xref: /openbmc/linux/tools/testing/selftests/net/rtnetlink.sh (revision c4c8f39a57bf5057fc51a848d42b7e348ecfa31d)
1#!/bin/sh
2#
3# This test is for checking rtnetlink callpaths, and get as much coverage as possible.
4#
5# set -e
6
7devdummy="test-dummy0"
8ret=0
9
10# set global exit status, but never reset nonzero one.
11check_err()
12{
13	if [ $ret -eq 0 ]; then
14		ret=$1
15	fi
16}
17
18# same but inverted -- used when command must fail for test to pass
19check_fail()
20{
21	if [ $1 -eq 0 ]; then
22		ret=1
23	fi
24}
25
26kci_add_dummy()
27{
28	ip link add name "$devdummy" type dummy
29	check_err $?
30	ip link set "$devdummy" up
31	check_err $?
32}
33
34kci_del_dummy()
35{
36	ip link del dev "$devdummy"
37	check_err $?
38}
39
40kci_test_netconf()
41{
42	dev="$1"
43	r=$ret
44
45	ip netconf show dev "$dev" > /dev/null
46	check_err $?
47
48	for f in 4 6; do
49		ip -$f netconf show dev "$dev" > /dev/null
50		check_err $?
51	done
52
53	if [ $ret -ne 0 ] ;then
54		echo "FAIL: ip netconf show $dev"
55		test $r -eq 0 && ret=0
56		return 1
57	fi
58}
59
60# add a bridge with vlans on top
61kci_test_bridge()
62{
63	devbr="test-br0"
64	vlandev="testbr-vlan1"
65
66	ret=0
67	ip link add name "$devbr" type bridge
68	check_err $?
69
70	ip link set dev "$devdummy" master "$devbr"
71	check_err $?
72
73	ip link set "$devbr" up
74	check_err $?
75
76	ip link add link "$devbr" name "$vlandev" type vlan id 1
77	check_err $?
78	ip addr add dev "$vlandev" 10.200.7.23/30
79	check_err $?
80	ip -6 addr add dev "$vlandev" dead:42::1234/64
81	check_err $?
82	ip -d link > /dev/null
83	check_err $?
84	ip r s t all > /dev/null
85	check_err $?
86
87	for name in "$devbr" "$vlandev" "$devdummy" ; do
88		kci_test_netconf "$name"
89	done
90
91	ip -6 addr del dev "$vlandev" dead:42::1234/64
92	check_err $?
93
94	ip link del dev "$vlandev"
95	check_err $?
96	ip link del dev "$devbr"
97	check_err $?
98
99	if [ $ret -ne 0 ];then
100		echo "FAIL: bridge setup"
101		return 1
102	fi
103	echo "PASS: bridge setup"
104
105}
106
107kci_test_gre()
108{
109	gredev=neta
110	rem=10.42.42.1
111	loc=10.0.0.1
112
113	ret=0
114	ip tunnel add $gredev mode gre remote $rem local $loc ttl 1
115	check_err $?
116	ip link set $gredev up
117	check_err $?
118	ip addr add 10.23.7.10 dev $gredev
119	check_err $?
120	ip route add 10.23.8.0/30 dev $gredev
121	check_err $?
122	ip addr add dev "$devdummy" 10.23.7.11/24
123	check_err $?
124	ip link > /dev/null
125	check_err $?
126	ip addr > /dev/null
127	check_err $?
128
129	kci_test_netconf "$gredev"
130
131	ip addr del dev "$devdummy" 10.23.7.11/24
132	check_err $?
133
134	ip link del $gredev
135	check_err $?
136
137	if [ $ret -ne 0 ];then
138		echo "FAIL: gre tunnel endpoint"
139		return 1
140	fi
141	echo "PASS: gre tunnel endpoint"
142}
143
144# tc uses rtnetlink too, for full tc testing
145# please see tools/testing/selftests/tc-testing.
146kci_test_tc()
147{
148	dev=lo
149	ret=0
150
151	tc qdisc add dev "$dev" root handle 1: htb
152	check_err $?
153	tc class add dev "$dev" parent 1: classid 1:10 htb rate 1mbit
154	check_err $?
155	tc filter add dev "$dev" parent 1:0 prio 5 handle ffe: protocol ip u32 divisor 256
156	check_err $?
157	tc filter add dev "$dev" parent 1:0 prio 5 handle ffd: protocol ip u32 divisor 256
158	check_err $?
159	tc filter add dev "$dev" parent 1:0 prio 5 handle ffc: protocol ip u32 divisor 256
160	check_err $?
161	tc filter add dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:3 u32 ht ffe:2: match ip src 10.0.0.3 flowid 1:10
162	check_err $?
163	tc filter add dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:2 u32 ht ffe:2: match ip src 10.0.0.2 flowid 1:10
164	check_err $?
165	tc filter show dev "$dev" parent  1:0 > /dev/null
166	check_err $?
167	tc filter del dev "$dev" protocol ip parent 1: prio 5 handle ffe:2:3 u32
168	check_err $?
169	tc filter show dev "$dev" parent  1:0 > /dev/null
170	check_err $?
171	tc qdisc del dev "$dev" root handle 1: htb
172	check_err $?
173
174	if [ $ret -ne 0 ];then
175		echo "FAIL: tc htb hierarchy"
176		return 1
177	fi
178	echo "PASS: tc htb hierarchy"
179
180}
181
182kci_test_polrouting()
183{
184	ret=0
185	ip rule add fwmark 1 lookup 100
186	check_err $?
187	ip route add local 0.0.0.0/0 dev lo table 100
188	check_err $?
189	ip r s t all > /dev/null
190	check_err $?
191	ip rule del fwmark 1 lookup 100
192	check_err $?
193	ip route del local 0.0.0.0/0 dev lo table 100
194	check_err $?
195
196	if [ $ret -ne 0 ];then
197		echo "FAIL: policy route test"
198		return 1
199	fi
200	echo "PASS: policy routing"
201}
202
203kci_test_route_get()
204{
205	ret=0
206
207	ip route get 127.0.0.1 > /dev/null
208	check_err $?
209	ip route get 127.0.0.1 dev "$devdummy" > /dev/null
210	check_err $?
211	ip route get ::1 > /dev/null
212	check_err $?
213	ip route get fe80::1 dev "$devdummy" > /dev/null
214	check_err $?
215	ip route get 127.0.0.1 from 127.0.0.1 oif lo tos 0x1 mark 0x1 > /dev/null
216	check_err $?
217	ip route get ::1 from ::1 iif lo oif lo tos 0x1 mark 0x1 > /dev/null
218	check_err $?
219	ip addr add dev "$devdummy" 10.23.7.11/24
220	check_err $?
221	ip route get 10.23.7.11 from 10.23.7.12 iif "$devdummy" > /dev/null
222	check_err $?
223	ip addr del dev "$devdummy" 10.23.7.11/24
224	check_err $?
225
226	if [ $ret -ne 0 ];then
227		echo "FAIL: route get"
228		return 1
229	fi
230
231	echo "PASS: route get"
232}
233
234kci_test_addrlabel()
235{
236	ret=0
237
238	ip addrlabel add prefix dead::/64 dev lo label 1
239	check_err $?
240
241	ip addrlabel list |grep -q "prefix dead::/64 dev lo label 1"
242	check_err $?
243
244	ip addrlabel del prefix dead::/64 dev lo label 1 2> /dev/null
245	check_err $?
246
247	ip addrlabel add prefix dead::/64 label 1 2> /dev/null
248	check_err $?
249
250	ip addrlabel del prefix dead::/64 label 1 2> /dev/null
251	check_err $?
252
253	# concurrent add/delete
254	for i in $(seq 1 1000); do
255		ip addrlabel add prefix 1c3::/64 label 12345 2>/dev/null
256	done &
257
258	for i in $(seq 1 1000); do
259		ip addrlabel del prefix 1c3::/64 label 12345 2>/dev/null
260	done
261
262	wait
263
264	ip addrlabel del prefix 1c3::/64 label 12345 2>/dev/null
265
266	if [ $ret -ne 0 ];then
267		echo "FAIL: ipv6 addrlabel"
268		return 1
269	fi
270
271	echo "PASS: ipv6 addrlabel"
272}
273
274kci_test_ifalias()
275{
276	ret=0
277	namewant=$(uuidgen)
278	syspathname="/sys/class/net/$devdummy/ifalias"
279
280	ip link set dev "$devdummy" alias "$namewant"
281	check_err $?
282
283	if [ $ret -ne 0 ]; then
284		echo "FAIL: cannot set interface alias of $devdummy to $namewant"
285		return 1
286	fi
287
288	ip link show "$devdummy" | grep -q "alias $namewant"
289	check_err $?
