5554abd9cc
Factor out the data counter helpers for other tests to use. Reviewed by: kp MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D30699
633 lines
16 KiB
C
633 lines
16 KiB
C
/*-
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
*
|
|
* Copyright 2021 Lutz Donnerhacke
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above
|
|
* copyright notice, this list of conditions and the following
|
|
* disclaimer in the documentation and/or other materials provided
|
|
* with the distribution.
|
|
* 3. Neither the name of the copyright holder nor the names of its
|
|
* contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
|
|
* CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
|
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS
|
|
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
|
|
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
|
|
* TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
|
|
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
|
|
* TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
* THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
#include <atf-c.h>
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
|
|
#include <net/ethernet.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/ip.h>
|
|
#include <netinet/ip6.h>
|
|
|
|
#include "util.h"
|
|
#include <netgraph/ng_bridge.h>
|
|
|
|
static void get_tablesize(char const *source, struct ng_mesg *msg, void *ctx);
|
|
struct gettable
|
|
{
|
|
u_int32_t tok;
|
|
int cnt;
|
|
};
|
|
|
|
struct frame4
|
|
{
|
|
struct ether_header eh;
|
|
struct ip ip;
|
|
char data[64];
|
|
};
|
|
struct frame6
|
|
{
|
|
struct ether_header eh;
|
|
struct ip6_hdr ip;
|
|
char data[64];
|
|
};
|
|
|
|
static struct frame4 msg4 = {
|
|
.ip.ip_v = 4,
|
|
.ip.ip_hl = 5,
|
|
.ip.ip_ttl = 1,
|
|
.ip.ip_p = 254,
|
|
.ip.ip_src = {htonl(0x0a00dead)},
|
|
.ip.ip_dst = {htonl(0x0a00beef)},
|
|
.ip.ip_len = 32,
|
|
.eh.ether_type = ETHERTYPE_IP,
|
|
.eh.ether_shost = {2, 4, 6},
|
|
.eh.ether_dhost = {2, 4, 6},
|
|
};
|
|
|
|
|
|
ATF_TC(basic);
|
|
ATF_TC_HEAD(basic, conf)
|
|
{
|
|
atf_tc_set_md_var(conf, "require.user", "root");
|
|
}
|
|
|
|
ATF_TC_BODY(basic, dummy)
|
|
{
|
|
ng_counter_t r;
|
|
struct gettable rm;
|
|
|
|
ng_init();
|
|
ng_errors(PASS);
|
|
ng_shutdown("bridge:");
|
|
ng_errors(FAIL);
|
|
|
|
ng_mkpeer(".", "a", "bridge", "link0");
|
|
ng_name("a", "bridge");
|
|
ng_connect(".", "b", "bridge:", "link1");
|
|
ng_connect(".", "c", "bridge:", "link2");
|
|
|
|
/* do not bounce back */
|
|
ng_register_data("a", get_data0);
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
ng_send_data("a", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0);
|
|
|
|
/* send to others */
|
|
ng_register_data("b", get_data1);
|
|
ng_register_data("c", get_data2);
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
ng_send_data("a", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1);
|
|
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 2;
|
|
ng_send_data("b", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1);
|
|
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 3;
|
|
