lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 21 Mar 2024 13:20:01 +0100
From: Mark Cilissen <mark@...suba.nl>
To: netdev@...r.kernel.org
Cc: Mark Cilissen <mark@...suba.nl>,
	Jakub Kicinski <kuba@...nel.org>,
	Hans de Goede <hdegoede@...hat.com>,
	Paolo Abeni <pabeni@...hat.com>,
	Ratheesh Kannoth <rkannoth@...vell.com>,
	Eric Dumazet <edumazet@...gle.com>,
	Breno Leitao <leitao@...ian.org>,
	Ingo Molnar <mingo@...hat.com>,
	"David S. Miller" <davem@...emloft.net>,
	linux-kernel@...r.kernel.org
Subject: [RFC net-next v2 2/2] selftests: add netpoll selftest

Now that netpoll supports more kinds of network interfaces it benefits
extra from being tested to monitor regressions. This test runs entirely in
userspace, adding a netconsole for the interface-under-test using configfs
and sending a kernel log message that is verified using socat.

To cover a mix of circumstances while keeping host tooling dependences
fairly minimal, the following interface scenarios are tested:
- Ethernet link layer, IPv4 and IPv6 (veth)
- No exposed link layer, IPv4 (gre, ipip, ip6tnl)
- No exposed link layer, IPv6 (gre, sit, ip6tnl)

As a sanity check the test was run on kernel release 6.7.9-200.fc39,
which does not include the expanded netpoll interface support,
and yielded the expected failures:

  PASS: netconsole (eth/ipv4)
  PASS: netconsole (eth/ipv6)
  FAIL: netconsole (ipv4/gre/ipv4): message did not arrive in time (124)
  FAIL: netconsole (ipv4/gre/ipv6): message did not arrive in time (124)
  FAIL: netconsole (ipv6/ip6gre/ipv4): message did not arrive in time (124)
  FAIL: netconsole (ipv6/ip6gre/ipv6): message did not arrive in time (124)
  FAIL: netconsole (ipv4/ipip/ipv4): message did not arrive in time (124)
  FAIL: netconsole (ipv4/sit/ipv6): message did not arrive in time (124)
  FAIL: netconsole (ipv6/ip6tnl/ipv4): message did not arrive in time (124)
  FAIL: netconsole (ipv6/ip6tnl/ipv6): message did not arrive in time (124)

Signed-off-by: Mark Cilissen <mark@...suba.nl>
---
 tools/testing/selftests/net/Makefile   |   1 +
 tools/testing/selftests/net/config     |   1 +
 tools/testing/selftests/net/netpoll.sh | 226 +++++++++++++++++++++++++
 3 files changed, 228 insertions(+)
 create mode 100755 tools/testing/selftests/net/netpoll.sh

diff --git a/tools/testing/selftests/net/Makefile b/tools/testing/selftests/net/Makefile
index 7b6918d5f4af..e9908a976f5e 100644
--- a/tools/testing/selftests/net/Makefile
+++ b/tools/testing/selftests/net/Makefile
@@ -93,6 +93,7 @@ TEST_PROGS += test_bridge_backup_port.sh
 TEST_PROGS += fdb_flush.sh
 TEST_PROGS += fq_band_pktlimit.sh
 TEST_PROGS += vlan_hw_filter.sh
+TEST_PROGS += netpoll.sh
 
