• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1#!/bin/sh
2#==============================================================================
3# Copyright (c) Linux Test Project, 2014
4# Copyright (c) 2015 Red Hat, Inc.
5#
6# This program is free software; you can redistribute it and/or modify
7# it under the terms of the GNU General Public License as published by
8# the Free Software Foundation; either version 2 of the License, or
9# (at your option) any later version.
10#
11# This program is distributed in the hope that it will be useful,
12# but WITHOUT ANY WARRANTY; without even the implied warranty of
13# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14# GNU General Public License for more details.
15#
16# You should have received a copy of the GNU General Public License
17# along with this program.  If not, see <http://www.gnu.org/licenses/>.
18#==============================================================================
19
20. test.sh
21TST_CLEANUP=netns_ns_exec_cleanup
22
23# Set to 1 only for test cases using ifconfig (ioctl).
24USE_IFCONFIG=0
25
26
27##
28# Variables which can be used in test cases (set by netns_setup() function):
29###############################################################################
30# Use in test cases to execute commands inside a namespace. Set to 'ns_exec' or
31# 'ip netns exec' command according to NS_EXEC_PROGRAM argument specified in
32# netns_setup() function call.
33NS_EXEC=""
34
35# Set to "net" for ns_create/ns_exec as their options requires
36# to specify a namespace type. Empty for ip command.
37NS_TYPE=""
38
39# IP addresses of veth0 (IP0) and veth1 (IP1) devices (ipv4/ipv6 variant
40# is determined according to the IP_VERSION argument specified in netns_setup()
41# function call.
42IP0=""
43IP1=""
44NETMASK=""
45
46# 'ping' or 'ping6' according to the IP_VERSION argument specified
47# in netns_setup() function call.
48tping=""
49
50# Network namespaces handles for manipulating and executing commands inside
51# namespaces. For 'ns_exec' handles are PIDs of daemonized processes running
52# in namespaces.
53NS_HANDLE0=""
54NS_HANDLE1=""
55
56# Adds "inet6 add" to the 'ifconfig' arguments which is required for the ipv6
57# version. Always use with 'ifconfig', even if ipv4 version of a test case is
58# used, in which case IFCONF_IN6_ARG will be empty string. Usage:
59# ifconfig <device> $IFCONF_IN6_ARG IP/NETMASK
60IFCONF_IN6_ARG=""
61###############################################################################
62
63
64tst_check_iproute()
65{
66	local cur_ipver="$(ip -V)"
67	local spe_ipver="$1"
68
69	cur_ipver=${cur_ipver##*s}
70
71	if [ -z $cur_ipver ] || [ -z $spe_ipver ]; then
72		tst_brkm TBROK "don't obtain valid iproute version"
73	fi
74
75	if [ $cur_ipver -lt $spe_ipver ]; then
76		tst_brkm TCONF \
77			"The commands in iproute tools do not support required objects"
78	fi
79}
80
81##
82# Sets up global variables which can be used in test cases (documented above),
83# creates two network namespaces and a pair of virtual ethernet devices, each
84# device in one namespace. Each device is then enabled and assigned an IP
85# address according to the function parameters. IFCONF_IN6_ARG variable is set
86# only if ipv6 variant of test case is used (determined by IP_VERSION argument).
87#
88# SYNOPSIS:
89# netns_setup <NS_EXEC_PROGRAM> <IP_VERSION> <COMM_TYPE> <IP4_VETH0>
90#             <IP4_VETH1> <IP6_VETH0> <IP6_VETH1>
91#
92# OPTIONS:
93#	* NS_EXEC_PROGRAM (ns_exec|ip)
94#		Program which will be used to enter and run other commands
95#		inside a network namespace.
96#	* IP_VERSION (ipv4|ipv6)
97#		Version of IP. (ipv4|ipv6)
98#	* COMM_TYPE (netlink|ioctl)
99#		Communication type between kernel and user space
100#		for enabling and assigning IP addresses to the virtual
101#		ethernet devices. Uses 'ip' command for netlink and 'ifconfig'
102#		for ioctl. (If set to ioctl, function also checks the existance
103#		of the 'ifconfig' command.)
104#	* IP4_VETH0, IP4_VETH1
105#		IPv4 addresses for veth0 and veth1 devices.
106#	* IP6_VETH0, IP6_VETH1
107#		IPv6 addresses for veth0 and veth1 devices.
