From patchwork Fri Jul 28 11:59:35 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Aaron Conole X-Patchwork-Id: 12767 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:918b:0:b0:3e4:2afc:c1 with SMTP id s11csp397062vqg; Fri, 28 Jul 2023 05:26:23 -0700 (PDT) X-Google-Smtp-Source: APBJJlFlVttq1bZUtloOysYvqkNwQPB0Msu1kPMAtHJk/kCjgAKgf7ttnoHlnMby1JMUEmL61xQt X-Received: by 2002:a05:6a21:789b:b0:137:26bb:cd95 with SMTP id bf27-20020a056a21789b00b0013726bbcd95mr2194705pzc.51.1690547183513; Fri, 28 Jul 2023 05:26:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690547183; cv=none; d=google.com; s=arc-20160816; b=U5MxgWc1r7bAGo8s9wFRhfQMLVy6sHhPbjMdgj8PC71O/+L+4GbI++D0gWBjxhdmqp W9nbsC50XcYRLog66TAFUSaSRMIqe+Y7UthlR3ArJfv4FxvV830cUxd19MKymQoZwn8T Vg87LW2hYdE+McYO2g0FKhV0BYoOsda7LeU04ZCPbDx1AI4lcPqBXqumkrrxQC1I7/Ud 1t7gQ0cCQVUC0VVh030rFLEWK00m6nEvvhenMJjLViGgkpUYV7NV+7Jq/f+kD8d32Wfi WtwqR+dTZkYiXjPXwsco5fNdIifWC3dom7n6NoWuLwWHG5TreWOCBn19iSCU0O/k5zI6 kfWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=wkYExyrH0hmK6H5XLA8WFiWWTbpLMfoLOCPaCc3YX2s=; fh=La6qilCb+hhN8ZobPG5+gd37udDxEfhBrObJVo0O05w=; b=Yb/O66P/ZfN6l3ldKP3UnCda8TPFtfbo/O0co8hIR3E27a1ujsJ2+qpmVjBJgexvrs SfPowWUu7Gm3i+GNtWRUoj5R2op8Cla3lBvGMi5cPMw0Uklt0jduqkN4DsgzO9qQX/hc 61nw8/iooRUR1TVXiTOO2+ZlRjQl21NClC/xytE2qvQE5cg8mHhopPkohzr/brAVw/P1 IIzEmHwpIMIKsSg61kFwSXXBFsS4Pk1EIjBPEpADlHQsF32XYvtbR0oih3t5VnUFLJ/N ru3UBnBYJBL85US7EeX665w7VGeXZbv77WhwdD6QHWD8mctL8hx2ZWvkomOjuyQUQSeA hZSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=VH2ocyiB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cj11-20020a056a00298b00b0065dfb27ee3fsi3024642pfb.246.2023.07.28.05.26.10; Fri, 28 Jul 2023 05:26:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=VH2ocyiB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236422AbjG1MBn (ORCPT + 99 others); Fri, 28 Jul 2023 08:01:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52454 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232465AbjG1MBS (ORCPT ); Fri, 28 Jul 2023 08:01:18 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AC0033C31 for ; Fri, 28 Jul 2023 04:59:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1690545588; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=wkYExyrH0hmK6H5XLA8WFiWWTbpLMfoLOCPaCc3YX2s=; b=VH2ocyiB4z4LtE3e2Ge9zTZOB+haQuTg0AOH0+ZLwXmfVP2O2IEVYOcfJ4CZck4TWt283V 8URsrrTpkyfceucgxRCCF8SxNpwCMP1ZmrgRCWLnRzMjbUIUMLh9HqAbI2XXgw0SlHoKtU 11kfMCNXnNGvgbkRogcqN0o7kCqY3pg= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-230-hv_Mz3zuPv-n4WqRSpntkQ-1; Fri, 28 Jul 2023 07:59:42 -0400 X-MC-Unique: hv_Mz3zuPv-n4WqRSpntkQ-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 84A781008142; Fri, 28 Jul 2023 11:59:41 +0000 (UTC) Received: from RHTPC1VM0NT.redhat.com (unknown [10.22.8.217]) by smtp.corp.redhat.com (Postfix) with ESMTP id D70EE207B338; Fri, 28 Jul 2023 11:59:40 +0000 (UTC) From: Aaron Conole To: netdev@vger.kernel.org Cc: dev@openvswitch.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Shuah Khan , Paolo Abeni , Jakub Kicinski , Eric Dumazet , "David S. Miller" , Pravin B Shelar , Ilya Maximets Subject: [PATCH v2 net-next 0/5] selftests: openvswitch: add flow programming cases Date: Fri, 28 Jul 2023 07:59:35 -0400 Message-Id: <20230728115940.578658-1-aconole@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.4 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1772667203111506525 X-GMAIL-MSGID: 1772667203111506525 The openvswitch selftests currently contain a few cases for managing the datapath, which includes creating datapath instances, adding interfaces, and doing some basic feature / upcall tests. This is useful to validate the control path. Add the ability to program some of the more common flows with actions. This can be improved overtime to include regression testing, etc. Changes from original: 1. Fix issue when parsing ipv6 in the NAT action 2. Fix issue calculating length during ctact parsing 3. Fix error message when invalid bridge is passed 4. Fold in Adrian's patch to support key masks Aaron Conole (4): selftests: openvswitch: add an initial flow programming case selftests: openvswitch: add a test for ipv4 forwarding selftests: openvswitch: add basic ct test case parsing selftests: openvswitch: add ct-nat test case with ipv4 Adrian Moreno (1): selftests: openvswitch: support key masks .../selftests/net/openvswitch/openvswitch.sh | 223 +++++++ .../selftests/net/openvswitch/ovs-dpctl.py | 601 +++++++++++++++++- 2 files changed, 800 insertions(+), 24 deletions(-)