2022-05-10 15:04:18

by kernel test robot

[permalink] [raw]
Subject: [nf_flowtable] 2cd764935d: kernel-selftests.netfilter.nft_flowtable.sh.ipsec_tunnel_mode_for_ns1/ns2.fail



Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: 2cd764935de4447e8e3f1ec534b4700206857683 ("[PATCH] nf_flowtable: nft_flow_route use more data for reverse route")
url: https://github.com/intel-lab-lkp/linux/commits/Sven-Auhagen/nf_flowtable-nft_flow_route-use-more-data-for-reverse-route/20220427-151900
base: https://git.kernel.org/cgit/linux/kernel/git/pablo/nf.git master
patch link: https://lore.kernel.org/netfilter-devel/[email protected]

in testcase: kernel-selftests
version: kernel-selftests-x86_64-a6eb654d-1_20220501
with following parameters:

group: netfilter
ucode: 0xec

test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel.
test-url: https://www.kernel.org/doc/Documentation/kselftest.txt


on test machine: 8 threads Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz with 28G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):




If you fix the issue, kindly add following tag
Reported-by: kernel test robot <[email protected]>



# selftests: netfilter: nft_flowtable.sh
# PASS: netns routing/connectivity: ns1 can reach ns2
# FAIL: file mismatch for ns1 -> ns2
# -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4
# -rw------- 1 root root 99388 May 8 22:05 /tmp/tmp.LL8ohakyGQ
# FAIL: file mismatch for ns1 <- ns2
# -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX
# -rw------- 1 root root 15584 May 8 22:05 /tmp/tmp.HnObAriWng
# FAIL: flow offload for ns1/ns2:
# table inet filter {
# flowtable f1 {
# hook ingress priority 0
# devices = { veth0, veth1 }
# }
#
# chain forward {
# type filter hook forward priority 0; policy drop;
# oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0
# tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 14 bytes 103660
# tcp flags fin,rst ct mark set 0x00000000 accept
# meta length > 1500 accept comment "something-to-grep-for"
# tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop
# ct state established,related accept
# meta length < 200 oif "veth1" tcp dport 12345 counter packets 1 bytes 60 accept
# meta l4proto icmp accept
# meta l4proto ipv6-icmp accept
# }
# }
# /dev/stdin:4:73-74: Error: syntax error, unexpected to, expecting newline or semicolon
# meta iif "veth0" ip daddr 10.6.6.6 tcp dport 1666 counter dnat ip to 10.0.2.99:12345
# ^^
# FAIL: file mismatch for ns1 -> ns2
# -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4
# -rw------- 1 root root 0 May 8 22:05 /tmp/tmp.LL8ohakyGQ
# FAIL: file mismatch for ns1 <- ns2
# -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX
# -rw------- 1 root root 0 May 8 22:05 /tmp/tmp.HnObAriWng
# FAIL: flow offload for ns1/ns2 with NAT
# table inet filter {
# flowtable f1 {
# hook ingress priority 0
# devices = { veth0, veth1 }
# }
#
# chain forward {
# type filter hook forward priority 0; policy drop;
# oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0
# tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 15 bytes 103980
# tcp flags fin,rst ct mark set 0x00000000 accept
# meta length > 1500 accept comment "something-to-grep-for"
# tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop
# ct state established,related accept
# meta length < 200 oif "veth1" tcp dport 12345 counter packets 4 bytes 240 accept
# meta l4proto icmp accept
# meta l4proto ipv6-icmp accept
# }
# }
# FAIL: file mismatch for ns1 -> ns2
# -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4
# -rw------- 1 root root 0 May 8 22:05 /tmp/tmp.LL8ohakyGQ
# FAIL: file mismatch for ns1 <- ns2
# -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX
# -rw------- 1 root root 0 May 8 22:05 /tmp/tmp.HnObAriWng
# FAIL: flow offload for ns1/ns2 with NAT and pmtu discovery
# table inet filter {
# flowtable f1 {
# hook ingress priority 0
# devices = { veth0, veth1 }
# }
#
# chain forward {
# type filter hook forward priority 0; policy drop;
# oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0
# tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 16 bytes 104300
# tcp flags fin,rst ct mark set 0x00000000 accept
# tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop
# ct state established,related accept
# meta length < 200 oif "veth1" tcp dport 12345 counter packets 7 bytes 420 accept
# meta l4proto icmp accept
# meta l4proto ipv6-icmp accept
# }
# }
