I simply snoop on "switch" using tcpdump, observing that there is almost no unicast packets address to external clients.
For example, snooping while I start pinging between two clients on lan1 (10.11.12.13) and lan2 (10.11.12.12) I see this:
root@OpenWrt:/# tcpdump -ni switch
[98987.064784] device switch entered promiscuous mode
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on switch, link-type EN10MB (Ethernet), capture size 262144 bytes
12:42:24.743708 STP 802.1d, Config, Flags [none], bridge-id 8025.80:e8:6f:97:78:00.8001, length 42
12:42:26.328199 IP 10.11.12.13 > 10.11.12.12: ICMP echo request, id 39923, seq 1, length 64
12:42:26.743079 STP 802.1d, Config, Flags [none], bridge-id 8025.80:e8:6f:97:78:00.8001, length 42
12:42:28.745909 STP 802.1d, Config, Flags [none], bridge-id 8025.80:e8:6f:97:78:00.8001, length 42
12:42:29.193655 DTPv1, length 38
12:42:29.697754 IP6 fe80::bea5:11ff:fe9f:e123 > ff02::1: ICMP6, router advertisement, length 120
12:42:30.748743 STP 802.1d, Config, Flags [none], bridge-id 8025.80:e8:6f:97:78:00.8001, length 42
12:42:32.748181 STP 802.1d, Config, Flags [none], bridge-id 8025.80:e8:6f:97:78:00.8001, length 42
12:42:34.751008 STP 802.1d, Config, Flags [none], bridge-id 8025.80:e8:6f:97:78:00.8001, length 42
12:42:36.750410 STP 802.1d, Config, Flags [none], bridge-id 8025.80:e8:6f:97:78:00.8001, length 42
12:42:38.753188 STP 802.1d, Config, Flags [none], bridge-id 8025.80:e8:6f:97:78:00.8001, length 42
12:42:40.752645 STP 802.1d, Config, Flags [none], bridge-id 8025.80:e8:6f:97:78:00.8001, length 42
^C
12 packets captured
There is one initial ICMP packet because the address was unknown to the switch, but it learns from that packet and none of the remaining unicast packets show up on the CPU port.
The rest of the above are all multicast packets.
Note that the difference with and without the patch is only the initial inconsistency. If you toggle learning off and on, then the bridge and DSA ports will become synchronized even without the patch.
But "no one" ever does that, making this fix critical for sane bridge behaviour.
EDIT: BTW, I've now also put the patch into one of my "production" GS1900-10HPs. There I can simply observe the port statistics to validate the patch (this was how I initially discovered the bug). Ran a series of speedtests on the NR7101 hanging off the switch for fun, getting 850 Mbps over 5G Makes it easy to verify traffic spikes on the ports involved and no others. Not to mention that I'd expect the ethernet driver to explode with something like that thrown at it.