Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp5607014imm; Tue, 26 Jun 2018 14:28:46 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJPrr9KFRzIYgFYhMf9RAYIHlIALlm6rbcmdKznHnT2YRzkhOJNfFmpddDGbg9QcLpoOotK X-Received: by 2002:a17:902:8a94:: with SMTP id p20-v6mr3197364plo.258.1530048526380; Tue, 26 Jun 2018 14:28:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530048526; cv=none; d=google.com; s=arc-20160816; b=GfLuixyQiNRQSfXdVAhNerTXjo8RSyW+UqYEZ9IcbWI9ipG95RWHfwPCJeS1glVNlT d5p6pDIIIt0eshLkvOcbuRdYiSgPxGJlEWeBbHeGCPbJBB8LuZrRChb+rWGv6ivBngt7 IbXrHmQj2edND6Hqoyy8BhZ16LmYEsMrEUHfd4Zk3R+uTNFEl53lPz+FrehVCUKS/C5E kCYocOc8WhQZ5qxr2au8BrkrIxZnne0EpS3NVbpvio7ZBFZG6khswX2sVcRSnebWD3xO E7rdhi3CUErmZEVfGsyEsniVogjJRGNL3mL4yzKUcDoIypcLrXcO6VuakIhQfeCOUrhX Vd4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=AZuGQ/ILxTWbPG9tyW8KTgAPM6QBSOYfIVs3skCeW9s=; b=YZ/OoYWxzFsvXyNbrw0HeOhnAknIiYhotLaVS4SHjxxr3W/2vtp/PFQddlvPYX+z5u 4YqLJQ7BXGcfq6eJfa9HvxxMpHa0QA1+SizuUyEX6YnRRa6wEVH4ScewFBT/hxQ3l0Kj JbymtbridT+AlJHCuJyhRTm4a3/Qj8F9XERLm8dY777OJw4Ut3nhAe2ouK2F4DNteQJz SvOhxi//kL/6wku+GA6C3jeoPut4TXNeylwq5WX98lwuIPGW8dDjqpVUKu4+s8a5UOx9 M4EQlz6yKBgjDzr/OMUFOFRTi3+D+nxqnXIq07MXYM4mhIcwL24sVf2XNyXFMsaP1Yo9 eDtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=lthS0ekw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e7-v6si2102151pgf.317.2018.06.26.14.28.31; Tue, 26 Jun 2018 14:28:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=lthS0ekw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752487AbeFZV1x (ORCPT + 99 others); Tue, 26 Jun 2018 17:27:53 -0400 Received: from mail-qt0-f196.google.com ([209.85.216.196]:41057 "EHLO mail-qt0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751879AbeFZV1v (ORCPT ); Tue, 26 Jun 2018 17:27:51 -0400 Received: by mail-qt0-f196.google.com with SMTP id y20-v6so16541732qto.8; Tue, 26 Jun 2018 14:27:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=AZuGQ/ILxTWbPG9tyW8KTgAPM6QBSOYfIVs3skCeW9s=; b=lthS0ekwd8+OTOKQpxJBMNvKrlOotmzBQBxEizkMSdM+iWBGnHTrkURORx6h+GHeM3 SuF3kwZUL+ggW0tUNa6efnlBhUxp5jvZuXvgoR4SirQ7VOLgSlFQsnxvr+C14Kx2+PWf O3QbxX4td7K1eEvRJI0XXqz97NnIvscvPMUEM0YH7Pfqm3XrR3cVzsqYCIqpxi/wvMZ9 9Ka4iOH0HO6n3uUMLJlpIn6yREg0mBrNvFPYPGDkCT6pAPww+nMMn+n3IQjPK2AzYM2p 9cT8v0lBmOIatrsNPRXhOb8rxaHOlK+4BXVxM4PpvxSirs76qNkPXLoWOh6gX267sbgp yibw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=AZuGQ/ILxTWbPG9tyW8KTgAPM6QBSOYfIVs3skCeW9s=; b=sJuFLybQwSs16QuaIPkMVpsxZ3Ggt4r67WEfVvlE0750iCAb4IpGwyRtiRxtfzEVUF 8Sx089J8+VSj69wQb/HK+JDb9PlrK/Nkik6NewrvdbcudE1KqL+3YHdjOu6he2Ut5G0t 9hd/AyTjxJKGJiavoOqrLaKuoQ4tryyuRcNWYEv7PWxZa+xGERwpcv9J/TR8fI4EwrnR ZWjIw4+860p2x6qHofuFVx1xVhTr7mdk99jGffiRc6ACS/4c+1ycjbA/sdv6+2Tp6fMT 0dxY6kugKiunSlGsO6sRwLiCBXGnnRH78QJFK8TrEIbfUauMG847yO9tC1V62DBajluA ig9A== X-Gm-Message-State: APt69E3y6G87YUb3d5rxFWH2imJEjs39SGwVJU08tWdhnMUhhUf55NFD a9IeKoD+kp9qaNmRQa0IEkItJXMfta3rON+DqaIgT4Uy X-Received: by 2002:ac8:70d8:: with SMTP id g24-v6mr3210334qtp.192.1530048470471; Tue, 26 Jun 2018 14:27:50 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:aed:23e8:0:0:0:0:0 with HTTP; Tue, 26 Jun 2018 14:27:10 -0700 (PDT) In-Reply-To: References: <20180612110510.11731-1-anders.roxell@linaro.org> From: William Tu Date: Tue, 26 Jun 2018 14:27:10 -0700 Message-ID: Subject: Re: [PATCH] selftests: bpf: config: add config fragments To: Anders Roxell Cc: Daniel Borkmann , Alexei Starovoitov , Shuah Khan , Networking , Linux Kernel Mailing List , "open list:KERNEL SELFTEST FRAMEWORK" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org >> > >> > --- ::11 ping statistics --- >> > 5 packets transmitted, 3 packets received, 40% packet loss >> > round-trip min/avg/max = 0.139/1.857/5.293 ms >> > + ip netns exec at_ns0 ping -c 3 -w 10 -q 10.1.1.200 >> > PING 10.1.1.200 (10.1.1.200): 56 data bytes >> > >> > --- 10.1.1.200 ping statistics --- >> > 3 packets transmitted, 3 packets received, 0% packet loss >> > round-trip min/avg/max = 0.214/0.256/0.305 ms >> > + ping -c 3 -w 10 -q 10.1.1.100 >> > PING 10.1.1.100 (10.1.1.100): 56 data bytes >> > >> > --- 10.1.1.100 ping statistics --- >> > 3 packets transmitted, 3 packets received, 0% packet loss >> > round-trip min/avg/max = 0.210/0.211/0.213 ms >> > + check_err 0 >> > + '[' 0 -eq 0 ']' >> > + ret=0 So looks like the ipv4 over ipv6 gre passes. >> > + ip netns exec at_ns0 ping6 -c 3 -w 10 -q fc80::200 >> > PING fc80::200 (fc80::200): 56 data bytes >> > >> > --- fc80::200 ping statistics --- >> > 10 packets transmitted, 0 packets received, 100% packet loss ` but the ipv6 over ipv6 gre fails. Do you have any firewall rules that block this traffic? or if possible, the packet might get dropped at function ip6gre_xmit_ipv6 can you print the return value of this function? >> > + check_err 1 >> > + '[' 0 -eq 0 ']' >> > + ret=1 >> > + ip -s link show ip6gretap11 >> > 19: ip6gretap11@NONE: mtu 1434 qdisc >> > pfifo_fast state UNKNOWN mode DEFAULT group default qlen 1000 >> > link/ether de:d2:0c:53:80:8c brd ff:ff:ff:ff:ff:ff >> > RX: bytes packets errors dropped overrun mcast >> > 2096 25 0 0 0 0 >> > TX: bytes packets errors dropped carrier collsns >> > 5324 36 5 5 0 0 >> >> So there are 5 errors at TX. > > and today when I tried it on next-20180620 I saw 8 errors at TX. > >> I couldn't reproduce in my local machine using 4.17-rc6. >> How do I checkin the "next-20180613" source code? > > You can find the source code here [1], and I would look in the latest tag that I > said that I was able to reproduce it on above. > > Cheers, > Anders > [1] https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/ Hi Anders, I'm still not able to reproduce the issue on next-20180620. Below is my test. Testing IP6GRETAP tunnel... PING ::11(::11) 56 data bytes --- ::11 ping statistics --- 5 packets transmitted, 3 received, 40% packet loss, time 4048ms rtt min/avg/max/mdev = 0.040/32.118/96.235/45.337 ms PING 10.1.1.200 (10.1.1.200) 56(84) bytes of data. --- 10.1.1.200 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2026ms rtt min/avg/max/mdev = 0.074/0.099/0.117/0.018 ms PING 10.1.1.100 (10.1.1.100) 56(84) bytes of data. --- 10.1.1.100 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2054ms rtt min/avg/max/mdev = 0.069/0.113/0.187/0.052 ms PING fc80::200(fc80::200) 56 data bytes --- fc80::200 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2054ms rtt min/avg/max/mdev = 0.069/0.104/0.142/0.031 ms PASS: ip6gretap root@osboxes:~/linux-next/tools/testing/selftests/bpf# root@osboxes:~/linux-next/tools/testing/selftests/bpf# uname -a Linux osboxes 4.18.0-rc1-next-20180620 #1 SMP Tue Jun 26 12:26:00 PDT 2018 x86_64 x86_64 x86_64 GNU/Linux