Message ID | 20181119161006.5405-9-idosch@mellanox.com (mailing list archive) |
---|---|
State | Accepted |
Commit | 5852fd07c441bc7c2e720440d8df2e2b80aea58b |
Headers | show
Return-Path: <linux-kselftest-owner@kernel.org> Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 5985F6C5 for <patchwork-linux-kselftest@patchwork.kernel.org>; Mon, 19 Nov 2018 16:11:32 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 4942A2A0DC for <patchwork-linux-kselftest@patchwork.kernel.org>; Mon, 19 Nov 2018 16:11:32 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 3BE752A0FD; Mon, 19 Nov 2018 16:11:32 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.0 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id C3CC32A0DC for <patchwork-linux-kselftest@patchwork.kernel.org>; Mon, 19 Nov 2018 16:11:31 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730016AbeKTCfa (ORCPT <rfc822;patchwork-linux-kselftest@patchwork.kernel.org>); Mon, 19 Nov 2018 21:35:30 -0500 Received: from mail-eopbgr10049.outbound.protection.outlook.com ([40.107.1.49]:48096 "EHLO EUR02-HE1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730008AbeKTCfa (ORCPT <rfc822;linux-kselftest@vger.kernel.org>); Mon, 19 Nov 2018 21:35:30 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Mellanox.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=eWwe2R3vA648CNr9+4RqwhCG6kY5P/O4mdIQ3BOfsis=; b=iqI+ypPyNaKZGH18q9pSSms3gNS9RUBUEcBKDTajmsv9TSzHPEfJIYZnofB16x6xQJI+sLTfKVQs8UP91p55RXitjs/ckKbcn/RzxRGDliT555RtJH4XuF/NfwH/7fKxjiZpwyzbI3BTmB2IIrlrOqMmEATB1NKJ4jYbQYU4vnQ= Received: from AM0PR05MB4978.eurprd05.prod.outlook.com (20.177.42.95) by AM0PR05MB6225.eurprd05.prod.outlook.com (20.178.115.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1294.30; Mon, 19 Nov 2018 16:11:16 +0000 Received: from AM0PR05MB4978.eurprd05.prod.outlook.com ([fe80::f953:cde4:ff8d:501a]) by AM0PR05MB4978.eurprd05.prod.outlook.com ([fe80::f953:cde4:ff8d:501a%4]) with mapi id 15.20.1339.026; Mon, 19 Nov 2018 16:11:16 +0000 From: Ido Schimmel <idosch@mellanox.com> To: "netdev@vger.kernel.org" <netdev@vger.kernel.org>, "linux-kselftest@vger.kernel.org" <linux-kselftest@vger.kernel.org> CC: "davem@davemloft.net" <davem@davemloft.net>, "shuah@kernel.org" <shuah@kernel.org>, Jiri Pirko <jiri@mellanox.com>, Petr Machata <petrm@mellanox.com>, "roopa@cumulusnetworks.com" <roopa@cumulusnetworks.com>, mlxsw <mlxsw@mellanox.com>, Ido Schimmel <idosch@mellanox.com> Subject: [PATCH net-next 08/18] selftests: forwarding: vxlan_bridge_1d: Add ping test Thread-Topic: [PATCH net-next 08/18] selftests: forwarding: vxlan_bridge_1d: Add ping test Thread-Index: AQHUgCJ/MqZhxTFON06LBinLn+jlOA== Date: Mon, 19 Nov 2018 16:11:15 +0000 Message-ID: <20181119161006.5405-9-idosch@mellanox.com> References: <20181119161006.5405-1-idosch@mellanox.com> In-Reply-To: <20181119161006.5405-1-idosch@mellanox.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: AM5PR0601CA0031.eurprd06.prod.outlook.com (2603:10a6:203:68::17) To AM0PR05MB4978.eurprd05.prod.outlook.com (2603:10a6:208:d0::31) authentication-results: spf=none (sender IP is ) smtp.mailfrom=idosch@mellanox.com; x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [193.47.165.251] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;AM0PR05MB6225;6:2oscMJaSxQ2dv+qBWWhO2KfeZvICTzAWt4byfsGqDGYkHFLNlr+GKht/jWH58bjy+MepXGUbP/FM3ODBI0CSYhibkSop87Vjjfts2XwwuwW8U/DdU6w8Y4X6z6yve++1pvwRKkvmCR9xacfKWEEqcIYtdaiLj8XXUY5OGpFto10oH369TMANg1jkOLUe5g4hImmsP+EnTodnJd3vn7LUxJQR2C+c7SuXlV3RB3Pa0qjNPpM62WjS9kg19GN07k0iWeJkBg3fNg3qdbE3oswvXDXtr7/CP8TSVbt3QttWS/nnKdV9mV1reQpzRwxU+81mGvAT0UhVlriqn/M6rpq01S59Mjin0u6EiEKGIRQPn4Z+uIjROA6UUFetnSdGQqirwz6DN+DHLQsTtAkQvhkbaktBg8n1UF5tgii6uAUhw3y9rgkd1/47CKVwhTCNox7r+TDEwNcXt7ucZizefg0r0A==;5:QEhS53JXqKH6RaVLUQ0Q4PzfYoRjoYbk+bTeK6FC8leMpl/RMRYvDR4Ux8zL09YNekpuE9n+wFRO/pywmA72wQDrnTyhJGoe85jTYq7pbrmfUiHV4T5HMtOgwnBrsNnYH0wz8fC+rYxkYFpl6rLHJ5IxTauRfqO+gcqlCNHXa7M=;7:5Qv6nGShQFJ9/CiugMECtqn8Lz76j1aJ2bOtB9FtwJKGTMRYrzU+3vQGqGu9W7FmfNBRwgLycwVqcLrKhnXDqNlGAkGw9c0Fv3E2DQHuam2cJ+QiMeAPCGm7oduRM9dCcrRxiwLTjUbr9MC5pz2Tmg== x-ms-office365-filtering-correlation-id: 