Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp913770rwb; Fri, 23 Sep 2022 06:01:07 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6/kj2lxsp+ec9uOXNa52GeClW2GG19MQXRlp+eCuGD68XotC8aUywIPJyofLRDBYH92Qs9 X-Received: by 2002:a05:6402:249f:b0:453:eb1b:1f8b with SMTP id q31-20020a056402249f00b00453eb1b1f8bmr8252271eda.235.1663938067324; Fri, 23 Sep 2022 06:01:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663938067; cv=none; d=google.com; s=arc-20160816; b=g7EQms76z177mD16+zBNoGbUJMR3+JB6Ks2BDeEB1tN1atTFOaYaeC/bLF2qTPvkQp SWelqRZhjZGsrf2K0XTp6t3N6r37jivS/w/VXm18vdqqflb3BSBkjFSlEvaqiUko9etj yCcUUx+e0ArDCBFjmWFOY5OzKgamTAsjnqGZDohPxFTBN0MRcjLn33OlfzxoONMcpZkX ubYdbRdZfCkC8izT5LBtSjfpVTjuu4VCtLRQKDgnBAxS9GLd9KDP3NkOjPxk8N9m4AyE 9dynbdtpD8dOJkv1E0ApcvLZjE/J5z/FgL0yai2/O/p4ec6dyaipCWmG23DL9jzZsWeP SYng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:message-id:user-agent :references:in-reply-to:subject:cc:to:from:date:mime-version; bh=/cClqTvUuq3iX7WcmxXNl8mJjCSaz2p+Wk5bu0RPkM4=; b=Mudv+Fe8s6au3ptla9d9Mf5ClOTt8mRcH+9fBOzFfNj2EeLqAQLSGPdAy96ph7mIfE NDsQ39M0Qj5XbRckfXyDjpSM6QWRCCdNDIDJqOSa2HtI0J/CnUHwF1v5N3Hc9Vcdvnuu oyB0D9eheACxjuyA8wHdlHJVDBJrPB5o3+iGGdeJ/aafmdBnEe/tN5eNaUnYlUzM3dSw WCF2SlCP769RyTPDNYURzXa7898koyh3x7xDmyuwuNQn15LdmAFl+LviLR0vjsBxwAcV 71b7+MTR/LfGIUPEwyvsEZ7HYTXmn5dvqyTbVdnEPpi4cVCqE/DYTqepRqCVQl6Lacr2 9ing== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id he36-20020a1709073da400b00734b2821879si8518171ejc.898.2022.09.23.06.00.27; Fri, 23 Sep 2022 06:01:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232253AbiIWMIZ (ORCPT + 99 others); Fri, 23 Sep 2022 08:08:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231213AbiIWMGN (ORCPT ); Fri, 23 Sep 2022 08:06:13 -0400 Received: from mailout-taastrup.gigahost.dk (mailout-taastrup.gigahost.dk [46.183.139.199]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8F78618B19; Fri, 23 Sep 2022 05:01:45 -0700 (PDT) Received: from mailout.gigahost.dk (mailout.gigahost.dk [89.186.169.112]) by mailout-taastrup.gigahost.dk (Postfix) with ESMTP id 2E9BD1884FE3; Fri, 23 Sep 2022 12:01:44 +0000 (UTC) Received: from smtp.gigahost.dk (smtp.gigahost.dk [89.186.169.109]) by mailout.gigahost.dk (Postfix) with ESMTP id 1D698250064E; Fri, 23 Sep 2022 12:01:44 +0000 (UTC) Received: by smtp.gigahost.dk (Postfix, from userid 1000) id 0C3EC9EC0005; Fri, 23 Sep 2022 12:01:44 +0000 (UTC) X-Screener-Id: 413d8c6ce5bf6eab4824d0abaab02863e8e3f662 MIME-Version: 1.0 Date: Fri, 23 Sep 2022 14:01:43 +0200 From: netdev@kapio-technology.com To: Ido Schimmel Cc: Vladimir Oltean , davem@davemloft.net, kuba@kernel.org, netdev@vger.kernel.org, Florian Fainelli , Andrew Lunn , Vivien Didelot , Eric Dumazet , Paolo Abeni , Kurt Kanzenbach , Hauke Mehrtens , Woojung Huh , UNGLinuxDriver@microchip.com, Sean Wang , Landen Chao , DENG Qingfang , Matthias Brugger , Claudiu Manoil , Alexandre Belloni , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Nikolay Aleksandrov , Shuah Khan , Christian Marangi , Daniel Borkmann , Yuwei Wang , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mediatek@lists.infradead.org, bridge@lists.linux-foundation.org, linux-kselftest@vger.kernel.org Subject: Re: [PATCH v5 net-next 6/6] selftests: forwarding: add test of MAC-Auth Bypass to locked port tests In-Reply-To: References: <5cee059b65f6f7671e099150f9da79c1@kapio-technology.com> <8dfc9b525f084fa5ad55019f4418a35e@kapio-technology.com> <20220908112044.czjh3xkzb4r27ohq@skbuf> <152c0ceadefbd742331c340bec2f50c0@kapio-technology.com> <20220911001346.qno33l47i6nvgiwy@skbuf> <15ee472a68beca4a151118179da5e663@kapio-technology.com> <086704ce7f323cc1b3cca78670b42095@kapio-technology.com> User-Agent: Gigahost Webmail Message-ID: <60d7733e1134dfeebf82306d44209f14@kapio-technology.com> X-Sender: netdev@kapio-technology.com Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-09-21 09:15, Ido Schimmel wrote: > # Check blackhole entries can be replaced. > bridge fdb replace `mac_get $h2` dev $swp2 master static > bridge fdb get `mac_get $h2` br br0 | grep -q blackhole > check_fail $? "Blackhole entry found after replacement" > I am quite in doubt if the driver will be able to overwrite a blackhole entry added by userspace as the replace action must be to delete and then add the replacement afaics, but a NEWNEIGH event using port_fdb_add() will not succeed with that using the ops I use now. Otherwise it has be all with port_fb_add() with new lists keeping the userspace added blackhole fdb entries.