Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp609159pxa; Tue, 11 Aug 2020 10:31:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyCVHydx7yB36V3oluQTVxlaUONkdJm0i+b4rHMk/7LLlQ2Lc2Fw4hVJFr0R1uF9LB3OTSo X-Received: by 2002:a17:906:289a:: with SMTP id o26mr26910154ejd.309.1597167104310; Tue, 11 Aug 2020 10:31:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597167104; cv=none; d=google.com; s=arc-20160816; b=gDBzI/tW6fpBZqikPwWTX9Na8O2Na9EmZuMZLDNrx/ygwkqVw0KsZPeKa4MkyyKYBU z31rsI9HkkUdb1VDByVQj6nY7Ao1Tiy6/5CKuGwyUHa+QMnpReTPCwFnWP/6kMT2AvoZ X4NOdq3YkdJY0ryTTxqsi4G9zG0JFHVxqEbFcj2OMfKXoI8ffUif06rVMI/75arHaND7 4NsaudMjgxVmt9Nr2/KN4QL1ZcsiT+eFI+XGZuYOYSe9EALbanKCDZwj40C28idvqolh d211gp2aY8gZYH6PT0azoY0aGcTwNnLlmbfWhye0h7On5mz5FD4kw7onsYrabUaGrHlU uStA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=eKts0w9ER80Nj7Sx6ckTI/SvDI+i0rdvJhEACLfLbnw=; b=kl1YwL+DXnKoQ+5JVKHi3qpt18W2DOuc2IvM+NtkmNfBDWLTcZDx4OFldN/BmCU0eR i9pCgIBPuROGPxE9V7NMQzoQU9OgWJDFh8Q1aJE7xHfBWoenmkb3ndptKk3K/xqJJeRn de+iFaJVWTMK5QOvLczEP+Jzu0kq7wCQXdTQDMsl+dZxpSyXACDe6HzY6PLzD9hFcfeI 5CH1LhCuowErzfqqq5FJMBSjWWRsmEJA+225pnHin8QdJHxSwQRI8FEg6VRJST1j8DQk IPfSQ03LGB7ObkVYzN91meNDzAQ/jiZSzcC2NlH0Pe9aouRkU5NXeJZl04+BqSZfn+AW OYjg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i21si11972741ejz.395.2020.08.11.10.31.17; Tue, 11 Aug 2020 10:31:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729292AbgHKR27 (ORCPT + 99 others); Tue, 11 Aug 2020 13:28:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50268 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729258AbgHKR26 (ORCPT ); Tue, 11 Aug 2020 13:28:58 -0400 Received: from shards.monkeyblade.net (shards.monkeyblade.net [IPv6:2620:137:e000::1:9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 07142C06174A; Tue, 11 Aug 2020 10:28:58 -0700 (PDT) Received: from localhost (unknown [IPv6:2601:601:9f00:477::3d5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id C7DC112880A3D; Tue, 11 Aug 2020 10:12:11 -0700 (PDT) Date: Tue, 11 Aug 2020 10:28:56 -0700 (PDT) Message-Id: <20200811.102856.864544731521589077.davem@davemloft.net> To: mjeanson@efficios.com Cc: dsahern@kernel.org, linux-kernel@vger.kernel.org, mathieu.desnoyers@efficios.com, netdev@vger.kernel.org Subject: Re: [PATCH] selftests: Add VRF icmp error route lookup test From: David Miller In-Reply-To: <20200806185121.19688-1-mjeanson@efficios.com> References: <42cb74c8-9391-cf4c-9e57-7a1d464f8706@gmail.com> <20200806185121.19688-1-mjeanson@efficios.com> X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Tue, 11 Aug 2020 10:12:12 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michael Jeanson Date: Thu, 6 Aug 2020 14:51:21 -0400 > The objective is to check that the incoming vrf routing table is selected > to send an ICMP error back to the source when the ttl of a packet reaches 1 > while it is forwarded between different vrfs. > > The first test sends a ping with a ttl of 1 from h1 to h2 and parses the > output of the command to check that a ttl expired error is received. > > [This may be flaky, I'm open to suggestions of a more robust approch.] > > The second test runs traceroute from h1 to h2 and parses the output to > check for a hop on r1. > > Signed-off-by: Michael Jeanson This patch does not apply cleanly to the current net tree.