Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp5879519rwb; Tue, 22 Nov 2022 06:10:32 -0800 (PST) X-Google-Smtp-Source: AA0mqf5kALEbG8k+5DA/fo9zt4a6vIXR99Anyw2maAdYGmniwjF40ks7/mWLVhjF+PCxXVS6dBDb X-Received: by 2002:a17:90a:8a86:b0:212:ec84:91d9 with SMTP id x6-20020a17090a8a8600b00212ec8491d9mr32553045pjn.139.1669126232326; Tue, 22 Nov 2022 06:10:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669126232; cv=none; d=google.com; s=arc-20160816; b=rTFGktaB2+8D34tTanF/N9Z23njNf/E+5uXYKGck6sztZXzAZL6+Elxt5e3+jYrdAF Jb4TK5jBYV++Cf2OkBueIE9YWOFLxegdxaX2njmDJKm3wdcbmESPRm0KWHrkjfyT9Uni OA5ZLgBI4WodVB2kNqHf+fFHA60RlXUIPXU27TeNa7M4FDFqLZppxE8S89hLtO9cuOxh D5tfwrDTKTC2wtlYuSbgbT8FRQhmPAxrAjGMTFSZYaYerUyljYKfKV4FwrDP5PwwX8Kf 4lPwJnPHINx6A9SoZDESgLITC5rBSRK+XND/MAJD9pf4kki8SojcZ4Es6SMzfzzM4GqA s5Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=FiZt6CO0d2Q/fNRLdOiB+spVHV87735/SJe/WQ/NZzg=; b=sfJXGfl+jfqZv7SiwgsK9Nf8oBNwDYEwTln9K1MzWbMFh+xmSpu5nQk9dotDTeyB/Y wfDKcx0+0bTuq0xHXx+oJfylNb8M9LzdqfI49tfW2YyqFoWa6kkn1fVReg6oiDPuG7Mm /lCFDpEubUb2PL6W/m3M1qsqDZzSlYbbRnn25SSj35uj5XUlxQgjO8Gx1VXRln3Agd38 QQ6dxJptAZfieO1U4YKy7qP3j4R4wfEnXXutm5SDGCwjS0pJFAIOaQIU3slGf6MZIL+j mFuS5k39po/5x9qmtJmvpqXm3+tcGch55aWPruVNJo+qS3FDYZ8gKo4BnPBH0587TaTP F7Pw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZK9QIdWD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y27-20020a63181b000000b0047698f9d889si14037130pgl.188.2022.11.22.06.10.19; Tue, 22 Nov 2022 06:10:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZK9QIdWD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233995AbiKVOF6 (ORCPT + 91 others); Tue, 22 Nov 2022 09:05:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55766 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233976AbiKVOFO (ORCPT ); Tue, 22 Nov 2022 09:05:14 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 58B381EEFF for ; Tue, 22 Nov 2022 06:03:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1669125796; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=FiZt6CO0d2Q/fNRLdOiB+spVHV87735/SJe/WQ/NZzg=; b=ZK9QIdWDVtosfcG8457VQvFEXexdYFE1GWIm/cabYV2+KvJCty5zOM5eTC+uXf4Ho0na9P +hSWIEaV/PER8np1yvGYF97ExQIJJsBkg68s9VM3lk9GmTM/7CtDTIeoRCtSORRWRGibYm KDY38ZzkIAym5W3EodLpQMnzxFIa7Lo= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-609-KbIRkdF1M_2eJfwfZ3i_ZA-1; Tue, 22 Nov 2022 09:03:14 -0500 X-MC-Unique: KbIRkdF1M_2eJfwfZ3i_ZA-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com [10.11.54.2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 73174801585; Tue, 22 Nov 2022 14:03:13 +0000 (UTC) Received: from RHTPC1VM0NT.redhat.com (unknown [10.22.16.203]) by smtp.corp.redhat.com (Postfix) with ESMTP id DE54040C6EC6; Tue, 22 Nov 2022 14:03:11 +0000 (UTC) From: Aaron Conole To: netdev@vger.kernel.org Cc: Pravin B Shelar , Jakub Kicinski , "David S. Miller" , Paolo Abeni , Eric Dumazet , Thomas Graf , dev@openvswitch.org, Eelco Chaudron , Ilya Maximets , Shuah Khan , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: [RFC net-next 4/6] selftests: openvswitch: adjust datapath NL message Date: Tue, 22 Nov 2022 09:03:05 -0500 Message-Id: <20221122140307.705112-5-aconole@redhat.com> In-Reply-To: <20221122140307.705112-1-aconole@redhat.com> References: <20221122140307.705112-1-aconole@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.2 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The netlink message for creating a new datapath takes an array of ports for the PID creation. This shouldn't cause much issue but correct it for future messages where we need to do decode of datapath information that could include the per-cpu PID map Fixes: 25f16c873fb1 ("selftests: add openvswitch selftest suite") Signed-off-by: Aaron Conole --- tools/testing/selftests/net/openvswitch/ovs-dpctl.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/net/openvswitch/ovs-dpctl.py b/tools/testing/selftests/net/openvswitch/ovs-dpctl.py index d654fe1fe4e6..fe14da358901 100644 --- a/tools/testing/selftests/net/openvswitch/ovs-dpctl.py +++ b/tools/testing/selftests/net/openvswitch/ovs-dpctl.py @@ -71,7 +71,7 @@ class OvsDatapath(GenericNetlinkSocket): nla_map = ( ("OVS_DP_ATTR_UNSPEC", "none"), ("OVS_DP_ATTR_NAME", "asciiz"), - ("OVS_DP_ATTR_UPCALL_PID", "uint32"), + ("OVS_DP_ATTR_UPCALL_PID", "array(uint32)"), ("OVS_DP_ATTR_STATS", "dpstats"), ("OVS_DP_ATTR_MEGAFLOW_STATS", "megaflowstats"), ("OVS_DP_ATTR_USER_FEATURES", "uint32"), @@ -141,7 +141,7 @@ class OvsDatapath(GenericNetlinkSocket): msg["attrs"].append(["OVS_DP_ATTR_USER_FEATURES", dpfeatures]) if not shouldUpcall: - msg["attrs"].append(["OVS_DP_ATTR_UPCALL_PID", 0]) + msg["attrs"].append(["OVS_DP_ATTR_UPCALL_PID", [0]]) try: reply = self.nlm_request( -- 2.34.3