__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
#!/bin/bash
# SPDX-License-Identifier: GPL-2.0
ALL_TESTS="
locked_port_ipv4
locked_port_ipv6
locked_port_vlan
locked_port_mab
locked_port_mab_roam
locked_port_mab_config
locked_port_mab_flush
locked_port_mab_redirect
"
NUM_NETIFS=4
CHECK_TC="no"
source lib.sh
h1_create()
{
simple_if_init $h1 192.0.2.1/24 2001:db8:1::1/64
vlan_create $h1 100 v$h1 198.51.100.1/24
}
h1_destroy()
{
vlan_destroy $h1 100
simple_if_fini $h1 192.0.2.1/24 2001:db8:1::1/64
}
h2_create()
{
simple_if_init $h2 192.0.2.2/24 2001:db8:1::2/64
vlan_create $h2 100 v$h2 198.51.100.2/24
}
h2_destroy()
{
vlan_destroy $h2 100
simple_if_fini $h2 192.0.2.2/24 2001:db8:1::2/64
}
switch_create()
{
ip link add dev br0 type bridge vlan_filtering 1
ip link set dev $swp1 master br0
ip link set dev $swp2 master br0
bridge link set dev $swp1 learning off
ip link set dev br0 up
ip link set dev $swp1 up
ip link set dev $swp2 up
}
switch_destroy()
{
ip link set dev $swp2 down
ip link set dev $swp1 down
ip link del dev br0
}
setup_prepare()
{
h1=${NETIFS[p1]}
swp1=${NETIFS[p2]}
swp2=${NETIFS[p3]}
h2=${NETIFS[p4]}
vrf_prepare
h1_create
h2_create
switch_create
}
cleanup()
{
pre_cleanup
switch_destroy
h2_destroy
h1_destroy
vrf_cleanup
}
locked_port_ipv4()
{
RET=0
check_locked_port_support || return 0
ping_do $h1 192.0.2.2
check_err $? "Ping did not work before locking port"
bridge link set dev $swp1 locked on
ping_do $h1 192.0.2.2
check_fail $? "Ping worked after locking port, but before adding FDB entry"
bridge fdb add `mac_get $h1` dev $swp1 master static
ping_do $h1 192.0.2.2
check_err $? "Ping did not work after locking port and adding FDB entry"
bridge link set dev $swp1 locked off
bridge fdb del `mac_get $h1` dev $swp1 master static
ping_do $h1 192.0.2.2
check_err $? "Ping did not work after unlocking port and removing FDB entry."
log_test "Locked port ipv4"
}
locked_port_vlan()
{
RET=0
check_locked_port_support || return 0
bridge vlan add vid 100 dev $swp1
bridge vlan add vid 100 dev $swp2
ping_do $h1.100 198.51.100.2
check_err $? "Ping through vlan did not work before locking port"
bridge link set dev $swp1 locked on
ping_do $h1.100 198.51.100.2
check_fail $? "Ping through vlan worked after locking port, but before adding FDB entry"
bridge fdb add `mac_get $h1` dev $swp1 vlan 100 master static
ping_do $h1.100 198.51.100.2
check_err $? "Ping through vlan did not work after locking port and adding FDB entry"
bridge link set dev $swp1 locked off
bridge fdb del `mac_get $h1` dev $swp1 vlan 100 master static
ping_do $h1.100 198.51.100.2
check_err $? "Ping through vlan did not work after unlocking port and removing FDB entry"
bridge vlan del vid 100 dev $swp1
bridge vlan del vid 100 dev $swp2
log_test "Locked port vlan"
}
locked_port_ipv6()
{
RET=0
check_locked_port_support || return 0
ping6_do $h1 2001:db8:1::2
check_err $? "Ping6 did not work before locking port"
bridge link set dev $swp1 locked on
ping6_do $h1 2001:db8:1::2
check_fail $? "Ping6 worked after locking port, but before adding FDB entry"
bridge fdb add `mac_get $h1` dev $swp1 master static
ping6_do $h1 2001:db8:1::2
check_err $? "Ping6 did not work after locking port and adding FDB entry"
bridge link set dev $swp1 locked off
bridge fdb del `mac_get $h1` dev $swp1 master static
ping6_do $h1 2001:db8:1::2
check_err $? "Ping6 did not work after unlocking port and removing FDB entry"
log_test "Locked port ipv6"
}
locked_port_mab()
{
RET=0
check_port_mab_support || return 0
ping_do $h1 192.0.2.2
check_err $? "Ping did not work before locking port"
