* [PATCH 0/3] selftests: netfilter: introduce test cases for ipvs
@ 2019-09-26 16:48 Haishuang Yan
2019-09-26 16:48 ` [PATCH 1/3] selftests: netfilter: add ipvs test script Haishuang Yan
` (2 more replies)
0 siblings, 3 replies; 5+ messages in thread
From: Haishuang Yan @ 2019-09-26 16:48 UTC (permalink / raw)
To: Shuah Khan, Pablo Neira Ayuso, David S. Miller
Cc: Julian Anastasov, linux-kernel, linux-kselftest, Haishuang Yan
This series patch include test cases for ipvs.
The test topology is who as below:
+--------------------------------------------------------------+
| | |
| ns0 | ns1 |
| ----------- | ----------- ----------- |
| | veth01 | --------- | veth10 | | veth12 | |
| ----------- peer ----------- ----------- |
| | | | |
| ----------- | | |
| | br0 | |----------------- peer |--------------|
| ----------- | | |
| | | | |
| ---------- peer ---------- ----------- |
| | veth02 | --------- | veth20 | | veth12 | |
| ---------- | ---------- ----------- |
| | ns2 |
| | |
+--------------------------------------------------------------+
Test results:
# selftests: netfilter: ipvs.sh
# Testing DR mode...
# Testing NAT mode...
# Testing Tunnel mode...
# ipvs.sh: PASS
ok 6 selftests: netfilter: ipvs.sh
Haishuang Yan (3):
selftests: netfilter: add ipvs test script
selftests: netfilter: add ipvs nat test case
selftests: netfilter: add ipvs tunnel test case
tools/testing/selftests/netfilter/Makefile | 2 +-
tools/testing/selftests/netfilter/ipvs.sh | 230 +++++++++++++++++++++++++++++
2 files changed, 231 insertions(+), 1 deletion(-)
create mode 100755 tools/testing/selftests/netfilter/ipvs.sh
--
1.8.3.1
^ permalink raw reply [flat|nested] 5+ messages in thread
* [PATCH 1/3] selftests: netfilter: add ipvs test script
2019-09-26 16:48 [PATCH 0/3] selftests: netfilter: introduce test cases for ipvs Haishuang Yan
@ 2019-09-26 16:48 ` Haishuang Yan
2019-09-26 16:48 ` [PATCH 2/3] selftests: netfilter: add ipvs nat test case Haishuang Yan
2019-09-26 16:48 ` [PATCH 3/3] selftests: netfilter: add ipvs tunnel " Haishuang Yan
2 siblings, 0 replies; 5+ messages in thread
From: Haishuang Yan @ 2019-09-26 16:48 UTC (permalink / raw)
To: Shuah Khan, Pablo Neira Ayuso, David S. Miller
Cc: Julian Anastasov, linux-kernel, linux-kselftest, Haishuang Yan
Test virutal server via directing routing for IPv4.
Tested:
# selftests: netfilter: ipvs.sh
# Testing DR mode...
# ipvs.sh: PASS
ok 6 selftests: netfilter: ipvs.sh
Signed-off-by: Haishuang Yan <yanhaishuang@cmss.chinamobile.com>
---
tools/testing/selftests/netfilter/Makefile | 2 +-
tools/testing/selftests/netfilter/ipvs.sh | 177 +++++++++++++++++++++++++++++
2 files changed, 178 insertions(+), 1 deletion(-)
create mode 100755 tools/testing/selftests/netfilter/ipvs.sh
diff --git a/tools/testing/selftests/netfilter/Makefile b/tools/testing/selftests/netfilter/Makefile
index 4144984..de1032b 100644
--- a/tools/testing/selftests/netfilter/Makefile
+++ b/tools/testing/selftests/netfilter/Makefile
@@ -2,6 +2,6 @@
# Makefile for netfilter selftests
TEST_PROGS := nft_trans_stress.sh nft_nat.sh bridge_brouter.sh \
- conntrack_icmp_related.sh nft_flowtable.sh
+ conntrack_icmp_related.sh nft_flowtable.sh ipvs.sh
include ../lib.mk
diff --git a/tools/testing/selftests/netfilter/ipvs.sh b/tools/testing/selftests/netfilter/ipvs.sh
new file mode 100755
index 0000000..15c386b
--- /dev/null
+++ b/tools/testing/selftests/netfilter/ipvs.sh
@@ -0,0 +1,177 @@
+#!/bin/sh
+# SPDX-License-Identifier: GPL-2.0
+#
+# End-to-end ipvs test suite
+# Topology:
+#---------------------------------------------------------------
+# | |
+# ns0 | ns1 |
+# ----------- | ----------- ----------- |
+# | veth01 | --------- | veth10 | | veth12 | |
+# ----------- peer ----------- ----------- |
+# | | | |
+# ----------- | | |
+# | br0 | |----------------- peer |--------------|
+# ----------- | | |
+# | | | |
+# ---------- peer ---------- ----------- |
+# | veth02 | --------- | veth20 | | veth12 | |
+# ---------- | ---------- ----------- |
+# | ns2 |
+# | |
+#---------------------------------------------------------------
+#
+# We assume that all network driver are loaded
+#
+
+# Kselftest framework requirement - SKIP code is 4.
