From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-ot1-f41.google.com (mail-ot1-f41.google.com [209.85.210.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 19EE53F7870 for ; Thu, 7 May 2026 13:15:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.41 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778159763; cv=none; b=YxJhi/EeMkesbvxffjMcJzAgtYJjhCpOqkZhKbGY8oRRohzErpGXMxWzA69bOHuM9gWOdVZfuW0su5tFNit+5m2LmorEK2CT5NKDL7KL8lbp0bEKVNoR4+DHkhN/X1djlgKvMH9sUB8BXeYhpqGnV3vL7MSt4kn8vU+k9EuIizg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778159763; c=relaxed/simple; bh=GAJMcz8BWL9uaAoIKrjqh8nuURhEgi33jD5g9qzyjtw=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=GxQgcIJeUS0nBBaA6XRvThTQ9hFGaoNWNf065JRVH/uD8CXnbNC5eACNDl2AL2M/1Bq+SL8LpV1QWB/fQIrqljock+jWFyKJuaYyJV0rXuTJpyJjagarfMd7u5Cxu/4IYgLl53Ir8VhosG4dv/RgfEHf444sCIhKr7dksI5Jr+I= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=qPCtNcgV; arc=none smtp.client-ip=209.85.210.41 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="qPCtNcgV" Received: by mail-ot1-f41.google.com with SMTP id 46e09a7af769-7de44ed7a11so703101a34.1 for ; Thu, 07 May 2026 06:15:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1778159757; x=1778764557; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=TRvWNkmel+YHvL5LZc0SrAVa4019euEI2glulSMITOg=; b=qPCtNcgV8JZtMW82QSx7h5HphHH9bLRHp5Zgf0v0Pti661q6oDqinTmNSnIzHicFCt /W8Luuop+k9UBVS2j/8nRrwnBBoRVHKTmNBJNE6359i9tQCPavDHRq63a2x1XSF0FZAy iKZFtyKabviVc2nJW8LlVGjEKiwdQm/xG0cUW7PcgHo+dvXMiYpX0eHZ5LqWGTFep/ln obb/NoQSLK0YIRN+brG4g0anWC6G7t+AzVRhXbaSTzR3gYj4ewgIunnE8UtDMPCoghOU FnKAEkz1J0tqf9GSbafq1Zx6ftf+cg/r9CLpy8AyM4TLV27NXriY4BsoTVS2rvcKtaSP tX2Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778159757; x=1778764557; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=TRvWNkmel+YHvL5LZc0SrAVa4019euEI2glulSMITOg=; b=Gr48zepa2VPc7fD7TBJQ26caC2ZzVbl/pJsJR8WdSaS6PI9S2LdjVZk3mhJYdC8Y2M VjYirLcXf4tEDqT2zz+Ap0/in5Hsoao9NmjqX8AkvQafnaZf0Oi6otiPVapjM3YZjjDY t/mx488WeM1zSkhcarbhPP3N1lh4AfC+5s3whq/jDapznKNhF7YknXeEj0xNmRzCQjSe Ia6zS8jubRqxQS8U7BaIETSbEEqT45wTXTwekl0r7KGcdH8FZvo94T0L0Ahu6Py2pZOm yNJFqxnyOpzPyxtl37co8SSIxIHFO9vSBjDO8ryICk5+GHY6EixppvS/Qna8tFpH15uh mA4A== X-Forwarded-Encrypted: i=1; AFNElJ/EmuBpZr8DFcNlrtuVyQbdJgw8KinwlED5THJhWU5muPA38tTkuRLMUFTffTN7a/WMm4wrHU4+sqjXkJ8=@vger.kernel.org X-Gm-Message-State: AOJu0Ywgz4Qd4kk4BQkcJMPOj8NXKT1sEOP1ytim7Vso1Qd3+RJ3Y2k4 qcTGWOcU4UAnIrD4n1r33e6BEXwVx4stTLg5g5gpBlC2jH/KRh72qdOJZxzHALD6juRNVA== X-Gm-Gg: AeBDiescVX7+bAT02f/I9FnXbceGQigRgYKmzrWgNtP+1dsObKSHeGcHtrOYhj2Hsd0 DxSNDg5wBZ1ATQWgIHAlpG1BSe8iazSdszxOlrf6eBrH6GcG6kHKs4a/W1LydmKD23aAADAS2Ww nQjczQuoxVD8rDlXZVTaCHyR8wanhxBD5rXNbArpVl8QHG+/1/o+ufCNVmwVxzr6l7yf1FF+iiD bS3UbUw1hMXb1QNPlgf4IUlXCSOJbKomLuwfDtF3vcnuysf0V1pldk4p4W1+lFqtJQ/bwPG8X+J tUwP8XZg25sEldXZGfjfW5gWU7NYFWm/GUfdUQ1xCsVyW5+a54hcWXbm/CZFpeVmtnFH0N5Mv1m HqxX2eBTvxB/Mlllmv6DYp/SCRpDybg7wrjA1Gsp24hnOo2MvkxB2sw1/aWAEZtZjWbby/qrbWn UAHAYLSm8OaT5aLKm+8Z2CxccVjhjf8bzbRO6D X-Received: by 2002:a05:6830:6a88:b0:7d7:d524:bc8a with SMTP id 46e09a7af769-7e1def078b1mr4464120a34.9.1778159757284; Thu, 07 May 2026 06:15:57 -0700 (PDT) Received: from houminxi ([72.244.37.221]) by smtp.gmail.com with ESMTPSA id 46e09a7af769-7deca826dbesm14047117a34.12.2026.05.07.06.15.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 May 2026 06:15:56 -0700 (PDT) From: Minxi Hou To: netdev@vger.kernel.org Cc: aconole@redhat.com, echaudro@redhat.com, i.maximets@ovn.org, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, horms@kernel.org, shuah@kernel.org, dev@openvswitch.