bridge link set dev $swp1 learning on locked on
ping_do $h1 192.0.2.2
check_fail $? "Ping worked on a locked port without an FDB entry"
bridge fdb get `mac_get $h1` br br0 vlan 1 &> /dev/null
check_fail $? "FDB entry created before enabling MAB"
bridge link set dev $swp1 learning on locked on mab on
ping_do $h1 192.0.2.2
check_fail $? "Ping worked on MAB enabled port without an FDB entry"
bridge fdb get `mac_get $h1` br br0 vlan 1 | grep "dev $swp1" | grep -q "locked"
check_err $? "Locked FDB entry not created"
bridge fdb replace `mac_get $h1` dev $swp1 master static
ping_do $h1 192.0.2.2
check_err $? "Ping did not work after replacing FDB entry"
bridge fdb get `mac_get $h1` br br0 vlan 1 | grep "dev $swp1" | grep -q "locked"
check_fail $? "FDB entry marked as locked after replacement"
bridge fdb del `mac_get $h1` dev $swp1 master
bridge link set dev $swp1 learning off locked off mab off
log_test "Locked port MAB"
}
# Check that entries cannot roam to a locked port, but that entries can roam
# to an unlocked port.
locked_port_mab_roam()
{
local mac=a0:b0:c0:c0:b0:a0
RET=0
check_port_mab_support || return 0
bridge link set dev $swp1 learning on locked on mab on
$MZ $h1 -q -c 5 -d 100msec -t udp -a $mac -b rand
bridge fdb get $mac br br0 vlan 1 | grep "dev $swp1" | grep -q "locked"
check_err $? "No locked entry on first injection"
$MZ $h2 -q -c 5 -d 100msec -t udp -a $mac -b rand
bridge fdb get $mac br br0 vlan 1 | grep -q "dev $swp2"
check_err $? "Entry did not roam to an unlocked port"
bridge fdb get $mac br br0 vlan 1 | grep -q "locked"
check_fail $? "Entry roamed with locked flag on"
$MZ $h1 -q -c 5 -d 100msec -t udp -a $mac -b rand
bridge fdb get $mac br br0 vlan 1 | grep -q "dev $swp1"
check_fail $? "Entry roamed back to locked port"
bridge fdb del $mac vlan 1 dev $swp2 master
bridge link set dev $swp1 learning off locked off mab off
log_test "Locked port MAB roam"
}
# Check that MAB can only be enabled on a port that is both locked and has
# learning enabled.
locked_port_mab_config()
{
RET=0
check_port_mab_support || return 0
bridge link set dev $swp1 learning on locked off mab on &> /dev/null
check_fail $? "MAB enabled while port is unlocked"
bridge link set dev $swp1 learning off locked on mab on &> /dev/null
check_fail $? "MAB enabled while port has learning disabled"
bridge link set dev $swp1 learning on locked on mab on
check_err $? "Failed to enable MAB when port is locked and has learning enabled"
bridge link set dev $swp1 learning off locked off mab off
log_test "Locked port MAB configuration"
}
# Check that locked FDB entries are flushed from a port when MAB is disabled.
locked_port_mab_flush()
{
local locked_mac1=00:01:02:03:04:05
local unlocked_mac1=00:01:02:03:04:06
local locked_mac2=00:01:02:03:04:07
local unlocked_mac2=00:01:02:03:04:08
RET=0
check_port_mab_support || return 0
bridge link set dev $swp1 learning on locked on mab on
bridge link set dev $swp2 learning on locked on mab on
# Create regular and locked FDB entries on each port.
bridge fdb add $unlocked_mac1 dev $swp1 vlan 1 master static
bridge fdb add $unlocked_mac2 dev $swp2 vlan 1 master static
$MZ $h1 -q -c 5 -d 100msec -t udp -a $locked_mac1 -b rand
bridge fdb get $locked_mac1 br br0 vlan 1 | grep "dev $swp1" | \
grep -q "locked"
check_err $? "Failed to create locked FDB entry on first port"
$MZ $h2 -q -c 5 -d 100msec -t udp -a $locked_mac2 -b rand
bridge fdb get $locked_mac2 br br0 vlan 1 | grep "dev $swp2" | \
grep -q "locked"
check_err $? "Failed to create locked FDB entry on second port"