+ksft_skip=4
+ret=0
+GREEN='\033[0;92m'
+RED='\033[0;31m'
+NC='\033[0m' # No Color
+
+readonly port=8080
+
+readonly vip_v4=207.175.44.110
+readonly cip_v4=10.0.0.2
+readonly gip_v4=10.0.0.1
+readonly dip_v4=172.16.0.1
+readonly rip_v4=172.16.0.2
+readonly sip_v4=10.0.0.3
+
+readonly infile="$(mktemp)"
+readonly outfile="$(mktemp)"
+
+ip -Version > /dev/null 2>&1
+if [ $? -ne 0 ]; then
+ echo "SKIP: Could not run test without ip tool"
+ exit $ksft_skip
+fi
+
+ipvsadm -v > /dev/null 2>&1
+if [ $? -ne 0 ]; then
+ echo "SKIP: Could not run test without ipvsadm"
+ exit $ksft_skip
+fi
+
+nc --version > /dev/null 2>&1
+if [ $? -ne 0 ]; then
+ echo "SKIP: Could not run test without ncat"
+ exit $ksft_skip
+fi
+
+setup() {
+ ip netns add ns0
+ ip netns add ns1
+ ip netns add ns2
+
+ ip link add veth01 netns ns0 type veth peer name veth10 netns ns1
+ ip link add veth02 netns ns0 type veth peer name veth20 netns ns2
+ ip link add veth12 netns ns1 type veth peer name veth21 netns ns2
+
+ ip netns exec ns0 ip link set veth01 up
+ ip netns exec ns0 ip link set veth02 up
+ ip netns exec ns0 ip link add br0 type bridge
+ ip netns exec ns0 ip link set veth01 master br0
+ ip netns exec ns0 ip link set veth02 master br0
+ ip netns exec ns0 ip link set br0 up
+ ip netns exec ns0 ip addr add ${cip_v4}/24 dev br0
+
+ ip netns exec ns1 ip link set lo up
+ ip netns exec ns1 ip link set veth10 up
+ ip netns exec ns1 ip addr add ${gip_v4}/24 dev veth10
+ ip netns exec ns1 ip link set veth12 up
+ ip netns exec ns1 ip addr add ${dip_v4}/24 dev veth12
+
+ ip netns exec ns2 ip link set lo up
+ ip netns exec ns2 ip link set veth21 up
+ ip netns exec ns2 ip addr add ${rip_v4}/24 dev veth21
+ ip netns exec ns2 ip link set veth20 up
+ ip netns exec ns2 ip addr add ${sip_v4}/24 dev veth20
+}
+
+cleanup() {
+ for i in 0 1 2
+ do
+ ip netns del ns$i > /dev/null 2>&1
+ done
+ pkill nc
+}
+
+server_listen() {
+ ip netns exec ns2 nc -l -p 8080 > "${outfile}" &
+ server_pid=$!
+ sleep 0.2
+}
+
+client_connect() {
+ ip netns exec ns0 timeout 2 nc -w 1 ${vip_v4} ${port} < "${infile}"
+}
+
+verify_data() {
+ wait "${server_pid}"
+ # sha1sum returns two fields [sha1] [filepath]
+ # convert to bash array and access first elem
+ insum=($(sha1sum ${infile}))
+ outsum=($(sha1sum ${outfile}))
+ if [[ "${insum[0]}" != "${outsum[0]}" ]]; then
+ echo "data mismatch"
+ exit 1
+ fi
+}
+
+test_service() {
+ server_listen
+ client_connect
+ ret=$?
