload check_fail $? ip address add 198.51.100.1/32 dev lo ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? log_test "vxlan decap route - add local route" RET=0 ip link set dev $swp1 nomaster ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? ip link set dev $swp2 nomaster ip route show table local | grep 198.51.100.1 | grep -q offload check_fail $? ip link set dev $swp1 master br0 ip link set dev $swp2 master br1 ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? log_test "vxlan decap route - local ports enslavement" RET=0 ip link del dev br0 ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? ip link del dev br1 ip route show table local | grep 198.51.100.1 | grep -q offload check_fail $? log_test "vxlan decap route - bridge device deletion" RET=0 ip link add name br0 up type bridge mcast_snooping 0 ip link add name br1 up type bridge mcast_snooping 0 ip link set dev $swp1 master br0 ip link set dev $swp2 master br1 ip link set dev vxlan0 master br0 ip link set dev vxlan1 master br1 ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? ip link del dev vxlan0 ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? ip link del dev vxlan1 ip route show table local | grep 198.51.100.1 | grep -q offload check_fail $? log_test "vxlan decap route - vxlan device deletion" ip link add name vxlan0 up master br0 type vxlan id 10 nolearning \ noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789 ip link add name vxlan1 up master br1 type vxlan id 20 nolearning \ noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789 } check_fdb_offloaded() { local mac=00:11:22:33:44:55 local zmac=00:00:00:00:00:00 bridge fdb show dev vxlan0 | grep $mac | grep self | grep -q offload check_err $? bridge fdb show dev vxlan0 | grep $mac | grep master | grep -q offload check_err $? bridge fdb show dev vxlan0 | grep $zmac | grep self | grep -q offload check_err $? } check_vxlan_fdb_not_offloaded() { local mac=00:11:22:33:44:55 local zmac=00:00:00:00:00:00 bridge fdb show dev vxlan0 | grep $mac | grep -q self check_err $? bridge fdb show dev vxlan0 | grep $mac | grep self | grep -q offload check_fail $? bridge fdb show dev vxlan0 | grep $zmac | grep -q self check_err $? bridge fdb show dev vxlan0 | grep $zmac | grep self | grep -q offload check_fail $? } check_bridge_fdb_not_offloaded() { local mac=00:11:22:33:44:55 local zmac=00:00:00:00:00:00 bridge fdb show dev vxlan0 | grep $mac | grep -q master check_err $? bridge fdb show dev vxlan0 | grep $mac | grep master | grep -q offload check_fail $? } __offload_indication_join_vxlan_first() { local vid=$1; shift local mac=00:11:22:33:44:55 local zmac=00:00:00:00:00:00 bridge fdb append $zmac dev vxlan0 self dst 198.51.100.2 ip link set dev vxlan0 master br0 bridge fdb add dev vxlan0 $mac self master static dst 198.51.100.2 RET=0 check_vxlan_fdb_not_offloaded ip link set dev $swp1 master br0 sleep .1 check_fdb_offloaded log_test "offload indication - attach vxlan first" RET=0 ip link set dev vxlan0 down check_vxlan_fdb_not_offloaded check_bridge_fdb_not_offloaded log_test "offload indication - set vxlan down" RET=0 ip link set dev vxlan0 up sleep .1 check_fdb_offloaded log_test "offload indication - set vxlan up" if [[ ! -z $vid ]]; then RET=0 bridge vlan del dev vxlan0 vid $vid check_vxlan_fdb_not_offloaded check_bridge_fdb_not_offloaded log_test "offload indication - delete VLAN" RET=0 bridge vlan add dev vxlan0 vid $vid check_vxlan_fdb_not_offloaded check_bridge_fdb_not_offloaded log_test "offload indication - add tagged VLAN" RET=0 bridge vlan add dev vxlan0 vid $vid pvid untagged sleep .1 check_fdb_offloaded log_test "offload indication - add pvid/untagged VLAN" fi RET=0 ip link set dev $swp1 nomaster check_vxlan_fdb_not_offloaded log_test "offload indication - detach port" } offload_indication_join_vxlan_first() { ip link add dev br0 up type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 __offload_indication_join_vxlan_first ip link del dev vxlan0 ip link del dev br0 } __offload_indication_join_vxlan_last() { local zmac=00:00:00:00:00:00 RET=0 bridge fdb append $zmac dev vxlan0 self dst 198.51.100.2 ip link set dev $swp1 master br0 bridge fdb show dev vxlan0 | grep $zmac | grep self | grep -q offload check_fail $? ip link set dev vxlan0 master br0 bridge fdb show dev vxlan0 | grep $zmac | grep self | grep -q offload check_err $? log_test "offload indication - attach vxlan last" } offload_indication_join_vxlan_last() { ip link add dev br0 up type bridge mcast_snooping 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 __offload_indication_join_vxlan_last ip link del dev vxlan0 ip link del dev br0 } offload_indication_test() { offload_indication_setup_create offload_indication_fdb_test offload_indication_decap_route_test offload_indication_setup_destroy log_info "offload indication - replay & cleanup" offload_indication_join_vxlan_first offload_indication_join_vxlan_last } sanitization_vlan_aware_test() { RET=0 ip link add dev br0 type bridge mcast_snooping 0 vlan_filtering 1 ip link add name vxlan10 up master br0 type vxlan id 10 nolearning \ noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789 ip link add name vxlan20 up master br0 type vxlan id 20 nolearning \ noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789 # Test that when each VNI is mapped to a different VLAN we can enslave # a port to the bridge bridge vlan add vid 10 dev vxlan10 pvid untagged bridge vlan add vid 20 dev vxlan20 pvid untagged ip link set dev $swp1 master br0 check_err $? log_test "vlan-aware - enslavement to vlan-aware bridge" # Try to map both VNIs to the same VLAN and make sure configuration # fails RET=0 bridge vlan add vid 10 dev vxlan20 pvid untagged &> /dev/null check_fail $? log_test "vlan-aware - two vnis mapped to the same vlan" # Test that enslavement of a port to a bridge fails when two VNIs # are mapped to the same VLAN RET=0 ip link set dev $swp1 nomaster bridge vlan del vid 20 dev vxlan20 pvid untagged bridge vlan add vid 10 dev vxlan20 pvid untagged ip link set dev $swp1 master br0 &> /dev/null check_fail $? log_test "vlan-aware - failed enslavement to vlan-aware bridge" bridge vlan del vid 10 dev vxlan20 bridge vlan add vid 20 dev vxlan20 pvid untagged # Test that offloading of an unsupported tunnel fails when it is # triggered by addition of VLAN to a local port RET=0 # TOS must be set to inherit ip link set dev vxlan10 type vxlan tos 42 ip link set dev $swp1 master br0 bridge vlan add vid 10 dev $swp1 &> /dev/null check_fail $? log_test "vlan-aware - failed vlan addition to a local port" ip link set dev vxlan10 type vxlan tos inherit ip link del dev vxlan20 ip link del dev vxlan10 ip link del dev br0 } offload_indication_vlan_aware_setup_create() { # Create a simple setup with two VxLAN devices and a single VLAN-aware # bridge ip link add name br0 up type bridge mcast_snooping 0 vlan_filtering 1 \ vlan_default_pvid 0 ip link set dev $swp1 master br0 bridge vlan add vid 10 dev $swp1 bridge vlan add vid 20 dev $swp1 ip address add 198.51.100.1/32 dev lo ip link add name vxlan10 up master br0 type vxlan id 10 nolearning \ noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789 ip link add name vxlan20 up master br0 type vxlan id 20 nolearning \ noudpcsum ttl 20 tos inherit local 198.51.100.1 dstport 4789 bridge vlan add vid 10 dev vxlan10 pvid untagged bridge vlan add vid 20 dev vxlan20 pvid untagged } offload_indication_vlan_aware_setup_destroy() { bridge vlan del vid 20 dev vxlan20 bridge vlan del vid 10 dev vxlan10 ip link del dev vxlan20 ip link del dev vxlan10 ip address del 198.51.100.1/32 dev lo bridge vlan del vid 20 dev $swp1 bridge vlan del vid 10 dev $swp1 ip link set dev $swp1 nomaster ip link del dev br0 } offload_indication_vlan_aware_fdb_test() { RET=0 log_info "vxlan entry offload indication - vlan-aware" bridge fdb add de:ad:be:ef:13:37 dev vxlan10 self master static \ dst 198.51.100.2 vlan 10 bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep self \ | grep -q offload check_err $? bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep -v self \ | grep -q offload check_err $? log_test "vxlan entry offload indication - initial state" # Remove FDB entry from the bridge driver and check that corresponding # entry in the VxLAN driver is not marked as offloaded RET=0 bridge fdb del de:ad:be:ef:13:37 dev vxlan10 master vlan 10 bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep self \ | grep -q offload check_fail $? log_test "vxlan entry offload indication - after removal from bridge" # Add the FDB entry back to the bridge driver and make sure it is # marked as offloaded in both drivers RET=0 bridge fdb add de:ad:be:ef:13:37 dev vxlan10 master static vlan 10 bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep self \ | grep -q offload check_err $? bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep -v self \ | grep -q offload check_err $? log_test "vxlan entry offload indication - after re-add to bridge" # Remove FDB entry from the VxLAN driver and check that corresponding # entry in the bridge driver is not marked