From patchwork Tue Jun 20 13:55:48 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Machata X-Patchwork-Id: 694644 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6A0B9EB64D8 for ; Tue, 20 Jun 2023 13:56:54 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231315AbjFTN4x (ORCPT ); Tue, 20 Jun 2023 09:56:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53810 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230490AbjFTN4w (ORCPT ); Tue, 20 Jun 2023 09:56:52 -0400 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2040.outbound.protection.outlook.com [40.107.236.40]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8732DA2; Tue, 20 Jun 2023 06:56:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XF42j/VjsTkd5jiORnGggVhkv8045kKJckvJLIVex2tjiI6u7I6o0ZKDc92ctGGvNqnkEz0tuXanzHlyyzh6LdaLppKZ+yUzuVdITYU9ETxQsdmTaDDZqg1/TX1aLr8zs5bKYi/C9tmQwN0g5UZg6LGIhdB97b3NAaqjPVH9LZ2XLvkc7fa9w9T6PyWBbr9Xl8B7u2pTTp/hjAc2q1xuxzQLPnNrAbUqcHzEMxpRTq53AeJmrQedeEpItCGuYAoW3Ci+xVj9SV9XzyRIpsLiJgagecaECWDX3f9uDxN+9xgZlhypJmy/lbc3wmVa0l7WGjBPfWT7aRvzS1WBWwW2kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=QbIkZBZ1ilkaoKN/V8acfhsJ7LM1HVj4j4+snS+ul1o=; b=KqLPyKM7t/sYN1Q7fbAj7ZUY1urcVze5XPl45Db6Dd0ShyBpDj3r4XxYjW6Jh1wfmKXOSxyOlBq5l3pBcGAPFVUruipPVEJyLmVDOiMbOEPr0Qy1RZy9yj3l7WJSb0dcQ4Xlbty2iOxHKO1Aq7vQc1nOX0Akr+ZvRMYrnv1l3v6yAlA9C2xxBHpB50anl7RW0mObgh3sZEDlVg4cHMHfpnGXpyoE/3qDCJ3QrCghFy0LgQwzWu3DqMaKe5pS9xO+sAXNvW5N7R7oKZIAL+ouDs3ULSI8TKz3DaOwmgiBflMNaNU84zzekAEDRSUBB3N8ttqpugkZ9ioEkAL/+iIPIw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=davemloft.net smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QbIkZBZ1ilkaoKN/V8acfhsJ7LM1HVj4j4+snS+ul1o=; b=ivq4umzxajZVslQHJ72PRFYAiJ6ybYqU7Ks+PjBKose0vuIfynaYQIn7MMj3RaUR8KAUGVXoP+iIPLT1zybBUPw85GMw8HSXPzPEyRa0jsgpTIGrMAUqRSkrGq7AE8BuMPT7RzuVyIOICbm4GupcqnVc4ZJsFcp5GoYgV4V6nQrzf7A8QBBa9utdKeGOH0bIJRGI55VTq9VFPM04d/GC65tWglVevBS67sdxs4P5K/cKsCojj/l7t1/vwbHlDuWTAhJLSRm66eXRlSX3HZqCmDmYhNRyY75wQLL7vFa8Kqx8EbwgvQ9/baMxvPRg/9h37ZpPFV1vyqau/RlySanAHQ== Received: from BN9P221CA0010.NAMP221.PROD.OUTLOOK.COM (2603:10b6:408:10a::13) by MN2PR12MB4390.namprd12.prod.outlook.com (2603:10b6:208:26e::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37; Tue, 20 Jun 2023 13:56:48 +0000 Received: from BN8NAM11FT077.eop-nam11.prod.protection.outlook.com (2603:10b6:408:10a:cafe::dd) by BN9P221CA0010.outlook.office365.com (2603:10b6:408:10a::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:56:48 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.160) by BN8NAM11FT077.mail.protection.outlook.com (10.13.177.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6477.29 via Frontend Transport; Tue, 20 Jun 2023 13:56:48 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Tue, 20 Jun 2023 06:56:32 -0700 Received: from yaviefel.vdiclient.nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Tue, 20 Jun 2023 06:56:26 -0700 From: Petr Machata To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , CC: Petr Machata , Ido Schimmel , Danielle Ratson , Amit Cohen , Shuah Khan , , Subject: [PATCH net-next 02/16] selftests: forwarding: dual_vxlan_bridge: Disable IPv6 autogen on bridges Date: Tue, 20 Jun 2023 15:55:48 +0200 Message-ID: X-Mailer: git-send-email 2.40.1 In-Reply-To: References: MIME-Version: 1.0 X-Originating-IP: [10.126.230.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT077:EE_|MN2PR12MB4390:EE_ X-MS-Office365-Filtering-Correlation-Id: 3eac0015-12da-4b4f-b392-08db7196311b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: WRfmb2IyXkpnVth1s6ZlHVio35VXIR/HiIm9iN3GRSlZUKwiZIOokJtnq62fi2xYCkRRUty2ojE+1HpEo2KduLMD4ABrC1gDDtL3H93J32WGOy1xNM76GisKYkv/3TW+n8vWU+b3lzTXCq22FyzAN4sJdI35pGyqH143y6u+5zW5TLG9xH7Cp9gAiTdJtL8u+AzG/z8NKlXlby1inovVJNW1VeOyPGTxDo4vx34TvBue0cWdnRtIP5uaY+mGdK/L+yd3Ei8JzKRi3n9SKWKjf6GNVsUBdaXcqlnXgKMIDi9trxkkd+gCxn76Hr/RGu0hqrObYd37mYQhNcSfw6XkYwUfpkdvMAS5LX/LdrD4gEnVLAv8xx7PgsXInw0Ss04xSnmER7ghlIRWNiPlZGj0qHmR7E5udKO15mzGe9yxxOXHTDHNj8CTjWM6lMlP7jIrnHRyIS+/DfqVtt9+OEWeE8Hgw+PD+MjV0PHr3SBqepTy+z8hjchqV30DIECYCeDKT+5HNNIWBlaLGSPchGLRHQ3Zez/Pteej5tE6VdFo7kIfOcHCEa8m/N+ApehrV+8+yxFFNXA0zRX2YABf2Aggu23vj4oB5rba3Q37MjkEORuVipLBJIUD88F+Fm/gSSoTUnqWRqP3El0NIUXQdlDcJ5nSNPH/Dq5FHcJ/iacdyGYCyFA86x4WlDE2VNnhQdJ3jEDQHp/I8kbz0vaZcEgyw8/HbiIQ4vigtnv5/gHP89WXiI7xKrmvDS9xJk+RGSnq X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(376002)(346002)(39860400002)(136003)(396003)(451199021)(40470700004)(36840700001)(46966006)(40460700003)(7696005)(6666004)(478600001)(66574015)(47076005)(26005)(16526019)(186003)(107886003)(336012)(426003)(2616005)(36756003)(82310400005)(86362001)(82740400003)(356005)(7636003)(40480700001)(36860700001)(8936002)(41300700001)(8676002)(5660300002)(316002)(4326008)(2906002)(70586007)(70206006)(54906003)(110136005); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jun 2023 13:56:48.4114 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3eac0015-12da-4b4f-b392-08db7196311b X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT077.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR12MB4390 Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org In a future patch, mlxsw will start adding RIFs to uppers of front panel port netdevices, if they have an IP address. This will cause this selftest to fail spuriously. The swp enslavement to the 802.1ad bridge is not allowed, because RIFs are not allowed to be created for 802.1ad bridges, but the address indicates one needs to be created. Fix by disabling automatic IPv6 address generation for the HW-offloaded bridge in this selftest, thus exempting it from mlxsw router attention. Signed-off-by: Petr Machata Reviewed-by: Amit Cohen --- tools/testing/selftests/net/forwarding/dual_vxlan_bridge.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/testing/selftests/net/forwarding/dual_vxlan_bridge.sh b/tools/testing/selftests/net/forwarding/dual_vxlan_bridge.sh index 5148d97a5df8..68ee92df3e07 100755 --- a/tools/testing/selftests/net/forwarding/dual_vxlan_bridge.sh +++ b/tools/testing/selftests/net/forwarding/dual_vxlan_bridge.sh @@ -132,6 +132,7 @@ switch_create() #### BR1 #### ip link add name br1 type bridge vlan_filtering 1 \ vlan_protocol 802.1ad vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br1 addrgenmode none # Make sure the bridge uses the MAC address of the local port and not # that of the VxLAN's device. ip link set dev br1 address $(mac_get $swp1) From patchwork Tue Jun 20 13:55:49 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Machata X-Patchwork-Id: 694643 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B088BEB64D7 for ; Tue, 20 Jun 2023 13:56:58 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230490AbjFTN45 (ORCPT ); Tue, 20 Jun 2023 09:56:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53854 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232204AbjFTN44 (ORCPT ); Tue, 20 Jun 2023 09:56:56 -0400 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2056.outbound.protection.outlook.com [40.107.93.56]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A85DAA2; Tue, 20 Jun 2023 06:56:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CvG9X27QwoKQ9uMBwMtjE8CG0RpfaCOOos1yubyoAheqqEiVMjrr7gX46HNXgE/o+SFg861jjf7C2tYfRIXR+IZV2ltKNHnx5osJtE8THDrfXqjoPM7M436lQzSBNkdM5lVrUbNXRCOGaqnfJK/y24jrSUrLnO9fy29zzPhhiCyF42lMVe5OHF60F5IgeoEaTq7hDVSXkrLun+BeLVZKMGvLEXajZugULJ35fG0thNSUMAR7YqayGAc0OgQpqUeK347oXzhwrsTgvFV6J3HxCsJWJxUOKvIqKH1R8M18Kwi1Ao21nTMwMgVKjJsPp8Ne/vPE1lNrAmhkc8laZGjOgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DOtLzkHKEYIkJimtmtyRMLdi9C3Ing9qiUFXKrWAMvs=; b=bRtN/g8yI7KYKUYxTt6RSXp2DVlypK/g50x68f59NwcD8FNkU9bbDlm1KhQiEbAk/cHltcMEIl3G8jpUxfRM2ew8KercaHEVjvut9RNd/L94sGyCA9+LyFnwBIS6fhgU3QGGm6PV30CznHmVQNw8MHroa0zugLwu57Pb4hQL6rBC84uvISTRtB6lW58tICEMmE6Bd8EGoebQCtE5rnY/g6tGPvc1/MzqfF5JGxTCMbwM0Zn2rVUx+tGfW4Xj3VeqLVldb7kjz2no4IydTyuEnCskTf4iPigN+DPJUNagZzsn1oJQJvhOUjR6ZptZOBmGFMNaPx+CBUg+boM1vGz+HA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=davemloft.net smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DOtLzkHKEYIkJimtmtyRMLdi9C3Ing9qiUFXKrWAMvs=; b=DYCOHGmWnRYmnq8AFWf1r/cPRWd+y5+8Z3kP+1lhVbxXk2CaLXUzgz6Vapl5BIyHA4rs582Q3KIj/oJ0KYCfuVVcw6KWEMvTOQmVFNCghpfXeWzr8euB6TJn6ir2UXsRUzS/VVdDxP17HoZrBeBJilTrVlwnp7kM9jOPhLJ/eoEOQCHQQWL0m7bLlA7IvqfhpmI3CmcPi2q3DsH99Ri67uLKoinayhJL82okwh25Z7zj53PoUYIm01DoQK3QEH3ItcsS+J3tGGCKf9T2a6lWkRvGMlUvELMg8pfxeOBIgtGSELL1OWdglTpmdEo1c9HbIFug3sivyRhrQ1tzNGPgIg== Received: from BN0PR04CA0097.namprd04.prod.outlook.com (2603:10b6:408:ec::12) by CH2PR12MB5514.namprd12.prod.outlook.com (2603:10b6:610:62::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37; Tue, 20 Jun 2023 13:56:53 +0000 Received: from BN8NAM11FT090.eop-nam11.prod.protection.outlook.com (2603:10b6:408:ec:cafe::a1) by BN0PR04CA0097.outlook.office365.com (2603:10b6:408:ec::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:56:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.160) by BN8NAM11FT090.mail.protection.outlook.com (10.13.177.105) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:56:53 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Tue, 20 Jun 2023 06:56:36 -0700 Received: from yaviefel.vdiclient.nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Tue, 20 Jun 2023 06:56:32 -0700 From: Petr Machata To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , CC: Petr Machata , Ido Schimmel , Danielle Ratson , Amit Cohen , Shuah Khan , , Subject: [PATCH net-next 03/16] selftests: forwarding: skbedit_priority: Disable IPv6 autogen on a bridge Date: Tue, 20 Jun 2023 15:55:49 +0200 Message-ID: X-Mailer: git-send-email 2.40.1 In-Reply-To: References: MIME-Version: 1.0 X-Originating-IP: [10.126.230.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT090:EE_|CH2PR12MB5514:EE_ X-MS-Office365-Filtering-Correlation-Id: a4b31586-8979-4898-d067-08db719633eb X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(346002)(396003)(136003)(376002)(39860400002)(451199021)(46966006)(36840700001)(40470700004)(5660300002)(8676002)(8936002)(82310400005)(70206006)(70586007)(4326008)(316002)(41300700001)(40480700001)(86362001)(40460700003)(2906002)(36756003)(7696005)(6666004)(336012)(426003)(16526019)(186003)(26005)(2616005)(107886003)(356005)(36860700001)(7636003)(83380400001)(478600001)(54906003)(110136005)(82740400003)(47076005)(66574015); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jun 2023 13:56:53.1151 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: a4b31586-8979-4898-d067-08db719633eb X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT090.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR12MB5514 Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org In a future patch, mlxsw will start adding RIFs to uppers of front panel port netdevices, if they have an IP address. At the time that the front panel port is enslaved to the bridge, the bridge MAC address does not have the same prefix as other interfaces in the system. On Nvidia Spectrum-1 machines all the RIFs have to have the same 38-bit MAC address prefix. Since the bridge does not obey this limitation, the RIF cannot be created, and the enslavement attempt is vetoed on the grounds of the configuration not being offloadable. The selftest itself however checks operation of pedit on IPv4 and IPv6 dsfield and its parts. The bridge thus does not need to participate in routing traffic and the IP address or the RIF are irrelevant. Fix by disabling automatic IPv6 address generation for the HW-offloaded bridge in this selftest, thus exempting it from mlxsw router attention. Since the bridge is only used for L2 forwarding, this change should not hinder usefulness of this selftest for testing SW datapath or HW datapaths in other devices. Signed-off-by: Petr Machata Reviewed-by: Danielle Ratson --- tools/testing/selftests/net/forwarding/pedit_dsfield.sh | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/tools/testing/selftests/net/forwarding/pedit_dsfield.sh b/tools/testing/selftests/net/forwarding/pedit_dsfield.sh index 64fbd211d907..af008fbf2725 100755 --- a/tools/testing/selftests/net/forwarding/pedit_dsfield.sh +++ b/tools/testing/selftests/net/forwarding/pedit_dsfield.sh @@ -60,7 +60,9 @@ h2_destroy() switch_create() { - ip link add name br1 up type bridge vlan_filtering 1 + ip link add name br1 type bridge vlan_filtering 1 + ip link set dev br1 addrgenmode none + ip link set dev br1 up ip link set dev $swp1 master br1 ip link set dev $swp1 up ip link set dev $swp2 master br1 From patchwork Tue Jun 20 13:55:52 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Machata X-Patchwork-Id: 694642 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8900AEB64DB for ; Tue, 20 Jun 2023 13:57:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232214AbjFTN5D (ORCPT ); Tue, 20 Jun 2023 09:57:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53914 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232204AbjFTN5B (ORCPT ); Tue, 20 Jun 2023 09:57:01 -0400 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2067.outbound.protection.outlook.com [40.107.223.67]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 66CDDD3; Tue, 20 Jun 2023 06:57:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OJrAmLPfpm7bXTkFBjRbWWdNIr27wc9BZNr7pZIfeQtngulm71lIJlAHrK1g7gZ6QV0JduQgUS0rcNlZlBfRkK3D2xpTkIBiBHJQpvPBpb25oRYuVSnXFcgDgjyWUdEX+uf0ZJQM/0Iw7aHUDl6nZTDsQ5DkeKKt5YtFHHIwHjLAAkVQXmR262sieZmMC4CIykBZhG6hlqql1Swp8hBImi9w2n+j2k2RBGTC5x6t9JKkJyoKJR/2QOi9qjWNnO0BUugFo8wtS3jSZ7OrCHbQ2fqHdcgZo+JQzoWwtso1eDrJQ5hPs306+ap/9Or5bxJSgRLfewh3zyRWXqkVq3dboA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GVD+Himn3jxE+9Z5FakfaoQYgmgYX+OPfhpual5AgZw=; b=OBfl35wLrYcPGAChVdBE7eZn1QwRI0gY0AdL4f5q6gRs/hmYaTpu1nrgvEw13wNIEhBlIEJxgV/lpjkIlLGetmbMDB3J0jxvFBa0aNairLR7FPc0t6hmV+2D9O+cyaMQsyFOjT5gXOq2IhNP/C3CuqbxbVO25OgL92qkv/nD2urBQeCz2fxbenG0lZLh4wvhCMWaH1ciNFYA6fYTJdQdmcV3W8A5zoSiCXt/FHNYtPrCu3zZTadUObynUTOcNBLrgqFXTxeDqwhq99DNTpnaTvKOwS+8DSsEQiKeWdsVJHYa78K7j/u5WPSJqaWwJC3zxqibazxyGQw/4SwZ2+Uj5A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=davemloft.net smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GVD+Himn3jxE+9Z5FakfaoQYgmgYX+OPfhpual5AgZw=; b=BX21g3917lIcuo1HJjgABCPjRKn50XXYPLBhw8FZRgaBG6yHq1UVr8AmnSXbNITLxEoFNkxCOY302fSBl42CpLS3bcTezq/tiHgkWfGCoHpdkg9jWyQ6TKKBltMCd7a+4cpbYlYaYml9hjIvAkeQNyJ/oWGfR9T7JN43fJyQUf5pstZmUVjhybP7Sm0u7/UrAJaXjIPq3OGN0w4SxT5M/ZnbcXDqj/bPYimkFFWlpWORVBRQmRxFeZKMzTL6gemG/Eba6hESxkiRbJQTnrtG+Q51bVN3IVOOezrwMSj33QsWukIE9KUe9Fu2JBqLVMY+YHYTPtcbM/zpDfRnWm2DmQ== Received: from BN8PR16CA0014.namprd16.prod.outlook.com (2603:10b6:408:4c::27) by PH7PR12MB6420.namprd12.prod.outlook.com (2603:10b6:510:1fc::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37; Tue, 20 Jun 2023 13:56:57 +0000 Received: from BN8NAM11FT048.eop-nam11.prod.protection.outlook.com (2603:10b6:408:4c:cafe::63) by BN8PR16CA0014.outlook.office365.com (2603:10b6:408:4c::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:56:57 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.161) by BN8NAM11FT048.mail.protection.outlook.com (10.13.177.117) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:56:57 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Tue, 20 Jun 2023 06:56:49 -0700 Received: from yaviefel.vdiclient.nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Tue, 20 Jun 2023 06:56:45 -0700 From: Petr Machata To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , CC: Petr Machata , Ido Schimmel , Danielle Ratson , Amit Cohen , Shuah Khan , , Subject: [PATCH net-next 06/16] selftests: forwarding: mirror_gre_*: Use port MAC for bridge address Date: Tue, 20 Jun 2023 15:55:52 +0200 Message-ID: <9f76a2fd0f89db7ee6e857c2c072db577acc98a9.1687265905.git.petrm@nvidia.com> X-Mailer: git-send-email 2.40.1 In-Reply-To: References: MIME-Version: 1.0 X-Originating-IP: [10.126.230.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT048:EE_|PH7PR12MB6420:EE_ X-MS-Office365-Filtering-Correlation-Id: 08549f67-f05c-4cf0-83ed-08db71963660 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(346002)(39860400002)(396003)(136003)(376002)(451199021)(46966006)(40470700004)(36840700001)(70206006)(70586007)(40460700003)(426003)(83380400001)(47076005)(6666004)(336012)(86362001)(36860700001)(82310400005)(4326008)(7696005)(186003)(16526019)(316002)(107886003)(26005)(8936002)(41300700001)(2616005)(36756003)(8676002)(40480700001)(356005)(110136005)(5660300002)(7636003)(54906003)(82740400003)(2906002)(478600001); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jun 2023 13:56:57.2354 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 08549f67-f05c-4cf0-83ed-08db71963660 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT048.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB6420 Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org In a future patch, mlxsw will start adding RIFs to uppers of front panel port netdevices, if they have an IP address. At the time that the front panel port is enslaved to the bridge, the bridge MAC address does not have the same prefix as other interfaces in the system. On Nvidia Spectrum-1 machines all the RIFs have to have the same 38-bit MAC address prefix. Since the bridge does not obey this limitation, the RIF cannot be created, and the enslavement attempt is vetoed on the grounds of the configuration not being offloadable. The bridge eventually inherits MAC address from its first member, after the enslavement is acked. A number of (mainly VXLAN) selftests already work around the problem by setting the MAC address to whatever it will eventually be anyway. Do the same for several mirror_gre selftests. Signed-off-by: Petr Machata Reviewed-by: Danielle Ratson --- tools/testing/selftests/net/forwarding/mirror_gre_bridge_1d.sh | 3 ++- .../selftests/net/forwarding/mirror_gre_bridge_1d_vlan.sh | 3 ++- .../selftests/net/forwarding/mirror_gre_bridge_1q_lag.sh | 3 ++- 3 files changed, 6 insertions(+), 3 deletions(-) diff --git a/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1d.sh b/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1d.sh index aec752a22e9e..04fd14b0a9b7 100755 --- a/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1d.sh +++ b/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1d.sh @@ -65,7 +65,8 @@ setup_prepare() vrf_prepare mirror_gre_topo_create - ip link add name br2 type bridge vlan_filtering 0 + ip link add name br2 address $(mac_get $swp3) \ + type bridge vlan_filtering 0 ip link set dev br2 up ip link set dev $swp3 master br2 diff --git a/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1d_vlan.sh b/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1d_vlan.sh index 1b27f2b0f196..f35313c76fac 100755 --- a/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1d_vlan.sh +++ b/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1d_vlan.sh @@ -35,7 +35,8 @@ setup_prepare() vrf_prepare mirror_gre_topo_create - ip link add name br2 type bridge vlan_filtering 0 + ip link add name br2 address $(mac_get $swp3) \ + type bridge vlan_filtering 0 ip link set dev br2 up vlan_create $swp3 555 diff --git a/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1q_lag.sh b/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1q_lag.sh index 91e431cd919e..c53148b1dc63 100755 --- a/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1q_lag.sh +++ b/tools/testing/selftests/net/forwarding/mirror_gre_bridge_1q_lag.sh @@ -140,7 +140,8 @@ switch_create() ip link set dev $swp3 up ip link set dev $swp4 up - ip link add name br1 type bridge vlan_filtering 1 + ip link add name br1 address $(mac_get $swp3) \ + type bridge vlan_filtering 1 team_create lag loadbalance $swp3 $swp4 ip link set dev lag master br1 From patchwork Tue Jun 20 13:55:54 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Machata X-Patchwork-Id: 694641 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8C9B8EB64D8 for ; Tue, 20 Jun 2023 13:57:17 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232225AbjFTN5R (ORCPT ); Tue, 20 Jun 2023 09:57:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54002 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231272AbjFTN5P (ORCPT ); Tue, 20 Jun 2023 09:57:15 -0400 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2062d.outbound.protection.outlook.com [IPv6:2a01:111:f400:7eab::62d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0AA52A2; Tue, 20 Jun 2023 06:57:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GElS7jY+XFkE7mn5FDtM00W2BBDhjZbju2EcqnnGGTLObVZYVTkDuS1NUePOW7eM0EkTHRzfBAatYBGNryE44FuhfTcYiuw59zw1kCE+keZA5AIsHsYXnE0884JzadnVp1aDG8SajdFv4Kk7w7YEb0SdQaTVy3HTlJBwN5xwyXGLD2RCWV4mNhIM6xB1lm0hymJhVBUwpC2vBPoiSG6/GRAToMoRnFP6SstSCREZv/pecVK36a/Jr3oF9MCmeTehNRydXY+OcRXj3iEBkGkkD0YT1cZ0ULGyR1kwDN5a0n9bs0n2Jlh3BK48g6xjlH9XTBKqJK0m63UlZ3nXhE829w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=77kIKvy+UbrIOpvL33Kv7RIfoeIFrzBQkzWjZsF26L0=; b=OHjVuGQC2BOIemdNB37NTAAv7SQhsQrlF51LGGcrh4VCK7ufx/e3Ivtu7PZuadHyupVp9UB/NiIlcnB2U8CZED+2L6oANEPQH+B0pappIbqg89Ssom+nyzx5wBRBywTxi+KFB1QktzcV4c4+XZqGufeLltd+vCzVWunKYqqoBIoWjOAEmFdpBbtW6fY4PZHhrBJU8SdEycX6CHGS1PrQrSRm7xO1L2h94JlblbuRxS6+Ep/MJSh3CpL7eZnGVIve/eJ1I2/s2BM8lY0hsBPKhVTRGgVeDV+J1P28YIRVJdLjH8Tvm3E8sPzmva+UD3SMJmvU3Y9g67BYj0p0bGQUgQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=davemloft.net smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=77kIKvy+UbrIOpvL33Kv7RIfoeIFrzBQkzWjZsF26L0=; b=PMn6ibgKsFcVZ2CxuUoF3cw8pmI9fYyAvraagHe2SbBmna3QmzCLpCcR4ctSCBnszj21L2w7Pf4pg2s7dSotQ/uelG7rT/LHNaXRdteRNttnr7nZkw+zWTNQC1Rxa44CSsydh5/OaO4XgvLQBihqxP4Qnyi2otWrYH1nu8gVL6pkjAipP1UoEipZ8efaQO6FaLsgpVCskslliZkxQwfBWF9awmnyjKOR18wiYkStQxW6Qefxdg0fsK6WWALCbjwn9j7guzVBks8f6xmonG3uBurFIdjOywePKWyExXylY6HT8kT3JM0lfgpfeT01+oerjkCpRRnNb5Pujr5qPE4ASg== Received: from BN0PR04CA0045.namprd04.prod.outlook.com (2603:10b6:408:e8::20) by SA1PR12MB6970.namprd12.prod.outlook.com (2603:10b6:806:24d::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.35; Tue, 20 Jun 2023 13:57:10 +0000 Received: from BN8NAM11FT004.eop-nam11.prod.protection.outlook.com (2603:10b6:408:e8:cafe::5a) by BN0PR04CA0045.outlook.office365.com (2603:10b6:408:e8::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6521.21 via Frontend Transport; Tue, 20 Jun 2023 13:57:08 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.161) by BN8NAM11FT004.mail.protection.outlook.com (10.13.176.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.38 via Frontend Transport; Tue, 20 Jun 2023 13:57:09 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Tue, 20 Jun 2023 06:56:58 -0700 Received: from yaviefel.vdiclient.nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Tue, 20 Jun 2023 06:56:54 -0700 From: Petr Machata To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , CC: Petr Machata , Ido Schimmel , Danielle Ratson , Amit Cohen , Shuah Khan , , Subject: [PATCH net-next 08/16] selftests: mlxsw: q_in_q_veto: Disable IPv6 autogen on bridges Date: Tue, 20 Jun 2023 15:55:54 +0200 Message-ID: <7ff597df6c315e4cc6cfb50f9cc399f173475239.1687265905.git.petrm@nvidia.com> X-Mailer: git-send-email 2.40.1 In-Reply-To: References: MIME-Version: 1.0 X-Originating-IP: [10.126.230.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT004:EE_|SA1PR12MB6970:EE_ X-MS-Office365-Filtering-Correlation-Id: 9b80b091-0c1c-4a89-537f-08db71963dcb X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(39860400002)(136003)(376002)(346002)(396003)(451199021)(36840700001)(46966006)(40470700004)(2906002)(40460700003)(5660300002)(8936002)(82310400005)(36756003)(40480700001)(8676002)(41300700001)(86362001)(107886003)(478600001)(26005)(54906003)(186003)(110136005)(16526019)(7696005)(70586007)(70206006)(36860700001)(66574015)(47076005)(7636003)(356005)(4326008)(316002)(426003)(336012)(2616005)(82740400003); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jun 2023 13:57:09.6794 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 9b80b091-0c1c-4a89-537f-08db71963dcb X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT004.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR12MB6970 Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org In a future patch, mlxsw will start adding RIFs to uppers of front panel port netdevices, if they have an IP address. The swp enslavement to the 802.1ad bridge is not allowed, because RIFs are not allowed to be created for 802.1ad bridges, but the address indicates one needs to be created. Thus the veto selftests fail already during the port enslavement. Then the attempt to create a VLAN on top of the same bridge is not vetoed, because the bridge is not related to mlxsw, and the selftest fails. Fix by disabling automatic IPv6 address generation for the bridges in this selftest, thus exempting them from the mlxsw router attention. Signed-off-by: Petr Machata Reviewed-by: Amit Cohen --- tools/testing/selftests/drivers/net/mlxsw/q_in_q_veto.sh | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/tools/testing/selftests/drivers/net/mlxsw/q_in_q_veto.sh b/tools/testing/selftests/drivers/net/mlxsw/q_in_q_veto.sh index 7edaed8eb86a..00d55b0e98c1 100755 --- a/tools/testing/selftests/drivers/net/mlxsw/q_in_q_veto.sh +++ b/tools/testing/selftests/drivers/net/mlxsw/q_in_q_veto.sh @@ -48,6 +48,7 @@ create_vlan_upper_on_top_of_bridge() ip link add dev br0 type bridge vlan_filtering 1 \ vlan_protocol $bridge_proto vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br0 addrgenmode none ip link set dev br0 up ip link set dev $swp1 master br0 @@ -88,6 +89,7 @@ create_8021ad_vlan_upper_on_top_bridge_port() ip link add dev br0 type bridge vlan_filtering 1 \ vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br0 addrgenmode none ip link set dev $swp1 master br0 ip link set dev br0 up @@ -155,6 +157,7 @@ create_vlan_upper_on_top_front_panel_enslaved_to_8021ad_bridge() ip link add dev br0 type bridge vlan_filtering 1 \ vlan_protocol 802.1ad vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br0 addrgenmode none ip link set dev br0 up ip link set dev $swp1 master br0 @@ -177,6 +180,7 @@ create_vlan_upper_on_top_lag_enslaved_to_8021ad_bridge() ip link add dev br0 type bridge vlan_filtering 1 \ vlan_protocol 802.1ad vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br0 addrgenmode none ip link set dev br0 up ip link add name bond1 type bond mode 802.3ad @@ -203,6 +207,7 @@ enslave_front_panel_with_vlan_upper_to_8021ad_bridge() ip link add dev br0 type bridge vlan_filtering 1 \ vlan_protocol 802.1ad vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br0 addrgenmode none ip link set dev br0 up ip link add name $swp1.100 link $swp1 type vlan id 100 @@ -225,6 +230,7 @@ enslave_lag_with_vlan_upper_to_8021ad_bridge() ip link add dev br0 type bridge vlan_filtering 1 \ vlan_protocol 802.1ad vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br0 addrgenmode none ip link set dev br0 up ip link add name bond1 type bond mode 802.3ad @@ -252,6 +258,7 @@ add_ip_address_to_8021ad_bridge() ip link add dev br0 type bridge vlan_filtering 1 \ vlan_protocol 802.1ad vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br0 addrgenmode none ip link set dev br0 up ip link set dev $swp1 master br0 @@ -273,6 +280,7 @@ switch_bridge_protocol_from_8021q_to_8021ad() ip link add dev br0 type bridge vlan_filtering 1 \ vlan_protocol 802.1ad vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br0 addrgenmode none ip link set dev br0 up ip link set dev $swp1 master br0 From patchwork Tue Jun 20 13:55:56 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Machata X-Patchwork-Id: 694640 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B7C2BEB64D7 for ; Tue, 20 Jun 2023 13:57:23 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232204AbjFTN5X (ORCPT ); Tue, 20 Jun 2023 09:57:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54046 