Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4076838imu; Tue, 18 Dec 2018 08:41:56 -0800 (PST) X-Google-Smtp-Source: AFSGD/X4pvc/3fmmsTw3S480u0jLHFfoIqolt/+eicKCH8oZkzPXCIedLtymJTTWttdNL87abNk/ X-Received: by 2002:a63:7219:: with SMTP id n25mr16531124pgc.324.1545151316300; Tue, 18 Dec 2018 08:41:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545151316; cv=none; d=google.com; s=arc-20160816; b=n+WVQWhFqwJHOkqZGZHvmNxVUXyqNiCM+ut+ahrZc3z7Ddt2/UJDCh2tkHsV/FNnBY bFMJQEgPyfjvxMLZYpAZbmSCxrPfgN3q3O4ioj3VwvSkT1OZqaTE2joH7jVaJ5MMzql6 M3jEj5fFPrMisyn9vWDqVSbZzKo15qQfkWWJX4NBu7YMufZzjXoAl5DRO9D+I+ETJhm3 bu1APlXLejKM9+LRQN0D2A47RknBHVHoqUHdMU+U2ee9GAOX4amJ0AAEYyqbLs/gaUjd udVuqS3w5fvkbH3XZbSWO44ZOO5uujozMZbrNkx3UxYnb/hqN6sJcNWwqtf2KWncpR9y 2Tww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:from:references:to:subject:cc :dkim-signature; bh=6HpRSAOxlCyi0OWTFvflnj2CYme3RasMPz+oPuzQIGg=; b=VzfAfH8V2HVTgKKQJDpzj3pw6dRB2Drn8dysVm8cK0gdBUdFsDFXj5CnyAmdQsVvFv DvjX55AFo93QCRu0CrmWfZ4zfctE1Hp6ILnKW26vZASiqT0nfXFV5biGELYUCNj35Lac EggO71FyUwuNYXmj3WU8MTw4a95BGc7+rbwDrblATn5RLMTXggDGddEqUT0fdOvd20A2 1RUDCky4TeIlNLWQJHyECP4A6QacCxTHdN2p/G7wkzJ6YY622VxPEW/049YkLpOmw6Bc 2HH3QPL29cMPIotuyLm2qBSSSTYZKHprX3byrDC+OQJNObjmbo03m+x27/GVQ1c9Tmag 3AaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=MYbTRI64; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q14si13579889pgq.197.2018.12.18.08.41.32; Tue, 18 Dec 2018 08:41:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=MYbTRI64; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726932AbeLRPgz (ORCPT + 99 others); Tue, 18 Dec 2018 10:36:55 -0500 Received: from mail-qk1-f193.google.com ([209.85.222.193]:44452 "EHLO mail-qk1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726840AbeLRPgz (ORCPT ); Tue, 18 Dec 2018 10:36:55 -0500 Received: by mail-qk1-f193.google.com with SMTP id n12so9684962qkh.11 for ; Tue, 18 Dec 2018 07:36:51 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=cc:subject:to:references:from:organization:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=6HpRSAOxlCyi0OWTFvflnj2CYme3RasMPz+oPuzQIGg=; b=MYbTRI64ofdLfo5h6jTx9uplhdfX1ROq1iDPLmq7/d2xQkgUi+GzHQF4zrbxUKjrU/ rPQU838wD427LQuBQMqcn8VSD5Aeu7GXYSvAmGf82tz+X+HW2PN5uK1ddJUSDpyuJ/7g b+ayKVt+U+b6TshrPcGXbHdFJRhw1bp15KBPs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:cc:subject:to:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=6HpRSAOxlCyi0OWTFvflnj2CYme3RasMPz+oPuzQIGg=; b=ePQFiZePU+QpfAfDY0zwKPFFfGqg/ZcFEzFR8cq3wPim4M0eDqMSQOScZYhhnmEVQE XXjRZQcXUwMJksSNyazaM+Yuukery0ldG0EjqUg6Qq9qp0Id5ncjMu/NNBr7cd1boE78 hyUgIvZA+r5ncQZhVeu810qCSV3a2LpXFrcxFmisiIsGREfAQ+CtbeiCJa+ww23T9Pv8 a//M/tm3VJLceOYcO944No9e0grQjuuODCkbvKnrVluPp4Ajx5svfglOKtS9yGklub+r jCiQC4h7uuiJF6mzk34gaE5KbISl2eCwwWHpDVp0xWCYHrRZjWddwEVjFRfaSPn6Addu J4eg== X-Gm-Message-State: AA+aEWYjNSl9GANl4KJHAIb6ZA8Ou0F8lT4XCPUob+pRfNrFz/1tT+Rv UavwRH5lCwwlgCjypk8cP1WlRjOeFqsKiQ== X-Received: by 2002:a37:5bc1:: with SMTP id p184mr17083213qkb.121.1545147410850; Tue, 18 Dec 2018 07:36:50 -0800 (PST) Received: from [192.168.49.18] ([138.204.25.31]) by smtp.gmail.com with ESMTPSA id c77sm186584qkh.82.2018.12.18.07.36.47 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 18 Dec 2018 07:36:50 -0800 (PST) Cc: Rafael David Tinoco , "David S. Miller" , netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Willem de Bruijn , Dan Rue , Anders Roxell Subject: Re: selftests/net: udpgso: LTS kernels supportability ? To: shuah References: <1d2c9a10-6caf-49ff-b921-8b93dbe96f78@kernel.org> <1de7a003-0aac-1f4f-b836-267136e30a0a@linaro.org> From: Rafael David Tinoco Organization: Linaro Message-ID: Date: Tue, 18 Dec 2018 13:36:46 -0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/18/18 12:53 PM, shuah wrote: > On 12/18/18 4:37 AM, Rafael David Tinoco wrote: >> On 12/17/18 4:42 PM, shuah wrote: >>> Hi Rafael, >>> >>> On 12/17/18 10:53 AM, Rafael David Tinoco wrote: >>>> Shuah, >>>> >>>> I was recently investigating some errors coming out of our functional >>>> tests and we, Dan and I, came up with a discussion that might not be >>>> new >>>> for you, but, interests us, in defining how to better use kselftests as >>>> a regression mechanism/tool in our LKFT (https://lkft.linaro.org). >>>> >>>> David / Willem, >>>> >>>> I'm only using udpgso as an example for what I'd like to ask Shuah. >>>> Feel >>>> free to jump in in the discussion if you think its worth. >>>> >>>> All, >>>> >>>> Regarding: udpgso AND https://bugs.linaro.org/show_bug.cgi?id=3980 >>>> >>>> udpgso tests are failing in kernels bellow 4.18 because of 2 main >>>> reasons: >>>> >>>> 1) udp4_ufo_fragment does not seem to demand the GSO SKB to be > than >>>> the MTU for older kernels (4th test case in udpgso.c). >>>> >>>> 2) setsockopt(...UDP_SEGMENT) support is not present for older kernels. >>>> (commits "udp: generate gso with UDP_SEGMENT" and its fixes seem to be >>>> needed). >>> >>> This case is easy right? Based on the test output below , I can see that >>> the failure is due to >>> >>> ./udpgso: setsockopt udp segment: Protocol not available. setsockopt() >>> is returning an error to clearly indicate that this options isn't >>> supported. This will be a test change to say test is a skip as opposed >>> to fail. >> >> You referred to (2). (1) isn't that straightforward. >> >>> We have a solution for this - test should SKIP as opposed to FAIL. >>> >>>> With that explained, finally the question/discussion: >>>> >>>> Shouldn't we enforce a versioning mechanism for tests that are testing >>>> recently added features ? I mean, some of the tests inside udpgso >>>> selftest are good enough for older kernels... >>> >>> Right - we do have generic way to handle that by detecting if feature is >>> supported and skip instead of using Kernel version which is going to be >>> hard to maintain. >> >> You can't distinguish case (1) failures between real failures OR older >> kernel behaving differently then testcase expects. >> >>>> >>>> But, because we have no control over "kernel features" and "supported >>>> test cases", we, Linaro, have to end up blacklisting all selftests that >>>> have new feature oriented tests, because one or two test cases only. >>>> > > Can you share the blacklisted tests? Sure! The following yaml file: https://github.com/Linaro/qa-reports-known-issues/blob/master/kselftests-production.yaml Contains a list of all "known issues" for kselftests running in LKFT. 1 entry example (this particular one): - environments: *environments_all notes: > LKFT: net: udpgso.sh PASS on 4.18 and failed on 4.17 and below projects: - lkft/linux-stable-rc-4.14-oe - lkft/linux-stable-rc-4.9-oe - lkft/linux-stable-rc-4.4-oe - lkft/linaro-hikey-stable-rc-4.4-oe test_names: - kselftest/net_udpgso.sh - kselftest-vsyscall-mode-none/net_udpgso.sh - kselftest-vsyscall-mode-native/net_udpgso.sh url: https://bugs.linaro.org/show_bug.cgi?id=3980 active: true intermittent: false Tells us: Its a known issue for all environments (arm, arm64, x86, x86_64, qemus, etc) and kernels 4.14, 4.9 and 4.4. The "url" shows our internal bug related to the known issue/investigation. With that, we don't consider it as a regression when this test fails for 4.14, 4.9 and 4.4 in any existing environment (boards, qemu/kvm, hosts, diff archs). I hope it helps you, Cheers o/ -- Rafael D. Tinoco Linaro - Kernel Validation