+ if [ $ret -ne 0 ]; then
+ return $ret
+ fi
+ verify_data
+}
+
+
+test_dr() {
+ ip netns exec ns0 ip route add ${vip_v4} via ${gip_v4} dev br0
+
+ ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=1
+ ip netns exec ns1 ipvsadm -A -t ${vip_v4}:${port} -s rr
+ ip netns exec ns1 ipvsadm -a -t ${vip_v4}:${port} -r ${rip_v4}:${port}
+ ip netns exec ns1 ip addr add ${vip_v4}/32 dev lo:1
+
+ # avoid incorrect arp response
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_ignore=1
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_announce=2
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.lo.arp_ignore=1
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.lo.arp_announce=2
+ # avoid reverse route lookup
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.all.rp_filter=0
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.veth21.rp_filter=0
+ ip netns exec ns2 ip addr add ${vip_v4}/32 dev lo:1
+
+ test_service
+}
+
+run_tests() {
+ local errors=
+
+ echo "Testing DR mode..."
+ setup
+ test_dr
+ errors=$(( $errors + $? ))
+
+ return $errors
+}
+
+trap cleanup EXIT
+
+cleanup
+run_tests
+
+if [ $? -ne 0 ]; then
+ echo -e "$(basename $0): ${RED}FAIL${NC}"
+ exit 1
+fi
+echo -e "$(basename $0): ${GREEN}PASS${NC}"
+exit 0
--
1.8.3.1
^ permalink raw reply related [flat|nested] 5+ messages in thread
* [PATCH 2/3] selftests: netfilter: add ipvs nat test case
2019-09-26 16:48 [PATCH 0/3] selftests: netfilter: introduce test cases for ipvs Haishuang Yan
2019-09-26 16:48 ` [PATCH 1/3] selftests: netfilter: add ipvs test script Haishuang Yan
@ 2019-09-26 16:48 ` Haishuang Yan
2019-09-26 16:48 ` [PATCH 3/3] selftests: netfilter: add ipvs tunnel " Haishuang Yan
2 siblings, 0 replies; 5+ messages in thread
From: Haishuang Yan @ 2019-09-26 16:48 UTC (permalink / raw)
To: Shuah Khan, Pablo Neira Ayuso, David S. Miller
Cc: Julian Anastasov, linux-kernel, linux-kselftest, Haishuang Yan
Test virtual server via NAT.
Tested:
# selftests: netfilter: ipvs.sh
# Testing DR mode...
# Testing NAT mode...
# ipvs.sh: PASS
Signed-off-by: Haishuang Yan <yanhaishuang@cmss.chinamobile.com>
---
tools/testing/selftests/netfilter/ipvs.sh | 22 +++++++++++++++++++++-
1 file changed, 21 insertions(+), 1 deletion(-)
diff --git a/tools/testing/selftests/netfilter/ipvs.sh b/tools/testing/selftests/netfilter/ipvs.sh
index 15c386b..40058f9 100755
--- a/tools/testing/selftests/netfilter/ipvs.sh
+++ b/tools/testing/selftests/netfilter/ipvs.sh
@@ -153,20 +153,40 @@ test_dr() {
test_service
}
+test_nat() {
+ ip netns exec ns0 ip route add ${vip_v4} via ${gip_v4} dev br0
+
+ ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=1
+ ip netns exec ns1 ipvsadm -A -t ${vip_v4}:${port} -s rr
+ ip netns exec ns1 ipvsadm -a -m -t ${vip_v4}:${port} -r ${rip_v4}:${port}
+ ip netns exec ns1 ip addr add ${vip_v4}/32 dev lo:1
+
+ ip netns exec ns2 ip link del veth20
+ ip netns exec ns2 ip route add default via ${dip_v4} dev veth21
+
+ test_service
+}
+
run_tests() {
local errors=
echo "Testing DR mode..."
+ cleanup
setup
test_dr
errors=$(( $errors + $? ))
+ echo "Testing NAT mode..."
