Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp2898929ybd; Mon, 24 Jun 2019 15:00:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqzcPulGVRC00vU9+If609F2ti3ADVNATxOgLKDxumXBRr5YfMXZk7jE+cDeT8VTGExmvpca X-Received: by 2002:a17:90a:216f:: with SMTP id a102mr27855401pje.29.1561413608717; Mon, 24 Jun 2019 15:00:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561413608; cv=none; d=google.com; s=arc-20160816; b=z1O0OUGnpNpYIAnPdJ5sHYa46WUzRYtrEEKicT+IufK5hfX7AOzVY04tdzOudvc4FI 28p/91RqwzKX8h7ly18ArIK+GiUbWunzV+H2JUKLc6V1uS/EZqe6Zl+Y2cCIKA5vuFUA 0fX6COdY7e7zQ1A/h09h50CKykbtvUPMbI+exmiDf29GEHWDlMZao6USMilX1TsYbk7I vQ62Rcqdb8BM8uU5bhpiIYBG4LiLn+m0Md00JEC2srYb2xtXt5ZPmiPoQAWCFNzNdbv7 J1FTVK+GZKRwirW/quYzt+G/yVFifhpU2Z2dDLbzNfGx6DNHA1diPTxfaFXi7EVkJpmP 2/9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=YMFwihNHo7OoU9fBUp8dkQR9OeI1KVlYg3r8RMHNouU=; b=WWWA5o9yJ773/4LEZcKGXq6rXuC/9J0t1inbns2BBB2+NWfWEQ8tcPhipyeXzCbVFz Dm8OZi3oKghGxqEMwS6tpfHn/YJHzjNoKMtyxVvyJ0DomWyb0An7gkLfndc/JWQo9UE6 qrOYJ+Jw+5HEVO7Ueqb9Dt+GcG/aYtnJHCPI+12Zll6qACUT395f1MH946sNzirurw8n IMZGAgJPb7c1xf8wUEqW1wXL4SH9/p0z9qsBMb+t44pla9toOJ1IgCC9Hg6XWKpFYvMY ivbRPYTGaubb4uncsBlr4ZzVnAS28bF1GzkBxyd0T2cTCjtTm7yRLuhzsSu6WV3A3Xtw tsqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=YUEe1lTw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 207si12427389pfu.258.2019.06.24.14.59.52; Mon, 24 Jun 2019 15:00:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=YUEe1lTw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730843AbfFXTxj (ORCPT + 99 others); Mon, 24 Jun 2019 15:53:39 -0400 Received: from mail-io1-f66.google.com ([209.85.166.66]:45484 "EHLO mail-io1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728702AbfFXTxi (ORCPT ); Mon, 24 Jun 2019 15:53:38 -0400 Received: by mail-io1-f66.google.com with SMTP id e3so257931ioc.12 for ; Mon, 24 Jun 2019 12:53:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=YMFwihNHo7OoU9fBUp8dkQR9OeI1KVlYg3r8RMHNouU=; b=YUEe1lTwVtb+DOhJURMX1uoBgDWN+caVMgYM0mRQSEPvY9MDm6EyX6nUOmffcdiwB8 l3gKaBDqLU5TrgeTvUaDhfMrLqsyGJXvfVurbP0SapG9Rg0Op9HS5JESWo7CdVAvOXsN M4HeFRxWi677IebPmuvTslkAfO79BPpjPKmn1sh9iKt8ljj9DUUa1GLSVVHkaNYvkOBS 7Uqfgp4Lp2x0c7IrCgzKtm8HCKmSP4ftt01+1INbqdAxhri/F37Em/AL8PRCoIRnXCdJ Hs+jJdUIfSKc1RSsCOintUFbBjnllYYJO1kIG352wbEcbyDEUk/m6ihhGnLOikYt5YzZ D4Hw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=YMFwihNHo7OoU9fBUp8dkQR9OeI1KVlYg3r8RMHNouU=; b=B46ho7tQ5V56A7oZZBn8OMmwxznWwj1WnUrOhoLTp6LWH6TrGqaX1sfxKUpghZz/S6 /FXdSQkDGnIQqf3z+TL9rXsrEO7qqtN4O58IxiUEChon0mKXb30Cil3UCHIb3VkeM8m5 AOmhDjQza7OdDuHSRalhoh3gm5jxLJVR/YEhhOVeFSekq6xzmhe2eUcHtK9fyttxEPUk Rl8/FQW2PUucSLB5XXUSDUvBTt/JF3Mows9PAGPp8LSZuPjlsJJ8BT5DlVNzvePXDhO0 DG05ylMqI7R6DYlZxvUKhpZceG4z6KlhyeC+whqApDlhY8DVa9ClAoFPrfk5hnSPElSa 4vRQ== X-Gm-Message-State: APjAAAU84kxIk8cvmeaE23Hd5C+fdT1zr6Us+Qb1fSNZCsy4to3lqF5N VTqyePriEYHlQ3HMxbI99yPgzg== X-Received: by 2002:a05:6638:6a3:: with SMTP id d3mr67515888jad.33.1561406017903; Mon, 24 Jun 2019 12:53:37 -0700 (PDT) Received: from localhost (c-75-72-120-115.hsd1.mn.comcast.net. [75.72.120.115]) by smtp.gmail.com with ESMTPSA id x22sm13711381iob.84.2019.06.24.12.53.36 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 24 Jun 2019 12:53:36 -0700 (PDT) Date: Mon, 24 Jun 2019 14:53:36 -0500 From: Dan Rue To: Andrii Nakryiko Cc: Naresh Kamboju , "open list:KERNEL SELFTEST FRAMEWORK" , bpf , Netdev , open list , xdp-newbies@vger.kernel.org, "David S. Miller" , Daniel Borkmann , Alexei Starovoitov , Martin Lau , Yonghong Song , john fastabend , hawk@kernel.org, Jakub Kicinski , Shuah Khan Subject: Re: selftests: bpf: test_libbpf.sh failed at file test_l4lb.o Message-ID: <20190624195336.nubi7n2np5vfjutr@xps.therub.org> References: <20190621161752.d7d7n4m5q67uivys@xps.therub.