lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <24e75641-ad78-4ceb-a42a-c61c1ea5b367@lunn.ch>
Date: Mon, 13 Jan 2025 21:06:31 +0100
From: Andrew Lunn <andrew@...n.ch>
To: John Ousterhout <ouster@...stanford.edu>
Cc: netdev@...r.kernel.org, pabeni@...hat.com, edumazet@...gle.com,
	horms@...nel.org, kuba@...nel.org
Subject: Re: [PATCH net-next v5 00/12] Begin upstreaming Homa transport
 protocol

On Mon, Jan 13, 2025 at 09:27:34AM -0800, John Ousterhout wrote:
> The Patchwork Web page for this patch set
> (https://patchwork.kernel.org/project/netdevbpf/list/?series=922654&state=*)
> is showing errors for the "netdev/contest" context for each of the
> patches in the series. The errors are the same for each patch, and
> they seem to be coming from places other than Homa.

Hi John

The tests take too long to run for each patchset, so i _think_ all
patches in a 3 hour window are tested in a batch. So it could well be
some other patchset in the batch broke something.

You should be able to run the test yourself, on your own build.
https://netdev-3.bots.linux.dev/vmksft-net-dbg/results/937341/60-bpf-offload-py/stdout
shows you the command line. However, the test environment, what tools
you need installed etc, is less clear.

To me, it does seem unlikely that HOMA would cause:

cat: /sys/kernel/debug/netdevsim/netdevsim20347//ports/0//queue_reset:
Invalid argument

So i would not worry about it too much. However, if the next
submission has the same issues....

	Andrew

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