lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <cf2b6d442c7e066ddb404f0e688dd43497cf93d0.camel@redhat.com> Date: Tue, 05 Jul 2022 09:54:04 +0200 From: Paolo Abeni <pabeni@...hat.com> To: Andrea Mayer <andrea.mayer@...roma2.it>, "David S. Miller" <davem@...emloft.net>, Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>, David Ahern <dsahern@...nel.org>, Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Shuah Khan <shuah@...nel.org>, Anton Makarov <anton.makarov11235@...il.com>, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, linux-kselftest@...r.kernel.org Cc: Stefano Salsano <stefano.salsano@...roma2.it>, Paolo Lungaroni <paolo.lungaroni@...roma2.it>, Ahmed Abdelsalam <ahabdels.dev@...il.com> Subject: Re: [net-next v4 4/4] selftests: seg6: add selftest for SRv6 H.L2Encaps.Red behavior On Fri, 2022-07-01 at 17:01 +0200, Andrea Mayer wrote: > This selftest is designed for testing the H.L2Encaps.Red behavior. It > instantiates a virtual network composed of several nodes: hosts and SRv6 > routers. Each node is realized using a network namespace that is > properly interconnected to others through veth pairs. > The test considers SRv6 routers implementing a L2 VPN leveraged by hosts > for communicating with each other. Such routers make use of the SRv6 > H.L2Encaps.Red behavior for applying SRv6 policies to L2 traffic coming > from hosts. > > The correct execution of the behavior is verified through reachability > tests carried out between hosts belonging to the same VPN. > > Signed-off-by: Andrea Mayer <andrea.mayer@...roma2.it> It looks like the same remarks I made on the previous patch apply here, too. Cheers, Paolo
Powered by blists - more mailing lists