108#
109# On success function returns, on error tst_brkm is called and TC is terminated.
110netns_setup()
111{
112	tst_require_root
113	tst_test_cmds ip modprobe
114
115	modprobe veth > /dev/null 2>&1
116
117	case "$1" in
118	ns_exec)
119		setns_check
120		if [ $? -eq 32 ]; then
121			tst_brkm TCONF "setns not supported"
122		fi
123		NS_TYPE="net"
124		netns_ns_exec_setup
125		TST_CLEANUP=netns_ns_exec_cleanup
126		;;
127	ip)
128		netns_ip_setup
129		TST_CLEANUP=netns_ip_cleanup
130		;;
131	*)
132		tst_brkm TBROK \
133		"first argument must be a program used to enter a network namespace (ns_exec|ip)"
134		;;
135	esac
136
137	case "$3" in
138	netlink)
139		;;
140	ioctl)
141		USE_IFCONFIG=1
142		tst_test_cmds ifconfig
143		;;
144	*)
145		tst_brkm TBROK \
146		"third argument must be a comm. type between kernel and user space (netlink|ioctl)"
147		;;
148	esac
149
150	if [ -z "$4" ]; then
151		tst_brkm TBROK "fourth argument must be the IPv4 address for veth0"
152	fi
153	if [ -z "$5" ]; then
154		tst_brkm TBROK "fifth argument must be the IPv4 address for veth1"
155	fi
156	if [ -z "$6" ]; then
157		tst_brkm TBROK "sixth argument must be the IPv6 address for veth0"
158	fi
159	if [ -z "$7" ]; then
160		tst_brkm TBROK "seventh argument must be the IPv6 address for veth1"
161	fi
162
163	case "$2" in
164	ipv4)
165		IP0=$4; IP1=$5
166		tping="ping"; NETMASK=24
167		;;
168	ipv6)
169		IFCONF_IN6_ARG="inet6 add"
170		IP0=$6; IP1=$7;
171		if which ping6 >/dev/null 2>&1; then
172		    tping="ping6"
173		else
174		    tping="ping -6"
175		fi
176		NETMASK=64
177		;;
178	*)
179		tst_brkm TBROK "second argument must be an ip version (ipv4|ipv6)"
180		;;
181	esac
182
183	netns_set_ip
184}
185
186##
187# Sets up NS_EXEC to use 'ns_exec', creates two network namespaces and stores
188# their handles into NS_HANDLE0 and NS_HANDLE1 variables (in this case handles
189# are PIDs of daemonized processes running in these namespaces). Virtual
190# ethernet device is then created for each namespace.
191netns_ns_exec_setup()
192{
193	NS_EXEC="ns_exec"
194
195	NS_HANDLE0=$(ns_create $NS_TYPE)
196	if [ $? -eq 1 ]; then
197		tst_resm TINFO "$NS_HANDLE0"
198		tst_brkm TBROK "unable to create a new network namespace"
199	fi
200
201	NS_HANDLE1=$(ns_create $NS_TYPE)
202	if [ $? -eq 1 ]; then
203		tst_resm TINFO "$NS_HANDLE1"
204		tst_brkm TBROK "unable to create a new network namespace"
205	fi
206
207	$NS_EXEC $NS_HANDLE0 $NS_TYPE ip link add veth0 type veth peer name veth1 || \
208		tst_brkm TBROK "unable to create veth pair devices"
209
210	$NS_EXEC $NS_HANDLE0 $NS_TYPE ns_ifmove veth1 $NS_HANDLE1
211	ret=$?
212	if [ $ret -eq 0 ]; then
213		return;
214	fi
215
216	if [ $ret -eq 32 ]; then
217		tst_brkm TCONF "IFLA_NET_NS_PID not supported"
218	fi
219
220	tst_brkm TBROK "unable to add device veth1 to the separate network namespace"
221}
222
223##
224# Sets up NS_EXEC to use 'ip netns exec', creates two network namespaces
225# and stores their handles into NS_HANDLE0 and NS_HANDLE1 variables. Virtual
226# ethernet device is then created for each namespace.
