-
Notifications
You must be signed in to change notification settings - Fork 13
/
test-ct-tcp-reload.sh
executable file
·110 lines (85 loc) · 2.7 KB
/
test-ct-tcp-reload.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
#!/bin/bash
#
# Test CT fwd with tcp traffic and reload the driver.
#
# This reproduces an issue with remaining object the fc cache.
# 507138.876287] BUG mlx5_fc_cache (Tainted: G B OE ): Objects
# remaining in mlx5_fc_cache on __kmem_cache_shutdown()
#
my_dir="$(dirname "$0")"
. $my_dir/common.sh
require_module act_ct
echo 1 > /proc/sys/net/netfilter/nf_conntrack_tcp_be_liberal
IP1="7.7.7.1"
IP2="7.7.7.2"
enable_switchdev
require_interfaces REP REP2
unbind_vfs
bind_vfs
reset_tc $REP
reset_tc $REP2
mac1=`cat /sys/class/net/$VF/address`
mac2=`cat /sys/class/net/$VF2/address`
test "$mac1" || fail "no mac1"
test "$mac2" || fail "no mac2"
function cleanup() {
ip netns del ns0 2> /dev/null
ip netns del ns1 2> /dev/null
reset_tc $REP &>/dev/null
reset_tc $REP2 &> /dev/null
}
trap cleanup EXIT
function run() {
title "Test CT TCP"
config_vf ns0 $VF $REP $IP1
config_vf ns1 $VF2 $REP2 $IP2
echo "add arp rules"
tc_filter add dev $REP ingress protocol arp prio 1 flower \
action mirred egress redirect dev $REP2
tc_filter add dev $REP2 ingress protocol arp prio 1 flower \
action mirred egress redirect dev $REP
echo "add ct rules"
tc_filter add dev $REP ingress protocol ip prio 2 flower \
dst_mac $mac2 ct_state -trk \
action ct action goto chain 1
tc_filter add dev $REP ingress protocol ip chain 1 prio 2 flower \
dst_mac $mac2 ct_state +trk+new \
action ct commit \
action mirred egress redirect dev $REP2
tc_filter add dev $REP ingress protocol ip chain 1 prio 2 flower \
dst_mac $mac2 ct_state +trk+est \
action mirred egress redirect dev $REP2
# chain0,ct -> chain1,fwd
tc_filter add dev $REP2 ingress protocol ip prio 2 flower \
dst_mac $mac1 \
action ct action goto chain 1
tc_filter add dev $REP2 ingress protocol ip prio 2 chain 1 flower \
dst_mac $mac1 ct_state +trk+est \
action mirred egress redirect dev $REP
fail_if_err
echo $REP
tc filter show dev $REP ingress
echo $REP2
tc filter show dev $REP2 ingress
t=12
echo "run traffic for $t seconds"
ip netns exec ns1 timeout $((t+1)) iperf -s &
sleep 0.5
ip netns exec ns0 timeout $((t+1)) iperf -t $t -c $IP2 &
sleep 2
pidof iperf &>/dev/null || err "iperf failed"
echo "sniff packets on $REP"
# first 4 packets not offloaded until conn is in established state.
timeout $((t-4)) tcpdump -qnnei $REP -c 10 'tcp' &
pid=$!
sleep $t
killall -9 iperf &>/dev/null
wait $! 2>/dev/null
title "Verify no traffic on $REP"
verify_no_traffic $pid
sleep 1
reload_modules
config_sriov 2
}
run
test_done