ng_send_data("c", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 1 && r[2] == 0);
|
|
|
|
/* send to learned unicast */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
msg4.eh.ether_dhost[5] = 3;
|
|
ng_send_data("a", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 0 && r[2] == 1);
|
|
|
|
/* inspect mac table */
|
|
ng_register_msg(get_tablesize);
|
|
rm.tok = ng_send_msg("bridge:", "gettable");
|
|
rm.cnt = 0;
|
|
ng_handle_events(50, &rm);
|
|
ATF_CHECK(rm.cnt == 3);
|
|
|
|
/* remove a link */
|
|
ng_rmhook(".", "b");
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
msg4.eh.ether_dhost[5] = 0;
|
|
ng_send_data("a", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 0 && r[2] == 1);
|
|
|
|
/* inspect mac table */
|
|
ng_register_msg(get_tablesize);
|
|
rm.tok = ng_send_msg("bridge:", "gettable");
|
|
rm.cnt = 0;
|
|
ng_handle_events(50, &rm);
|
|
ATF_CHECK(rm.cnt == 2);
|
|
|
|
ng_shutdown("bridge:");
|
|
}
|
|
|
|
ATF_TC(persistence);
|
|
ATF_TC_HEAD(persistence, conf)
|
|
{
|
|
atf_tc_set_md_var(conf, "require.user", "root");
|
|
}
|
|
|
|
ATF_TC_BODY(persistence, dummy)
|
|
{
|
|
ng_init();
|
|
ng_errors(PASS);
|
|
ng_shutdown("bridge:");
|
|
ng_errors(FAIL);
|
|
|
|
ng_mkpeer(".", "a", "bridge", "link0");
|
|
ng_name("a", "bridge");
|
|
|
|
ng_send_msg("bridge:", "setpersistent");
|
|
ng_rmhook(".", "a");
|
|
|
|
ng_shutdown("bridge:");
|
|
}
|
|
|
|
ATF_TC(loop);
|
|
ATF_TC_HEAD(loop, conf)
|
|
{
|
|
atf_tc_set_md_var(conf, "require.user", "root");
|
|
}
|
|
|
|
ATF_TC_BODY(loop, dummy)
|
|
{
|
|
ng_counter_t r;
|
|
int i;
|
|
|
|
ng_init();
|
|
ng_errors(PASS);
|
|
ng_shutdown("bridge1:");
|
|
ng_shutdown("bridge2:");
|
|
ng_errors(FAIL);
|
|
|
|
ng_mkpeer(".", "a", "bridge", "link0");
|
|
ng_name("a", "bridge1");
|
|
ng_mkpeer(".", "b", "bridge", "link1");
|
|
ng_name("b", "bridge2");
|
|
|
|
ng_register_data("a", get_data0);
|
|
ng_register_data("b", get_data1);
|
|
|
|
/*-
|
|
* Open loop
|
|
*
|
|
* /-- bridge1
|
|
* . < |
|
|
* \-- bridge2
|
|
*/
|
|
ng_connect("bridge1:", "link11", "bridge2:", "link11");
|
|
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
ng_send_data("a", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1);
|
|
|
|
/*-
|
|
* Closed loop, DANGEROUS!
|
|
*
|
|
* /-- bridge1 -\
|
|
* . < | |
|
|
* \-- bridge2 -/
|
|
*/
|
|
ng_connect("bridge1:", "link12", "bridge2:", "link12");
|
|
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
ng_errors(PASS);
|
|
ng_send_data("a", &msg4, sizeof(msg4));
|
|
ATF_CHECK_ERRNO(ELOOP, errno != 0); /* loop might be detected */
|
|
ng_errors(FAIL);
|
|
for (i = 0; i < 10; i++) /* don't run forever */
|
|
if (!ng_handle_event(50, &r))
|
|
break;
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1);
|
|
|
|
ng_shutdown("bridge1:");
|
|
ng_shutdown("bridge2:");
|
|
}
|
|
|
|
ATF_TC(many_unicasts);
|
|
ATF_TC_HEAD(many_unicasts, conf)
|
|
{
|
|
atf_tc_set_md_var(conf, "require.user", "root");
|
|
}
|
|
|
|
ATF_TC_BODY(many_unicasts, dummy)
|
|
{
|
|
ng_counter_t r;
|
|
int i;
|
|
const int HOOKS = 1000;
|
|
struct gettable rm;
|
|
|
|
ng_init();
|
|
ng_errors(PASS);
|
|
ng_shutdown("bridge:");