290
291	if [ -r "$syspathname" ] ; then
292		read namehave < "$syspathname"
293		if [ "$namewant" != "$namehave" ]; then
294			echo "FAIL: did set ifalias $namewant but got $namehave"
295			return 1
296		fi
297
298		namewant=$(uuidgen)
299		echo "$namewant" > "$syspathname"
300	        ip link show "$devdummy" | grep -q "alias $namewant"
301		check_err $?
302
303		# sysfs interface allows to delete alias again
304		echo "" > "$syspathname"
305
306	        ip link show "$devdummy" | grep -q "alias $namewant"
307		check_fail $?
308
309		for i in $(seq 1 100); do
310			uuidgen > "$syspathname" &
311		done
312
313		wait
314
315		# re-add the alias -- kernel should free mem when dummy dev is removed
316		ip link set dev "$devdummy" alias "$namewant"
317		check_err $?
318	fi
319
320	if [ $ret -ne 0 ]; then
321		echo "FAIL: set interface alias $devdummy to $namewant"
322		return 1
323	fi
324
325	echo "PASS: set ifalias $namewant for $devdummy"
326}
327
328kci_test_vrf()
329{
330	vrfname="test-vrf"
331	ret=0
332
333	ip link show type vrf 2>/dev/null
334	if [ $? -ne 0 ]; then
335		echo "SKIP: vrf: iproute2 too old"
336		return 0
337	fi
338
339	ip link add "$vrfname" type vrf table 10
340	check_err $?
341	if [ $ret -ne 0 ];then
342		echo "FAIL: can't add vrf interface, skipping test"
343		return 0
344	fi
345
346	ip -br link show type vrf | grep -q "$vrfname"
347	check_err $?
348	if [ $ret -ne 0 ];then
349		echo "FAIL: created vrf device not found"
350		return 1
351	fi
352
353	ip link set dev "$vrfname" up
354	check_err $?
355
356	ip link set dev "$devdummy" master "$vrfname"
357	check_err $?
358	ip link del dev "$vrfname"
359	check_err $?
360
361	if [ $ret -ne 0 ];then
362		echo "FAIL: vrf"
363		return 1
364	fi
365
366	echo "PASS: vrf"
367}
368
369kci_test_encap_vxlan()
370{
371	ret=0
372	vxlan="test-vxlan0"
373	vlan="test-vlan0"
374	testns="$1"
375
376	ip netns exec "$testns" ip link add "$vxlan" type vxlan id 42 group 239.1.1.1 \
377		dev "$devdummy" dstport 4789 2>/dev/null
378	if [ $? -ne 0 ]; then
379		echo "FAIL: can't add vxlan interface, skipping test"
380		return 0
381	fi
382	check_err $?
383
384	ip netns exec "$testns" ip addr add 10.2.11.49/24 dev "$vxlan"
385	check_err $?
386
387	ip netns exec "$testns" ip link set up dev "$vxlan"
388	check_err $?
389
390	ip netns exec "$testns" ip link add link "$vxlan" name "$vlan" type vlan id 1
391	check_err $?
392
393	ip netns exec "$testns" ip link del "$vxlan"
394	check_err $?
395
396	if [ $ret -ne 0 ]; then
397		echo "FAIL: vxlan"
398		return 1
399	fi
400	echo "PASS: vxlan"
401}
402
403kci_test_encap_fou()
404{
405	ret=0
406	name="test-fou"
407	testns="$1"
408
409	ip fou help 2>&1 |grep -q 'Usage: ip fou'
410	if [ $? -ne 0 ];then
411		echo "SKIP: fou: iproute2 too old"
412		return 1
413	fi
414
415	ip netns exec "$testns" ip fou add port 7777 ipproto 47 2>/dev/null
416	if [ $? -ne 0 ];then
417		echo "FAIL: can't add fou port 7777, skipping test"
418		return 1
419	fi
420
421	ip netns exec "$testns" ip fou add port 8888 ipproto 4
422	check_err $?
423
424	ip netns exec "$testns" ip fou del port 9999 2>/dev/null
425	check_fail $?
426
427	ip netns exec "$testns" ip fou del port 7777
428	check_err $?
429
430	if [ $ret -ne 0 ]; then
431		echo "FAIL: fou"
432		return 1
433	fi
434
435	echo "PASS: fou"
436}
437
438# test various encap methods, use netns to avoid unwanted interference
439kci_test_encap()
440{
441	testns="testns"
442	ret=0
443
444	ip netns add "$testns"
445	if [ $? -ne 0 ]; then
446		echo "SKIP encap tests: cannot add net namespace $testns"
447		return 1
448	fi
449
450	ip netns exec "$testns" ip link set lo up
451	check_err $?
