lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Mon, 4 Jan 2021 10:52:18 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Fabian Frederick <fabf@...net.be>
Cc:     Pablo Neira Ayuso <pablo@...filter.org>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        lkp@...el.com
Subject: [selftests]  48d072c4e8: kernel-selftests.netfilter.nft_meta.sh.fail


Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 48d072c4e8cdb542ade06727c31d7851bcc40a89 ("selftests: netfilter: add time counter check")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master


in testcase: kernel-selftests
version: kernel-selftests-x86_64-cb0debfe-1_20201231
with following parameters:

	group: netfilter
	ucode: 0xe2

test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel.
test-url: https://www.kernel.org/doc/Documentation/kselftest.txt


on test machine: 8 threads Intel(R) Core(TM) i7-6770HQ CPU @ 2.60GHz with 32G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):




If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>

KERNEL SELFTESTS: linux_headers_dir is /usr/src/linux-headers-x86_64-rhel-7.6-kselftests-48d072c4e8cdb542ade06727c31d7851bcc40a89
2021-01-01 14:51:43 ln -sf /usr/bin/clang
2021-01-01 14:51:43 ln -sf /usr/bin/llc
2021-01-01 14:51:43 sed -i s/default_timeout=45/default_timeout=300/ kselftest/runner.sh
2021-01-01 14:51:43 make run_tests -C netfilter
make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-7.6-kselftests-48d072c4e8cdb542ade06727c31d7851bcc40a89/tools/testing/selftests/netfilter'
gcc     nf-queue.c /usr/src/perf_selftests-x86_64-rhel-7.6-kselftests-48d072c4e8cdb542ade06727c31d7851bcc40a89/tools/testing/selftests/kselftest_harness.h /usr/src/perf_selftests-x86_64-rhel-7.6-kselftests-48d072c4e8cdb542ade06727c31d7851bcc40a89/tools/testing/selftests/kselftest.h -lmnl -o /usr/src/perf_selftests-x86_64-rhel-7.6-kselftests-48d072c4e8cdb542ade06727c31d7851bcc40a89/tools/testing/selftests/netfilter/nf-queue
TAP version 13
1..10
# selftests: netfilter: nft_trans_stress.sh
ok 1 selftests: netfilter: nft_trans_stress.sh
# selftests: netfilter: nft_nat.sh
# PASS: netns routing/connectivity: ns0-eM2oEo43 can reach ns1-eM2oEo43 and ns2-eM2oEo43
# PASS: ping to ns1-eM2oEo43 was ip NATted to ns2-eM2oEo43
# PASS: ping to ns1-eM2oEo43 OK after ip nat output chain flush
# PASS: ipv6 ping to ns1-eM2oEo43 was ip6 NATted to ns2-eM2oEo43
# PASS: ping to ns1-eM2oEo43 was inet NATted to ns2-eM2oEo43
# PASS: ping to ns1-eM2oEo43 OK after inet nat output chain flush
# PASS: ipv6 ping to ns1-eM2oEo43 was inet NATted to ns2-eM2oEo43
# PASS: ip IP masquerade  for ns2-eM2oEo43
# PASS: ip6 IPv6 masquerade  for ns2-eM2oEo43
# PASS: inet IP masquerade  for ns2-eM2oEo43
# PASS: inet IPv6 masquerade  for ns2-eM2oEo43
# PASS: ip IP masquerade fully-random for ns2-eM2oEo43
# PASS: ip6 IPv6 masquerade fully-random for ns2-eM2oEo43
# PASS: inet IP masquerade fully-random for ns2-eM2oEo43
# PASS: inet IPv6 masquerade fully-random for ns2-eM2oEo43
# PASS: ip IP redirection for ns2-eM2oEo43
# PASS: ip6 IPv6 redirection for ns2-eM2oEo43
# PASS: inet IP redirection for ns2-eM2oEo43
# PASS: inet IPv6 redirection for ns2-eM2oEo43
ok 2 selftests: netfilter: nft_nat.sh
# selftests: netfilter: bridge_brouter.sh
# PASS: netns connectivity: ns1 and ns2 can reach each other
#  RULE_APPEND failed (No such file or directory): rule in chain BROUTING.
# SKIP: Could not add ebtables broute redirect rule
ok 3 selftests: netfilter: bridge_brouter.sh # SKIP
# selftests: netfilter: conntrack_icmp_related.sh
# PASS: icmp mtu error had RELATED state
ok 4 selftests: netfilter: conntrack_icmp_related.sh
# selftests: netfilter: nft_flowtable.sh
# PASS: netns routing/connectivity: ns1 can reach ns2
# PASS: flow offloaded for ns1/ns2
# PASS: flow offloaded for ns1/ns2 with NAT
# PASS: flow offloaded for ns1/ns2 with NAT and pmtu discovery
# PASS: ipsec tunnel mode for ns1/ns2
ok 5 selftests: netfilter: nft_flowtable.sh
# selftests: netfilter: ipvs.sh
# Testing DR mode...
# Testing NAT mode...
# Testing Tunnel mode...
# -e ipvs.sh: .[0;92mPASS.[0m
ok 6 selftests: netfilter: ipvs.sh