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231272AbjFTN5V (ORCPT ); Tue, 20 Jun 2023 09:57:21 -0400 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2083.outbound.protection.outlook.com [40.107.93.83]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DDE32D3; Tue, 20 Jun 2023 06:57:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BI7RnhZ3ghYZCjrABTy/xXI+vsvH9oOJX+9MDjLEj3AXrgD/Z9YVNfpnumwDGgjhzpFQoCH7o8/s7EPc78sXZCdC60Ry4OCHpbHlIjZssdeBnB8VRt2/GtZq4LpXlHXph0Du6m8NbFMsw+AIS2zAq78KBf0NTKq6BnsyF9yqdU9058nyndEgygB/OwjjYjyjJj/sS/F7hCZaF5ARV4+slJofMD6sv+cIxR5HLvAuC7qcZjexx6Rvda+4Hsx8mFxQxQ8rdFj48/hF0AEIyrrdJeXL0TlBXBD+ojHv72k/H5SQZdQaU+wf2PwDlyj1ruiYYgPu7jws0H62zAXTHqAyzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oNKSLNR+laZ6F2+Kc3jaKGaBStDoRaJj5CTLMD951IA=; b=Zu6cOsZITzeGAjRzp6jUhLeMwxMeORGZea82p/EfVuVmFKADiXDfdZ+KQKJWLNbUVqcikF2T8RSdBL7mSdBxNoDswkClDOGR5nqy57O8Cn71iyHousuBBNv5DbtsQXYN3GP/64DLpwCrGw9gcHYgTPLto3P51zIFemjBBpgUPxaf2JxV7O/dypnvw8O5puPU2bPNt8fBpcdj9YQRj7jqIt+r1Lk2/a+PUf4eHmaIgxinLfy5hkCtJjPkWGg3VUT0iCebqQsdJWCsxRtb1ii6o72xuVGDdmNTa47+KV/BGOoAIQUJ92hudDA5LGYGcAi4isbQrlCVKgCRfbKH3gSfjA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=davemloft.net smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oNKSLNR+laZ6F2+Kc3jaKGaBStDoRaJj5CTLMD951IA=; b=iW+FUeLyf2Q1BUboIeFjOotSb5Mnp7lnck05djqsGTZaKxhfrlZLxcMHozT70mpLFnbpHsniqzHLLjw4SYNvUD4d0hWA4Exhm129Pdxc6pexuMEbb+z7nfSodL71jDpyN7xPEWfVnSdV8bJPkLes3yeeD/zckXqDjdyGJDnz0/KZaeOtUPcZisesk4rgDKfDzizFx+udWqIwfJD1Ypmc1ilHYImHkPdCjtVLhedpku6Ew9p+lUxFbUxuNLAFxTuuVJR3e2BaChgerGmYNK37yj6Zhm86wPsC+Y0NJqZV2j5uNcUKe9xO3ME2BilfG68zCxzmGKWjwd+8mzNEhhFTLA== Received: from BN0PR08CA0003.namprd08.prod.outlook.com (2603:10b6:408:142::19) by MN0PR12MB6080.namprd12.prod.outlook.com (2603:10b6:208:3c8::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6521.21; Tue, 20 Jun 2023 13:57:17 +0000 Received: from BN8NAM11FT043.eop-nam11.prod.protection.outlook.com (2603:10b6:408:142:cafe::92) by BN0PR08CA0003.outlook.office365.com (2603:10b6:408:142::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:57:17 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.161) by BN8NAM11FT043.mail.protection.outlook.com (10.13.177.218) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:57:17 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Tue, 20 Jun 2023 06:57:05 -0700 Received: from yaviefel.vdiclient.nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Tue, 20 Jun 2023 06:57:01 -0700 From: Petr Machata To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , CC: Petr Machata , Ido Schimmel , Danielle Ratson , Amit Cohen , Shuah Khan , , Subject: [PATCH net-next 10/16] selftests: mlxsw: mirror_gre_scale: Disable IPv6 autogen on a bridge Date: Tue, 20 Jun 2023 15:55:56 +0200 Message-ID: <37694704013f9640c27c3cb7d9296f4bd213473f.1687265905.git.petrm@nvidia.com> X-Mailer: git-send-email 2.40.1 In-Reply-To: References: MIME-Version: 1.0 X-Originating-IP: [10.126.230.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT043:EE_|MN0PR12MB6080:EE_ X-MS-Office365-Filtering-Correlation-Id: 4316381b-3a04-4274-beaa-08db7196423e X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(396003)(39860400002)(376002)(136003)(346002)(451199021)(36840700001)(46966006)(40470700004)(82310400005)(36860700001)(36756003)(40460700003)(70206006)(356005)(5660300002)(8936002)(8676002)(41300700001)(86362001)(4326008)(40480700001)(316002)(82740400003)(70586007)(7636003)(107886003)(426003)(47076005)(66574015)(26005)(186003)(16526019)(2906002)(2616005)(7696005)(478600001)(6666004)(83380400001)(336012)(54906003)(110136005); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jun 2023 13:57:17.1467 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4316381b-3a04-4274-beaa-08db7196423e X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT043.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN0PR12MB6080 Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org In a future patch, mlxsw will start adding RIFs to uppers of front panel port netdevices, if they have an IP address. At the time that the front panel port is enslaved to the bridge, the bridge MAC address does not have the same prefix as other interfaces in the system. On Nvidia Spectrum-1 machines all the RIFs have to have the same 38-bit MAC address prefix. Since the bridge does not obey this limitation, the RIF cannot be created, and the enslavement attempt is vetoed on the grounds of the configuration not being offloadable. The selftest itself however checks how many mirroring sessions a machine is capable of offloading. The IP address or the RIF are irrelevant. Fix by disabling automatic IPv6 address generation for the HW-offloaded bridge in this selftest, thus exempting it from mlxsw router attention. Signed-off-by: Petr Machata Reviewed-by: Danielle Ratson --- tools/testing/selftests/drivers/net/mlxsw/mirror_gre_scale.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/testing/selftests/drivers/net/mlxsw/mirror_gre_scale.sh b/tools/testing/selftests/drivers/net/mlxsw/mirror_gre_scale.sh index e00435753008..e5589e2fca85 100644 --- a/tools/testing/selftests/drivers/net/mlxsw/mirror_gre_scale.sh +++ b/tools/testing/selftests/drivers/net/mlxsw/mirror_gre_scale.sh @@ -165,6 +165,7 @@ mirror_gre_setup_prepare() simple_if_init $h3 ip link add name br1 type bridge vlan_filtering 1 + ip link set dev br1 addrgenmode none ip link set dev br1 up ip link set dev $swp1 master br1 From patchwork Tue Jun 20 13:55:58 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Machata X-Patchwork-Id: 694639 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 91C04EB64D8 for ; Tue, 20 Jun 2023 13:57:32 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231272AbjFTN5c (ORCPT ); Tue, 20 Jun 2023 09:57:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54094 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230148AbjFTN5b (ORCPT ); Tue, 20 Jun 2023 09:57:31 -0400 Received: from NAM04-DM6-obe.outbound.protection.outlook.com (mail-dm6nam04on2066.outbound.protection.outlook.com [40.107.102.66]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E119DA4; Tue, 20 Jun 2023 06:57:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NBFmrsfIECsJDfM113wB7yzewUkRcHBxPrS1iqsPal+bjPTssqhhXz8MBolD1GSPod8hTFGS7QAlpgmJ34t4kx7bP9cyNr3hJoobCj264VBV1yUiM+cQsUQeQjxOL388kmylKnWiUM6MjC6n6kjb/CWgGcB7ro96OqJ5WGKd22i2U/YufwgGDNTdm5F5wRm25Sybrivm/6tUTAU7xb/W5cioSKXuuDstkVubib82kme/A37L7K+hys2v0WuUyNpSOiiz9ku6hss4y/1a6Kr3y4kCNA7uLwnCaELFvRPsWQRxQD+GoSXVlEbJW/EcOhX4dyLNqT/UJnqWUSBs+s0q7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PrLXOLIa21/7LSYoBEbpTQBTJbebgsyHlK5SWfURaiw=; b=A5wZrl/fqcmgXj4MfvdCxsAwKpOKgWEDUQ8nSJY8sYLTcNc6A/XsI1LqU9ljhooOBtHxM4Aqrcz8EVP9dWh0Ul3+/7CXNxEZvcnBmbCis5TzAymwTs9m5ZHvpHv06MUbq9akbioD3HrZ0H6IaclVqIs9DYh610HuPK+mBKc4I1n7GMFYRMrJtdk7+lG/i/Qj+2nG1xqL1GcFNEhDNILv3oe6G6139Q8OkBVOO2f9Kz9cgY1X2JYQU61kOHb4awLCnPcp/7QF+XyXQjPDPOy/1D7zKwENuOUnwtGBQqn2mOYVdwMDVXDa8ZNc1pIYlUjcvHGZ7EAP1R9EjozkTaqOMg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=davemloft.net smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PrLXOLIa21/7LSYoBEbpTQBTJbebgsyHlK5SWfURaiw=; b=pnF52Xwcvk7aCugw5u9WgCFtx+0OGS4z1THwAkd7HkZYVfr75KaU2KJ+ngr34du/17tFfEoM7UgBhK21IWsMALR8pyMEhYQJZmD/pCLM260emshcM7BhqAEbv52nx3ugJ4XqfDlW7KjjN5K01hmqbEcNxE/UwFmzMYt5DpTqvDMiQZRd1q1iVgoYRQS27CtukGlduGMeW2uBRK/sn3pP/6o+fhBHtK7tGh3RkF3Zw0uN9pIg2ETM6vBJ8YNMmmuX/0s2imgUOKLIt/eTPR1zAO7Gxxg/y11bGhJBaT6AOoEsZTtm+EgzImz2ojiF+XO7cZJ6ARuN8K6pPvmVXzR5VQ== Received: from BN6PR17CA0059.namprd17.prod.outlook.com (2603:10b6:405:75::48) by SA1PR12MB8142.namprd12.prod.outlook.com (2603:10b6:806:334::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37; Tue, 20 Jun 2023 13:57:26 +0000 Received: from BN8NAM11FT014.eop-nam11.prod.protection.outlook.com (2603:10b6:405:75:cafe::d7) by BN6PR17CA0059.outlook.office365.com (2603:10b6:405:75::48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:57:26 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.160) by BN8NAM11FT014.mail.protection.outlook.com (10.13.177.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:57:26 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Tue, 20 Jun 2023 06:57:14 -0700 Received: from yaviefel.vdiclient.nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Tue, 20 Jun 2023 06:57:09 -0700 From: Petr Machata To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , CC: Petr Machata , Ido Schimmel , Danielle Ratson , Amit Cohen , Shuah Khan , , Subject: [PATCH net-next 12/16] selftests: mlxsw: qos_ets_strict: Disable IPv6 autogen on bridges Date: Tue, 20 Jun 2023 15:55:58 +0200 Message-ID: <4d3ff23c988dbeb9c8eda27bcd71e776b35f2b16.1687265905.git.petrm@nvidia.com> X-Mailer: git-send-email 2.40.1 In-Reply-To: References: MIME-Version: 1.0 X-Originating-IP: [10.126.230.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT014:EE_|SA1PR12MB8142:EE_ X-MS-Office365-Filtering-Correlation-Id: f479c0b5-4dd1-4e99-6922-08db719647d9 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(136003)(39860400002)(396003)(346002)(376002)(451199021)(36840700001)(40470700004)(46966006)(82310400005)(36860700001)(36756003)(70206006)(356005)(40460700003)(5660300002)(8936002)(8676002)(41300700001)(86362001)(7636003)(4326008)(40480700001)(316002)(70586007)(82740400003)(107886003)(426003)(47076005)(66574015)(186003)(16526019)(2906002)(7696005)(478600001)(2616005)(26005)(83380400001)(336012)(54906003)(110136005)(6666004); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jun 2023 13:57:26.5489 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f479c0b5-4dd1-4e99-6922-08db719647d9 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT014.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR12MB8142 Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org In a future patch, mlxsw will start adding RIFs to uppers of front panel port netdevices, if they have an IP address. At the time that the front panel port is enslaved to the bridge (this holds for both bridges used here), the bridge MAC address does not have the same prefix as other interfaces in the system. On Nvidia Spectrum-1 machines all the RIFs have to have the same 38-bit MAC address prefix. Since the bridge does not obey this limitation, the RIF cannot be created, and the enslavement attempt is vetoed on the grounds of the configuration not being offloadable. The selftest itself however checks traffic prioritization and scheduling, and the bridges serve for their L2 forwarding capabilities, and do not need to participate in routing traffic. The IP addresses or the RIFs are irrelevant. Fix by disabling automatic IPv6 address generation for the HW-offloaded bridges in this selftest, thus exempting them from mlxsw router attention. Signed-off-by: Petr Machata Reviewed-by: Danielle Ratson --- .../testing/selftests/drivers/net/mlxsw/qos_ets_strict.sh | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/drivers/net/mlxsw/qos_ets_strict.sh b/tools/testing/selftests/drivers/net/mlxsw/qos_ets_strict.sh index 690d8daa71b4..fee74f215cec 100755 --- a/tools/testing/selftests/drivers/net/mlxsw/qos_ets_strict.sh +++ b/tools/testing/selftests/drivers/net/mlxsw/qos_ets_strict.sh @@ -138,11 +138,15 @@ switch_create() vlan_create $swp3 111 vlan_create $swp3 222 - ip link add name br111 up type bridge vlan_filtering 0 + ip link add name br111 type bridge vlan_filtering 0 + ip link set dev br111 addrgenmode none + ip link set dev br111 up ip link set dev $swp1.111 master br111 ip link set dev $swp3.111 master br111 - ip link add name br222 up type bridge vlan_filtering 0 + ip link add name br222 type bridge vlan_filtering 0 + ip link set dev br222 addrgenmode none + ip link set dev br222 up ip link set dev $swp2.222 master br222 ip link set dev $swp3.222 master br222 From patchwork Tue Jun 20 13:56:00 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Machata X-Patchwork-Id: 694638 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id E66D9EB64DB for ; Tue, 20 Jun 2023 13:57:41 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231314AbjFTN5l (ORCPT ); Tue, 20 Jun 2023 09:57:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54146 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230346AbjFTN5k (ORCPT ); Tue, 20 Jun 2023 09:57:40 -0400 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2043.outbound.protection.outlook.com [40.107.223.43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6EF311B0; Tue, 20 Jun 2023 06:57:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ANU/xQK7n5LQeril7RSFkXwMuaVIhyMYChPtrr9BkD9mhjyGtGJ73R6Notf5RRC5pyG4+xVvzty3QLRd4ZEY+8goOWV0Ju6Z1V9Ex2TyNWOJzGrJ7x9Wy/2d6jDcLcdo8az3AhmG7mtKHOoCZyA6QSKfmimNkfIqI1PfqXfCYv0/W7ibbMx0f5qgOV249XS80rzpUij03Uss03I3CaoRjqr9Jtw76wzMVjDGgZJdZmYm2m25guNX/wRqutSEBiUW5J/C1p6GNXVBHeUjJwU8NULSUhwwfHaw/9bFNy1ws8zsVGeE0tnjOwNfEuyyLH4E84TlSeddQ9ybDuQwgqk2hA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BunjBm0ZMEXE8evgBFdZVV8cTV1Mzmmze6LgCbfZ8yg=; b=GQZLHr3ut3meLlUf0Ew9o2qRSJN7sRA+eU0/YzWnUg2iglWquDacpHJQCGkYTeL0LKD8z+eroQ7IxYF9ZwitkUBXtzbaLufQ/kBbGMAUad5LueNjKTqUsLxLELo904PaM7b/KUsxRIgIWomaMvbXMDTAlNpnVNe1jKgRyTkzlOuSE1BATK6LkhuzuAnbkwTeUqO7YWPeMovmjkCoBBokev7+d5cMY1EZ1unbVMO/Y/ligUT0Up4UoEf/x7+d1cWlb7iDOjZjuR/j5x7a7poU8FWsASBLZ3tBkICZBF66DrBQVgyQ04pWcnKeKxOENGceALJHUHJmT846Hk8YQnGz5g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=davemloft.net smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BunjBm0ZMEXE8evgBFdZVV8cTV1Mzmmze6LgCbfZ8yg=; b=lZ6uDJ1QfJ4K1xnyQchhQvEbr9hHUzlMvFecYzYd/JVyjeYFPEYCgGfptzlFaUbyxdSlSxwVZZ1O5kVnqg6c1jznx8wGjeMEDV28qJvmB2J8LPtMn3r5qW8WJ6CFrDasqONsH9waHfTzFNjCA5dLdDj06UneWnXez1ILPqg2cpqwJ5xX1Pqtk90zYtGWj0nNvJoIULOJwowNl+Cl5+xg/9T94aO3I9rb1L78CR/ZqajtL9xbJ94YY335X1j+vfR626JSqY9dYyj7qXnXwSxcBtC7Yle/q/hToZmyor+dCMRHvUe2TMD2WmxYsMqq5+KpxCTr7nTtYAx5ldHPBKvSjw== Received: from