aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLutz Donnerhacke <donner@FreeBSD.org>2021-06-04 10:59:00 +0000
committerLutz Donnerhacke <donner@FreeBSD.org>2021-06-16 11:48:24 +0000
commit49736a31a5c29319c6dc8f9080b3a85da2305b47 (patch)
tree181cc654ad0ecac123c37add3d6f4d1b6893b505
parent4a0c1d0543afd83156b50b3f9b74c79e74cf526f (diff)
downloadsrc-49736a31a5c29319c6dc8f9080b3a85da2305b47.tar.gz
src-49736a31a5c29319c6dc8f9080b3a85da2305b47.zip
tests/netgraph: Tests for ng_bridge
Test functionality of ng_bridge(4): - replicating traffic to anything but the sending hook - persistence - detect loops - unicast to only one link of many - stretch to implementation limits on broadcast Reviewed by: kp Differential Revision: https://reviews.freebsd.org/D30647 Differential Revision: https://reviews.freebsd.org/D30699 (cherry picked from commit 61814702398ce29430b2bef75cbdd6fd2c07ad12) (cherry picked from commit 5554abd9cc9702af30af90925b33c5efff4e7d88)
-rw-r--r--tests/sys/netgraph/Makefile2
-rw-r--r--tests/sys/netgraph/bridge.c632
2 files changed, 634 insertions, 0 deletions
diff --git a/tests/sys/netgraph/Makefile b/tests/sys/netgraph/Makefile
index a28cae2f2432..7ec036139850 100644
--- a/tests/sys/netgraph/Makefile
+++ b/tests/sys/netgraph/Makefile
@@ -6,8 +6,10 @@ TESTSDIR= ${TESTSBASE}/sys/netgraph
BINDIR= ${TESTSDIR}
ATF_TESTS_C+= basic \
+ bridge \
SRCS.basic= basic.c util.c
+SRCS.bridge= bridge.c util.c
LIBADD+= netgraph
diff --git a/tests/sys/netgraph/bridge.c b/tests/sys/netgraph/bridge.c
new file mode 100644
index 000000000000..3e3c0f804278
--- /dev/null
+++ b/tests/sys/netgraph/bridge.c
@@ -0,0 +1,632 @@
+/*-
+ * SPDX-License-Identifier: BSD-3-Clause
+ *
+ * Copyright 2021 Lutz Donnerhacke
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above
+ * copyright notice, this list of conditions and the following
+ * disclaimer in the documentation and/or other materials provided
+ * with the distribution.
+ * 3. Neither the name of the copyright holder nor the names of its
+ * contributors may be used to endorse or promote products derived
+ * from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
+ * CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
+ * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS
+ * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
+ * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
+ * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
+ * ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
+ * TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
+ * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+#include <atf-c.h>
+#include <errno.h>
+#include <stdio.h>
+
+#include <net/ethernet.h>
+#include <netinet/in.h>
+#include <netinet/ip.h>
+#include <netinet/ip6.h>
+
+#include "util.h"
+#include <netgraph/ng_bridge.h>
+
+static void get_tablesize(char const *source, struct ng_mesg *msg, void *ctx);
+struct gettable
+{
+ u_int32_t tok;
+ int cnt;
+};
+
+struct frame4
+{
+ struct ether_header eh;
+ struct ip ip;
+ char data[64];
+};
+struct frame6
+{
+ struct ether_header eh;
+ struct ip6_hdr ip;
+ char data[64];
+};
+
+static struct frame4 msg4 = {
+ .ip.ip_v = 4,
+ .ip.ip_hl = 5,
+ .ip.ip_ttl = 1,
+ .ip.ip_p = 254,
+ .ip.ip_src = {htonl(0x0a00dead)},
