From patchwork Fri Aug 7 19:31:50 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Fabian Frederick X-Patchwork-Id: 1342372 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=23.128.96.18; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=skynet.be Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by ozlabs.org (Postfix) with ESMTP id 4BNb8m6kNJz9sRN for ; Sat, 8 Aug 2020 05:32:08 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726429AbgHGTcG (ORCPT ); Fri, 7 Aug 2020 15:32:06 -0400 Received: from mailrelay110.isp.belgacom.be ([195.238.20.137]:57873 "EHLO mailrelay110.isp.belgacom.be" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725893AbgHGTcG (ORCPT ); Fri, 7 Aug 2020 15:32:06 -0400 IronPort-SDR: EKkHPZmFIQsR2DeSxGORNFwOAvV6Cqsba2MVemjr7NDO1g79M4jg6ZJ06fdDyG81ctz7TbHd67 iIsja1UyDQ7XhHcWpYj/lGYGcdo/ajqAWzEfHeRAnG4k5Ei2NgjHNCE9RWJCvsZ8I3VsmF+VgW y54ln5Zh6/IwRm2zSItliz0sz8b3fpRmRbtgtnsAFtg5vMMZqOEZraTvxpb+0lJJLvjYkGCJeq ckZVxvc19rwJusVJKHw7qOJnvYG8K02WWL9RxlvXrLO/br+tzs250ZxBJi0AcacZrrXGyAer5g 3ZU= X-Belgacom-Dynamic: yes IronPort-PHdr: 9a23:4JqgLxzU5lRYuJfXCy+O+j09IxM/srCxBDY+r6Qd0usQKfad9pjvdHbS+e9qxAeQG9mCtbQU0aGP6PuocFdDyK7JiGoFfp1IWk1NouQttCtkPvS4D1bmJuXhdS0wEZcKflZk+3amLRodQ56mNBXdrXKo8DEdBAj0OxZrKeTpAI7SiNm82/yv95HJbAhEmTuwbalxIRmoogndq8cbjIV/Iast1xXFpWdFdf5Lzm1yP1KTmBj85sa0/JF99ilbpuws+c1dX6jkZqo0VbNXAigoPGAz/83rqALMTRCT6XsGU2UZiQRHDg7Y5xznRJjxsy/6tu1g2CmGOMD9UL45VSi+46ptVRTljjoMOTwk/2HNksF+jLxVrg+vqRJ8xIDbb46bOeFicq7eZ94WWXBMUtpNWyFHH4iyb5EPD+0EPetAr4fyvUABrRqkCgmqGejhyiVIiWHr0qIkyeQhEB3J3A89FN8JvnTbts76NKkJXOCuz6nJzTPDYO1K2Tvn84fHbAksrPeRVr1/bcTf01MgFx/ZjlqOs4zlOSuY2OoOvmWf7+RtVOKih3Appg9xvzWj2toghpXIi4waxV7J6Ct0zZgoKNC4SkN2f9GqHIdeuS+VM4Z4QsMsT39stSs817YIuoa7cTAOxZg63RLTdv+Kf5aS7h7+VeucIS10iG9kdb+5mh2861KvyvfmWcmxyFtKqy1FncTSuX0VzBzT79SHSuN6/ke8xTaDzwDT5f9AIUAzjafbL5khzaIqmZoXsUTDGTT2mFnsgK+ScUUr5vKn6+D6bbXho5+TLY50igfmPqQvnMywH/g4PxAKUmSG4+iwyb7u8VPjTLlXj/A7krPVvI3bKMgDo662GQ5V0oIt6xalCDem1cwVnXcdI11edhKKlJPpO1LOIfD+E/i/n06gnyx1yPzeJL3uHo3NLmTfkLfmZbt981RTxxE3zdBY/J9UDK8OIO79Wk/wsNzYEgE2Mxauz+bgEtV92ZsUWXiTDa+BLKPSrViI6/osI+aWeYAVvCjyJOQ+6v7ok3A5hVEdfait3ZsLdn+4BO5qI0KDYXrjmt0BC3sFvhIiTOz2j12PSTBTZnipUqIn+jE7EoamApnFRoy3nbOOwj+xHodKaWBeFlCMDXDoep2CW/gSdCKSLM5hkjgYVbe/UY8tzAyhuxHky7V5KurZ4TMYtZ3929hv/eHTlg899SZyD8uD12GBVWZ0nnkHRzUuxqBwvVR9ykuf0ah/m/FXCdtT5+lXXQcmK5HT1el6Bsv0Wg3fYteJRlemQtG6AT4vVNI92dgOY1xyG9+6lBDMwzKqA6MJl7yMHJE09LzT32TsKMlj1XbLz7chj1Y4TctVL2GmhbBw9xLVB4HXl0WVjaGqdb4T3CTV7meM0XKOvF1EUA53SajFU2oQaVDYrdni/UPCTL+vCbI5PQtd08KNMbVFOZXVigBeTf3nP/zYbn6/mmOsCAzOwamDKMLpcmkZ0S71DkUYnQEX4Xuccw8kCWPprX32FyB0EV/pJU/hosdkr3buYEY+zgiMJ2N72ra44B8ehrTIRfoZ0JofuzYnpikyFlvrjIGeMMaJuwc0JPYUWtg6+loSjW8= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A2ArBADUqy1f/xCltltgHQEBAQEJARIBBQUBR4FDgxlUX401kiyRegsBAQEBAQEBAQEnDQECBAEBhEyCOSU4EwIDAQEBAwIFAQEGAQEBAQEBBQQBhg9Fgjcig0YLASMjgT8JCYMmAYJXKbY9M4QQhSKBQIE4iB+FCoFBP4ERg06EH4YVBLYigmyDC4RZfZEmDyGgDZIroUOBek0gGIMkCUcZDZxoQjA3AgYIAQEDCVcBPQGPLl8BAQ X-IPAS-Result: A2ArBADUqy1f/xCltltgHQEBAQEJARIBBQUBR4FDgxlUX401kiyRegsBAQEBAQEBAQEnDQECBAEBhEyCOSU4EwIDAQEBAwIFAQEGAQEBAQEBBQQBhg9Fgjcig0YLASMjgT8JCYMmAYJXKbY9M4QQhSKBQIE4iB+FCoFBP4ERg06EH4YVBLYigmyDC4RZfZEmDyGgDZIroUOBek0gGIMkCUcZDZxoQjA3AgYIAQEDCVcBPQGPLl8BAQ Received: from 16.165-182-91.adsl-dyn.isp.belgacom.be (HELO localhost.localdomain) ([91.182.165.16]) by relay.skynet.be with ESMTP; 07 Aug 2020 21:32:04 +0200 From: Fabian Frederick To: pablo@netfilter.org, kadlec@netfilter.org, fw@strlen.de Cc: netfilter-devel@vger.kernel.org, coreteam@netfilter.org, netdev@vger.kernel.org, Fabian Frederick Subject: [PATCH 2/3 linux-next] selftests: netfilter: add MTU arguments to flowtables Date: Fri, 7 Aug 2020 21:31:50 +0200 Message-Id: <20200807193150.12684-1-fabf@skynet.be> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Add some documentation, default values defined in original script and Originator/Link/Responder arguments using getopts like in tools/power/cpupower/bench/cpufreq-bench_plot.sh Signed-off-by: Fabian Frederick --- .../selftests/netfilter/nft_flowtable.sh | 30 +++++++++++++++---- 1 file changed, 24 insertions(+), 6 deletions(-) diff --git a/tools/testing/selftests/netfilter/nft_flowtable.sh b/tools/testing/selftests/netfilter/nft_flowtable.sh index 68a183753c6c3..e98cac6f8bfdd 100755 --- a/tools/testing/selftests/netfilter/nft_flowtable.sh +++ b/tools/testing/selftests/netfilter/nft_flowtable.sh @@ -2,13 +2,18 @@ # SPDX-License-Identifier: GPL-2.0 # # This tests basic flowtable functionality. -# Creates following topology: +# Creates following default topology: # # Originator (MTU 9000) <-Router1-> MTU 1500 <-Router2-> Responder (MTU 2000) # Router1 is the one doing flow offloading, Router2 has no special # purpose other than having a link that is smaller than either Originator # and responder, i.e. TCPMSS announced values are too large and will still # result in fragmentation and/or PMTU discovery. +# +# You can check with different Orgininator/Link/Responder MTU eg: +# sh nft_flowtable.sh -o1000 -l500 -r100 +# + # Kselftest framework requirement - SKIP code is 4. ksft_skip=4 @@ -78,11 +83,24 @@ ip -net nsr2 addr add dead:2::1/64 dev veth1 # ns2 is going via nsr2 with a smaller mtu, so that TCPMSS announced by both peers # is NOT the lowest link mtu. -ip -net nsr1 link set veth0 mtu 9000 -ip -net ns1 link set eth0 mtu 9000 +omtu=9000 +lmtu=1500 +rmtu=2000 + +while getopts "o:l:r:" o +do + case $o in + o) omtu=$OPTARG;; + l) lmtu=$OPTARG;; + r) rmtu=$OPTARG;; + esac +done + +ip -net nsr1 link set veth0 mtu $omtu +ip -net ns1 link set eth0 mtu $omtu -ip -net nsr2 link set veth1 mtu 2000 -ip -net ns2 link set eth0 mtu 2000 +ip -net nsr2 link set veth1 mtu $rmtu +ip -net ns2 link set eth0 mtu $rmtu # transfer-net between nsr1 and nsr2. # these addresses are not used for connections. @@ -136,7 +154,7 @@ table inet filter { # as PMTUd is off. # This rule is deleted for the last test, when we expect PMTUd # to kick in and ensure all packets meet mtu requirements. - meta length gt 1500 accept comment something-to-grep-for + meta length gt $lmtu accept comment something-to-grep-for # next line blocks connection w.o. working offload. # we only do this for reverse dir, because we expect packets to