2018-08-29 02:36:20 +08:00
|
|
|
#!/bin/sh
|
|
|
|
# SPDX-License-Identifier: GPL-2.0
|
|
|
|
#
|
|
|
|
# Run a couple of IP defragmentation tests.
|
|
|
|
|
|
|
|
set +x
|
|
|
|
set -e
|
|
|
|
|
2020-07-16 23:51:14 +08:00
|
|
|
modprobe -q nf_defrag_ipv6
|
|
|
|
|
2018-09-22 02:17:17 +08:00
|
|
|
readonly NETNS="ns-$(mktemp -u XXXXXX)"
|
|
|
|
|
|
|
|
setup() {
|
|
|
|
ip netns add "${NETNS}"
|
|
|
|
ip -netns "${NETNS}" link set lo up
|
2019-01-05 01:43:08 +08:00
|
|
|
|
2018-10-11 17:17:37 +08:00
|
|
|
ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_high_thresh=9000000 >/dev/null 2>&1
|
|
|
|
ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_low_thresh=7000000 >/dev/null 2>&1
|
2019-01-05 01:43:08 +08:00
|
|
|
ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_time=1 >/dev/null 2>&1
|
|
|
|
|
2018-10-11 17:17:37 +08:00
|
|
|
ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_high_thresh=9000000 >/dev/null 2>&1
|
|
|
|
ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_low_thresh=7000000 >/dev/null 2>&1
|
2019-01-05 01:43:08 +08:00
|
|
|
ip netns exec "${NETNS}" sysctl -w net.ipv6.ip6frag_time=1 >/dev/null 2>&1
|
|
|
|
|
2019-01-23 02:02:53 +08:00
|
|
|
ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_high_thresh=9000000 >/dev/null 2>&1
|
|
|
|
ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_low_thresh=7000000 >/dev/null 2>&1
|
|
|
|
ip netns exec "${NETNS}" sysctl -w net.netfilter.nf_conntrack_frag6_timeout=1 >/dev/null 2>&1
|
|
|
|
|
2019-01-05 01:43:08 +08:00
|
|
|
# DST cache can get full with a lot of frags, with GC not keeping up with the test.
|
|
|
|
ip netns exec "${NETNS}" sysctl -w net.ipv6.route.max_size=65536 >/dev/null 2>&1
|
2018-09-22 02:17:17 +08:00
|
|
|
}
|
2018-08-29 02:36:20 +08:00
|
|
|
|
2018-09-22 02:17:17 +08:00
|
|
|
cleanup() {
|
|
|
|
ip netns del "${NETNS}"
|
2018-08-29 02:36:20 +08:00
|
|
|
}
|
|
|
|
|
2018-09-22 02:17:17 +08:00
|
|
|
trap cleanup EXIT
|
|
|
|
setup
|
|
|
|
|
|
|
|
echo "ipv4 defrag"
|
|
|
|
ip netns exec "${NETNS}" ./ip_defrag -4
|
|
|
|
|
2018-08-29 02:36:20 +08:00
|
|
|
echo "ipv4 defrag with overlaps"
|
2018-09-22 02:17:17 +08:00
|
|
|
ip netns exec "${NETNS}" ./ip_defrag -4o
|
|
|
|
|
|
|
|
echo "ipv6 defrag"
|
|
|
|
ip netns exec "${NETNS}" ./ip_defrag -6
|
|
|
|
|
|
|
|
echo "ipv6 defrag with overlaps"
|
|
|
|
ip netns exec "${NETNS}" ./ip_defrag -6o
|
2018-08-29 02:36:20 +08:00
|
|
|
|
2019-01-23 02:02:53 +08:00
|
|
|
# insert an nf_conntrack rule so that the codepath in nf_conntrack_reasm.c taken
|
|
|
|
ip netns exec "${NETNS}" ip6tables -A INPUT -m conntrack --ctstate INVALID -j ACCEPT
|
|
|
|
|
|
|
|
echo "ipv6 nf_conntrack defrag"
|
|
|
|
ip netns exec "${NETNS}" ./ip_defrag -6
|
|
|
|
|
|
|
|
echo "ipv6 nf_conntrack defrag with overlaps"
|
|
|
|
# netfilter will drop some invalid packets, so we run the test in
|
|
|
|
# permissive mode: i.e. pass the test if the packet is correctly assembled
|
|
|
|
# even if we sent an overlap
|
|
|
|
ip netns exec "${NETNS}" ./ip_defrag -6op
|
|
|
|
|
2019-01-05 01:43:08 +08:00
|
|
|
echo "all tests done"
|