+ .ip.ip_dst = {htonl(0x0a00beef)},
+ .ip.ip_len = 32,
+ .eh.ether_type = ETHERTYPE_IP,
+ .eh.ether_shost = {2, 4, 6},
+ .eh.ether_dhost = {2, 4, 6},
+};
+
+
+ATF_TC(basic);
+ATF_TC_HEAD(basic, conf)
+{
+ atf_tc_set_md_var(conf, "require.user", "root");
+}
+
+ATF_TC_BODY(basic, dummy)
+{
+ ng_counter_t r;
+ struct gettable rm;
+
+ ng_init();
+ ng_errors(PASS);
+ ng_shutdown("bridge:");
+ ng_errors(FAIL);
+
+ ng_mkpeer(".", "a", "bridge", "link0");
+ ng_name("a", "bridge");
+ ng_connect(".", "b", "bridge:", "link1");
+ ng_connect(".", "c", "bridge:", "link2");
+
+ /* do not bounce back */
+ ng_register_data("a", get_data0);
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ ng_send_data("a", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0);
+
+ /* send to others */
+ ng_register_data("b", get_data1);
+ ng_register_data("c", get_data2);
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ ng_send_data("a", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1);
+
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 2;
+ ng_send_data("b", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1);
+
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 3;
+ ng_send_data("c", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 1 && r[2] == 0);
+
+ /* send to learned unicast */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ msg4.eh.ether_dhost[5] = 3;
+ ng_send_data("a", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 0 && r[2] == 1);
+
+ /* inspect mac table */
+ ng_register_msg(get_tablesize);
+ rm.tok = ng_send_msg("bridge:", "gettable");
+ rm.cnt = 0;
+ ng_handle_events(50, &rm);
+ ATF_CHECK(rm.cnt == 3);
+
+ /* remove a link */
+ ng_rmhook(".", "b");
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ msg4.eh.ether_dhost[5] = 0;
+ ng_send_data("a", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 0 && r[2] == 1);
+
+ /* inspect mac table */
+ ng_register_msg(get_tablesize);
+ rm.tok = ng_send_msg("bridge:", "gettable");
+ rm.cnt = 0;
+ ng_handle_events(50, &rm);
+ ATF_CHECK(rm.cnt == 2);
+
+ ng_shutdown("bridge:");
+}
+
+ATF_TC(persistence);
+ATF_TC_HEAD(persistence, conf)
+{
+ atf_tc_set_md_var(conf, "require.user", "root");
+}
+
+ATF_TC_BODY(persistence, dummy)
+{
+ ng_init();
+ ng_errors(PASS);
+ ng_shutdown("bridge:");
+ ng_errors(FAIL);
+
+ ng_mkpeer(".", "a", "bridge", "link0");
+ ng_name("a", "bridge");
+
+ ng_send_msg("bridge:", "setpersistent");
+ ng_rmhook(".", "a");
+
+ ng_shutdown("bridge:");
+}
+
+ATF_TC(loop);
+ATF_TC_HEAD(loop, conf)
+{
+ atf_tc_set_md_var(conf, "require.user", "root");
+}
+
+ATF_TC_BODY(loop, dummy)
+{
+ ng_counter_t r;
+ int i;
+
+ ng_init();
+ ng_errors(PASS);
+ ng_shutdown("bridge1:");
+ ng_shutdown("bridge2:");
+ ng_errors(FAIL);
+
+ ng_mkpeer(".", "a", "bridge", "link0");
+ ng_name("a", "bridge1");
+ ng_mkpeer(".", "b", "bridge", "link1");
+ ng_name("b", "bridge2");
+
+ ng_register_data("a", get_data0);
+ ng_register_data("b", get_data1);
+
+ /*-
+ * Open loop
+ *
+ * /-- bridge1
+ * . < |
+ * \-- bridge2
+ */
+ ng_connect("bridge1:", "link11", "bridge2:", "link11");
+
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ ng_send_data("a", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1);
+
+ /*-
+ * Closed loop, DANGEROUS!