452
453	ip netns exec "$testns" ip link add name "$devdummy" type dummy
454	check_err $?
455	ip netns exec "$testns" ip link set "$devdummy" up
456	check_err $?
457
458	kci_test_encap_vxlan "$testns"
459	kci_test_encap_fou "$testns"
460
461	ip netns del "$testns"
462}
463
464kci_test_macsec()
465{
466	msname="test_macsec0"
467	ret=0
468
469	ip macsec help 2>&1 | grep -q "^Usage: ip macsec"
470	if [ $? -ne 0 ]; then
471		echo "SKIP: macsec: iproute2 too old"
472		return 0
473	fi
474
475	ip link add link "$devdummy" "$msname" type macsec port 42 encrypt on
476	check_err $?
477	if [ $ret -ne 0 ];then
478		echo "FAIL: can't add macsec interface, skipping test"
479		return 1
480	fi
481
482	ip macsec add "$msname" tx sa 0 pn 1024 on key 01 12345678901234567890123456789012
483	check_err $?
484
485	ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef"
486	check_err $?
487
488	ip macsec add "$msname" rx port 1234 address "1c:ed:de:ad:be:ef" sa 0 pn 1 on key 00 0123456789abcdef0123456789abcdef
489	check_err $?
490
491	ip macsec show > /dev/null
492	check_err $?
493
494	ip link del dev "$msname"
495	check_err $?
496
497	if [ $ret -ne 0 ];then
498		echo "FAIL: macsec"
499		return 1
500	fi
501
502	echo "PASS: macsec"
503}
504
505#-------------------------------------------------------------------
506# Example commands
507#   ip x s add proto esp src 14.0.0.52 dst 14.0.0.70 \
508#            spi 0x07 mode transport reqid 0x07 replay-window 32 \
509#            aead 'rfc4106(gcm(aes))' 1234567890123456dcba 128 \
510#            sel src 14.0.0.52/24 dst 14.0.0.70/24
511#   ip x p add dir out src 14.0.0.52/24 dst 14.0.0.70/24 \
512#            tmpl proto esp src 14.0.0.52 dst 14.0.0.70 \
513#            spi 0x07 mode transport reqid 0x07
514#
515# Subcommands not tested
516#    ip x s update
517#    ip x s allocspi
518#    ip x s deleteall
519#    ip x p update
520#    ip x p deleteall
521#    ip x p set
522#-------------------------------------------------------------------
523kci_test_ipsec()
524{
525	srcip="14.0.0.52"
526	dstip="14.0.0.70"
527	algo="aead rfc4106(gcm(aes)) 0x3132333435363738393031323334353664636261 128"
528
529	# flush to be sure there's nothing configured
530	ip x s flush ; ip x p flush
531	check_err $?
532
533	# start the monitor in the background
534	tmpfile=`mktemp ipsectestXXX`
535	ip x m > $tmpfile &
536	mpid=$!
537	sleep 0.2
538
539	ipsecid="proto esp src $srcip dst $dstip spi 0x07"
540	ip x s add $ipsecid \
541            mode transport reqid 0x07 replay-window 32 \
542            $algo sel src $srcip/24 dst $dstip/24
543	check_err $?
544
545	lines=`ip x s list | grep $srcip | grep $dstip | wc -l`
546	test $lines -eq 2
547	check_err $?
548
549	ip x s count | grep -q "SAD count 1"
550	check_err $?
551
552	lines=`ip x s get $ipsecid | grep $srcip | grep $dstip | wc -l`
553	test $lines -eq 2
554	check_err $?
555
556	ip x s delete $ipsecid
557	check_err $?
558
559	lines=`ip x s list | wc -l`
560	test $lines -eq 0
561	check_err $?
562
563	ipsecsel="dir out src $srcip/24 dst $dstip/24"
564	ip x p add $ipsecsel \
565		    tmpl proto esp src $srcip dst $dstip \
566		    spi 0x07 mode transport reqid 0x07
567	check_err $?
568
569	lines=`ip x p list | grep $srcip | grep $dstip | wc -l`
570	test $lines -eq 2
571	check_err $?
572
573	ip x p count | grep -q "SPD IN  0 OUT 1 FWD 0"
574	check_err $?