# Disable MAB on the first port and check that only the first locked
# FDB entry was flushed.
bridge link set dev $swp1 mab off
bridge fdb get $unlocked_mac1 br br0 vlan 1 &> /dev/null
check_err $? "Regular FDB entry on first port was flushed after disabling MAB"
bridge fdb get $unlocked_mac2 br br0 vlan 1 &> /dev/null
check_err $? "Regular FDB entry on second port was flushed after disabling MAB"
bridge fdb get $locked_mac1 br br0 vlan 1 &> /dev/null
check_fail $? "Locked FDB entry on first port was not flushed after disabling MAB"
bridge fdb get $locked_mac2 br br0 vlan 1 &> /dev/null
check_err $? "Locked FDB entry on second port was flushed after disabling MAB"
bridge fdb del $unlocked_mac2 dev $swp2 vlan 1 master static
bridge fdb del $unlocked_mac1 dev $swp1 vlan 1 master static
bridge link set dev $swp2 learning on locked off mab off
bridge link set dev $swp1 learning off locked off mab off
log_test "Locked port MAB FDB flush"
}
# Check that traffic can be redirected from a locked bridge port and that it
# does not create locked FDB entries.
locked_port_mab_redirect()
{
RET=0
check_port_mab_support || return 0
tc qdisc add dev $swp1 clsact
tc filter add dev $swp1 ingress protocol all pref 1 handle 101 flower \
action mirred egress redirect dev $swp2
bridge link set dev $swp1 learning on locked on mab on
ping_do $h1 192.0.2.2
check_err $? "Ping did not work with redirection"
bridge fdb get `mac_get $h1` br br0 vlan 1 2> /dev/null | \
grep "dev $swp1" | grep -q "locked"
check_fail $? "Locked entry created for redirected traffic"
tc filter del dev $swp1 ingress protocol all pref 1 handle 101 flower
ping_do $h1 192.0.2.2
check_fail $? "Ping worked without redirection"
bridge fdb get `mac_get $h1` br br0 vlan 1 2> /dev/null | \
grep "dev $swp1" | grep -q "locked"
check_err $? "Locked entry not created after deleting filter"
bridge fdb del `mac_get $h1` vlan 1 dev $swp1 master
bridge link set dev $swp1 learning off locked off mab off
tc qdisc del dev $swp1 clsact
log_test "Locked port MAB redirect"
}
trap cleanup EXIT
setup_prepare
setup_wait
tests_run
exit $EXIT_STATUS
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| Makefile | File | 2.94 KB | 0644 |
|
| bridge_fdb_learning_limit.sh | File | 5.8 KB | 0755 |
|
| bridge_igmp.sh | File | 14.71 KB | 0755 |
|
| bridge_locked_port.sh | File | 9.25 KB | 0755 |
|
| bridge_mdb.sh | File | 45.15 KB | 0755 |
|
| bridge_mdb_host.sh | File | 1.66 KB | 0755 |
|
| bridge_mdb_max.sh | File | 29.98 KB | 0755 |
|
| bridge_mdb_port_down.sh | File | 2.24 KB | 0755 |
|
| bridge_mld.sh | File | 16.17 KB | 0755 |
|
| bridge_port_isolation.sh | File | 2.32 KB | 0755 |
|
| bridge_sticky_fdb.sh | File | 1.13 KB | 0755 |
|
| bridge_vlan_aware.sh | File | 4.2 KB | 0755 |
|
| bridge_vlan_mcast.sh | File | 16.74 KB | 0755 |