+ *
+ * /-- bridge1 -\
+ * . < | |
+ * \-- bridge2 -/
+ */
+ ng_connect("bridge1:", "link12", "bridge2:", "link12");
+
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ ng_errors(PASS);
+ ng_send_data("a", &msg4, sizeof(msg4));
+ ATF_CHECK_ERRNO(ELOOP, errno != 0); /* loop might be detected */
+ ng_errors(FAIL);
+ for (i = 0; i < 10; i++) /* don't run forever */
+ if (!ng_handle_event(50, &r))
+ break;
+ ATF_CHECK(r[0] == 0 && r[1] == 1);
+
+ ng_shutdown("bridge1:");
+ ng_shutdown("bridge2:");
+}
+
+ATF_TC(many_unicasts);
+ATF_TC_HEAD(many_unicasts, conf)
+{
+ atf_tc_set_md_var(conf, "require.user", "root");
+}
+
+ATF_TC_BODY(many_unicasts, dummy)
+{
+ ng_counter_t r;
+ int i;
+ const int HOOKS = 1000;
+ struct gettable rm;
+
+ ng_init();
+ ng_errors(PASS);
+ ng_shutdown("bridge:");
+ ng_errors(FAIL);
+
+ ng_mkpeer(".", "a", "bridge", "link0");
+ ng_name("a", "bridge");
+ ng_register_data("a", get_data0);
+
+ /* learn MAC */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[3] = 0xff;
+ ng_send_data("a", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0);
+
+ /* use learned MAC as destination */
+ msg4.eh.ether_shost[3] = 0;
+ msg4.eh.ether_dhost[3] = 0xff;
+
+ /* now send */
+ ng_counter_clear(r);
+ for (i = 1; i <= HOOKS; i++)
+ {
+ char hook[20];
+
+ snprintf(hook, sizeof(hook), "link%d", i);
+ ng_connect(".", hook, "bridge:", hook);
+ ng_register_data(hook, get_data2);
+
+ msg4.eh.ether_shost[4] = i >> 8;
+ msg4.eh.ether_shost[5] = i & 0xff;
+ ng_errors(PASS);
+ ng_send_data(hook, &msg4, sizeof(msg4));
+ ng_errors(FAIL);
+ if (errno != 0)
+ break;
+ ng_handle_events(50, &r);
+ }
+ ATF_CHECK(r[0] == HOOKS && r[2] == 0);
+
+ /* inspect mac table */
+ ng_register_msg(get_tablesize);
+ rm.cnt = 0;
+ ng_errors(PASS);
+ rm.tok = ng_send_msg("bridge:", "gettable");
+ ng_errors(FAIL);
+ if (rm.tok == (u_int32_t)-1)
+ {
+ ATF_CHECK_ERRNO(ENOBUFS, 1);
+ atf_tc_expect_fail("response too large");
+ }
+ ng_handle_events(50, &rm);
+ ATF_CHECK(rm.cnt == HOOKS + 1);
+ atf_tc_expect_pass();
+
+ ng_shutdown("bridge:");
+}
+
+ATF_TC(many_broadcasts);
+ATF_TC_HEAD(many_broadcasts, conf)
+{
+ atf_tc_set_md_var(conf, "require.user", "root");
+}
+
+ATF_TC_BODY(many_broadcasts, dummy)
+{
+ ng_counter_t r;
+ int i;
+ const int HOOKS = 1000;
+
+ ng_init();
+ ng_errors(PASS);
+ ng_shutdown("bridge:");
+ ng_errors(FAIL);
+
+ ng_mkpeer(".", "a", "bridge", "link0");
+ ng_name("a", "bridge");
+ ng_register_data("a", get_data0);
+
+ /* learn MAC */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[3] = 0xff;
+ ng_send_data("a", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0);
+
+ /* use broadcast MAC */
+ msg4.eh.ether_shost[3] = 0;
+ memset(msg4.eh.ether_dhost, 0xff, sizeof(msg4.eh.ether_dhost));
+
+ /* now send */
+ ng_counter_clear(r);
+ for (i = 1; i <= HOOKS; i++)
+ {
+ char hook[20];
+
+ snprintf(hook, sizeof(hook), "link%d", i);
+ ng_connect(".", hook, "bridge:", hook);
+ ng_register_data(hook, get_data3);
+
+ msg4.eh.ether_shost[4] = i >> 8;
+ msg4.eh.ether_shost[5] = i & 0xff;
+ ng_errors(PASS);
+ ng_send_data(hook, &msg4, sizeof(msg4));
+ ng_errors(FAIL);
+ if (errno != 0)
+ break;
+ ng_handle_events(50, &r);
+ }
+ ATF_CHECK(r[0] > 100 && r[3] > 100);
+ if (i < HOOKS)
+ atf_tc_expect_fail("netgraph queue full (%d)", i);