# /dev/stdin:5:71-72: Error: syntax error, unexpected to, expecting newline or semicolon
# meta iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter dnat ip to 10.0.2.99:12345
# ^^
# FAIL: file mismatch for ns1 -> ns2
# -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4
# -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.LL8ohakyGQ
# FAIL: file mismatch for ns1 <- ns2
# -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX
# -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.HnObAriWng
# FAIL: flow offload for ns1/ns2 with bridge NAT
# table inet filter {
# flowtable f1 {
# hook ingress priority 0
# devices = { veth0, veth1 }
# }
#
# chain forward {
# type filter hook forward priority 0; policy drop;
# oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0
# tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 17 bytes 104620
# tcp flags fin,rst ct mark set 0x00000000 accept
# tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop
# ct state established,related accept
# meta length < 200 oif "veth1" tcp dport 12345 counter packets 10 bytes 600 accept
# meta l4proto icmp accept
# meta l4proto ipv6-icmp accept
# }
# }
# FAIL: file mismatch for ns1 -> ns2
# -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4
# -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.LL8ohakyGQ
# FAIL: file mismatch for ns1 <- ns2
# -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX
# -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.HnObAriWng
# FAIL: flow offload for ns1/ns2 with bridge NAT and VLAN
# table inet filter {
# flowtable f1 {
# hook ingress priority 0
# devices = { veth0, veth1 }
# }
#
# chain forward {
# type filter hook forward priority 0; policy drop;
# oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0
# tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 17 bytes 104620
# tcp flags fin,rst ct mark set 0x00000000 accept
# tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop
# ct state established,related accept
# meta length < 200 oif "veth1" tcp dport 12345 counter packets 13 bytes 780 accept
# meta l4proto icmp accept
# meta l4proto ipv6-icmp accept
# }
# }
# Error: Could not process rule: No such file or directory
# delete table ip nat
# ^^^^^^^^^^^^^^^^^^^^
# FAIL: file mismatch for ns1 -> ns2
# -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4
# -rw------- 1 root root 12512 May 8 22:06 /tmp/tmp.LL8ohakyGQ
# FAIL: file mismatch for ns1 <- ns2
# -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX
# -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.HnObAriWng
# FAIL: ipsec tunnel mode for ns1/ns2
# table inet filter {
# flowtable f1 {
# hook ingress priority 0
# devices = { veth0, veth1 }
# }
#
# chain forward {
# type filter hook forward priority 0; policy drop;
# oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0
# tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 22 bytes 121550
# tcp flags fin,rst ct mark set 0x00000000 accept
# tcp sport 12345 ct mark 0x00000001 counter packets 83 bytes 26278 log prefix "mark failure " drop
# ct state established,related accept
# meta length < 200 oif "veth1" tcp dport 12345 counter packets 14 bytes 840 accept
# meta l4proto icmp accept
# meta l4proto ipv6-icmp accept
# }
# }
# XfrmInError 0
# XfrmInBufferError 0
# XfrmInHdrError 0
# XfrmInNoStates 0
# XfrmInStateProtoError 0
# XfrmInStateModeError 0
# XfrmInStateSeqError 0
# XfrmInStateExpired 0
# XfrmInStateMismatch 0
# XfrmInStateInvalid 0
# XfrmInTmplMismatch 0
# XfrmInNoPols 0
# XfrmInPolBlock 0
# XfrmInPolError 0
# XfrmOutError 0
# XfrmOutBundleGenError 0
# XfrmOutBundleCheckError 0
# XfrmOutNoStates 0
# XfrmOutStateProtoError 0
# XfrmOutStateModeError 0
# XfrmOutStateSeqError 0
# XfrmOutStateExpired 0
# XfrmOutPolBlock 0
# XfrmOutPolDead 0
# XfrmOutPolError 0
# XfrmFwdHdrError 0
# XfrmOutStateInvalid 0
# XfrmAcquireError 0
not ok 6 selftests: netfilter: nft_flowtable.sh # exit=1



To reproduce:

git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
sudo bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
sudo bin/lkp run generated-yaml-file

# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.



--
0-DAY CI Kernel Test Service
https://01.org/lkp



Attachments:
(No filename) (9.85 kB)
config-5.18.0-rc1-00127-g2cd764935de4 (169.67 kB)
job-script (6.34 kB)
dmesg.xz (33.84 kB)
kernel-selftests (25.53 kB)
job.yaml (5.13 kB)
reproduce (162.00 B)
Download all attachments