Re: [ovs-dev] [PATCH 1/2] test: Fix fragment-related tests that fail due to small-sized packets

2019-03-26 Thread Yifeng Sun
I've create a pull request on github as v2 because this patch contains
long lines that can't be handled by email protocol.

https://github.com/openvswitch/ovs/pull/278

Thanks,
Yifeng

On Mon, Mar 18, 2019 at 10:42 AM Yifeng Sun  wrote:
>
> Thanks Darrell for the review. Will do.
> Yifeng
>
> On Sat, Mar 16, 2019 at 11:43 AM Darrell Ball  wrote:
>>
>> Hi Yifeng
>>
>> Thanks for the patch.
>>
>> Your patch is corrupted; if this is due to transmit via e-mail, you can post 
>> a pull request.
>> Other comments inline
>>
>>
>> On Fri, Mar 15, 2019 at 7:20 PM Yifeng Sun  wrote:
>>>
>>> These fragment-related tests are failing on later kernels (4.19.x)
>>> because kernel quietly drops any packet fragment that is not the last
>>> but has a size smaller than IPV6_MIN_MTU. This patch fixes
>>> them by increasing their sizes to IPV6_MIN_MTU.
>>>
>>> Signed-off-by: Yifeng Sun 
>>> ---
>>>  tests/system-traffic.at | 30 +++---
>>>  1 file changed, 15 insertions(+), 15 deletions(-)
>>>
>>> diff --git a/tests/system-traffic.at b/tests/system-traffic.at
>>> index b1241812e..42bf09815 100644
>>> --- a/tests/system-traffic.at
>>> +++ b/tests/system-traffic.at
>>> @@ -2611,7 +2611,7 @@ packet-out in_port=1, 
>>> packet=5054000a505400090800453100310011a48
>>>  ])
>>>
>>>  AT_CHECK([ovs-ofctl bundle br0 bundle.txt])
>>> -# There is one byte of overlap, hence the no packet gets thru. conntrack.
>>> +dnl There is one byte of overlap, hence the no packet gets thru. conntrack.
>>
>>
>> s/hence the no packet/hence no packet/
>>
>>
>>>
>>>  AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(10.1.1.2)], [0], [dnl
>>>  ])
>>>
>>> @@ -2635,7 +2635,7 @@ packet-out in_port=1, 
>>> packet=5054000a505400090800450001a400012011834
>>>  ])
>>>
>>>  AT_CHECK([ovs-ofctl bundle br0 bundle.txt])
>>> -# There is one byte of overlap, hence the no packet gets thru. conntrack.
>>> +dnl There is one byte of overlap, hence the no packet gets thru. conntrack.
>>
>>
>> s/hence the no packet/hence no packet/
>>
>>>
>>>  AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(10.1.1.2)], [0], [dnl
>>>  ])
>>>
>>> @@ -2827,7 +2827,7 @@ ADD_VETH(p0, at_ns0, br0, "fc00::1/96")
>>>  ADD_VETH(p1, at_ns1, br0, "fc00::2/96")
>>
>>
>>
>> Don't change the packet size in these two tests
>>
>> AT_SETUP([conntrack - IPv6 fragmentation with fragments specified])
>> AT_SETUP([conntrack - IPv6 fragmentation out of order])
>>
>> Add a macro
>> 'CHECK_SMALL_V6_FRAG'
>> and check for it in these tests.
>>
>> AT_SETUP([conntrack - IPv6 fragmentation with fragments specified])
>> AT_SETUP([conntrack - IPv6 fragmentation out of order])
>>
>> and skip the kernel tests for kernel versions (>=4.19) where the check
>> IPV6_MIN_MTU=1280 is enforced.
>>
>>>
>>>
>>>  AT_DATA([bundle.txt], [dnl
>>> -packet-out in_port=1, 
>>> packet=5054000a5054000986dd61a02cfffc01fc0211010001000100020008f62900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809,
>>>   actions=ct(co
 mmit
>>>  )
>>> +packet-out in_port=1, 
>>> packet=5054000a5054000986dd65002cfffc01fc0211010001000100020008f629000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090010203040506070
 8090
>>>  
>>> 

Re: [ovs-dev] [PATCH 1/2] test: Fix fragment-related tests that fail due to small-sized packets

2019-03-18 Thread Yifeng Sun
Thanks Darrell for the review. Will do.
Yifeng

On Sat, Mar 16, 2019 at 11:43 AM Darrell Ball  wrote:

