Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp5148568imm; Tue, 19 Jun 2018 05:59:36 -0700 (PDT) X-Google-Smtp-Source: ADUXVKITNhtnQR/je3q5WLWMdL/cSIHskSUGvRvgn37PS6Sa+lpSRF3wl1QBIny9UyRpj8+o6vh7 X-Received: by 2002:a63:6642:: with SMTP id a63-v6mr14558826pgc.408.1529413176291; Tue, 19 Jun 2018 05:59:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529413176; cv=none; d=google.com; s=arc-20160816; b=LdJcv1j41f2HOUS1IvxtpW4r5IA29dNlCz0cj3HLlvsW3fTRyEahBorbx4sxGE7uy2 0O3GcRHARG/LJc43pC4iacTikjg1zW0begtdnHNTVN0K0zskS1Ft3m2G34uyKakzGzN+ mXmqeGF0fsWhoGCMA+921GIW1c1xfSKp67V6gu3pWRquU1mDJcjvDvMWW7YKnq0WJu1t LNjQ59er6rB7wn38k73zl/OvsFWMmNN6DJ36b3R4W0hlbQyvQrgQnlXbWCyAG1U5xsEi I55P7ljYLrd3yfhodz9nZdyHZ9y0u8/LBAfzcKbJbHTYEu7ron5RRkyID+TQVYEfRAkg 2hVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=XoxrUacn2pppdp5q/J+79P5xzJo9E1IGirns39fjvhk=; b=w2hdWEHxt1+m89VFZV7FSwG/snLBBW7ZRt3BMoJYYWf9Zm5J/EKctFh04UFBvEULhP /luaPE+WDskFWKa1YmLpHloziIQhD5YZaZ579p/dHs8V1xJ/9I+p40NV4f++9KUj/Xqn PcdmOx5H4cspTqjSOrFzKWS0p0agFb+9xr9JRqb8Ac8Qs33oFZhpW8aazlSohgdbZv34 WA/7Sei4kCHkARHFGXtoxJMLNBg6bbhscLY6CW4ALX4EO8P+PDbzgL8EbOSLgQ/tcNYM F3zDhvcIXbvmJVYZ/lkLOcBmz21SfWTmOa7Bp2TUQYpG+Q5LbFoN609znUWfCHVGkFXP 0oDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Fj5874Ex; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v6-v6si17458998plp.60.2018.06.19.05.59.22; Tue, 19 Jun 2018 05:59:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Fj5874Ex; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S937999AbeFSM45 (ORCPT + 99 others); Tue, 19 Jun 2018 08:56:57 -0400 Received: from mail-qk0-f194.google.com ([209.85.220.194]:34608 "EHLO mail-qk0-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S937770AbeFSM4w (ORCPT ); Tue, 19 Jun 2018 08:56:52 -0400 Received: by mail-qk0-f194.google.com with SMTP id q70-v6so11267534qke.1; Tue, 19 Jun 2018 05:56:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=XoxrUacn2pppdp5q/J+79P5xzJo9E1IGirns39fjvhk=; b=Fj5874ExHyOqWCqUUjAlXUJ+qlP+IJhoI5JQ6gc9EOm8hsZXyanrNdfC0RRcNjDyYT UJ8zNZlJia6H2d8zv8nQUzpu8jZ9AsYDL/5GWYV+mO69hJdvcMQ7gfFcuqVZO5K5ZPDg +j93E94xAs7sMbq0mPXEfVYv7A5i/OCYqaDUFCA/+efWJnFGWFlISosP+onboA71BQLA rUqNY75LURj1M2XInAUtiqcM6bDNKW+D0a92YvD0GN3Kx+o9NE4ZLwHf9/8jgrcre08J au9npyXE3uI+xogVYZvleXPjOjSMuFXw4ydJRLx9IV5/LE/ExTJmYXDQDekYrdWihN8n kw4w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=XoxrUacn2pppdp5q/J+79P5xzJo9E1IGirns39fjvhk=; b=Qx1bv7u/NnlaJ1C69qmZugKN9t5xcW8yYXSjyufGi0DbGEabaSVjPxDFOVW7bVSYur 4LVxvV5M/rcVZMaGhEexWzHMmBTItZpoA+R6E3+USZUUcnmWsBZvEDA/UbiT6uczWMnM TpBbtEwgzRwrBJtAiHH/mNCC3d5xuOjtrL3xyDCzcr4jxA2bZ3hLJTbcGblLYjW/9gBR 8Fzh2CRxSND2x78i2T3RtHJGNXydfYPhMuqwBPzzJIrPzbacTP2qE0xarNGAGNDkBBEk QSxgsXzfv8t87yetVm0XmnXy5Nv/dGTMkMn4y7MIgbS+7/kkRXShPVh5j0vLKj+1VYOs