# selftests: netfilter: nft_concat_range.sh
# TEST: reported issues
#   Add two elements, flush, re-add                               [ OK ]
# TEST: correctness
#   net,port                                                      [ OK ]
#   port,net                                                      [ OK ]
#   net6,port                                                     [ OK ]
#   port,proto                                                    [ OK ]
#   net6,port,mac                                                 [ OK ]
#   net6,port,mac,proto                                           [ OK ]
#   net,port,net                                                  [ OK ]
#   net,mac                                                       [ OK ]
#   net,mac - ICMP                                                [ OK ]
#   net6,mac - ICMPv6                                             [ OK ]
#   net6,port,net6,port                                           [ OK ]
#   net,port,mac,proto,net                                        [ OK ]
# TEST: concurrency
#   net,port                                                      [SKIP]
# need one of: iperf3 iperf netperf, skipping
#   port,net                                                      [SKIP]
# need one of: iperf3 iperf netperf, skipping
#   net6,port                                                     [SKIP]
# need one of: iperf3 iperf netperf, skipping
#   net,port,net                                                  [SKIP]
# need one of: iperf3 iperf netperf, skipping
#   net6,port,net6,port                                           [SKIP]
# need one of: iperf3 iperf netperf, skipping
# TEST: timeout
#   net,port                                                      [ OK ]
#   port,net                                                      [ OK ]
#   net6,port                                                     [ OK ]
#   port,proto                                                    [ OK ]
#   net6,port,mac                                                 [ OK ]
#   net6,port,mac,proto                                           [ OK ]
#   net,port,net                                                  [ OK ]
#   net,mac                                                       [ OK ]
#   net,mac - ICMP                                                [ OK ]
#   net6,mac - ICMPv6                                             [ OK ]
#   net6,port,net6,port                                           [ OK ]
#   net,port,mac,proto,net                                        [ OK ]
# TEST: performance
#   net,port                                                      [SKIP]
#   perf not supported
#   port,net                                                      [SKIP]
#   perf not supported
#   net6,port                                                     [SKIP]
#   perf not supported
#   port,proto                                                    [SKIP]
#   perf not supported
#   net6,port,mac                                                 [SKIP]
#   perf not supported
#   net6,port,mac,proto                                           [SKIP]
#   perf not supported
#   net,mac                                                       [SKIP]
#   perf not supported
not ok 7 selftests: netfilter: nft_concat_range.sh # exit=1
# selftests: netfilter: nft_conntrack_helper.sh
# SKIP: Could not run test without conntrack tool
ok 8 selftests: netfilter: nft_conntrack_helper.sh # SKIP
# selftests: netfilter: nft_queue.sh
# PASS: ns1-DV9WZVLe can reach ns2-DV9WZVLe
# PASS: ip: statement with no listener results in packet drop
# PASS: ip6: statement with no listener results in packet drop
# PASS: Expected and received 10 packets total
# PASS: Expected and received 20 packets total
# PASS: tcp and nfqueue in forward chain
# PASS: tcp via loopback
ok 9 selftests: netfilter: nft_queue.sh
# selftests: netfilter: nft_meta.sh
# FAIL: icurrentyearcounter, want "packets 2", got
# table inet filter {
# 	counter icurrentyearcounter {
# 		packets 0 bytes 0
# 	}
# }
not ok 10 selftests: netfilter: nft_meta.sh # exit=1
make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-7.6-kselftests-48d072c4e8cdb542ade06727c31d7851bcc40a89/tools/testing/selftests/netfilter'



To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Oliver Sang


View attachment "config-5.9.0-rc3-g48d072c4e8cdb5" of type "text/plain" (209574 bytes)

View attachment "job-script" of type "text/plain" (5940 bytes)

Download attachment "kmsg.xz" of type "application/x-xz" (25688 bytes)

View attachment "kernel-selftests" of type "text/plain" (7321 bytes)

View attachment "job.yaml" of type "text/plain" (5061 bytes)

View attachment "reproduce" of type "text/plain" (140 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