lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <willemdebruijn.kernel.1deb495a9cf2b@gmail.com>
Date: Wed, 20 Aug 2025 07:29:38 -0400
From: Willem de Bruijn <willemdebruijn.kernel@...il.com>
To: Kuniyuki Iwashima <kuniyu@...gle.com>, 
 "David S. Miller" <davem@...emloft.net>, 
 Eric Dumazet <edumazet@...gle.com>, 
 Jakub Kicinski <kuba@...nel.org>, 
 Paolo Abeni <pabeni@...hat.com>
Cc: Simon Horman <horms@...nel.org>, 
 Willem de Bruijn <willemb@...gle.com>, 
 Kuniyuki Iwashima <kuniyu@...gle.com>, 
 Kuniyuki Iwashima <kuni1840@...il.com>, 
 netdev@...r.kernel.org
Subject: Re: [PATCH v1 net-next] selftests/net: packetdrill: Support single
 protocol test.

Kuniyuki Iwashima wrote:
> Currently, we cannot write IPv4 or IPv6 specific packetdrill tests
> as ksft_runner.sh runs each .pkt file for both protocols.
> 
> Let's support single protocol test by checking --ip_version in the
> .pkt file.
> 
> Signed-off-by: Kuniyuki Iwashima <kuniyu@...gle.com>

Reviewed-by: Willem de Bruijn <willemb@...gle.com>

> ---
>  .../selftests/net/packetdrill/ksft_runner.sh  | 47 +++++++++++--------
>  1 file changed, 28 insertions(+), 19 deletions(-)
> 
> diff --git a/tools/testing/selftests/net/packetdrill/ksft_runner.sh b/tools/testing/selftests/net/packetdrill/ksft_runner.sh
> index a7e790af38ff..0ae6eeeb1a8e 100755
> --- a/tools/testing/selftests/net/packetdrill/ksft_runner.sh
> +++ b/tools/testing/selftests/net/packetdrill/ksft_runner.sh
> @@ -3,21 +3,22 @@
>  
>  source "$(dirname $(realpath $0))/../../kselftest/ktap_helpers.sh"
>  
> -readonly ipv4_args=('--ip_version=ipv4 '
> -		    '--local_ip=192.168.0.1 '
> -		    '--gateway_ip=192.168.0.1 '
> -		    '--netmask_ip=255.255.0.0 '
> -		    '--remote_ip=192.0.2.1 '
> -		    '-D CMSG_LEVEL_IP=SOL_IP '
> -		    '-D CMSG_TYPE_RECVERR=IP_RECVERR ')
> -
> -readonly ipv6_args=('--ip_version=ipv6 '
> -		    '--mtu=1520 '
> -		    '--local_ip=fd3d:0a0b:17d6::1 '
> -		    '--gateway_ip=fd3d:0a0b:17d6:8888::1 '
> -		    '--remote_ip=fd3d:fa7b:d17d::1 '
> -		    '-D CMSG_LEVEL_IP=SOL_IPV6 '
> -		    '-D CMSG_TYPE_RECVERR=IPV6_RECVERR ')
> +declare -A ip_args=(
> +	[ipv4]="--ip_version=ipv4
> +		--local_ip=192.168.0.1
> +		--gateway_ip=192.168.0.1
> +		--netmask_ip=255.255.0.0
> +		--remote_ip=192.0.2.1
> +		-D CMSG_LEVEL_IP=SOL_IP
> +		-D CMSG_TYPE_RECVERR=IP_RECVERR"
> +	[ipv6]="--ip_version=ipv6
> +		--mtu=1520
> +		--local_ip=fd3d:0a0b:17d6::1
> +		--gateway_ip=fd3d:0a0b:17d6:8888::1
> +		--remote_ip=fd3d:fa7b:d17d::1
> +		-D CMSG_LEVEL_IP=SOL_IPV6
> +		-D CMSG_TYPE_RECVERR=IPV6_RECVERR"
> +)
>  
>  if [ $# -ne 1 ]; then
>  	ktap_exit_fail_msg "usage: $0 <script>"
> @@ -38,12 +39,20 @@ if [[ -n "${KSFT_MACHINE_SLOW}" ]]; then
>  	failfunc=ktap_test_xfail
>  fi
>  
> +ip_versions=$(grep -E '^--ip_version=' $script | cut -d '=' -f 2)
> +if [[ -z $ip_versions ]]; then
> +	ip_versions="ipv4 ipv6"
> +elif [[ ! "$ip_versions" =~ ^ipv[46]$ ]]; then
> +	ktap_exit_fail_msg "Too many or unsupported --ip_version: $ip_versions"
> +	exit "$KSFT_FAIL"
> +fi
> +
>  ktap_print_header
>  ktap_set_plan 2
>  
> -unshare -n packetdrill ${ipv4_args[@]} ${optargs[@]} $script > /dev/null \
> -	&& ktap_test_pass "ipv4" || $failfunc "ipv4"
> -unshare -n packetdrill ${ipv6_args[@]} ${optargs[@]} $script > /dev/null \
> -	&& ktap_test_pass "ipv6" || $failfunc "ipv6"
> +for ip_version in $ip_versions; do
> +	unshare -n packetdrill ${ip_args[$ip_version]} ${optargs[@]} $script > /dev/null \
> +	    && ktap_test_pass $ip_version || $failfunc $ip_version

minor if respinning: indentation of 4 spaces instead of tab.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