64167321-6999-4f3e-76d6-08d64e39a1f7 x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: BCL:0;PCL:0;RULEID:(2390098)(7020095)(4652040)(8989299)(5600074)(711020)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020);SRVR:AM0PR05MB6225; x-ms-traffictypediagnostic: AM0PR05MB6225: x-microsoft-antispam-prvs: <AM0PR05MB6225A4C1FC478C5DDEB2D570BFD80@AM0PR05MB6225.eurprd05.prod.outlook.com> x-exchange-antispam-report-test: UriScan:; x-ms-exchange-senderadcheck: 1 x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(10201501046)(3002001)(3231415)(944501410)(52105112)(6055026)(148016)(149066)(150057)(6041310)(20161123564045)(20161123562045)(20161123560045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699051)(76991095);SRVR:AM0PR05MB6225;BCL:0;PCL:0;RULEID:;SRVR:AM0PR05MB6225; x-forefront-prvs: 08617F610C x-forefront-antispam-report: SFV:NSPM;SFS:(10009020)(346002)(136003)(39860400002)(366004)(376002)(396003)(189003)(199004)(71200400001)(71190400001)(478600001)(110136005)(54906003)(316002)(386003)(102836004)(14454004)(2906002)(2501003)(107886003)(26005)(97736004)(25786009)(256004)(14444005)(4326008)(53936002)(6512007)(105586002)(68736007)(106356001)(1076002)(8676002)(186003)(3846002)(2900100001)(446003)(6116002)(6486002)(7736002)(6436002)(486006)(305945005)(76176011)(52116002)(2616005)(6506007)(36756003)(99286004)(66066001)(81156014)(81166006)(11346002)(86362001)(8936002)(5660300001)(476003);DIR:OUT;SFP:1101;SCL:1;SRVR:AM0PR05MB6225;H:AM0PR05MB4978.eurprd05.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;MX:1;A:1; received-spf: None (protection.outlook.com: mellanox.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: ppXMwrUQtFnSe10zqAvIbOFY4rbJyLXRFGxZIPbw/LulRhzpZpeAkiZCLmoGlGjM4+g4CmjuhfoGCzzOOZcBAv/Pub9/HD4DbsA0XkUe1Ee0pxItMfiUE2vHJm9UJEtGzPDD8zn7QZ2KvhsH9IpHbVTEqiCB9fQbkzgsNGihAnmSETxaCqb3t6uTMptVhkuYiIoyzC/0Y7R1wYadt2udGw/pQljsFluB8sbCVnh0eU/O6G5xNa33LFfpJ5bVmkcEQD7wal16SRjSuum8ufSYtCtkPWqGntT/xzfkV52d0y5fU6xPaYPJ/2BXitE6HTe3EmTq78UztSdPJ3/xpimUtqwCc0OXlc5rsXelZM25zxA= spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: Mellanox.com X-MS-Exchange-CrossTenant-Network-Message-Id: 64167321-6999-4f3e-76d6-08d64e39a1f7 X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Nov 2018 16:11:15.9837 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: a652971c-7d2e-4d9b-a6a4-d149256f461b X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR05MB6225 Sender: linux-kselftest-owner@vger.kernel.org Precedence: bulk List-ID: <linux-kselftest.vger.kernel.org> X-Mailing-List: linux-kselftest@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP |
Series |
selftests: Add tests for VXLAN at an 802.1d bridge
|
expand
|
diff --git a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh index af88e1c146a7..0e3d7abc70d3 100755 --- a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh +++ b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh @@ -65,6 +65,7 @@ export VXPORT : ${ALL_TESTS:=" + ping_ipv4 "} NUM_NETIFS=6 @@ -281,6 +282,13 @@ cleanup() vrf_cleanup } +ping_ipv4() +{ + ping_test $h1 192.0.2.2 ": local->local" + ping_test $h1 192.0.2.3 ": local->remote 1" + ping_test $h1 192.0.2.4 ": local->remote 2" +} + test_all() { echo "Running tests with UDP port $VXPORT"