 TEST_FILES := settings
 TEST_FILES += in_netns.sh lib.sh net_helper.sh setup_loopback.sh setup_veth.sh
diff --git a/tools/testing/selftests/net/config b/tools/testing/selftests/net/config
index 5e4390cac17e..bc3b6991b1aa 100644
--- a/tools/testing/selftests/net/config
+++ b/tools/testing/selftests/net/config
@@ -100,3 +100,4 @@ CONFIG_NETFILTER_XT_MATCH_POLICY=m
 CONFIG_CRYPTO_ARIA=y
 CONFIG_XFRM_INTERFACE=m
 CONFIG_XFRM_USER=m
+CONFIG_NETCONSOLE=m
diff --git a/tools/testing/selftests/net/netpoll.sh b/tools/testing/selftests/net/netpoll.sh
new file mode 100755
index 000000000000..ab4acd756ca1
--- /dev/null
+++ b/tools/testing/selftests/net/netpoll.sh
@@ -0,0 +1,226 @@
+#!/bin/sh
+# SPDX-License-Identifier: GPL-2.0
+#
+# Test netpoll and netconsole in various interface scenarios:
+# ethernet (veth), raw IPv4 (gre, ipip, ip6tnl), raw IPv6 (gre, sit, ip6tnl)
+#
+# +-----------------------------------------+
+# | $NS1                                    |
+# |              $H1 +---+ $T1              |
+# |     192.0.2.1/30 |     192.0.2.65/30    |
+# | 2001:db8:1::1/64 |     2001:db8:2::1/64 |
+# +------------------|----------------------+
+#                    |
+# +------------------|----------------------+
+# | $NS2             |                      |
+# |              $H2 +---+ $T2              |
+# |     192.0.2.2/30       192.0.2.66/30    |
+# | 2001:db8:1::2/64       2001:db8:2::2/64 |
+# +-----------------------------------------+
+# shellcheck disable=SC3043 # allow 'local' keyword
+set -e
+
+readonly ksft_skip=4
+readonly H1A4=192.0.2.1/30
+readonly H1A6=2001:db8:1::1/64
+readonly H2A4=192.0.2.2/30
+readonly H2A6=2001:db8:1::2/64
+readonly T1A4=192.0.2.65/30
+readonly T1A6=2001:db8:2::1/64
+readonly T2A4=192.0.2.66/30
+readonly T2A6=2001:db8:2::2/64
+
+# shellcheck disable=SC2155 # declare and assign separately
+readonly BASE="ksft-$(mktemp -u XXXXXX)"
+readonly NS1="$BASE-n1"
+readonly NS2="$BASE-n2"
+readonly H1="$BASE-h1"
+readonly H2="$BASE-h2"
+readonly T1="$BASE-i1"
+readonly T2="$BASE-i2"
+
+
+# Utilities
+
+setup() {
+	ip netns add "$NS1"
+	ip netns exec "$NS1" sysctl -wq net.ipv4.ip_forward=1
+	ip netns exec "$NS1" sysctl -wq net.ipv6.conf.all.forwarding=1
+	ip netns exec "$NS1" sysctl -wq net.ipv6.conf.default.forwarding=1
+
+	ip netns add "$NS2"
+	ip netns exec "$NS2" sysctl -wq net.ipv4.ip_forward=1
+	ip netns exec "$NS2" sysctl -wq net.ipv6.conf.all.forwarding=1
+	ip netns exec "$NS2" sysctl -wq net.ipv6.conf.default.forwarding=1
+
+	ip link add "$H1" type veth peer name "$H2"
+
+	ip link set dev "$H1" netns "$NS1"
+	ip -n "$NS1" link set dev "$H1" up
+	ip -n "$NS1" addr add "$H1A4" dev "$H1"
+	ip -n "$NS1" addr add "$H1A6" dev "$H1" nodad
+
+	ip link set dev "$H2" netns "$NS2"
+	ip -n "$NS2" link set dev "$H2" up
+	ip -n "$NS2" addr add "$H2A4" dev "$H2"
+	ip -n "$NS2" addr add "$H2A6" dev "$H2" nodad
+
+	grep -q '^netcon' /proc/consoles || modprobe netconsole
+}
+
+cleanup() {
+	set +e
+	for d in /sys/kernel/config/netconsole/"$BASE"*; do
+		[ -d "$d" ] || continue
+		rmdir "$d"
+	done
+	for ns in "$NS1" "$NS2"; do
+		if ip -n "$ns" link show >/dev/null 2>&1; then
+			ip netns del "$ns"
+		fi
+	done
+	# In case we exit before the veth got moved into its namespace
+	if [ -e /sys/class/net/"$H1" ]; then
+		ip link del dev "$H1"
+	fi
+}
+
+trap cleanup EXIT
+
+if ! command -v socat >/dev/null 2>&1; then
+	echo "SKIP: netconsole tests need socat"
+	exit $ksft_skip
+fi
+
+
+test_netconsole() {
+	local name="$1"; shift
+	local outif="$1"; shift