+ cleanup
+ setup
+ test_nat
+ errors=$(( $errors + $? ))
+
return $errors
}
trap cleanup EXIT
-cleanup
run_tests
if [ $? -ne 0 ]; then
--
1.8.3.1
^ permalink raw reply related [flat|nested] 5+ messages in thread
* [PATCH 3/3] selftests: netfilter: add ipvs tunnel test case
2019-09-26 16:48 [PATCH 0/3] selftests: netfilter: introduce test cases for ipvs Haishuang Yan
2019-09-26 16:48 ` [PATCH 1/3] selftests: netfilter: add ipvs test script Haishuang Yan
2019-09-26 16:48 ` [PATCH 2/3] selftests: netfilter: add ipvs nat test case Haishuang Yan
@ 2019-09-26 16:48 ` Haishuang Yan
2019-09-26 19:34 ` Julian Anastasov
2 siblings, 1 reply; 5+ messages in thread
From: Haishuang Yan @ 2019-09-26 16:48 UTC (permalink / raw)
To: Shuah Khan, Pablo Neira Ayuso, David S. Miller
Cc: Julian Anastasov, linux-kernel, linux-kselftest, Haishuang Yan
Test virtual server via ipip tunnel.
Tested:
# selftests: netfilter: ipvs.sh
# Testing DR mode...
# Testing NAT mode...
# Testing Tunnel mode...
# ipvs.sh: PASS
ok 6 selftests: netfilter: ipvs.sh
Signed-off-by: Haishuang Yan <yanhaishuang@cmss.chinamobile.com>
---
tools/testing/selftests/netfilter/ipvs.sh | 33 +++++++++++++++++++++++++++++++
1 file changed, 33 insertions(+)
diff --git a/tools/testing/selftests/netfilter/ipvs.sh b/tools/testing/selftests/netfilter/ipvs.sh
index 40058f9..2012cec 100755
--- a/tools/testing/selftests/netfilter/ipvs.sh
+++ b/tools/testing/selftests/netfilter/ipvs.sh
@@ -167,6 +167,33 @@ test_nat() {
test_service
}
+test_tun() {
+ ip netns exec ns0 ip route add ${vip_v4} via ${gip_v4} dev br0
+
+ ip netns exec ns1 modprobe ipip
+ ip netns exec ns1 ip link set tunl0 up
+ ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=0
+ ip netns exec ns1 sysctl -qw net.ipv4.conf.all.send_redirects=0
+ ip netns exec ns1 sysctl -qw net.ipv4.conf.default.send_redirects=0
+ ip netns exec ns1 ipvsadm -A -t ${vip_v4}:${port} -s rr
+ ip netns exec ns1 ipvsadm -a -i -t ${vip_v4}:${port} -r ${rip_v4}:${port}
+ ip netns exec ns1 ip addr add ${vip_v4}/32 dev lo:1
+
+ ip netns exec ns2 modprobe ipip
+ ip netns exec ns2 ip link set tunl0 up
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_ignore=1
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_announce=2
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.all.rp_filter=0
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.lo.arp_ignore=1
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.lo.arp_announce=2
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.lo.rp_filter=0
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.tunl0.rp_filter=0
+ ip netns exec ns2 sysctl -qw net.ipv4.conf.veth21.rp_filter=0
+ ip netns exec ns2 ip addr add ${vip_v4}/32 dev lo:1
+
+ test_service
+}
+
run_tests() {
local errors=
@@ -182,6 +209,12 @@ run_tests() {
test_nat
errors=$(( $errors + $? ))
+ echo "Testing Tunnel mode..."
+ cleanup
+ setup
+ test_tun
+ errors=$(( $errors + $? ))
+
return $errors
}
--
1.8.3.1
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH 3/3] selftests: netfilter: add ipvs tunnel test case
2019-09-26 16:48 ` [PATCH 3/3] selftests: netfilter: add ipvs tunnel " Haishuang Yan
@ 2019-09-26 19:34 ` Julian Anastasov
0 siblings, 0 replies; 5+ messages in thread
From: Julian Anastasov @ 2019-09-26 19:34 UTC (permalink / raw)
To: Haishuang Yan
Cc: Shuah Khan, Pablo Neira Ayuso, David S. Miller, linux-kernel,
linux-kselftest, lvs-devel
Hello,
On Fri, 27 Sep 2019, Haishuang Yan wrote:
> Test virtual server via ipip tunnel.
>
> Tested:
> # selftests: netfilter: ipvs.sh
> # Testing DR mode...
> # Testing NAT mode...