|
|
ng_errors(FAIL);
|
|
|
|
ng_mkpeer(".", "a", "bridge", "link0");
|
|
ng_name("a", "bridge");
|
|
ng_register_data("a", get_data0);
|
|
|
|
/* learn MAC */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[3] = 0xff;
|
|
ng_send_data("a", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0);
|
|
|
|
/* use learned MAC as destination */
|
|
msg4.eh.ether_shost[3] = 0;
|
|
msg4.eh.ether_dhost[3] = 0xff;
|
|
|
|
/* now send */
|
|
ng_counter_clear(r);
|
|
for (i = 1; i <= HOOKS; i++)
|
|
{
|
|
char hook[20];
|
|
|
|
snprintf(hook, sizeof(hook), "link%d", i);
|
|
ng_connect(".", hook, "bridge:", hook);
|
|
ng_register_data(hook, get_data2);
|
|
|
|
msg4.eh.ether_shost[4] = i >> 8;
|
|
msg4.eh.ether_shost[5] = i & 0xff;
|
|
ng_errors(PASS);
|
|
ng_send_data(hook, &msg4, sizeof(msg4));
|
|
ng_errors(FAIL);
|
|
if (errno != 0)
|
|
break;
|
|
ng_handle_events(50, &r);
|
|
}
|
|
ATF_CHECK(r[0] == HOOKS && r[2] == 0);
|
|
|
|
/* inspect mac table */
|
|
ng_register_msg(get_tablesize);
|
|
rm.cnt = 0;
|
|
ng_errors(PASS);
|
|
rm.tok = ng_send_msg("bridge:", "gettable");
|
|
ng_errors(FAIL);
|
|
if (rm.tok == (u_int32_t)-1)
|
|
{
|
|
ATF_CHECK_ERRNO(ENOBUFS, 1);
|
|
atf_tc_expect_fail("response too large");
|
|
}
|
|
ng_handle_events(50, &rm);
|
|
ATF_CHECK(rm.cnt == HOOKS + 1);
|
|
atf_tc_expect_pass();
|
|
|
|
ng_shutdown("bridge:");
|
|
}
|
|
|
|
ATF_TC(many_broadcasts);
|
|
ATF_TC_HEAD(many_broadcasts, conf)
|
|
{
|
|
atf_tc_set_md_var(conf, "require.user", "root");
|
|
}
|
|
|
|
ATF_TC_BODY(many_broadcasts, dummy)
|
|
{
|
|
ng_counter_t r;
|
|
int i;
|
|
const int HOOKS = 1000;
|
|
|
|
ng_init();
|
|
ng_errors(PASS);
|
|
ng_shutdown("bridge:");
|
|
ng_errors(FAIL);
|
|
|
|
ng_mkpeer(".", "a", "bridge", "link0");
|
|
ng_name("a", "bridge");
|
|
ng_register_data("a", get_data0);
|
|
|
|
/* learn MAC */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[3] = 0xff;
|
|
ng_send_data("a", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0);
|
|
|
|
/* use broadcast MAC */
|
|
msg4.eh.ether_shost[3] = 0;
|
|
memset(msg4.eh.ether_dhost, 0xff, sizeof(msg4.eh.ether_dhost));
|
|
|
|
/* now send */
|
|
ng_counter_clear(r);
|
|
for (i = 1; i <= HOOKS; i++)
|
|
{
|
|
char hook[20];
|
|
|
|
snprintf(hook, sizeof(hook), "link%d", i);
|
|
ng_connect(".", hook, "bridge:", hook);
|
|
ng_register_data(hook, get_data3);
|
|
|
|
msg4.eh.ether_shost[4] = i >> 8;
|
|
msg4.eh.ether_shost[5] = i & 0xff;
|
|
ng_errors(PASS);
|
|
ng_send_data(hook, &msg4, sizeof(msg4));
|
|
ng_errors(FAIL);
|
|
if (errno != 0)
|
|
break;
|
|
ng_handle_events(50, &r);
|
|
}
|
|
ATF_CHECK(r[0] > 100 && r[3] > 100);
|
|
if (i < HOOKS)
|
|
atf_tc_expect_fail("netgraph queue full (%d)", i);
|
|
ATF_CHECK(r[0] == HOOKS);
|
|
atf_tc_expect_pass();
|
|
|
|
ng_shutdown("bridge:");
|
|
}
|
|
|
|
ATF_TC(uplink_private);
|
|
ATF_TC_HEAD(uplink_private, conf)
|
|
{
|
|
atf_tc_set_md_var(conf, "require.user", "root");
|
|
}
|
|
|
|
ATF_TC_BODY(uplink_private, dummy)
|
|
{
|
|
ng_counter_t r;
|
|
struct gettable rm;
|
|
|
|
ng_init();
|
|
ng_errors(PASS);
|
|
ng_shutdown("bridge:");
|
|
|
|
ng_mkpeer(".", "u1", "bridge", "uplink1");
|
|