+ ATF_CHECK(r[0] == HOOKS);
+ atf_tc_expect_pass();
+
+ ng_shutdown("bridge:");
+}
+
+ATF_TC(uplink_private);
+ATF_TC_HEAD(uplink_private, conf)
+{
+ atf_tc_set_md_var(conf, "require.user", "root");
+}
+
+ATF_TC_BODY(uplink_private, dummy)
+{
+ ng_counter_t r;
+ struct gettable rm;
+
+ ng_init();
+ ng_errors(PASS);
+ ng_shutdown("bridge:");
+
+ ng_mkpeer(".", "u1", "bridge", "uplink1");
+ if (errno > 0)
+ atf_tc_skip("uplinks are not supported.");
+ ng_errors(FAIL);
+ ng_name("u1", "bridge");
+ ng_register_data("u1", get_data1);
+ ng_connect(".", "u2", "bridge:", "uplink2");
+ ng_register_data("u2", get_data2);
+ ng_connect(".", "l0", "bridge:", "link0");
+ ng_register_data("l0", get_data0);
+ ng_connect(".", "l3", "bridge:", "link3");
+ ng_register_data("l3", get_data3);
+
+ /* unknown unicast 0 from uplink1 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ ng_send_data("u1", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 0 && r[2] == 1 && r[3] == 0);
+
+ /* unknown unicast 2 from link0 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 0;
+ msg4.eh.ether_dhost[5] = 2;
+ ng_send_data("l0", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 0);
+
+ /* known unicast 0 from uplink2 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 2;
+ msg4.eh.ether_dhost[5] = 0;
+ ng_send_data("u2", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 0 && r[3] == 0);
+
+ /* known unicast 0 from link3 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 3;
+ msg4.eh.ether_dhost[5] = 0;
+ ng_send_data("l3", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 0 && r[3] == 0);
+
+ /* (un)known unicast 2 from uplink1 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ msg4.eh.ether_dhost[5] = 2;
+ ng_send_data("u1", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 0 && r[2] == 1 && r[3] == 0);
+
+ /* (un)known unicast 2 from link0 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 0;
+ ng_send_data("l0", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 0);
+
+ /* unknown multicast 2 from uplink1 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ msg4.eh.ether_dhost[0] = 0xff;
+ ng_send_data("u1", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
+
+ /* unknown multicast 2 from link0 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 0;
+ ng_send_data("l0", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
+
+ /* broadcast from uplink1 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ memset(msg4.eh.ether_dhost, 0xff, sizeof(msg4.eh.ether_dhost));
+ ng_send_data("u1", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
+
+ /* broadcast from link0 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 0;
+ ng_send_data("l0", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
+
+ /* inspect mac table */
+ ng_register_msg(get_tablesize);
+ rm.tok = ng_send_msg("bridge:", "gettable");
+ rm.cnt = 0;
+ ng_handle_events(50, &rm);
+ ATF_CHECK(rm.cnt == 2);
+
+ ng_shutdown("bridge:");
+}
+
+ATF_TC(uplink_classic);
+ATF_TC_HEAD(uplink_classic, conf)
+{
+ atf_tc_set_md_var(conf, "require.user", "root");
+}
+
+ATF_TC_BODY(uplink_classic, dummy)
+{
+ ng_counter_t r;
+ struct gettable rm;
+
+ ng_init();
+ ng_errors(PASS);
+ ng_shutdown("bridge:");
+
+ ng_mkpeer(".", "l0", "bridge", "link0");
+ if (errno > 0)
+ atf_tc_skip("uplinks are not supported.");
+ ng_errors(FAIL);
+ ng_name("l0", "bridge");
+ ng_register_data("l0", get_data0);
+ ng_connect(".", "u1", "bridge:", "uplink1");
+ ng_register_data("u1", get_data1);
+ ng_connect(".", "u2", "bridge:", "uplink2");
+ ng_register_data("u2", get_data2);
+ ng_connect(".", "l3", "bridge:", "link3");
+ ng_register_data("l3", get_data3);
+
+ /* unknown unicast 0 from uplink1 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ ng_send_data("u1", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
+
+ /* unknown unicast 2 from link0 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 0;
+ msg4.eh.ether_dhost[5] = 2;
+ ng_send_data("l0", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
+
+ /* known unicast 0 from uplink2 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 2;
+ msg4.eh.ether_dhost[5] = 0;
+ ng_send_data("u2", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 0 && r[3] == 0);
+
+ /* known unicast 0 from link3 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 3;
+ msg4.eh.ether_dhost[5] = 0;
+ ng_send_data("l3", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 0 && r[3] == 0);
+
+ /* (un)known unicast 2 from uplink1 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ msg4.eh.ether_dhost[5] = 2;
+ ng_send_data("u1", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
+
+ /* (un)known unicast 2 from link0 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 0;
+ ng_send_data("l0", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
+
+ /* unknown multicast 2 from uplink1 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ msg4.eh.ether_dhost[0] = 0xff;
+ ng_send_data("u1", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
+
+ /* unknown multicast 2 from link0 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 0;
+ ng_send_data("l0", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
+
+ /* broadcast from uplink1 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 1;
+ memset(msg4.eh.ether_dhost, 0xff, sizeof(msg4.eh.ether_dhost));
+ ng_send_data("u1", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 1 && r[1] == 0 && r[2] == 1 && r[3] == 1);
+
+ /* broadcast from link0 */
+ ng_counter_clear(r);
+ msg4.eh.ether_shost[5] = 0;
+ ng_send_data("l0", &msg4, sizeof(msg4));
+ ng_handle_events(50, &r);
+ ATF_CHECK(r[0] == 0 && r[1] == 1 && r[2] == 1 && r[3] == 1);
+
+ /* inspect mac table */
+ ng_register_msg(get_tablesize);
+ rm.tok = ng_send_msg("bridge:", "gettable");
+ rm.cnt = 0;
+ ng_handle_events(50, &rm);
+ ATF_CHECK(rm.cnt == 2);
+
+ ng_shutdown("bridge:");
+}
+
+ATF_TP_ADD_TCS(bridge)
+{
+ ATF_TP_ADD_TC(bridge, basic);
+ ATF_TP_ADD_TC(bridge, loop);
+ ATF_TP_ADD_TC(bridge, persistence);
+ ATF_TP_ADD_TC(bridge, many_unicasts);
+ ATF_TP_ADD_TC(bridge, many_broadcasts);
+ ATF_TP_ADD_TC(bridge, uplink_private);
+ ATF_TP_ADD_TC(bridge, uplink_classic);
+
+ return atf_no_error();
+}
+
+static void
+get_tablesize(char const *source, struct ng_mesg *msg, void *ctx)
+{
+ struct gettable *rm = ctx;
+ struct ng_bridge_host_ary *gt = (void *)msg->data;
+
+ fprintf(stderr, "Response from %s to query %d\n", source, msg->header.token);
+ if (rm->tok == msg->header.token)
+ rm->cnt = gt->numHosts;
+}