lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240124174547.3325d7bb@kernel.org>
Date: Wed, 24 Jan 2024 17:45:47 -0800
From: Jakub Kicinski <kuba@...nel.org>
To: Paolo Abeni <pabeni@...hat.com>
Cc: netdev@...r.kernel.org, "David S. Miller" <davem@...emloft.net>, Eric
 Dumazet <edumazet@...gle.com>, Shuah Khan <shuah@...nel.org>, Willem de
 Bruijn <willemb@...gle.com>, Lucas Karpinski <lkarpins@...hat.com>,
 linux-kselftest@...r.kernel.org
Subject: Re: [PATCH net 0/3] selftests: net: a few fixes

On Wed, 24 Jan 2024 22:33:19 +0100 Paolo Abeni wrote:
> This series address self-tests failures for udp gro-related tests.
> 
> The first patch addresses the main problem I observe locally - the XDP
> program required by such tests, xdp_dummy, is currently build in the
> ebpf self-tests directory, not available if/when the user targets net
> only. Arguably is more a refactor than a fix, but still targeting net
> to hopefully 
> 
> The second patch fixes the integration of such tests with the build
> system.
> 
> Patch 3/3 fixes sporadic failures due to races.
> 
> Tested with:
> 
> make -C tools/testing/selftests/ TARGETS=net install
> ./tools/testing/selftests/kselftest_install/run_kselftest.sh \
> 	-t "net:udpgro_bench.sh net:udpgro.sh net:udpgro_fwd.sh \
> 	    net:udpgro_frglist.sh net:veth.sh"
> 
> no failures.

This series got into net-next-2024-01-25--00-00, looking at the outputs
it turns out that the iproute2 was crashing somewhere in libbpf :(
I rebuilt latest iproute2 without libbpf support. It loads xdp_dummy.o
just fine, so hopefully that's good enough for now, we'll see for sure
in about 3 hours :)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