if (errno > 0)
|
|
atf_tc_skip("uplinks are not supported.");
|
|
ng_errors(FAIL);
|
|
ng_name("u1", "bridge");
|
|
ng_register_data("u1", get_data1);
|
|
ng_connect(".", "u2", "bridge:", "uplink2");
|
|
ng_register_data("u2", get_data2);
|
|
ng_connect(".", "l0", "bridge:", "link0");
|
|
ng_register_data("l0", get_data0);
|
|
ng_connect(".", "l3", "bridge:", "link3");
|
|
ng_register_data("l3", get_data3);
|
|
|
|
/* unknown unicast 0 from uplink1 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
ng_send_data("u1", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 0 && r[2] == 1 && r[3] == 0);
|
|
|
|
/* unknown unicast 2 from link0 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 0;
|
|
msg4.eh.ether_dhost[5] = 2;
|
|
ng_send_data("l0", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 0);
|
|
|
|
/* known unicast 0 from uplink2 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 2;
|
|
msg4.eh.ether_dhost[5] = 0;
|
|
ng_send_data("u2", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 0 && r[3] == 0);
|
|
|
|
/* known unicast 0 from link3 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 3;
|
|
msg4.eh.ether_dhost[5] = 0;
|
|
ng_send_data("l3", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 0 && r[3] == 0);
|
|
|
|
/* (un)known unicast 2 from uplink1 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
msg4.eh.ether_dhost[5] = 2;
|
|
ng_send_data("u1", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 0 && r[2] == 1 && r[3] == 0);
|
|
|
|
/* (un)known unicast 2 from link0 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 0;
|
|
ng_send_data("l0", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 0);
|
|
|
|
/* unknown multicast 2 from uplink1 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
msg4.eh.ether_dhost[0] = 0xff;
|
|
ng_send_data("u1", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* unknown multicast 2 from link0 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 0;
|
|
ng_send_data("l0", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* broadcast from uplink1 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
memset(msg4.eh.ether_dhost, 0xff, sizeof(msg4.eh.ether_dhost));
|
|
ng_send_data("u1", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* broadcast from link0 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 0;
|
|
ng_send_data("l0", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* inspect mac table */
|
|
ng_register_msg(get_tablesize);
|
|
rm.tok = ng_send_msg("bridge:", "gettable");
|
|
rm.cnt = 0;
|
|
ng_handle_events(50, &rm);
|
|
ATF_CHECK(rm.cnt == 2);
|
|
|
|
ng_shutdown("bridge:");
|
|
}
|
|
|
|
ATF_TC(uplink_classic);
|
|
ATF_TC_HEAD(uplink_classic, conf)
|
|
{
|
|
atf_tc_set_md_var(conf, "require.user", "root");
|
|
}
|
|
|
|
ATF_TC_BODY(uplink_classic, dummy)
|
|
{
|
|
ng_counter_t r;
|
|
struct gettable rm;
|
|
|
|
ng_init();
|
|
ng_errors(PASS);
|
|
ng_shutdown("bridge:");
|
|
|
|
ng_mkpeer(".", "l0", "bridge", "link0");
|
|
if (errno > 0)
|
|
atf_tc_skip("uplinks are not supported.");
|
|
ng_errors(FAIL);
|
|
ng_name("l0", "bridge");
|
|
ng_register_data("l0", get_data0);
|
|
