From patchwork Fri Oct 6 15:12:54 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Aaron Conole X-Patchwork-Id: 15021 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:a888:0:b0:403:3b70:6f57 with SMTP id x8csp401449vqo; Fri, 6 Oct 2023 08:14:07 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEBMVgOgth+mAKx6Ycp038JC3HUzrOZ453X9QB0rNp/sYkA2/x9xYaYWHiB9PM+7wOSZn0H X-Received: by 2002:a05:6a00:21cc:b0:68f:f6dd:e78b with SMTP id t12-20020a056a0021cc00b0068ff6dde78bmr9501377pfj.17.1696605247563; Fri, 06 Oct 2023 08:14:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696605247; cv=none; d=google.com; s=arc-20160816; b=dtBbm/GAFPCMdP9W+/nqaM5h7u35nTRQRQEjcCbqOZ90kDY3WvMrs+7GvJkCWJ15mt Jh0fm1b4kdnKHOhUh9L1v3zNIJpnFH1pPA3twkWl5QZBlI5QsWBhTW6EpD2AM+AwipvS pCZjOkn+3veF3nRtraZK8hyBD2pVYB6oejVFTkRTXKqjY8sIGkiBXdR5cFreFFVkudJu bYXLAb1QV6F0UGZWuuJxQKBcBiJ/ZkrW6pJW3H2cnk2J7TRhzrw8T9L/baugdDNJ+X4C mgmr1WsPvROl9D5gC1mc9osDUYRYBRtzkscEuDtSMSXzaPdaXK9ssmByZeDWRGLHoztc ipMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=NHY6LRSsGEtAVXNDOjO62ecbXXwm9UaRIIe77pDYtx0=; fh=MdzQONQ/gulM6swFM9amSgUVTs752ZpsSWOQLplcSFQ=; b=unOCefSJkUKjsuhY0uWRB+xZzp/Nmteb/tYY7WELAsPa3yRRVud2DW+tFtO/FHAj9o TEpjYFasH9Uhbdu1s3L5bPEh28E8yFiHClHofwzW8qa61ZYstRS+wZ4Ink1WGuTn7rUm RiMVc86BrwJaTqomJDpu6vXPNxwDVnJL6P78aY5PeoSBasQK0Ulm5AyvAnG4epZhZhMT cc52g8hQrjnU+Z8HDXBXz6UDH3Bvz873VOLUaO3wSaI2oc24Br0BKPJk+CrmqNr07dv1 zuzY4kQ3Mej+vRh6Wr1sbZsJtwEM9J/5rXKEADoGxSaveDMlMJKjJQAkUsETWjoZJ5uC 6S0A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=JrV7cKOs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id ce8-20020a056a002a0800b0068a3a2984ccsi1599698pfb.236.2023.10.06.08.14.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 06 Oct 2023 08:14:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=JrV7cKOs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 8733A80A9E15; Fri, 6 Oct 2023 08:13:59 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232718AbjJFPNo (ORCPT + 18 others); Fri, 6 Oct 2023 11:13:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56960 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230223AbjJFPNn (ORCPT ); Fri, 6 Oct 2023 11:13:43 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 913599F for ; Fri, 6 Oct 2023 08:13:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1696605181; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=NHY6LRSsGEtAVXNDOjO62ecbXXwm9UaRIIe77pDYtx0=; b=JrV7cKOspCYK3OD1wXPIQHLo8hEH3JQ0yYq+8Xt2D+hW+F/ymxocC/3DlbUyMtqVzxL5Pj W0pgS804g/l6+eqPObtV8Tph3mKib3Qz+17hgvArj10ViAOk/8y6wlwtxtOJheT5KJwDA4 ZGl5wTULlnE3NGaR/NE1yfAnKS1YFrY= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-43-ndJne-f3MimyL-7m1yU1rg-1; Fri, 06 Oct 2023 11:13:00 -0400 X-MC-Unique: ndJne-f3MimyL-7m1yU1rg-1 Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com [10.11.54.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id B244C3801EF5; Fri, 6 Oct 2023 15:12:59 +0000 (UTC) Received: from RHTPC1VM0NT.lan (unknown [10.22.33.74]) by smtp.corp.redhat.com (Postfix) with ESMTP id EB37440D1BE; Fri, 6 Oct 2023 15:12:58 +0000 (UTC) From: Aaron Conole To: netdev@vger.kernel.org Cc: dev@openvswitch.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Pravin B Shelar , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Adrian Moreno , Eelco Chaudron Subject: [PATCH net 0/4] selftests: openvswitch: Minor fixes for some systems Date: Fri, 6 Oct 2023 11:12:54 -0400 Message-Id: <20231006151258.983906-1-aconole@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.9 X-Spam-Status: No, score=2.7 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Fri, 06 Oct 2023 08:13:59 -0700 (PDT) X-Spam-Level: ** X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1779019544228430056 X-GMAIL-MSGID: 1779019544228430056 A number of corner cases were caught when trying to run the selftests on older systems. Missed skip conditions, some error cases, and outdated python setups would all report failures but the issue would actually be related to some other condition rather than the selftest suite. Address these individual cases. Aaron Conole (4): selftests: openvswitch: Add version check for pyroute2 selftests: openvswitch: Catch cases where the tests are killed selftests: openvswitch: Skip drop testing on older kernels selftests: openvswitch: Fix the ct_tuple for v4 .../selftests/net/openvswitch/openvswitch.sh | 21 ++++++++- .../selftests/net/openvswitch/ovs-dpctl.py | 46 ++++++++++++++++++- 2 files changed, 65 insertions(+), 2 deletions(-)