Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2913068ybx; Fri, 8 Nov 2019 11:11:11 -0800 (PST) X-Google-Smtp-Source: APXvYqx8hmbaJU/pBKXjbqiauCuegHmYEJCrkB8rCXTkEL4zQ84oMQmWcgjgyM9CLy1/pBM56Idz X-Received: by 2002:a17:906:9248:: with SMTP id c8mr10603406ejx.47.1573240271265; Fri, 08 Nov 2019 11:11:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573240271; cv=none; d=google.com; s=arc-20160816; b=fnoIzS7z/iBofRQU1uVVzJ2HpXvs1vlwaoGqXuFuk6H7NpMKlrRFWarQ2bIOz5KxSb 8M9dXeWReUeczojLrOUyMtdxCYp6DH489NjzFfEpOmpOm2X3FrrNCJJFhbcpae7ezf2P lSCtumH83BQVvHSPX82fxQ/PBfokgjBOzgwCMsF7ydTrk+R9o0cXJmYnsdAh6YTOcKS0 mrVpdU82qn4Coq3HtvjD83jkvOv1D8H/sQTnlSNpCogD1PpUVQ/EmJ7KSrpiiuQmm7zr tD/tmfUasHzQfG7kq+VgBgLjf4lLlgqIwMyCTdD+haU+U9/9kkIm8D4s9CdAO8sPbUgl K7Kw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=UMG/9FJhUv3cudA4fgYnMUkVnHwX43hLE2CD557TwHY=; b=RvplO5za1sBuOey8MeaRwGVBaUUX8KbOKGm3mfzCkIlFBHSmw70QZluJ778sIX7J0x JpEqLGPHs/I3Jc+RRYfXN98VRSUV13a7HWpRX9KI7eYb+LcUa20HayLMBJNekgQyI2qb E9bw9CYtGLRV/KvthiWNagG3LzaQjjBkXDwTvpQfi35MiL+hSb6CGoShj+2kred0Q/Sp MtFyGGHc4QuzkpUOHxMSgrQ2TFZEJ6oGocThhg/DPDPTgtYP/iYqi9ZVW0KzfQp0dSYb KhqHZkfeIa42PyfcZCIvodJwcib6QhV3qiyS1d+QJvDsQReZ82up+4X7DM4fq7AAdc5R qARA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0UOXMvwc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r29si6460595edb.156.2019.11.08.11.10.48; Fri, 08 Nov 2019 11:11:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0UOXMvwc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391749AbfKHTJK (ORCPT + 99 others); Fri, 8 Nov 2019 14:09:10 -0500 Received: from mail.kernel.org ([198.145.29.99]:40626 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2403778AbfKHTJI (ORCPT ); Fri, 8 Nov 2019 14:09:08 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AA94C20673; Fri, 8 Nov 2019 19:09:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573240148; bh=iTGEvDZxrrICnS95LrEyTxl2/mws/rBxyHZDzWMkPMc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0UOXMvwcn4pg4HSgDmI9oyPiGuaBObpxnY7FKKf0KnFuGknQt8jQNcFhTZ1y6yXIo BESnJAwBpjAr3pfVmSkEvLB1g7SjJ9p1oQlpzBJ4A5XXMVL5CMwAUmZNkzd/dVSUvZ rZAHO6l+f55aXLJ23MWhG9rNtOPNZOF2JY7M/BtM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Ahern , Paolo Abeni , "David S. Miller" Subject: [PATCH 5.3 104/140] selftests: fib_tests: add more tests for metric update Date: Fri, 8 Nov 2019 19:50:32 +0100 Message-Id: <20191108174911.493111725@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191108174900.189064908@linuxfoundation.org> References: <20191108174900.189064908@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paolo Abeni [ Upstream commit 37de3b354150450ba12275397155e68113e99901 ] This patch adds two more tests to ipv4_addr_metric_test() to explicitly cover the scenarios fixed by the previous patch. Suggested-by: David Ahern Signed-off-by: Paolo Abeni Reviewed-by: David Ahern Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- tools/testing/selftests/net/fib_tests.sh | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) --- a/tools/testing/selftests/net/fib_tests.sh +++ b/tools/testing/selftests/net/fib_tests.sh @@ -1438,6 +1438,27 @@ ipv4_addr_metric_test() fi log_test $rc 0 "Prefix route with metric on link up" + # explicitly check for metric changes on edge scenarios + run_cmd "$IP addr flush dev dummy2" + run_cmd "$IP addr add dev dummy2 172.16.104.0/24 metric 259" + run_cmd "$IP addr change dev dummy2 172.16.104.0/24 metric 260" + rc=$? + if [ $rc -eq 0 ]; then + check_route "172.16.104.0/24 dev dummy2 proto kernel scope link src 172.16.104.0 metric 260" + rc=$? + fi + log_test $rc 0 "Modify metric of .0/24 address" + + run_cmd "$IP addr flush dev dummy2" + run_cmd "$IP addr add dev dummy2 172.16.104.1/32 peer 172.16.104.2 metric 260" + run_cmd "$IP addr change dev dummy2 172.16.104.1/32 peer 172.16.104.2 metric 261" + rc=$? + if [ $rc -eq 0 ]; then + check_route "172.16.104.2 dev dummy2 proto kernel scope link src 172.16.104.1 metric 261" + rc=$? + fi + log_test $rc 0 "Modify metric of address with peer route" + $IP li del dummy1 $IP li del dummy2 cleanup