ng_connect(".", "u1", "bridge:", "uplink1");
|
|
ng_register_data("u1", get_data1);
|
|
ng_connect(".", "u2", "bridge:", "uplink2");
|
|
ng_register_data("u2", get_data2);
|
|
ng_connect(".", "l3", "bridge:", "link3");
|
|
ng_register_data("l3", get_data3);
|
|
|
|
/* unknown unicast 0 from uplink1 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
ng_send_data("u1", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* unknown unicast 2 from link0 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 0;
|
|
msg4.eh.ether_dhost[5] = 2;
|
|
ng_send_data("l0", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* known unicast 0 from uplink2 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 2;
|
|
msg4.eh.ether_dhost[5] = 0;
|
|
ng_send_data("u2", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 0 && r[3] == 0);
|
|
|
|
/* known unicast 0 from link3 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 3;
|
|
msg4.eh.ether_dhost[5] = 0;
|
|
ng_send_data("l3", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 0 && r[3] == 0);
|
|
|
|
/* (un)known unicast 2 from uplink1 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
msg4.eh.ether_dhost[5] = 2;
|
|
ng_send_data("u1", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* (un)known unicast 2 from link0 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 0;
|
|
ng_send_data("l0", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* unknown multicast 2 from uplink1 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
msg4.eh.ether_dhost[0] = 0xff;
|
|
ng_send_data("u1", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* unknown multicast 2 from link0 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 0;
|
|
ng_send_data("l0", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* broadcast from uplink1 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 1;
|
|
memset(msg4.eh.ether_dhost, 0xff, sizeof(msg4.eh.ether_dhost));
|
|
ng_send_data("u1", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* broadcast from link0 */
|
|
ng_counter_clear(r);
|
|
msg4.eh.ether_shost[5] = 0;
|
|
ng_send_data("l0", &msg4, sizeof(msg4));
|
|
ng_handle_events(50, &r);
|
|
ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
|
|
|
|
/* inspect mac table */
|
|
ng_register_msg(get_tablesize);
|
|
rm.tok = ng_send_msg("bridge:", "gettable");
|
|
rm.cnt = 0;
|
|
ng_handle_events(50, &rm);
|
|
ATF_CHECK(rm.cnt == 2);
|
|
|
|
ng_shutdown("bridge:");
|
|
}
|
|
|
|
ATF_TP_ADD_TCS(bridge)
|
|
{
|
|
ATF_TP_ADD_TC(bridge, basic);
|
|
ATF_TP_ADD_TC(bridge, loop);
|
|
ATF_TP_ADD_TC(bridge, persistence);
|
|
ATF_TP_ADD_TC(bridge, many_unicasts);
|
|
ATF_TP_ADD_TC(bridge, many_broadcasts);
|
|
ATF_TP_ADD_TC(bridge, uplink_private);
|
|
ATF_TP_ADD_TC(bridge, uplink_classic);
|
|
|
|
return atf_no_error();
|
|
}
|
|
|
|
static void
|
|
get_tablesize(char const *source, struct ng_mesg *msg, void *ctx)
|
|
{
|
|
struct gettable *rm = ctx;
|
|
struct ng_bridge_host_ary *gt = (void *)msg->data;
|
|
|
|
fprintf(stderr, "Response from %s to query %d\n", source, msg->header.token);
|
|
if (rm->tok == msg->header.token)
|
|
rm->cnt = gt->numHosts;
|
|
}
|