|
| bridge_vlan_unaware.sh | File | 1.65 KB | 0755 |
|
| custom_multipath_hash.sh | File | 9.8 KB | 0755 |
|
| devlink_lib.sh | File | 12.81 KB | 0644 |
|
| dual_vxlan_bridge.sh | File | 11.21 KB | 0755 |
|
| fib_offload_lib.sh | File | 24.57 KB | 0644 |
|
| gre_custom_multipath_hash.sh | File | 12.51 KB | 0755 |
|
| gre_inner_v4_multipath.sh | File | 7.55 KB | 0755 |
|
| gre_inner_v6_multipath.sh | File | 7.66 KB | 0755 |
|
| gre_multipath.sh | File | 6.29 KB | 0755 |
|
| gre_multipath_nh.sh | File | 8.1 KB | 0755 |
|
| gre_multipath_nh_res.sh | File | 8.25 KB | 0755 |
|
| ip6_forward_instats_vrf.sh | File | 3.04 KB | 0755 |
|
| ip6gre_custom_multipath_hash.sh | File | 12.77 KB | 0755 |
|
| ip6gre_flat.sh | File | 1.18 KB | 0755 |
|
| ip6gre_flat_key.sh | File | 1.24 KB | 0755 |
|
| ip6gre_flat_keys.sh | File | 1.3 KB | 0755 |
|
| ip6gre_hier.sh | File | 1.27 KB | 0755 |
|
| ip6gre_hier_key.sh | File | 1.33 KB | 0755 |
|
| ip6gre_hier_keys.sh | File | 1.39 KB | 0755 |
|
| ip6gre_inner_v4_multipath.sh | File | 7.77 KB | 0755 |
|
| ip6gre_inner_v6_multipath.sh | File | 7.88 KB | 0755 |
|
| ip6gre_lib.sh | File | 15.75 KB | 0644 |
|
| ipip_flat_gre.sh | File | 838 B | 0755 |
|
| ipip_flat_gre_key.sh | File | 860 B | 0755 |
|
| ipip_flat_gre_keys.sh | File | 886 B | 0755 |
|
| ipip_hier_gre.sh | File | 887 B | 0755 |
|
| ipip_hier_gre_key.sh | File | 910 B | 0755 |
|
| ipip_hier_gre_keys.sh | File | 938 B | 0755 |
|
| ipip_lib.sh | File | 8.34 KB | 0644 |
|
| lib.sh | File | 41.63 KB | 0644 |
|
| lib_sh_test.sh | File | 3.57 KB | 0755 |
|
| local_termination.sh | File | 14.42 KB | 0755 |
|
| min_max_mtu.sh | File | 4.74 KB | 0755 |
|
| mirror_gre.sh | File | 2.9 KB | 0755 |
|
| mirror_gre_bound.sh | File | 5.51 KB | 0755 |
|
| mirror_gre_bridge_1d.sh | File | 4.12 KB | 0755 |
|
| mirror_gre_bridge_1d_vlan.sh | File | 2.37 KB | 0755 |
|
| mirror_gre_bridge_1q.sh | File | 3.97 KB | 0755 |
|
| mirror_gre_bridge_1q_lag.sh | File | 7.02 KB | 0755 |
|
| mirror_gre_changes.sh | File | 5.17 KB | 0755 |
|
| mirror_gre_flower.sh | File | 2.61 KB | 0755 |
|
| mirror_gre_lag_lacp.sh | File | 7.48 KB | 0755 |
|
| mirror_gre_lib.sh | File | 3.65 KB | 0644 |
|
| mirror_gre_neigh.sh | File | 2.08 KB | 0755 |
|
| mirror_gre_nh.sh | File | 2.53 KB | 0755 |
|
| mirror_gre_topo_lib.sh | File | 3.45 KB | 0644 |
|
| mirror_gre_vlan.sh | File | 1.36 KB | 0755 |
|
| mirror_gre_vlan_bridge_1q.sh | File | 8.46 KB | 0755 |
|
| mirror_lib.sh | File | 3.72 KB | 0644 |
|
| mirror_topo_lib.sh | File | 2.73 KB | 0644 |
|
| mirror_vlan.sh | File | 1.86 KB | 0755 |
|
| no_forwarding.sh | File | 5.52 KB | 0755 |
|
| pedit_dsfield.sh | File | 6.69 KB | 0755 |
|
| pedit_ip.sh | File | 4.41 KB | 0755 |
|
| pedit_l4port.sh | File | 4.46 KB | 0755 |
|
| q_in_vni.sh | File | 10.71 KB | 0755 |