wBhA== X-Gm-Message-State: APt69E1GA85phs3tgfDPss+vTrOGe0mX9CejVKGEgiVG/q7VfKo5mcq8 Z4CwtlSn29QUETBSPD8CXD2RfQc7P4jNHux5WD5nHdFt X-Received: by 2002:a37:db0a:: with SMTP id e10-v6mr13500415qki.136.1529413011004; Tue, 19 Jun 2018 05:56:51 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:ac8:22b2:0:0:0:0:0 with HTTP; Tue, 19 Jun 2018 05:56:10 -0700 (PDT) In-Reply-To: References: <20180612110510.11731-1-anders.roxell@linaro.org> From: William Tu Date: Tue, 19 Jun 2018 05:56:10 -0700 Message-ID: Subject: Re: [PATCH] selftests: bpf: config: add config fragments To: Anders Roxell Cc: Daniel Borkmann , Alexei Starovoitov , Shuah Khan , Networking , Linux Kernel Mailing List , "open list:KERNEL SELFTEST FRAMEWORK" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 14, 2018 at 11:41 PM, Anders Roxell wrote: > On Thu, 14 Jun 2018 at 14:09, William Tu wrote: >> >> On Thu, Jun 14, 2018 at 4:42 AM, Anders Roxell wrote: >> > On 14 June 2018 at 13:06, William Tu wrote: >> >> On Tue, Jun 12, 2018 at 5:08 PM, Daniel Borkmann wrote: >> >>> On 06/12/2018 01:05 PM, Anders Roxell wrote: >> >>>> Tests test_tunnel.sh fails due to config fragments ins't enabled. >> >>>> >> >>>> Fixes: 933a741e3b82 ("selftests/bpf: bpf tunnel test.") >> >>>> Signed-off-by: Anders Roxell >> >>>> --- >> >>>> >> >>>> All tests passes except ip6gretap that still fails. I'm unsure why. >> >>>> Ideas? >> >> >> >> Hi Anders, >> >> >> >> ip6erspan is based on ip6gretap, does ip6erspan pass? >> > >> > it did pass when I was sending the email. >> > However, I retested this on next-20180613 and now it fails. >> > >> Does 'ip -s link show' show any errors/dropped on ip6gretap device? > > I rerun the test_ip6gretap test only and added "set -x" to > test_tunnel.sh here's the output. > I added "ip -s link show ip6gretap11" before the cleanup function in the script. > > # ./test_tunnel.sh > + PING_ARG='-c 3 -w 10 -q' > + ret=0 > + GREEN='\033[0;92m' > + RED='\033[0;31m' > + NC='\033[0m' > + trap cleanup 0 3 6 > + trap cleanup_exit 2 9 > + cleanup > + ip netns delete at_ns0 > + ip link del veth1 > + ip link del ipip11 > + ip link del ipip6tnl11 > + ip link del gretap11 > + ip link del ip6gre11 > + ip link del ip6gretap11 > + ip link del vxlan11 > + ip link del ip6vxlan11 > + ip link del geneve11 > + ip link del ip6geneve11 > + ip link del erspan11 > + ip link del ip6erspan11 > + bpf_tunnel_test > + echo 'Testing IP6GRETAP tunnel...' > Testing IP6GRETAP tunnel... > + test_ip6gretap > + TYPE=ip6gretap > + DEV_NS=ip6gretap00 > + DEV=ip6gretap11 > + ret=0 > + check ip6gretap > + ip link help ip6gretap > + grep -q '^Usage:' > + '[' 0 -ne 0 ']' > + config_device > + ip netns add at_ns0 > + ip link add veth0 type veth peer name veth1 > + ip link set veth0 netns at_ns0 > + ip netns exec at_ns0 ip addr add 172.16.1.100/24 dev veth0 > + ip netns exec at_ns0 ip link set dev veth0 up > + ip link set dev veth1 up mtu 1500 > + ip addr add dev veth1 172.16.1.200/24 > + add_ip6gretap_tunnel > + ip netns exec at_ns0 ip addr add ::11/96 dev veth0 > + ip netns exec at_ns0 ip link set dev veth0 up > + ip addr add dev veth1 ::22/96 > + ip link set dev veth1 up > + ip netns exec at_ns0 ip link add dev ip6gretap00 type ip6gretap seq > flowlabel 0xbcdef key 2 local ::11 remote ::22 > + ip netns exec at_ns0 ip addr add dev ip6gretap00 10.1.1.100/24 > + ip netns exec at_ns0 ip addr add dev ip6gretap00 fc80::100/96 > + ip netns exec at_ns0 ip link set dev ip6gretap00 up > + ip link add dev ip6gretap11 type ip6gretap external > + ip addr add dev ip6gretap11 10.1.1.200/24 > + ip addr add dev ip6gretap11 fc80::200/24 > + ip link set dev ip6gretap11 up > + attach_bpf ip6gretap11 ip6gretap_set_tunnel ip6gretap_get_tunnel > + DEV=ip6gretap11 > + SET=ip6gretap_set_tunnel > + GET=ip6gretap_get_tunnel > + tc qdisc add dev ip6gretap11 clsact > + tc filter add dev ip6gretap11 egress bpf da obj test_tunnel_kern.o > sec ip6gretap_set_tunnel > + tc filter add dev ip6gretap11 ingress bpf da obj test_tunnel_kern.o > sec ip6gretap_get_tunnel > + ping6 -c 3 -w 10 -q ::11 > PING ::11 (::11): 56 data bytes > > --- ::11 ping statistics --- > 5 packets transmitted, 3 packets received, 40% packet loss > round-trip min/avg/max = 0.139/1.857/5.293 ms > + ip netns exec at_ns0 ping -c 3 -w 10 -q 10.1.1.200 > PING 10.1.1.200 (10.1.1.200): 56 data bytes > > --- 10.1.1.200 ping statistics --- > 3 packets transmitted, 3 packets received, 0% packet loss > round-trip min/avg/max = 0.214/0.256/0.305 ms > + ping -c 3 -w 10 -q 10.1.1.100 > PING 10.1.1.100 (10.1.1.100): 56 data bytes > > --- 10.1.1.100 ping statistics --- > 3 packets transmitted, 3 packets received, 0% packet loss > round-trip min/avg/max = 0.210/0.211/0.213 ms > + check_err 0 > + '[' 0 -eq 0 ']' > + ret=0 > + ip netns exec at_ns0 ping6 -c 3 -w 10 -q fc80::200 > PING fc80::200 (fc80::200): 56 data bytes > > --- fc80::200 ping statistics --- > 10 packets transmitted, 0 packets received, 100% packet loss > + check_err 1 > + '[' 0 -eq 0 ']' > + ret=1 > + ip -s link show ip6gretap11 > 19: ip6gretap11@NONE: mtu 1434 qdisc > pfifo_fast state UNKNOWN mode DEFAULT group default qlen 1000 > link/ether de:d2:0c:53:80:8c brd ff:ff:ff:ff:ff:ff > RX: bytes packets errors dropped overrun mcast > 2096 25 0 0 0 0 > TX: bytes packets errors dropped carrier collsns > 5324 36 5 5 0 0 So there are 5 errors at TX. I couldn't reproduce in my local machine using 4.17-rc6. How do I checkin the "next-20180613" source code? Thanks William