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 24, 2019 at 11:32:25AM -0700, Andrii Nakryiko wrote: > On Fri, Jun 21, 2019 at 9:17 AM Dan Rue wrote: > > > > On Thu, Jun 20, 2019 at 10:17:04PM -0700, Andrii Nakryiko wrote: > > > On Thu, Jun 20, 2019 at 1:08 AM Naresh Kamboju > > > wrote: > > > > > > > > selftests: bpf test_libbpf.sh failed running Linux -next kernel > > > > 20190618 and 20190619. > > > > > > > > Here is the log from x86_64, > > > > # selftests bpf test_libbpf.sh > > > > bpf: test_libbpf.sh_ # > > > > # [0] libbpf BTF is required, but is missing or corrupted. > > > > > > You need at least clang-9.0.0 (not yet released) to run some of these > > > tests successfully, as they rely on Clang's support for > > > BTF_KIND_VAR/BTF_KIND_DATASEC. > > > > Can there be a runtime check for BTF that emits a skip instead of a fail > > in such a case? > > I'm not sure how to do this simply and minimally intrusively. The best > I can come up with is setting some envvar from Makefile and checking > for that in each inidividual test, which honestly sounds a bit gross. > > How hard is it for you guys to upgrade compiler used to run these test? We should be able to run kselftest with any compiler that Linux supports, so that we can test with the toolchain that users actually run with. I would say if it's not possible to check at runtime, and it requires clang 9.0, that this test should not be enabled by default. Maybe something could be done in Makefile for that? Only add it to TEST_GEN_PROGS if the toolchain feature exists, otherwise add it to TEST_GEN_PROGS_EXTENDED. I don't know if this is a good idea.. but from kselftest.rst: TEST_PROGS, TEST_GEN_PROGS mean it is the executable tested by default. ... TEST_PROGS_EXTENDED, TEST_GEN_PROGS_EXTENDED mean it is the executable which is not tested by default. Dan > > > > > Thanks, > > Dan > > > > > > > > > libbpf: BTF_is # > > > > # test_libbpf failed at file test_l4lb.o > > > > failed: at_file # > > > > # selftests test_libbpf [FAILED] > > > > test_libbpf: [FAILED]_ # > > > > [FAIL] 29 selftests bpf test_libbpf.sh > > > > selftests: bpf_test_libbpf.sh [FAIL] > > > > > > > > Full test log, > > > > https://qa-reports.linaro.org/lkft/linux-next-oe/build/next-20190619/testrun/781777/log > > > > > > > > Test results comparison, > > > > https://qa-reports.linaro.org/lkft/linux-next-oe/tests/kselftest/bpf_test_libbpf.sh > > > > > > > > Good linux -next tag: next-20190617 > > > > Bad linux -next tag: next-20190618 > > > > git branch master > > > > git commit 1c6b40509daf5190b1fd2c758649f7df1da4827b > > > > git repo > > > > https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git > > > > > > > > Best regards > > > > Naresh Kamboju > > > > -- > > Linaro - Kernel Validation -- Linaro - Kernel Validation