Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp1050347rdg; Wed, 11 Oct 2023 12:51:50 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFgiC2fqX1Rwt+n5q9r1uJ2BgusXvK7MNf9n1WoFboVKQMUVfXJa/aR7EtzB9cYUYjeMflw X-Received: by 2002:a05:6358:5e0f:b0:142:fd2b:da2e with SMTP id q15-20020a0563585e0f00b00142fd2bda2emr25084040rwn.31.1697053910235; Wed, 11 Oct 2023 12:51:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697053910; cv=none; d=google.com; s=arc-20160816; b=HtlLduWntLqHNTGUlMP3dS1ZoWZ6yvUjJ+xTdLcKSvRM9GjqgrUSpi+IctTCpSx6A1 h8MpRghkqApQahwgQG5y+V/XaSxAfsbyQnn7XGBz7TzXtudoKgd9FqYWur0yMtns0nqD /a++fhvxptKDzziGmlePPZS0BTz4Y15OF5I+Ed4Ldh5TQOGtASQSmuugBm0A/j2Ud0KH zIrV2SkU4FBWPDJ2S3iYKfpGwycGl3LfEUywtQF//Of/MVVrJ2SSeM6raP+NeLC9+JuT aT9m6oyqhnzPCwD4Z1BbLlIa2tFavqWbe1m7IHfPPU/XOskIuCeP7lpc5YzwtmhrXauK 4sRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=KKHk9hX32NvUAjpB6c62OJCCjOws1Nm9GPb/DcDj7CQ=; fh=88nBSjTOrhHvyQS3Sgn//fCA45rCHSUCvyWdnfpu45A=; b=iXuqojkK+6zSjrYox9hMpFL/nGpGMFfNMIm1fFiV4qjwz7S7v5g3H9csLC7c9ZJatc PUM6tGiz46jD28FUhwIqTRbGbSLAicsoKAHCgiFAhaUxBRBvN16iTCSPtZi1rw+PjyL7 jv3hJB94JImUM4F07knmtjzuYphnVJVsTfHkk1Er3QKHjf7BrETsTseuHwb96V8phD6P b+RlL58m3BPUO6RMtN3Gz58f72xVQI67AoLvuRYB66buL2mP4E6xor5aJVN9yIlYIgP2 LLitNpm1D/Ctgy9D04mAejECrOE/7T26cTc4fjot81PAGOd1fnzOAsWY+yD0dPAk54qL xuuA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=euZaLyA0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id w63-20020a638242000000b0058988971b64si428781pgd.266.2023.10.11.12.51.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Oct 2023 12:51:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=euZaLyA0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 8DF6A833D570; Wed, 11 Oct 2023 12:51:47 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346876AbjJKTvY (ORCPT + 99 others); Wed, 11 Oct 2023 15:51:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235036AbjJKTvW (ORCPT ); Wed, 11 Oct 2023 15:51:22 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B6F81CC for ; Wed, 11 Oct 2023 12:49:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1697053790; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=KKHk9hX32NvUAjpB6c62OJCCjOws1Nm9GPb/DcDj7CQ=; b=euZaLyA0dbx04Nlm9P8T5YliyslssAVzOPPhXxemHnN5Yo06TAbPwF4b7d7ONPwq8BV/wY 11RtFT3OENdcJZSY9rQ18wjs9EZ5oGAA7FFrdf1L5PGoMp4zFkVc6U11Nj035NSgXy8Hjm eYzxvASp/SFPWyeqKlugXVd8sx8/DsY= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-690-8gTFy7U0MGaSpUNUzKimcQ-1; Wed, 11 Oct 2023 15:49:45 -0400 X-MC-Unique: 8gTFy7U0MGaSpUNUzKimcQ-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id E0BC41C0BB40; Wed, 11 Oct 2023 19:49:44 +0000 (UTC) Received: from RHTPC1VM0NT.lan (unknown [10.22.34.140]) by smtp.corp.redhat.com (Postfix) with ESMTP id 284E01C060B5; Wed, 11 Oct 2023 19:49:44 +0000 (UTC) From: Aaron Conole To: netdev@vger.kernel.org Cc: dev@openvswitch.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Pravin B Shelar , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Adrian Moreno , Eelco Chaudron , shuah@kernel.org Subject: [PATCH net v2 4/4] selftests: openvswitch: Fix the ct_tuple for v4 Date: Wed, 11 Oct 2023 15:49:39 -0400 Message-ID: <20231011194939.704565-5-aconole@redhat.com> In-Reply-To: <20231011194939.704565-1-aconole@redhat.com> References: <20231011194939.704565-1-aconole@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.7 X-Spam-Status: No, score=2.7 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Wed, 11 Oct 2023 12:51:47 -0700 (PDT) X-Spam-Level: ** The ct_tuple v4 data structure decode / encode routines were using the v6 IP address decode and relying on default encode. This could cause exceptions during encode / decode depending on how a ct4 tuple would appear in a netlink message. Caught during code review. Fixes: e52b07aa1a54 ("selftests: openvswitch: add flow dump support") Signed-off-by: Aaron Conole --- v2: More detailed explanation for fix. tools/testing/selftests/net/openvswitch/ovs-dpctl.py | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/tools/testing/selftests/net/openvswitch/ovs-dpctl.py b/tools/testing/selftests/net/openvswitch/ovs-dpctl.py index 10b8f31548f84..b97e621face95 100644 --- a/tools/testing/selftests/net/openvswitch/ovs-dpctl.py +++ b/tools/testing/selftests/net/openvswitch/ovs-dpctl.py @@ -1119,12 +1119,14 @@ class ovskey(nla): "src", lambda x: str(ipaddress.IPv4Address(x)), int, + convert_ipv4, ), ( "dst", "dst", - lambda x: str(ipaddress.IPv6Address(x)), + lambda x: str(ipaddress.IPv4Address(x)), int, + convert_ipv4, ), ("tp_src", "tp_src", "%d", int), ("tp_dst", "tp_dst", "%d", int), -- 2.41.0