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Minxi Hou Subject: [PATCH net-next v7 0/2] selftests: openvswitch: add pop_vlan test Date: Thu, 7 May 2026 21:15:39 +0800 Message-ID: <20260507131541.2331771-1-houminxi@gmail.com> X-Mailer: git-send-email 2.53.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Add test_pop_vlan() to verify OVS kernel datapath pop_vlan action correctly strips 802.1Q VLAN tags from frames. Patch 1 extends ovs-dpctl.py with vlan(vid=X,pcp=Y,cfi=Z) formatting and parsing, plus an encap_ovskey subclass for safe ENCAP NLA decoding. It changes OVS_KEY_ATTR_VLAN type from uint16 to be16 to match the kernel __be16 wire format. It also adds push_vlan action support (parse/format with range validation) and removes the unnecessary MAX_ENCAP_DEPTH limit. Patch 2 adds the selftest using purely ping-based verification with a push_vlan return flow for symmetric bidirectional testing. Tested with vng on x86_64, all OVS selftests pass (including new test_pop_vlan). v7: - remove slot number comments from encap_ovskey nla_map, keep only comments explaining differences from base ovskey class - remove explicit modprobe 8021q pre-flight check (ip link add type vlan auto-loads the module) v6: https://lore.kernel.org/netdev/20260506131218.1880852-1-houminxi@gmail.com/ - fix non-ASCII characters (em dashes) in comments and commit messages v5: https://lore.kernel.org/netdev/20260505124957.1239812-1-houminxi@gmail.com/ - add push_vlan action class, dpstr format and parse with range validation (vid 0-4095, pcp 0-7, tpid 0-0xFFFF, CFI forced to 1) - remove MAX_ENCAP_DEPTH constant and depth tracking (bracket-depth counter in encap parser already handles nesting) - remove start_capture/stop_capture helpers and tcpdump/pcap verification -- use ping success/failure instead - remove modprobe/netns pre-flight checks (other tests don't do this) - remove ethtool VLAN offload disable (unnecessary for veth) - add push_vlan return flow for symmetric bidirectional ping - use ovs_sbx wrapper for ping commands (consistent with siblings) v4: https://lore.kernel.org/netdev/20260504123713.555461-1-houminxi@gmail.com/ - fix all checkpatch line-length warnings in new code - fix pylint W0707: use explicit exception chaining (from exc) v3: https://lore.kernel.org/netdev/20260503120946.51869-1-houminxi@gmail.com/ - encap_ovskey: MPLS type "ovs_key_mpls" -> "array(ovs_key_mpls)" - encap_ovskey: PRIORITY/IN_PORT set to "none" (metadata, not in ENCAP) - _vlan_dpstr: cfi=0 falls back to tci=0x%04x for round-trip safety - encap parse(): check return value for unrecognized trailing content - vlan parser: boundary check + raise-from for exception chaining - start_capture: || return $? to propagate ksft_skip correctly - on_exit: moved after resource creation, not before - ping success: changed from NOTE to FAIL + return 1 - VLAN interface creation: added || return 1 error propagation - netns probe: distinguish EEXIST from missing CONFIG_NET_NS - sbx_add: || return $ksft_skip -> || return $? (match sibling tests) v2: https://lore.kernel.org/netdev/20260501133924.3100680-1-houminxi@gmail.com/ Minxi Hou (2): selftests: openvswitch: add vlan() and encap() flow string parsing selftests: openvswitch: add pop_vlan test .../selftests/net/openvswitch/openvswitch.sh | 73 ++++ .../selftests/net/openvswitch/ovs-dpctl.py | 322 +++++++++++++++++- 2 files changed, 385 insertions(+), 10 deletions(-) -- 2.53.0