BN8PR15CA0025.namprd15.prod.outlook.com (2603:10b6:408:c0::38) by CH2PR12MB5002.namprd12.prod.outlook.com (2603:10b6:610:6d::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37; Tue, 20 Jun 2023 13:57:36 +0000 Received: from BN8NAM11FT086.eop-nam11.prod.protection.outlook.com (2603:10b6:408:c0:cafe::1) by BN8PR15CA0025.outlook.office365.com (2603:10b6:408:c0::38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:57:36 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.161) by BN8NAM11FT086.mail.protection.outlook.com (10.13.176.220) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37 via Frontend Transport; Tue, 20 Jun 2023 13:57:35 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Tue, 20 Jun 2023 06:57:21 -0700 Received: from yaviefel.vdiclient.nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Tue, 20 Jun 2023 06:57:18 -0700 From: Petr Machata To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , CC: Petr Machata , Ido Schimmel , Danielle Ratson , Amit Cohen , Shuah Khan , , Subject: [PATCH net-next 14/16] selftests: mlxsw: spectrum: q_in_vni_veto: Disable IPv6 autogen on a bridge Date: Tue, 20 Jun 2023 15:56:00 +0200 Message-ID: X-Mailer: git-send-email 2.40.1 In-Reply-To: References: MIME-Version: 1.0 X-Originating-IP: [10.126.230.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT086:EE_|CH2PR12MB5002:EE_ X-MS-Office365-Filtering-Correlation-Id: 995b2bb9-84a2-4659-2353-08db71964d5b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(396003)(39860400002)(376002)(346002)(136003)(451199021)(36840700001)(46966006)(40470700004)(5660300002)(316002)(2906002)(4326008)(8936002)(8676002)(54906003)(41300700001)(110136005)(70586007)(70206006)(478600001)(7696005)(40460700003)(6666004)(356005)(7636003)(40480700001)(107886003)(16526019)(186003)(47076005)(2616005)(26005)(336012)(426003)(83380400001)(36860700001)(66574015)(82740400003)(36756003)(86362001)(82310400005); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jun 2023 13:57:35.7877 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 995b2bb9-84a2-4659-2353-08db71964d5b X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT086.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR12MB5002 Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org In a future patch, mlxsw will start adding RIFs to uppers of front panel port netdevices, if they have an IP address. At the time that the front panel port is enslaved to the bridge, the bridge MAC address does not have the same prefix as other interfaces in the system. On Nvidia Spectrum-1 machines all the RIFs have to have the same 38-bit MAC address prefix. Since the bridge does not obey this limitation, the RIF cannot be created, and the enslavement attempt is vetoed on the grounds of the configuration not being offloadable. The selftest itself however checks vetoing of a different aspect of the configuration and the bridge does not need to participate in routing traffic. The IP address or the RIF are irrelevant. Fix by disabling automatic IPv6 address generation for the HW-offloaded bridge in this selftest, thus exempting it from mlxsw router attention. Signed-off-by: Petr Machata Reviewed-by: Danielle Ratson --- .../selftests/drivers/net/mlxsw/spectrum/q_in_vni_veto.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/testing/selftests/drivers/net/mlxsw/spectrum/q_in_vni_veto.sh b/tools/testing/selftests/drivers/net/mlxsw/spectrum/q_in_vni_veto.sh index f0443b1b05b9..60753d46a2d4 100755 --- a/tools/testing/selftests/drivers/net/mlxsw/spectrum/q_in_vni_veto.sh +++ b/tools/testing/selftests/drivers/net/mlxsw/spectrum/q_in_vni_veto.sh @@ -34,6 +34,7 @@ create_vxlan_on_top_of_8021ad_bridge() ip link add dev br0 type bridge vlan_filtering 1 vlan_protocol 802.1ad \ vlan_default_pvid 0 mcast_snooping 0 + ip link set dev br0 addrgenmode none ip link set dev br0 up ip link add name vx100 type vxlan id 1000 local 192.0.2.17 dstport \ From patchwork Tue Jun 20 13:56:01 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Petr Machata X-Patchwork-Id: 694637 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id F0E5EEB64DB for ; Tue, 20 Jun 2023 13:57:48 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230346AbjFTN5s (ORCPT ); Tue, 20 Jun 2023 09:57:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54198 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232381AbjFTN5r (ORCPT ); Tue, 20 Jun 2023 09:57:47 -0400 Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2084.outbound.protection.outlook.com [40.107.237.84]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3CB0DD3; Tue, 20 Jun 2023 06:57:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PIAzKJG/1W6WfUXFpQ6u1CBbAlbX197zfNd8LQ2I4VeZEgAMLvuyupE2MqBe9T+QjVcp+zC9iPHD3IU4KaCoZ7r6UA/odedKovke5pNhtakWQqYbNMBgj1qpT73DMAxd6AtiY1eEpKzIFueHVzIBufwXQdcTdHR4Sr/77IzGmmVlgBEbzZoH9k+RxvucsRfVz5gpR+yddU8apw8DR1hxZ8YnXOSE7suSk+9wOSAbqTL25AFmHJ9vqO54eY/D1xmaBAnyBRLrCMalwKt4OAU+dTqexWq3zEKDSp/q4GePRY475eVRCEhTKmJxXY+Cbypv/rAgV8HWmVm46AkQtGBUzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Ek9e5xpA2I8s9r2TQOCr/DLkOs0t5tBCc+WtP5jYTnU=; b=b/zCe8KivxzELNpRhQmb7vjgDAyXRDYDYD/843E82qxU8cuZp699CIzsKn5I07U2lzi7VKKRvj3E6gik6tcCbYddkgEGH8uQOPGlGw9q4GclBSOLGLezFSc8l6c5Ln8bivndMwgKzdM7xuJgZR/sjDB5at323Hp+33VsYM6O2v3OXjSX4l5yFIqgvgAA2mqUgMox9lMxuNmVvzwV60H7C6v5ycFqCtmM6f6VYnfnjGcradS0mPlagd3hrgxOiENNwgX1zImPVW4WlXKhnlVJySpaIm27sdCdCHEmjpeE2FQxXHPVuGYUBYkUvadcmYvFfBgs2/Vg4+1YF1ikeIn+BA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=davemloft.net smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ek9e5xpA2I8s9r2TQOCr/DLkOs0t5tBCc+WtP5jYTnU=; b=acVNwG6h5WauXVimQzWF37NZGLkyCt2uMnLGHYrxfWTcmKgSVYCLVm+MtB4oorp2hFAa+60LKCm8+QNq/AE0W4rrEkjSkhxal9ntJq+JO4xXoctTveJf5uaRvmPTD2uXgFBdebTcp8h3D3Y4LL2HYt8hAWlCDIr3y/APmm2cLWSr+8JYC5tZekXfWg+uTnpE3Tq69Qr9FcRtH9h/cZqeuF9oS0yegb6PSIFrvIM/U/N21zLQmKwJZqLZT9PSNDySn+Q5z79w/6SUVF8QrYN9ogrv+I/kXiia4T2hIFdMHBBGarAPlapATArmtHErAAswYLhUYC8U7hzuy3hfv+T2hA== Received: from BN0PR03CA0040.namprd03.prod.outlook.com (2603:10b6:408:e7::15) by SJ0PR12MB7459.namprd12.prod.outlook.com (2603:10b6:a03:48d::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.37; Tue, 20 Jun 2023 13:57:42 +0000 Received: from BN8NAM11FT045.eop-nam11.prod.protection.outlook.com (2603:10b6:408:e7:cafe::93) by BN0PR03CA0040.outlook.office365.com (2603:10b6:408:e7::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6521.21 via Frontend Transport; Tue, 20 Jun 2023 13:57:41 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.160) by BN8NAM11FT045.mail.protection.outlook.com (10.13.177.47) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6500.38 via Frontend Transport; Tue, 20 Jun 2023 13:57:40 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.5; Tue, 20 Jun 2023 06:57:25 -0700 Received: from yaviefel.vdiclient.nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.37; Tue, 20 Jun 2023 06:57:21 -0700 From: Petr Machata To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , CC: Petr Machata , Ido Schimmel , Danielle Ratson , Amit Cohen , Shuah Khan , , Subject: [PATCH net-next 15/16] selftests: mlxsw: vxlan: Disable IPv6 autogen on bridges Date: Tue, 20 Jun 2023 15:56:01 +0200 Message-ID: <640c9cb55a0f2eaa0054e4a86e2615c64d9909c8.1687265905.git.petrm@nvidia.com> X-Mailer: git-send-email 2.40.1 In-Reply-To: References: MIME-Version: 1.0 X-Originating-IP: [10.126.230.35] X-ClientProxiedBy: rnnvmail203.nvidia.com (10.129.68.9) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BN8NAM11FT045:EE_|SJ0PR12MB7459:EE_ X-MS-Office365-Filtering-Correlation-Id: 76c09f5f-87f7-410b-a163-08db71965050 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.160; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge1.nvidia.com; CAT:NONE; SFS:(13230028)(4636009)(136003)(346002)(376002)(39860400002)(396003)(451199021)(36840700001)(46966006)(40470700004)(54906003)(110136005)(16526019)(186003)(26005)(6666004)(7696005)(41300700001)(478600001)(70206006)(70586007)(40460700003)(4326008)(316002)(40480700001)(36756003)(36860700001)(8936002)(5660300002)(107886003)(8676002)(66574015)(47076005)(2616005)(426003)(336012)(86362001)(2906002)(83380400001)(82310400005)(82740400003)(7636003)(356005); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jun 2023 13:57:40.7676 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 76c09f5f-87f7-410b-a163-08db71965050 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.160]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT045.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR12MB7459 Precedence: bulk List-ID: X-Mailing-List: linux-kselftest@vger.kernel.org In a future patch, mlxsw will start adding RIFs to uppers of front panel port netdevices, if they have an IP address. At the time that the front panel port is enslaved to the bridge (this holds for all bridges used here), the bridge MAC address does not have the same prefix as other interfaces in the system. On Nvidia Spectrum-1 machines all the RIFs have to have the same 38-bit MAC address prefix. Since the bridge does not obey this limitation, the RIF cannot be created, and the enslavement attempt is vetoed on the grounds of the configuration not being offloadable. The selftest itself however checks various aspects of VXLAN offloading and the bridges do not need to participate in routing traffic. The IP addresses or the RIFs are irrelevant. Fix by disabling automatic IPv6 address generation for the HW-offloaded bridges in this selftest, thus exempting them from mlxsw router attention. Signed-off-by: Petr Machata Reviewed-by: Danielle Ratson --- .../selftests/drivers/net/mlxsw/vxlan.sh | 41 ++++++++++++++----- 1 file changed, 31 insertions(+), 10 deletions(-) diff --git a/tools/testing/selftests/drivers/net/mlxsw/vxlan.sh b/tools/testing/selftests/drivers/net/mlxsw/vxlan.sh index 99a332b712f0..4687b0a7dffb 100755 --- a/tools/testing/selftests/drivers/net/mlxsw/vxlan.sh +++ b/tools/testing/selftests/drivers/net/mlxsw/vxlan.sh @@ -444,8 +444,12 @@ offload_indication_setup_create() { # Create a simple setup with two bridges, each with a VxLAN device # and one local port - ip link add name br0 up type bridge mcast_snooping 0 - ip link add name br1 up type bridge mcast_snooping 0 + ip link add name br0 type bridge mcast_snooping 0 + ip link set dev br0 addrgenmode none + ip link set dev br0 up + ip link add name br1 type bridge mcast_snooping 0 + ip link set dev br1 addrgenmode none + ip link set dev br1 up ip link set dev $swp1 master br0 ip link set dev $swp2 master br1 @@ -646,8 +650,12 @@ offload_indication_decap_route_test() RET=0 - ip link add name br0 up type bridge mcast_snooping 0 - ip link add name br1 up type bridge mcast_snooping 0 + ip link add name br0 type bridge mcast_snooping 0 + ip link set dev br0 addrgenmode none + ip link set dev br0 up + ip link add name br1 type bridge mcast_snooping 0 + ip link set dev br1 addrgenmode none + ip link set dev br1 up ip link set dev $swp1 master br0 ip link set dev $swp2 master br1 ip link set dev vxlan0 master br0 @@ -780,7 +788,9 @@ __offload_indication_join_vxlan_first() offload_indication_join_vxlan_first() { - ip link add dev br0 up type bridge mcast_snooping 0 + ip link add dev br0 type bridge mcast_snooping 0 + ip link set dev br0 addrgenmode none + ip link set dev br0 up ip link add name vxlan0 up type vxlan id 10 nolearning $UDPCSUM_FLAFS \ ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 @@ -815,7 +825,9 @@ __offload_indication_join_vxlan_last() offload_indication_join_vxlan_last() { - ip link add dev br0 up type bridge mcast_snooping 0 + ip link add dev br0 type bridge mcast_snooping 0 + ip link set dev br0 addrgenmode none + ip link set dev br0 up ip link add name vxlan0 up type vxlan id 10 nolearning $UDPCSUM_FLAFS \ ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 @@ -842,6 +854,7 @@ sanitization_vlan_aware_test() RET=0 ip link add dev br0 type bridge mcast_snooping 0 vlan_filtering 1 + ip link set dev br0 addrgenmode none ip link add name vxlan10 up master br0 type vxlan id 10 nolearning \ $UDPCSUM_FLAFS ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 @@ -915,8 +928,10 @@ offload_indication_vlan_aware_setup_create() { # Create a simple setup with two VxLAN devices and a single VLAN-aware # bridge - ip link add name br0 up type bridge mcast_snooping 0 vlan_filtering 1 \ + ip link add name br0 type bridge mcast_snooping 0 vlan_filtering 1 \ vlan_default_pvid 0 + ip link set dev br0 addrgenmode none + ip link set dev br0 up ip link set dev $swp1 master br0 @@ -1060,8 +1075,10 @@ offload_indication_vlan_aware_decap_route_test() offload_indication_vlan_aware_join_vxlan_first() { - ip link add dev br0 up type bridge mcast_snooping 0 \ + ip link add dev br0 type bridge mcast_snooping 0 \ vlan_filtering 1 vlan_default_pvid 1 + ip link set dev br0 addrgenmode none + ip link set dev br0 up ip link add name vxlan0 up type vxlan id 10 nolearning $UDPCSUM_FLAFS \ ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 @@ -1073,8 +1090,10 @@ offload_indication_vlan_aware_join_vxlan_first() offload_indication_vlan_aware_join_vxlan_last() { - ip link add dev br0 up type bridge mcast_snooping 0 \ + ip link add dev br0 type bridge mcast_snooping 0 \ vlan_filtering 1 vlan_default_pvid 1 + ip link set dev br0 addrgenmode none + ip link set dev br0 up ip link add name vxlan0 up type vxlan id 10 nolearning $UDPCSUM_FLAFS \ ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789 @@ -1091,8 +1110,10 @@ offload_indication_vlan_aware_l3vni_test() RET=0 sysctl_set net.ipv6.conf.default.disable_ipv6 1 - ip link add dev br0 up type bridge mcast_snooping 0 \ + ip link add dev br0 type bridge mcast_snooping 0 \ vlan_filtering 1 vlan_default_pvid 0 + ip link set dev br0 addrgenmode none + ip link set dev br0 up ip link add name vxlan0 up type vxlan id 10 nolearning $UDPCSUM_FLAFS \ ttl 20 tos inherit local $LOCAL_IP_1 dstport 4789