|
| q_in_vni_ipv6.sh | File | 10.87 KB | 0755 |
|
| router.sh | File | 7.32 KB | 0755 |
|
| router_bridge.sh | File | 3.97 KB | 0755 |
|
| router_bridge_1d.sh | File | 5.1 KB | 0755 |
|
| router_bridge_1d_lag.sh | File | 9.3 KB | 0755 |
|
| router_bridge_lag.sh | File | 6.82 KB | 0755 |
|
| router_bridge_pvid_vlan_upper.sh | File | 3.5 KB | 0755 |
|
| router_bridge_vlan.sh | File | 5.46 KB | 0755 |
|
| router_bridge_vlan_upper.sh | File | 3.92 KB | 0755 |
|
| router_bridge_vlan_upper_pvid.sh | File | 3.7 KB | 0755 |
|
| router_broadcast.sh | File | 5.02 KB | 0755 |
|
| router_mpath_nh.sh | File | 10.73 KB | 0755 |
|
| router_mpath_nh_lib.sh | File | 3.2 KB | 0644 |
|
| router_mpath_nh_res.sh | File | 12.71 KB | 0755 |
|
| router_mpath_seed.sh | File | 7.37 KB | 0755 |
|
| router_multicast.sh | File | 14.6 KB | 0755 |
|
| router_multipath.sh | File | 7.07 KB | 0755 |
|
| router_nh.sh | File | 3.31 KB | 0755 |
|
| router_vid_1.sh | File | 3.52 KB | 0755 |
|
| sch_ets.sh | File | 745 B | 0755 |
|
| sch_ets_core.sh | File | 7.33 KB | 0644 |
|
| sch_ets_tests.sh | File | 4.09 KB | 0644 |
|
| sch_red.sh | File | 11.14 KB | 0755 |
|
| sch_tbf_core.sh | File | 4.77 KB | 0644 |
|
| sch_tbf_ets.sh | File | 118 B | 0755 |
|
| sch_tbf_etsprio.sh | File | 1.37 KB | 0644 |
|
| sch_tbf_prio.sh | File | 118 B | 0755 |
|
| sch_tbf_root.sh | File | 496 B | 0755 |
|
| skbedit_priority.sh | File | 3.87 KB | 0755 |
|
| tc_actions.sh | File | 9.3 KB | 0755 |
|
| tc_chains.sh | File | 4.83 KB | 0755 |
|
| tc_common.sh | File | 710 B | 0644 |
|
| tc_flower.sh | File | 21.24 KB | 0755 |
|
| tc_flower_cfm.sh | File | 4.85 KB | 0755 |
|
| tc_flower_l2_miss.sh | File | 9.13 KB | 0755 |
|
| tc_flower_port_range.sh | File | 7.35 KB | 0755 |
|
| tc_flower_router.sh | File | 3.02 KB | 0755 |
|
| tc_mpls_l2vpn.sh | File | 5.03 KB | 0755 |
|
| tc_police.sh | File | 11.75 KB | 0755 |
|
| tc_shblocks.sh | File | 2.68 KB | 0755 |
|
| tc_tunnel_key.sh | File | 3.71 KB | 0755 |
|
| tc_vlan_modify.sh | File | 3.17 KB | 0755 |
|
| tsn_lib.sh | File | 5.47 KB | 0644 |
|
| vxlan_asymmetric.sh | File | 17.55 KB | 0755 |
|
| vxlan_asymmetric_ipv6.sh | File | 16.03 KB | 0755 |
|
| vxlan_bridge_1d.sh | File | 20.4 KB | 0755 |
|
| vxlan_bridge_1d_ipv6.sh | File | 21.31 KB | 0755 |
|
| vxlan_bridge_1d_port_8472.sh | File | 172 B | 0755 |
|
| vxlan_bridge_1d_port_8472_ipv6.sh | File | 188 B | 0755 |
|
| vxlan_bridge_1q.sh | File | 22.91 KB | 0755 |
|
| vxlan_bridge_1q_ipv6.sh | File | 24.35 KB | 0755 |
|
| vxlan_bridge_1q_port_8472.sh | File | 172 B | 0755 |
|
| vxlan_bridge_1q_port_8472_ipv6.sh | File | 188 B | 0755 |
|
| vxlan_reserved.sh | File | 7.23 KB | 0755 |
|
| vxlan_symmetric.sh | File | 18.05 KB | 0755 |
|
| vxlan_symmetric_ipv6.sh | File | 18.31 KB | 0755 |
|