> # Testing Tunnel mode...
> # ipvs.sh: PASS
> ok 6 selftests: netfilter: ipvs.sh
>
> Signed-off-by: Haishuang Yan <yanhaishuang@cmss.chinamobile.com>
It is good to have IPVS selftests... This is a good start,
later we can add IPv6...
> ---
> tools/testing/selftests/netfilter/ipvs.sh | 33 +++++++++++++++++++++++++++++++
> 1 file changed, 33 insertions(+)
>
> diff --git a/tools/testing/selftests/netfilter/ipvs.sh b/tools/testing/selftests/netfilter/ipvs.sh
> index 40058f9..2012cec 100755
> --- a/tools/testing/selftests/netfilter/ipvs.sh
> +++ b/tools/testing/selftests/netfilter/ipvs.sh
> @@ -167,6 +167,33 @@ test_nat() {
> test_service
> }
>
> +test_tun() {
> + ip netns exec ns0 ip route add ${vip_v4} via ${gip_v4} dev br0
> +
> + ip netns exec ns1 modprobe ipip
> + ip netns exec ns1 ip link set tunl0 up
> + ip netns exec ns1 sysctl -qw net.ipv4.ip_forward=0
> + ip netns exec ns1 sysctl -qw net.ipv4.conf.all.send_redirects=0
> + ip netns exec ns1 sysctl -qw net.ipv4.conf.default.send_redirects=0
> + ip netns exec ns1 ipvsadm -A -t ${vip_v4}:${port} -s rr
> + ip netns exec ns1 ipvsadm -a -i -t ${vip_v4}:${port} -r ${rip_v4}:${port}
> + ip netns exec ns1 ip addr add ${vip_v4}/32 dev lo:1
> +
> + ip netns exec ns2 modprobe ipip
> + ip netns exec ns2 ip link set tunl0 up
> + ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_ignore=1
> + ip netns exec ns2 sysctl -qw net.ipv4.conf.all.arp_announce=2
> + ip netns exec ns2 sysctl -qw net.ipv4.conf.all.rp_filter=0
> + ip netns exec ns2 sysctl -qw net.ipv4.conf.lo.arp_ignore=1
> + ip netns exec ns2 sysctl -qw net.ipv4.conf.lo.arp_announce=2
arp_ignore and arp_announce are not used on "lo". And MAX
is used, i.e.
# for all interfaces use (suitable for our test setup):
all.arp_ignore=1
all.arp_announce=2
# or if above is not desired, for specific LAN interface use
veth21.arp_ignore=1
veth21.arp_announce=2
BTW, the picture has ns2/veth12 while it should be veth21.
Also, should we check if IPVS module is loaded? Eg. depending
on present /proc/sys/net/ipv4/vs/ dir ?
> + ip netns exec ns2 sysctl -qw net.ipv4.conf.lo.rp_filter=0
IIRC, lo.rp_filter is never used, packets from "lo" always come
with attached output route, so source validation is not performed.
> + ip netns exec ns2 sysctl -qw net.ipv4.conf.tunl0.rp_filter=0
> + ip netns exec ns2 sysctl -qw net.ipv4.conf.veth21.rp_filter=0
> + ip netns exec ns2 ip addr add ${vip_v4}/32 dev lo:1
> +
> + test_service
> +}
> +
> run_tests() {
> local errors=
>
> @@ -182,6 +209,12 @@ run_tests() {
> test_nat
> errors=$(( $errors + $? ))
>
> + echo "Testing Tunnel mode..."
> + cleanup
> + setup
> + test_tun
> + errors=$(( $errors + $? ))
> +
> return $errors
> }
>
> --
> 1.8.3.1
Regards
--
Julian Anastasov <ja@ssi.bg>
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2019-09-26 19:43 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-09-26 16:48 [PATCH 0/3] selftests: netfilter: introduce test cases for ipvs Haishuang Yan
2019-09-26 16:48 ` [PATCH 1/3] selftests: netfilter: add ipvs test script Haishuang Yan
2019-09-26 16:48 ` [PATCH 2/3] selftests: netfilter: add ipvs nat test case Haishuang Yan
2019-09-26 16:48 ` [PATCH 3/3] selftests: netfilter: add ipvs tunnel " Haishuang Yan
2019-09-26 19:34 ` Julian Anastasov
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).