Patch "selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT" has been added to the 5.18-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is a note to let you know that I've just added the patch titled

    selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT

to the 5.18-stable tree which can be found at:
    http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     selftests-forwarding-fix-flood_unicast_test-when-h2-.patch
and it can be found in the queue-5.18 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@xxxxxxxxxxxxxxx> know about it.



commit d7296c464df6e1f28da9afdc3bfdcf81c7dd921d
Author: Vladimir Oltean <vladimir.oltean@xxxxxxx>
Date:   Sun Jul 3 10:36:24 2022 +0300

    selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT
    
    [ Upstream commit b8e629b05f5d23f9649c901bef09fab8b0c2e4b9 ]
    
    As mentioned in the blamed commit, flood_unicast_test() works by
    checking the match count on a tc filter placed on the receiving
    interface.
    
    But the second host interface (host2_if) has no interest in receiving a
    packet with MAC DA de:ad:be:ef:13:37, so its RX filter drops it even
    before the ingress tc filter gets to be executed. So we will incorrectly
    get the message "Packet was not flooded when should", when in fact, the
    packet was flooded as expected but dropped due to an unrelated reason,
    at some other layer on the receiving side.
    
    Force h2 to accept this packet by temporarily placing it in promiscuous
    mode. Alternatively we could either deliver to its MAC address or use
    tcpdump_start, but this has the fewest complications.
    
    This fixes the "flooding" test from bridge_vlan_aware.sh and
    bridge_vlan_unaware.sh, which calls flood_test from the lib.
    
    Fixes: 236dd50bf67a ("selftests: forwarding: Add a test for flooded traffic")
    Signed-off-by: Vladimir Oltean <vladimir.oltean@xxxxxxx>
    Reviewed-by: Ido Schimmel <idosch@xxxxxxxxxx>
    Tested-by: Ido Schimmel <idosch@xxxxxxxxxx>
    Signed-off-by: Paolo Abeni <pabeni@xxxxxxxxxx>
    Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>

diff --git a/tools/testing/selftests/net/forwarding/lib.sh b/tools/testing/selftests/net/forwarding/lib.sh
index 664b9ecaf228..823e5cef062d 100644
--- a/tools/testing/selftests/net/forwarding/lib.sh
+++ b/tools/testing/selftests/net/forwarding/lib.sh
@@ -1242,6 +1242,7 @@ flood_test_do()
 
 	# Add an ACL on `host2_if` which will tell us whether the packet
 	# was flooded to it or not.
+	ip link set $host2_if promisc on
 	tc qdisc add dev $host2_if ingress
 	tc filter add dev $host2_if ingress protocol ip pref 1 handle 101 \
 		flower dst_mac $mac action drop
@@ -1259,6 +1260,7 @@ flood_test_do()
 
 	tc filter del dev $host2_if ingress protocol ip pref 1 handle 101 flower
 	tc qdisc del dev $host2_if ingress
+	ip link set $host2_if promisc off
 
 	return $err
 }



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux