blob: 65842a2afa5569f040abaa96c7fd851886f07885 [file] [log] [blame]
Stefano Briviod1f1b9c2018-03-06 22:16:27 +01001#!/bin/sh
2# SPDX-License-Identifier: GPL-2.0
3#
4# Check that route PMTU values match expectations
5#
6# Tests currently implemented:
7#
8# - test_pmtu_vti6_exception
9# Set up vti6 tunnel on top of veth, with xfrm states and policies, in two
10# namespaces with matching endpoints. Check that route exception is
11# created by exceeding link layer MTU with ping to other endpoint. Then
12# decrease and increase MTU of tunnel, checking that route exception PMTU
13# changes accordingly
14
15NS_A="ns-$(mktemp -u XXXXXX)"
16NS_B="ns-$(mktemp -u XXXXXX)"
17ns_a="ip netns exec ${NS_A}"
18ns_b="ip netns exec ${NS_B}"
19
20veth6_a_addr="fd00:1::a"
21veth6_b_addr="fd00:1::b"
22veth6_mask="64"
23
24vti6_a_addr="fd00:2::a"
25vti6_b_addr="fd00:2::b"
26vti6_mask="64"
27
28setup_namespaces() {
Stefano Brivio380e29a2018-03-17 02:31:38 +010029 ip netns add ${NS_A} || return 1
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010030 ip netns add ${NS_B}
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010031}
32
33setup_veth() {
Stefano Brivio380e29a2018-03-17 02:31:38 +010034 ${ns_a} ip link add veth_a type veth peer name veth_b || return 1
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010035 ${ns_a} ip link set veth_b netns ${NS_B}
36
37 ${ns_a} ip addr add ${veth6_a_addr}/${veth6_mask} dev veth_a
38 ${ns_b} ip addr add ${veth6_b_addr}/${veth6_mask} dev veth_b
39
40 ${ns_a} ip link set veth_a up
41 ${ns_b} ip link set veth_b up
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010042}
43
44setup_vti6() {
Stefano Brivio380e29a2018-03-17 02:31:38 +010045 ${ns_a} ip link add vti_a type vti6 local ${veth6_a_addr} remote ${veth6_b_addr} key 10 || return 1
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010046 ${ns_b} ip link add vti_b type vti6 local ${veth6_b_addr} remote ${veth6_a_addr} key 10
47
48 ${ns_a} ip addr add ${vti6_a_addr}/${vti6_mask} dev vti_a
49 ${ns_b} ip addr add ${vti6_b_addr}/${vti6_mask} dev vti_b
50
51 ${ns_a} ip link set vti_a up
52 ${ns_b} ip link set vti_b up
53
54 sleep 1
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010055}
56
57setup_xfrm() {
Stefano Brivio380e29a2018-03-17 02:31:38 +010058 ${ns_a} ip -6 xfrm state add src ${veth6_a_addr} dst ${veth6_b_addr} spi 0x1000 proto esp aead "rfc4106(gcm(aes))" 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f 128 mode tunnel || return 1
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010059 ${ns_a} ip -6 xfrm state add src ${veth6_b_addr} dst ${veth6_a_addr} spi 0x1001 proto esp aead "rfc4106(gcm(aes))" 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f 128 mode tunnel
60 ${ns_a} ip -6 xfrm policy add dir out mark 10 tmpl src ${veth6_a_addr} dst ${veth6_b_addr} proto esp mode tunnel
61 ${ns_a} ip -6 xfrm policy add dir in mark 10 tmpl src ${veth6_b_addr} dst ${veth6_a_addr} proto esp mode tunnel
62
63 ${ns_b} ip -6 xfrm state add src ${veth6_a_addr} dst ${veth6_b_addr} spi 0x1000 proto esp aead "rfc4106(gcm(aes))" 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f 128 mode tunnel
64 ${ns_b} ip -6 xfrm state add src ${veth6_b_addr} dst ${veth6_a_addr} spi 0x1001 proto esp aead "rfc4106(gcm(aes))" 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f 128 mode tunnel
65 ${ns_b} ip -6 xfrm policy add dir out mark 10 tmpl src ${veth6_b_addr} dst ${veth6_a_addr} proto esp mode tunnel
66 ${ns_b} ip -6 xfrm policy add dir in mark 10 tmpl src ${veth6_a_addr} dst ${veth6_b_addr} proto esp mode tunnel
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010067}
68
69setup() {
70 tunnel_type="$1"
71
72 [ "$(id -u)" -ne 0 ] && echo "SKIP: need to run as root" && exit 0
73
Stefano Brivio380e29a2018-03-17 02:31:38 +010074 setup_namespaces || { echo "SKIP: namespaces not supported"; exit 0; }
75 setup_veth || { echo "SKIP: veth not supported"; exit 0; }
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010076
77 case ${tunnel_type} in
78 "vti6")
Stefano Brivio380e29a2018-03-17 02:31:38 +010079 setup_vti6 || { echo "SKIP: vti6 not supported"; exit 0; }
80 setup_xfrm || { echo "SKIP: xfrm not supported"; exit 0; }
Stefano Briviod1f1b9c2018-03-06 22:16:27 +010081 ;;
82 *)
83 ;;
84 esac
85}
86
87cleanup() {
88 ip netns del ${NS_A} 2 > /dev/null
89 ip netns del ${NS_B} 2 > /dev/null
90}
91
92mtu() {
93 ns_cmd="${1}"
94 dev="${2}"
95 mtu="${3}"
96
97 ${ns_cmd} ip link set dev ${dev} mtu ${mtu}
98}
99
100route_get_dst_exception() {
101 dst="${1}"
102
103 ${ns_a} ip route get "${dst}"
104}
105
106route_get_dst_pmtu_from_exception() {
107 dst="${1}"
108
109 exception="$(route_get_dst_exception ${dst})"
110 next=0
111 for i in ${exception}; do
112 [ ${next} -eq 1 ] && echo "${i}" && return
113 [ "${i}" = "mtu" ] && next=1
114 done
115}
116
117test_pmtu_vti6_exception() {
118 setup vti6
119
120 # Create route exception by exceeding link layer MTU
121 mtu "${ns_a}" veth_a 4000
122 mtu "${ns_b}" veth_b 4000
123 mtu "${ns_a}" vti_a 5000
124 mtu "${ns_b}" vti_b 5000
125 ${ns_a} ping6 -q -i 0.1 -w 2 -s 60000 ${vti6_b_addr} > /dev/null
126
127 # Check that exception was created
128 if [ "$(route_get_dst_pmtu_from_exception ${vti6_b_addr})" = "" ]; then
129 echo "FAIL: Tunnel exceeding link layer MTU didn't create route exception"
130 exit 1
131 fi
132
133 # Decrease tunnel MTU, check for PMTU decrease in route exception
134 mtu "${ns_a}" vti_a 3000
135
136 if [ "$(route_get_dst_pmtu_from_exception ${vti6_b_addr})" -ne 3000 ]; then
137 echo "FAIL: Decreasing tunnel MTU didn't decrease route exception PMTU"
138 exit 1
139 fi
140
141 # Increase tunnel MTU, check for PMTU increase in route exception
142 mtu "${ns_a}" vti_a 9000
143 if [ "$(route_get_dst_pmtu_from_exception ${vti6_b_addr})" -ne 9000 ]; then
144 echo "FAIL: Increasing tunnel MTU didn't increase route exception PMTU"
145 exit 1
146 fi
147
148 echo "PASS"
149}
150
151trap cleanup EXIT
152
153test_pmtu_vti6_exception
154
155exit 0