From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2AA8E343D7B for ; Sat, 28 Feb 2026 18:10:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772302251; cv=none; b=ueAqhAC/rX1scSt1e7SgtaHZuGZhh0WRl/Kqs0TbN90JCbyJAv7szqq//miW/brU0L7kCFNzrlwgrJwyGwE2SpjsggO06zTIj1omQeba8MtFelGVg7nVVTUUonUgnjVeUbf+R0yGyTwkHIyWvDlFCT2RKgSN/R0l3z9xphmt1aQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772302251; c=relaxed/simple; bh=2WYxL2TlHn/Oc5cYAnp7iC5LVz2lk82EZtx2JbhHgI8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Wu0QjC805cZl1TdQiZ4gBnxvBq+4dDUyb8CjHBrSf5ZjjGTzKmdy6FM5/FOZN9jIAk9NP9OJXyV31fTWqUvjYaYIksPt1uChrgeEAwCziHr2D+fVS533e7p+yifEGboGr737APjg9Gk8bFq5hhjf9pge1hZoxPv7T36yQbovhyc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=gWB0SSO6; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="gWB0SSO6" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5DBCDC116D0; Sat, 28 Feb 2026 18:10:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1772302251; bh=2WYxL2TlHn/Oc5cYAnp7iC5LVz2lk82EZtx2JbhHgI8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gWB0SSO62Ehy2fu9o8KIlmLdziYo3m0Sg2goZrFYPxYANKFHC8fYFb8UKwqWRIWzq Scf8wRH4GSh/lQLMHlavubs3UG+kxEZHGKuyBe6cNbZ/ikOmFlIfFnTyDx15ArvrnW 5RhQcO3mTAnTLkudBHoHY/fb05FAfgXU9f8Xk+69dNmcsjz/tVgIOCk3hFWbr8v5ZJ GQba5qJgKzPed25E1wQwGdtrDONULOb21LLrZbDGy+sEuEKB9WUSp7Qx44bSpAFw2G D7i6So6M4VJFZfChr6mqdag+krD/poKUWf9kz/AyeSSYE4pj0oN+J3UfulypQjJz3M loOI5qBZg2GqQ== From: Sasha Levin To: patches@lists.linux.dev Cc: Ido Schimmel , Petr Machata , Simon Horman , Jakub Kicinski , Sasha Levin Subject: [PATCH 6.6 264/283] selftests: mlxsw: tc_restrictions: Fix test failure with new iproute2 Date: Sat, 28 Feb 2026 13:06:46 -0500 Message-ID: <20260228180709.1583486-264-sashal@kernel.org> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20260228180709.1583486-1-sashal@kernel.org> References: <20260228180709.1583486-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit From: Ido Schimmel [ Upstream commit a2646773a005b59fd1dc7ff3ba15df84889ca5d2 ] As explained in [1], iproute2 started rejecting tc-police burst sizes that result in an overflow. This can happen when the burst size is high enough and the rate is low enough. A couple of test cases specify such configurations, resulting in iproute2 errors and test failure. Fix by reducing the burst size so that the test will pass with both new and old iproute2 versions. [1] https://lore.kernel.org/netdev/20250916215731.3431465-1-jay.vosburgh@canonical.com/ Fixes: cb12d1763267 ("selftests: mlxsw: tc_restrictions: Test tc-police restrictions") Signed-off-by: Ido Schimmel Signed-off-by: Petr Machata Reviewed-by: Simon Horman Link: https://patch.msgid.link/88b00c6e85188aa6a065dc240206119b328c46e1.1770643998.git.petrm@nvidia.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- tools/testing/selftests/drivers/net/mlxsw/tc_restrictions.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/drivers/net/mlxsw/tc_restrictions.sh b/tools/testing/selftests/drivers/net/mlxsw/tc_restrictions.sh index 0441a18f098b1..aac8ef490feb8 100755 --- a/tools/testing/selftests/drivers/net/mlxsw/tc_restrictions.sh +++ b/tools/testing/selftests/drivers/net/mlxsw/tc_restrictions.sh @@ -317,7 +317,7 @@ police_limits_test() tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ flower skip_sw \ - action police rate 0.5kbit burst 1m conform-exceed drop/ok + action police rate 0.5kbit burst 2k conform-exceed drop/ok check_fail $? "Incorrect success to add police action with too low rate" tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ @@ -327,7 +327,7 @@ police_limits_test() tc filter add dev $swp1 ingress pref 1 proto ip handle 101 \ flower skip_sw \ - action police rate 1.5kbit burst 1m conform-exceed drop/ok + action police rate 1.5kbit burst 2k conform-exceed drop/ok check_err $? "Failed to add police action with low rate" tc filter del dev $swp1 ingress protocol ip pref 1 handle 101 flower -- 2.51.0