File: //usr/src/linux-headers-5.15.0-153/tools/testing/selftests/net/forwarding/bridge_port_isolation.sh
#!/bin/bash
# SPDX-License-Identifier: GPL-2.0
ALL_TESTS="ping_ipv4 ping_ipv6 flooding"
NUM_NETIFS=6
CHECK_TC="yes"
source lib.sh
h1_create()
{
	simple_if_init $h1 192.0.2.1/24 2001:db8:1::1/64
}
h1_destroy()
{
	simple_if_fini $h1 192.0.2.1/24 2001:db8:1::1/64
}
h2_create()
{
	simple_if_init $h2 192.0.2.2/24 2001:db8:1::2/64
}
h2_destroy()
{
	simple_if_fini $h2 192.0.2.2/24 2001:db8:1::2/64
}
h3_create()
{
	simple_if_init $h3 192.0.2.3/24 2001:db8:1::3/64
}
h3_destroy()
{
	simple_if_fini $h3 192.0.2.3/24 2001:db8:1::3/64
}
switch_create()
{
	ip link add dev br0 type bridge
	ip link set dev $swp1 master br0
	ip link set dev $swp2 master br0
	ip link set dev $swp3 master br0
	ip link set dev $swp1 type bridge_slave isolated on
	check_err $? "Can't set isolation on port $swp1"
	ip link set dev $swp2 type bridge_slave isolated on
	check_err $? "Can't set isolation on port $swp2"
	ip link set dev $swp3 type bridge_slave isolated off
	check_err $? "Can't disable isolation on port $swp3"
	ip link set dev br0 up
	ip link set dev $swp1 up
	ip link set dev $swp2 up
	ip link set dev $swp3 up
}
switch_destroy()
{
	ip link set dev $swp3 down
	ip link set dev $swp2 down
	ip link set dev $swp1 down
	ip link del dev br0
}
setup_prepare()
{
	h1=${NETIFS[p1]}
	swp1=${NETIFS[p2]}
	swp2=${NETIFS[p3]}
	h2=${NETIFS[p4]}
	swp3=${NETIFS[p5]}
	h3=${NETIFS[p6]}
	vrf_prepare
	h1_create
	h2_create
	h3_create
	switch_create
}
cleanup()
{
	pre_cleanup
	switch_destroy
	h3_destroy
	h2_destroy
	h1_destroy
	vrf_cleanup
}
ping_ipv4()
{
	RET=0
	ping_do $h1 192.0.2.2
	check_fail $? "Ping worked when it should not have"
	RET=0
	ping_do $h3 192.0.2.2
	check_err $? "Ping didn't work when it should have"
	log_test "Isolated port ping"
}
ping_ipv6()
{
	RET=0
	ping6_do $h1 2001:db8:1::2
	check_fail $? "Ping6 worked when it should not have"
	RET=0
	ping6_do $h3 2001:db8:1::2
	check_err $? "Ping6 didn't work when it should have"
	log_test "Isolated port ping6"
}
flooding()
{
	local mac=de:ad:be:ef:13:37
	local ip=192.0.2.100
	RET=0
	flood_test_do false $mac $ip $h1 $h2
	check_err $? "Packet was flooded when it should not have been"
	RET=0
	flood_test_do true $mac $ip $h3 $h2
	check_err $? "Packet was not flooded when it should have been"
	log_test "Isolated port flooding"
}
trap cleanup EXIT
setup_prepare
setup_wait
tests_run
exit $EXIT_STATUS