227netns_ip_setup()
228{
229	tst_check_iproute 111010
230	NS_EXEC="ip netns exec"
231
232	NS_HANDLE0=tst_net_ns0
233	NS_HANDLE1=tst_net_ns1
234
235	ip netns del $NS_HANDLE0 2>/dev/null
236	ip netns del $NS_HANDLE1 2>/dev/null
237
238	ip netns add $NS_HANDLE0 || \
239		tst_brkm TBROK "unable to create a new network namespace"
240	ip netns add $NS_HANDLE1 || \
241		tst_brkm TBROK "unable to create a new network namespace"
242
243	$NS_EXEC $NS_HANDLE0 ip link add veth0 type veth peer name veth1 || \
244		tst_brkm TBROK "unable to create veth pair devices"
245
246	$NS_EXEC $NS_HANDLE0 ip link set veth1 netns $NS_HANDLE1 || \
247		tst_brkm TBROK "unable to add device veth1 to the separate network namespace"
248}
249
250##
251# Enables virtual ethernet devices and assigns IP addresses for both
252# of them (IPv4/IPv6 variant is decided by netns_setup() function).
253netns_set_ip()
254{
255	if [ -z "$NS_EXEC" ]; then
256		tst_brkm TBROK "netns_setup() function must be called first"
257	fi
258
259	# This applies only for ipv6 variant:
260	# Do not accept Router Advertisements (accept_ra) and do not use
261	# Duplicate Address Detection (accept_dad) which uses Neighbor
262	# Discovery Protocol - the problem is that until DAD can confirm that
263	# there is no other host with the same address, the address is
264	# considered to be "tentative" (attempts to bind() to the address fail
265	# with EADDRNOTAVAIL) which may cause problems for tests using ipv6.
266	echo 0 | $NS_EXEC $NS_HANDLE0 $NS_TYPE \
267		tee /proc/sys/net/ipv6/conf/veth0/accept_dad \
268		/proc/sys/net/ipv6/conf/veth0/accept_ra >/dev/null
269	echo 0 | $NS_EXEC $NS_HANDLE1 $NS_TYPE \
270		tee /proc/sys/net/ipv6/conf/veth1/accept_dad \
271		/proc/sys/net/ipv6/conf/veth1/accept_ra >/dev/null
272
273	case $USE_IFCONFIG in
274	1)
275		$NS_EXEC $NS_HANDLE0 $NS_TYPE ifconfig veth0 $IFCONF_IN6_ARG $IP0/$NETMASK ||
276			tst_brkm TBROK "adding address to veth0 failed"
277		$NS_EXEC $NS_HANDLE1 $NS_TYPE ifconfig veth1 $IFCONF_IN6_ARG $IP1/$NETMASK ||
278			tst_brkm TBROK "adding address to veth1 failed"
279		$NS_EXEC $NS_HANDLE0 $NS_TYPE ifconfig veth0 up ||
280			tst_brkm TBROK "enabling veth0 device failed"
281		$NS_EXEC $NS_HANDLE1 $NS_TYPE ifconfig veth1 up ||
282			tst_brkm TBROK "enabling veth1 device failed"
283		;;
284	*)
285		$NS_EXEC $NS_HANDLE0 $NS_TYPE ip address add $IP0/$NETMASK dev veth0 ||
286			tst_brkm TBROK "adding address to veth0 failed"
287		$NS_EXEC $NS_HANDLE1 $NS_TYPE ip address add $IP1/$NETMASK dev veth1 ||
288			tst_brkm TBROK "adding address to veth1 failed"
289		$NS_EXEC $NS_HANDLE0 $NS_TYPE ip link set veth0 up ||
290			tst_brkm TBROK "enabling veth0 device failed"
291		$NS_EXEC $NS_HANDLE1 $NS_TYPE ip link set veth1 up ||
292			tst_brkm TBROK "enabling veth1 device failed"
293		;;
294	esac
295}
296
297netns_ns_exec_cleanup()
298{
299	if [ -z "$NS_EXEC" ]; then
300		return
301	fi
302
303	# removes veth0 device (which also removes the paired veth1 device)
304	$NS_EXEC $NS_HANDLE0 $NS_TYPE ip link delete veth0
305
306	kill -9 $NS_HANDLE0 2>/dev/null
307	kill -9 $NS_HANDLE1 2>/dev/null
308}
309
310
311netns_ip_cleanup()
312{
313	if [ -z "$NS_EXEC" ]; then
314		return
315	fi
316
317	# removes veth0 device (which also removes the paired veth1 device)
318	$NS_EXEC $NS_HANDLE0 ip link delete veth0
319
320	ip netns del $NS_HANDLE0 2>/dev/null
321	ip netns del $NS_HANDLE1 2>/dev/null
322}
323