Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp4922845imc; Mon, 25 Feb 2019 13:43:11 -0800 (PST) X-Google-Smtp-Source: AHgI3IZ5ILt7xdOWv+Z9G8AbYFCCdz1Ioitjko59vzXp+EtawADqBthWm9Rlc+58MQZAY69723Aw X-Received: by 2002:a17:902:b60c:: with SMTP id b12mr22258742pls.261.1551130991069; Mon, 25 Feb 2019 13:43:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551130991; cv=none; d=google.com; s=arc-20160816; b=SutcpNyL/4CPi/VPXLR1LxpttBEA3q7aXZ1jj7rLcDtvWEotR5sHTq+6/X3s2f5nAh E1MrVR+u4ZfG1cX+zzMy+yez2lkPRG/l+ENtMll6UBhEgdpYVtecnvfsTZrYrJe6NUMH otoPievP/gjtpcnFq5TJ0Le40CuqDgdbfwATNZD3Z5k6DJdl/S2L/cRXGz08ITk6aESN GkYEm0JddNeyjx7tmhNGTzbA8/rTkkULMV1GuCttMwfMVow9XhBYAtmUygrxCrRTzMsq gP8KBsO5EN7uwKlAm61sh9ulyujX7QCGbdcqHRAZF02MLuYc98rX6EiQIS7OefrQvel3 Y8NQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iaUy68LzEpFRC+tC9gqmaePPg37FFdYsph/fWL3hEa4=; b=MKMLB4wgK+VWCOoMZ8H+CYfMhv5cqJvbvPyw5N+NTPJxkiEkTHFvl19yoEAOkDr5bM SUbLQgWd9eSjRg08xclX7sAOSnvjzJpZ2sXZVkDmPxslva5bffh23EnpPgBFR4er69Tl Q//ot0FbxvZXIiWk72043U0pDX4WFoazhSfKAUo6zQ5W8yp61PvI7p99fThmS9mxfMg9 979Iru4UBVHS+6WqAX9Gsvt5vFsUqSesEXxUbjGSl9gJNAOY2jKt6YqrHWZkjIZBzzRn +gnMfre7XigglDVosuttY1XsVeQ+z86V6v7THNeKeV+ndJ+pX7RD1UM6aywFv1R5Yn6A Mvog== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dwuC43Es; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l67si10919854pfc.147.2019.02.25.13.42.56; Mon, 25 Feb 2019 13:43:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dwuC43Es; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732719AbfBYVds (ORCPT + 99 others); Mon, 25 Feb 2019 16:33:48 -0500 Received: from mail.kernel.org ([198.145.29.99]:40014 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732714AbfBYVdq (ORCPT ); Mon, 25 Feb 2019 16:33:46 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7ED16217F5; Mon, 25 Feb 2019 21:33:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551130426; bh=rO8xS7Ito2a2Y9kjwbcavNGPkUSEsUmnt6y5odpuyo4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dwuC43EshIo6LitDx5KxDjDsruhncnV66MXZ9WWtOZ/M95IsY2J3vl2JX5bsiTyDv eAj6LmqQv4LqmhPBVeVy1V4w8D/il++E3jfcfil3G2WgaSjZLJfdcgJnNS5HxmUrl2 lP3KTtsLxtOxQmO9JLKEbXVI9Mz42A2V0w3lQWjU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Davide Caratti , "David S. Miller" , Sasha Levin Subject: [PATCH 4.20 100/183] selftests: tc-testing: fix tunnel_key failure if dst_port is unspecified Date: Mon, 25 Feb 2019 22:11:13 +0100 Message-Id: <20190225195111.525415106@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190225195054.748060397@linuxfoundation.org> References: <20190225195054.748060397@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 5216bd77798e2ed773ecd45f3f368dcaec63e5dd ] After commit 1c25324caf82 ("net/sched: act_tunnel_key: Don't dump dst port if it wasn't set"), act_tunnel_key doesn't dump anymore the destination port, unless it was explicitly configured. This caused systematic failures in the following TDC test case: 7a88 - Add tunnel_key action with cookie parameter Avoid matching zero values of TCA_TUNNEL_KEY_ENC_DST_PORT to let the test pass again. Signed-off-by: Davide Caratti Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- .../selftests/tc-testing/tc-tests/actions/tunnel_key.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/tc-testing/tc-tests/actions/tunnel_key.json b/tools/testing/selftests/tc-testing/tc-tests/actions/tunnel_key.json index af5e99d272296..e7e15a7336b6d 100644 --- a/tools/testing/selftests/tc-testing/tc-tests/actions/tunnel_key.json +++ b/tools/testing/selftests/tc-testing/tc-tests/actions/tunnel_key.json @@ -605,7 +605,7 @@ "cmdUnderTest": "$TC actions add action tunnel_key set src_ip 10.10.10.1 dst_ip 10.10.10.2 id 7 index 4 cookie aa11bb22cc33dd44ee55ff66aa11b1b2", "expExitCode": "0", "verifyCmd": "$TC actions get action tunnel_key index 4", - "matchPattern": "action order [0-9]+: tunnel_key.*set.*src_ip 10.10.10.1.*dst_ip 10.10.10.2.*key_id 7.*dst_port 0.*csum pipe.*index 4 ref.*cookie aa11bb22cc33dd44ee55ff66aa11b1b2", + "matchPattern": "action order [0-9]+: tunnel_key.*set.*src_ip 10.10.10.1.*dst_ip 10.10.10.2.*key_id 7.*csum pipe.*index 4 ref.*cookie aa11bb22cc33dd44ee55ff66aa11b1b2", "matchCount": "1", "teardown": [ "$TC actions flush action tunnel_key" -- 2.19.1