Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp4922731imc; Mon, 25 Feb 2019 13:43:02 -0800 (PST) X-Google-Smtp-Source: AHgI3IaESvTkLMXevisOy0/4jQh+j4m/nfxSlIblNDrXr6JYLZN/LQwvIkD6U29bkFB+0T5Oibpf X-Received: by 2002:a63:ca:: with SMTP id 193mr21135340pga.288.1551130982060; Mon, 25 Feb 2019 13:43:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551130982; cv=none; d=google.com; s=arc-20160816; b=YTGsz2gjZPM0GpgJD+Rv5h560j/P5Oh36uZu0GJk2Hu1wtTf0j4xGipVggJ+hSazUR wlWE7nHRu2uL8+BRV5D94KZxj0rhiWpdSX/hNgvShdsNFeY5JFxeSXkVlzAZP+TTlE4t dcbtHAEYUb8SB33CqBUXua2lm8z4FmYQNmn6F4Gdrq3XqRd0kVb6o+UMpkgN0HP6XV6U GoPrlwZJLVNLLD9mbX1orPwt/IhlizF6Hi4BtOLl5JG71cs6HojiDA8iK9/VjgxOMxr9 Ps2Q9j/KDKn4kHZI1lhWeqNrKpRdgdgPIl9Yk6DX2XI+7p6KZnW/M5ENzMUEVqYA7yZ4 igbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=BCd50evzuqYbjs5QjZxaMgQgNUAy2n7NhwZ856P5twc=; b=uXRSfkQUSxdRvxpc5+75eHScv/xEPV/DIPnR8GfVtDlzSeF2AOp1103chW8j8sMOuW 0NW8AXX1Olj+1zOwe/UMryCXf5yBtEBfKZR52h+yzIMig1Z6LS6mGZWM14dlkyATrDz6 /+89tihv1mw2uRE57c0pgGtuxX6U+ghmUtFTZ5KU5fOmQdhi4PaOvdSGo5GmkF0Am06f HFeT8dgRoyR3Ht49NxDJ2uzLL8Mofa1HoaH7XH2tTqlluYiv6AFzpBqKN4WgLfyUgh5P 3aEx75BlZJlkfn5VeFGnMgzh8Ia48wtH/lCoUXvyaunjFiiqQXEHKhOcdALleUmYtp0T vLTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QzcfTw8G; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b30si1712643pla.308.2019.02.25.13.42.47; Mon, 25 Feb 2019 13:43:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QzcfTw8G; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731953AbfBYVdT (ORCPT + 99 others); Mon, 25 Feb 2019 16:33:19 -0500 Received: from mail.kernel.org ([198.145.29.99]:39372 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732618AbfBYVdL (ORCPT ); Mon, 25 Feb 2019 16:33:11 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 41728217F5; Mon, 25 Feb 2019 21:33:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551130390; bh=G5OMMKDtRjJhUzz1HcuPf+H02w8U9ynK8gpKd32NCKg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QzcfTw8GJ/fL9tSkAw/0Szbw/YJbP8pjgZhoufovFxfF7royyRFsXTs9+r2g4vhfF qeHjKd46Zco+F+kW4FCoTiGX3QVSraufdlD8h6OMaX9bVShLbBszm4/7+CzXX70SKc ieiF43ELq8gu6akhMjNB/Xm7NiyOViLNTK6/wKaQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Davide Caratti , "David S. Miller" , Sasha Levin Subject: [PATCH 4.20 099/183] selftests: tc-testing: drop test on missing tunnel key id Date: Mon, 25 Feb 2019 22:11:12 +0100 Message-Id: <20190225195111.358869795@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190225195054.748060397@linuxfoundation.org> References: <20190225195054.748060397@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit e413615502a3324daba038f529932ba9a5248af0 ] After merge of commit 80ef0f22ceda ("net/sched: act_tunnel_key: Allow key-less tunnels"), act_tunnel_key does not reject anymore requests to install 'set' rules where the key id is missing. Therefore, drop the following TDC testcase: ba4e - Add tunnel_key set action with missing mandatory id parameter because it's going to become a systematic fail as soon as userspace iproute2 will start supporting key-less tunnels. Signed-off-by: Davide Caratti Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- .../tc-tests/actions/tunnel_key.json | 29 ------------------- 1 file changed, 29 deletions(-) diff --git a/tools/testing/selftests/tc-testing/tc-tests/actions/tunnel_key.json b/tools/testing/selftests/tc-testing/tc-tests/actions/tunnel_key.json index 10b2d894e4362..af5e99d272296 100644 --- a/tools/testing/selftests/tc-testing/tc-tests/actions/tunnel_key.json +++ b/tools/testing/selftests/tc-testing/tc-tests/actions/tunnel_key.json @@ -81,35 +81,6 @@ ] ] }, - { - "id": "ba4e", - "name": "Add tunnel_key set action with missing mandatory id parameter", - "category": [ - "actions", - "tunnel_key" - ], - "setup": [ - [ - "$TC actions flush action tunnel_key", - 0, - 1, - 255 - ] - ], - "cmdUnderTest": "$TC actions add action tunnel_key set src_ip 10.10.10.1 dst_ip 20.20.20.2", - "expExitCode": "255", - "verifyCmd": "$TC actions list action tunnel_key", - "matchPattern": "action order [0-9]+: tunnel_key set.*src_ip 10.10.10.1.*dst_ip 20.20.20.2", - "matchCount": "0", - "teardown": [ - [ - "$TC actions flush action tunnel_key", - 0, - 1, - 255 - ] - ] - }, { "id": "a5e0", "name": "Add tunnel_key set action with invalid src_ip parameter", -- 2.19.1