Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp845664ybl; Wed, 4 Dec 2019 11:54:46 -0800 (PST) X-Google-Smtp-Source: APXvYqyf6UYC+lTvrXi3pN+IvMvhZ5S6HQCbzV/FSh1Y/G+c8r0S7HrtwouvTOwFg6iYRUiT4vST X-Received: by 2002:a05:6808:6ce:: with SMTP id m14mr4094817oih.27.1575489286633; Wed, 04 Dec 2019 11:54:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575489286; cv=none; d=google.com; s=arc-20160816; b=OPbxY+aeYftBlaqJZiwx6e2Dkv4ZAotn520H2Zn0W8ZyzBiNKGRAV8gfyGIaXCbiBR 0SI6qyo6MkjKCjHt2MrVXn/7u9j8Fl2NowLBwfNgrLg/aURmrYt5oIrRItm80lsr04g5 Gx51fcFsPWKTaQ7WqsgxBouKE3gYzckOouOIYIZvEF177jVgUBvv40J8hnlfbxLEM4r1 1kRH67FHvFvjz/4TlU1C9oji+IuRbGPGrPQcGKuTOjOtCOQdpX5bIWNOtDVTVWdkbITb 2ZAMkfrrdNm1OLSUAh6mAW9cSHX2DxRvTPS/fWBxSp0z9oDKkaAvx47XhhQFLtwYTAPX wPYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=cet+peGenSLYaHh3307TUQuP1bQIizNa3VA8tl5pffQ=; b=w9vcNuM8odh7HN47BNAgBsm/xQ/mmyzryZLu28ATc9ShEmbdKWXQA0U4OOb/gBLU2k yMEHkuNa+UQfvsUGyJiq0kh4gzxpiAsK38ORjs6YayKVn7okB2iem683ClunFxqiJZQ4 oZBoHaiY4JzDCIxql58Rx6SV4x2fIjqdzSwmCTialT5cAREHEisJktfwB2OBrgq0DrBN kUCloAZKmvR7ynv2griLztg3K2yTqSMc6HVSRj3RqG26c2X4kkY+hw/8IOYaoKjSY9Zo COBKkaIUEnairWmbfWKzDJqPto3Wv6Q9FrvGpKpnaQ5AJQrOKRy2HVJ0Vfj9t6UDVm4l rfaQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d11si3844272otc.209.2019.12.04.11.54.34; Wed, 04 Dec 2019 11:54:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728183AbfLDTxq (ORCPT + 99 others); Wed, 4 Dec 2019 14:53:46 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:39628 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727887AbfLDTxp (ORCPT ); Wed, 4 Dec 2019 14:53:45 -0500 Received: from 1.general.cascardo.us.vpn ([10.172.70.58] helo=localhost.localdomain) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1icaiU-0007wL-Kk; Wed, 04 Dec 2019 19:53:43 +0000 From: Thadeu Lima de Souza Cascardo To: netdev@vger.kernel.org Cc: davem@davemloft.net, shuah@kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, posk@google.com, cascardo@canonical.com Subject: [PATCH] selftests: net: ip_defrag: increase netdev_max_backlog Date: Wed, 4 Dec 2019 16:53:21 -0300 Message-Id: <20191204195321.406365-1-cascardo@canonical.com> X-Mailer: git-send-email 2.24.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When using fragments with size 8 and payload larger than 8000, the backlog might fill up and packets will be dropped, causing the test to fail. This happens often enough when conntrack is on during the IPv6 test. As the larger payload in the test is 10000, using a backlog of 1250 allow the test to run repeatedly without failure. At least a 1000 runs were possible with no failures, when usually less than 50 runs were good enough for showing a failure. As netdev_max_backlog is not a pernet setting, this sets the backlog to 1000 during exit to prevent disturbing following tests. Signed-off-by: Thadeu Lima de Souza Cascardo Fixes: 4c3510483d26 (selftests: net: ip_defrag: cover new IPv6 defrag behavior) --- tools/testing/selftests/net/ip_defrag.sh | 3 +++ 1 file changed, 3 insertions(+) diff --git a/tools/testing/selftests/net/ip_defrag.sh b/tools/testing/selftests/net/ip_defrag.sh index 15d3489ecd9c..c91cfecfa245 100755 --- a/tools/testing/selftests/net/ip_defrag.sh +++ b/tools/testing/selftests/net/ip_defrag.sh @@ -12,6 +12,8 @@ setup() { ip netns add "${NETNS}" ip -netns "${NETNS}" link set lo up + sysctl -w net.core.netdev_max_backlog=1250 >/dev/null 2>&1 + ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_high_thresh=9000000 >/dev/null 2>&1 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_low_thresh=7000000 >/dev/null 2>&1 ip netns exec "${NETNS}" sysctl -w net.ipv4.ipfrag_time=1 >/dev/null 2>&1 @@ -30,6 +32,7 @@ setup() { cleanup() { ip netns del "${NETNS}" + sysctl -w net.core.netdev_max_backlog=1000 >/dev/null 2>&1 } trap cleanup EXIT -- 2.24.0