+	local outip="$1"; shift
+	local inif="$1"; shift
+	local inip="$1"; shift
+	local ret=0
+
+	local msg="kselftest/net/netpoll: netconsole test message for $name"
+	# Setup logger and background it, it will exit when it receives the message
+	timeout 3s ip netns exec "$NS2" socat -u -S 0 \
+		udp6-recv:6666,reuseaddr,so-bindtodevice="$inif",ipv6only=0 \
+		system:"grep -m 1 -q \'$(printf '%s' "$msg" | sed -e 's/:/\\:/g')\$\'" &
+	# Setup netconsole
+	ip netns exec "$NS1" sh -s <<EOF
+set -e
+mount -t configfs none /sys/kernel/config
+cd /sys/kernel/config/netconsole
+mkdir "$outif" && cd "$outif"
+echo "$outif" > dev_name
+echo "${outip%%/*}" > local_ip
+echo "${inip%%/*}" > remote_ip
+echo 6666 > remote_port
+echo 1 > enabled
+EOF
+
+	# Send message and wait for it to arrive or timeout
+	echo "<1>$msg" > /dev/kmsg
+	if wait %+; then
+		echo "PASS: netconsole ($name)"
+	else
+		ret=$?
+		echo "FAIL: netconsole ($name): message did not arrive in time ($err)"
+	fi
+	rmdir /sys/kernel/config/netconsole/"$outif"
+	return $ret
+}
+
+
+# Test starts here
+
+ret=0
+mark_failed() {
+	# Make sure failure isn't overwritten by skip
+	if [ "$ret" = 0 ] || [ "$ret" = $ksft_skip ]; then
+		ret="$1"
+	fi
+}
+
+setup
+
+# Test ethernet interfaces
+
+test_netconsole eth/ipv4 "$H1" "$H1A4" "$H2" "$H2A4" || mark_failed $?
+test_netconsole eth/ipv6 "$H1" "$H1A6" "$H2" "$H2A6" || mark_failed $?
+
+# Test tunnel interfaces
+
+setup_tunnel() {
+	local type="$1"; shift
+	local h1a="${1%%/*}"; shift
+	local h2a="${1%%/*}"; shift
+	local t1a="$1"; shift
+	local t2a="$1"; shift
+
+	ip -n "$NS1" link add "$T1" type "$type" local "$h1a" remote "$h2a" "$@" \
+		|| return $ksft_skip # Skip test if tunnel type is not available
+	ip -n "$NS1" addr add "$t1a" dev "$T1"
+	ip -n "$NS1" link set "$T1" up
+
+	ip -n "$NS2" link add "$T2" type "$type" local "$h2a" remote "$h1a" "$@" \
+		|| return $ksft_skip # Skip test if tunnel type is not available
+	ip -n "$NS2" addr add "$t2a" dev "$T2"
+	ip -n "$NS2" link set "$T2" up
+}
+
+teardown_tunnel() {
+	ip -n "$NS1" link del dev "$T1"
+	ip -n "$NS2" link del dev "$T2"
+}
+
+test_tunnel_4in4() {
+	local type="$1"; shift
+	local ret=0
+	setup_tunnel "$type" "$H1A4" "$H2A4" "$T1A4" "$T2A4" "$@"
+	test_netconsole "ipv4/$type/ipv4" "$T1" "$T1A4" "$T2" "$T2A4" || ret=$?
+	teardown_tunnel
+	return $ret
+}
+
+test_tunnel_4in6() {
+	local type="$1"; shift
+	local ret=0
+	setup_tunnel "$type" "$H1A6" "$H2A6" "$T1A4" "$T2A4" "$@"
+	test_netconsole "ipv6/$type/ipv4" "$T1" "$T1A4" "$T2" "$T2A4" || ret=$?
+	teardown_tunnel
+	return $ret
+}
+
+test_tunnel_6in4() {
+	local type="$1"; shift
+	local ret=0
+	setup_tunnel "$type" "$H1A4" "$H2A4" "$T1A6" "$T2A6" "$@"
+	test_netconsole "ipv4/$type/ipv6" "$T1" "$T1A6" "$T2" "$T2A6" || ret=$?
+	teardown_tunnel
+	return $ret
+}
+
+test_tunnel_6in6() {
+	local type="$1"; shift
+	local ret=0
+	setup_tunnel "$type" "$H1A6" "$H2A6" "$T1A6" "$T2A6" "$@"
+	test_netconsole "ipv6/$type/ipv6" "$T1" "$T1A6" "$T2" "$T2A6" || ret=$?
+	teardown_tunnel
+	return $ret
+}
+
+test_tunnel_4in4 gre    || mark_failed $?
+test_tunnel_6in4 gre    || mark_failed $?
+test_tunnel_4in6 ip6gre || mark_failed $?
+test_tunnel_6in6 ip6gre || mark_failed $?
+test_tunnel_4in4 ipip   || mark_failed $?
+test_tunnel_6in4 sit    || mark_failed $?
+test_tunnel_4in6 ip6tnl mode ipip6  || mark_failed $?
+test_tunnel_6in6 ip6tnl mode ip6ip6 || mark_failed $?
+
+
+# Test done
+
+cleanup
+exit "$ret"
-- 
2.44.0


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