575
576	lines=`ip x p get $ipsecsel | grep $srcip | grep $dstip | wc -l`
577	test $lines -eq 2
578	check_err $?
579
580	ip x p delete $ipsecsel
581	check_err $?
582
583	lines=`ip x p list | wc -l`
584	test $lines -eq 0
585	check_err $?
586
587	# check the monitor results
588	kill $mpid
589	lines=`wc -l $tmpfile | cut "-d " -f1`
590	test $lines -eq 20
591	check_err $?
592	rm -rf $tmpfile
593
594	# clean up any leftovers
595	ip x s flush
596	check_err $?
597	ip x p flush
598	check_err $?
599
600	if [ $ret -ne 0 ]; then
601		echo "FAIL: ipsec"
602		return 1
603	fi
604	echo "PASS: ipsec"
605}
606
607kci_test_gretap()
608{
609	testns="testns"
610	DEV_NS=gretap00
611	ret=0
612
613	ip netns add "$testns"
614	if [ $? -ne 0 ]; then
615		echo "SKIP gretap tests: cannot add net namespace $testns"
616		return 1
617	fi
618
619	ip link help gretap 2>&1 | grep -q "^Usage:"
620	if [ $? -ne 0 ];then
621		echo "SKIP: gretap: iproute2 too old"
622		ip netns del "$testns"
623		return 1
624	fi
625
626	# test native tunnel
627	ip netns exec "$testns" ip link add dev "$DEV_NS" type gretap seq \
628		key 102 local 172.16.1.100 remote 172.16.1.200
629	check_err $?
630
631	ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
632	check_err $?
633
634	ip netns exec "$testns" ip link set dev $DEV_NS up
635	check_err $?
636
637	ip netns exec "$testns" ip link del "$DEV_NS"
638	check_err $?
639
640	# test external mode
641	ip netns exec "$testns" ip link add dev "$DEV_NS" type gretap external
642	check_err $?
643
644	ip netns exec "$testns" ip link del "$DEV_NS"
645	check_err $?
646
647	if [ $ret -ne 0 ]; then
648		echo "FAIL: gretap"
649		ip netns del "$testns"
650		return 1
651	fi
652	echo "PASS: gretap"
653
654	ip netns del "$testns"
655}
656
657kci_test_ip6gretap()
658{
659	testns="testns"
660	DEV_NS=ip6gretap00
661	ret=0
662
663	ip netns add "$testns"
664	if [ $? -ne 0 ]; then
665		echo "SKIP ip6gretap tests: cannot add net namespace $testns"
666		return 1
667	fi
668
669	ip link help ip6gretap 2>&1 | grep -q "^Usage:"
670	if [ $? -ne 0 ];then
671		echo "SKIP: ip6gretap: iproute2 too old"
672		ip netns del "$testns"
673		return 1
674	fi
675
676	# test native tunnel
677	ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6gretap seq \
678		key 102 local fc00:100::1 remote fc00:100::2
679	check_err $?
680
681	ip netns exec "$testns" ip addr add dev "$DEV_NS" fc00:200::1/96
682	check_err $?
683
684	ip netns exec "$testns" ip link set dev $DEV_NS up
685	check_err $?
686
687	ip netns exec "$testns" ip link del "$DEV_NS"
688	check_err $?
689
690	# test external mode
691	ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6gretap external
692	check_err $?
693
694	ip netns exec "$testns" ip link del "$DEV_NS"
695	check_err $?
696
697	if [ $ret -ne 0 ]; then
698		echo "FAIL: ip6gretap"
699		ip netns del "$testns"
700		return 1
701	fi
702	echo "PASS: ip6gretap"
703
704	ip netns del "$testns"
705}
706
707kci_test_erspan()
708{
709	testns="testns"
710	DEV_NS=erspan00
711	ret=0
712
713	ip link help erspan 2>&1 | grep -q "^Usage:"
714	if [ $? -ne 0 ];then
715		echo "SKIP: erspan: iproute2 too old"
716		return 1
717	fi
718
719	ip netns add "$testns"
720	if [ $? -ne 0 ]; then
721		echo "SKIP erspan tests: cannot add net namespace $testns"
722		return 1
723	fi
724
725	# test native tunnel erspan v1
726	ip netns exec "$testns" ip link add dev "$DEV_NS" type erspan seq \
727		key 102 local 172.16.1.100 remote 172.16.1.200 \
728		erspan_ver 1 erspan 488
729	check_err $?