as offloaded RET=0 bridge fdb del de:ad:be:ef:13:37 dev vxlan10 self bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep -v self \ | grep -q offload check_fail $? log_test "vxlan entry offload indication - after removal from vxlan" # Add the FDB entry back to the VxLAN driver and make sure it is # marked as offloaded in both drivers RET=0 bridge fdb add de:ad:be:ef:13:37 dev vxlan10 self dst 198.51.100.2 bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep self \ | grep -q offload check_err $? bridge fdb show brport vxlan10 | grep de:ad:be:ef:13:37 | grep -v self \ | grep -q offload check_err $? log_test "vxlan entry offload indication - after re-add to vxlan" bridge fdb del de:ad:be:ef:13:37 dev vxlan10 self master vlan 10 } offload_indication_vlan_aware_decap_route_test() { RET=0 ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? # Toggle PVID flag on one VxLAN device and make sure route is still # marked as offloaded bridge vlan add vid 10 dev vxlan10 untagged ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? # Toggle PVID flag on second VxLAN device and make sure route is no # longer marked as offloaded bridge vlan add vid 20 dev vxlan20 untagged ip route show table local | grep 198.51.100.1 | grep -q offload check_fail $? # Toggle PVID flag back and make sure route is marked as offloaded bridge vlan add vid 10 dev vxlan10 pvid untagged bridge vlan add vid 20 dev vxlan20 pvid untagged ip route show table local | grep 198.51.100.1 | grep -q offload check_err $? log_test "vxlan decap route - vni map/unmap" } offload_indication_vlan_aware_join_vxlan_first() { ip link add dev br0 up type bridge mcast_snooping 0 \ vlan_filtering 1 vlan_default_pvid 1 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 __offload_indication_join_vxlan_first 1 ip link del dev vxlan0 ip link del dev br0 } offload_indication_vlan_aware_join_vxlan_last() { ip link add dev br0 up type bridge mcast_snooping 0 \ vlan_filtering 1 vlan_default_pvid 1 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 __offload_indication_join_vxlan_last ip link del dev vxlan0 ip link del dev br0 } offload_indication_vlan_aware_l3vni_test() { local zmac=00:00:00:00:00:00 RET=0 sysctl_set net.ipv6.conf.default.disable_ipv6 1 ip link add dev br0 up type bridge mcast_snooping 0 \ vlan_filtering 1 vlan_default_pvid 0 ip link add name vxlan0 up type vxlan id 10 nolearning noudpcsum \ ttl 20 tos inherit local 198.51.100.1 dstport 4789 ip link set dev $swp1 master br0 # The test will use the offload indication on the FDB entry to # understand if the tunnel is offloaded or not bridge fdb append $zmac dev vxlan0 self dst 192.0.2.1 ip link set dev vxlan0 master br0 bridge vlan add dev vxlan0 vid 10 pvid untagged # No local port or router port is member in the VLAN, so tunnel should # not be offloaded bridge fdb show brport vxlan0 | grep $zmac | grep self \ | grep -q offload check_fail $? "vxlan tunnel offloaded when should not" # Configure a VLAN interface and make sure tunnel is offloaded ip link add link br0 name br10 up type vlan id 10 sysctl_set net.ipv6.conf.br10.disable_ipv6 0 ip -6 address add 2001:db8:1::1/64 dev br10 bridge fdb show brport vxlan0 | grep $zmac | grep self \ | grep -q offload check_err $? "vxlan tunnel not offloaded when should" # Unlink the VXLAN device, make sure tunnel is no longer offloaded, # then add it back to the bridge and make sure it is offloaded ip link set dev vxlan0 nomaster bridge fdb show brport vxlan0 | grep $zmac | grep self \ | grep -q offload check_fail $? "vxlan tunnel offloaded after unlinked from bridge" ip link set dev vxlan0 master br0 bridge fdb show brport vxlan0 | grep $zmac | grep self \ | grep -q offload check_fail $? "vxlan tunnel offloaded despite no matching vid" bridge vlan add dev vxlan0 vid 10 pvid untagged bridge fdb show brport vxlan0 | grep $zmac | grep self \ | grep -q offload check_err $? "vxlan tunnel not offloaded after adding vid" log_test "vxlan - l3 vni" ip link del dev vxlan0 ip link del dev br0 sysctl_restore net.ipv6.conf.default.disable_ipv6 } offload_indication_vlan_aware_test() { offload_indication_vlan_aware_setup_create offload_indication_vlan_aware_fdb_test offload_indication_vlan_aware_decap_route_test offload_indication_vlan_aware_setup_destroy log_info "offload indication - replay & cleanup - vlan aware" offload_indication_vlan_aware_join_vxlan_first offload_indication_vlan_aware_join_vxlan_last offload_indication_vlan_aware_l3vni_test } trap cleanup EXIT setup_prepare setup_wait tests_run exit $EXIT_STATUS