730
731	ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
732	check_err $?
733
734	ip netns exec "$testns" ip link set dev $DEV_NS up
735	check_err $?
736
737	ip netns exec "$testns" ip link del "$DEV_NS"
738	check_err $?
739
740	# test native tunnel erspan v2
741	ip netns exec "$testns" ip link add dev "$DEV_NS" type erspan seq \
742		key 102 local 172.16.1.100 remote 172.16.1.200 \
743		erspan_ver 2 erspan_dir ingress erspan_hwid 7
744	check_err $?
745
746	ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
747	check_err $?
748
749	ip netns exec "$testns" ip link set dev $DEV_NS up
750	check_err $?
751
752	ip netns exec "$testns" ip link del "$DEV_NS"
753	check_err $?
754
755	# test external mode
756	ip netns exec "$testns" ip link add dev "$DEV_NS" type erspan external
757	check_err $?
758
759	ip netns exec "$testns" ip link del "$DEV_NS"
760	check_err $?
761
762	if [ $ret -ne 0 ]; then
763		echo "FAIL: erspan"
764		ip netns del "$testns"
765		return 1
766	fi
767	echo "PASS: erspan"
768
769	ip netns del "$testns"
770}
771
772kci_test_ip6erspan()
773{
774	testns="testns"
775	DEV_NS=ip6erspan00
776	ret=0
777
778	ip link help ip6erspan 2>&1 | grep -q "^Usage:"
779	if [ $? -ne 0 ];then
780		echo "SKIP: ip6erspan: iproute2 too old"
781		return 1
782	fi
783
784	ip netns add "$testns"
785	if [ $? -ne 0 ]; then
786		echo "SKIP ip6erspan tests: cannot add net namespace $testns"
787		return 1
788	fi
789
790	# test native tunnel ip6erspan v1
791	ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6erspan seq \
792		key 102 local fc00:100::1 remote fc00:100::2 \
793		erspan_ver 1 erspan 488
794	check_err $?
795
796	ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
797	check_err $?
798
799	ip netns exec "$testns" ip link set dev $DEV_NS up
800	check_err $?
801
802	ip netns exec "$testns" ip link del "$DEV_NS"
803	check_err $?
804
805	# test native tunnel ip6erspan v2
806	ip netns exec "$testns" ip link add dev "$DEV_NS" type ip6erspan seq \
807		key 102 local fc00:100::1 remote fc00:100::2 \
808		erspan_ver 2 erspan_dir ingress erspan_hwid 7
809	check_err $?
810
811	ip netns exec "$testns" ip addr add dev "$DEV_NS" 10.1.1.100/24
812	check_err $?
813
814	ip netns exec "$testns" ip link set dev $DEV_NS up
815	check_err $?
816
817	ip netns exec "$testns" ip link del "$DEV_NS"
818	check_err $?
819
820	# test external mode
821	ip netns exec "$testns" ip link add dev "$DEV_NS" \
822		type ip6erspan external
823	check_err $?
824
825	ip netns exec "$testns" ip link del "$DEV_NS"
826	check_err $?
827
828	if [ $ret -ne 0 ]; then
829		echo "FAIL: ip6erspan"
830		ip netns del "$testns"
831		return 1
832	fi
833	echo "PASS: ip6erspan"
834
835	ip netns del "$testns"
836}
837
838kci_test_rtnl()
839{
840	kci_add_dummy
841	if [ $ret -ne 0 ];then
842		echo "FAIL: cannot add dummy interface"
843		return 1
844	fi
845
846	kci_test_polrouting
847	kci_test_route_get
848	kci_test_tc
849	kci_test_gre
850	kci_test_gretap
851	kci_test_ip6gretap
852	kci_test_erspan
853	kci_test_ip6erspan
854	kci_test_bridge
855	kci_test_addrlabel
856	kci_test_ifalias
857	kci_test_vrf
858	kci_test_encap
859	kci_test_macsec
860	kci_test_ipsec
861
862	kci_del_dummy
863}
864
865#check for needed privileges
866if [ "$(id -u)" -ne 0 ];then
867	echo "SKIP: Need root privileges"
868	exit 0
869fi
870
871for x in ip tc;do
872	$x -Version 2>/dev/null >/dev/null
873	if [ $? -ne 0 ];then
874		echo "SKIP: Could not run test without the $x tool"
875		exit 0
876	fi
877done
878
879kci_test_rtnl
880
881exit $ret
882