> Hi Yifeng
>
> Thanks for the patch.
>
> Your patch is corrupted; if this is due to transmit via e-mail, you can
> post a pull request.
> Other comments inline
>
>
> On Fri, Mar 15, 2019 at 7:20 PM Yifeng Sun  wrote:
>
>> These fragment-related tests are failing on later kernels (4.19.x)
>> because kernel quietly drops any packet fragment that is not the last
>> but has a size smaller than IPV6_MIN_MTU. This patch fixes
>> them by increasing their sizes to IPV6_MIN_MTU.
>>
>> Signed-off-by: Yifeng Sun 
>> ---
>>  tests/system-traffic.at | 30 +++---
>>  1 file changed, 15 insertions(+), 15 deletions(-)
>>
>> diff --git a/tests/system-traffic.at b/tests/system-traffic.at
>> index b1241812e..42bf09815 100644
>> --- a/tests/system-traffic.at
>> +++ b/tests/system-traffic.at
>> @@ -2611,7 +2611,7 @@ packet-out in_port=1,
>> packet=5054000a505400090800453100310011a48
>>  ])
>>
>>  AT_CHECK([ovs-ofctl bundle br0 bundle.txt])
>> -# There is one byte of overlap, hence the no packet gets thru. conntrack.
>> +dnl There is one byte of overlap, hence the no packet gets thru.
>> conntrack.
>>
>
> s/hence the no packet/hence no packet/
>
>
>
>>  AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(10.1.1.2)], [0],
>> [dnl
>>  ])
>>
>> @@ -2635,7 +2635,7 @@ packet-out in_port=1,
>> packet=5054000a505400090800450001a400012011834
>>  ])
>>
>>  AT_CHECK([ovs-ofctl bundle br0 bundle.txt])
>> -# There is one byte of overlap, hence the no packet gets thru. conntrack.
>> +dnl There is one byte of overlap, hence the no packet gets thru.
>> conntrack.
>>
>
> s/hence the no packet/hence no packet/
>
>
>>  AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(10.1.1.2)], [0],
>> [dnl
>>  ])
>>
>> @@ -2827,7 +2827,7 @@ ADD_VETH(p0, at_ns0, br0, "fc00::1/96")
>>  ADD_VETH(p1, at_ns1, br0, "fc00::2/96")
>>
>
>
> Don't change the packet size in these two tests
>
> AT_SETUP([conntrack - IPv6 fragmentation with fragments specified])
> AT_SETUP([conntrack - IPv6 fragmentation out of order])
>
> Add a macro
> 'CHECK_SMALL_V6_FRAG'
> and check for it in these tests.
>
> AT_SETUP([conntrack - IPv6 fragmentation with fragments specified])
> AT_SETUP([conntrack - IPv6 fragmentation out of order])
>
> and skip the kernel tests for kernel versions (>=4.19) where the check
> IPV6_MIN_MTU=1280 is enforced.
>
>
>>
>>  AT_DATA([bundle.txt], [dnl
>> -packet-out in_port=1,
>> packet=5054000a5054000986dd61a02cfffc01fc0211010001000100020008f62900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809,
>> actions=ct(commit
>>  )
>> +packet-out in_port=1,
>> packet=5054000a5054000986dd65002cfffc01fc0211010001000100020008f6290001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900102030405060708090
>>
>>  
>> 

Re: [ovs-dev] [PATCH 1/2] test: Fix fragment-related tests that fail due to small-sized packets

2019-03-16 Thread Darrell Ball
Hi Yifeng

Thanks for the patch.

Your patch is corrupted; if this is due to transmit via e-mail, you can
post a pull request.
Other comments inline


On Fri, Mar 15, 2019 at 7:20 PM Yifeng Sun  wrote:

> These fragment-related tests are failing on later kernels (4.19.x)
> because kernel quietly drops any packet fragment that is not the last
> but has a size smaller than IPV6_MIN_MTU. This patch fixes
> them by increasing their sizes to IPV6_MIN_MTU.
>
> Signed-off-by: Yifeng Sun 
> ---
>  tests/system-traffic.at | 30 +++---
>  1 file changed, 15 insertions(+), 15 deletions(-)
>
> diff --git a/tests/system-traffic.at b/tests/system-traffic.at
> index b1241812e..42bf09815 100644
> --- a/tests/system-traffic.at
> +++ b/tests/system-traffic.at
> @@ -2611,7 +2611,7 @@ packet-out in_port=1,
> packet=5054000a505400090800453100310011a48
>  ])
>
>  AT_CHECK([ovs-ofctl bundle br0 bundle.txt])
> -# There is one byte of overlap, hence the no packet gets thru. conntrack.
> +dnl There is one byte of overlap, hence the no packet gets thru.
> conntrack.
>

s/hence the no packet/hence no packet/



>  AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(10.1.1.2)], [0],
> [dnl
>  ])
>
> @@ -2635,7 +2635,7 @@ packet-out in_port=1,
> packet=5054000a505400090800450001a400012011834
>  ])
>
>  AT_CHECK([ovs-ofctl bundle br0 bundle.txt])
> -# There is one byte of overlap, hence the no packet gets thru. conntrack.
> +dnl There is one byte of overlap, hence the no packet gets thru.
> conntrack.
>

s/hence the no packet/hence no packet/


>  AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(10.1.1.2)], [0],
> [dnl
>  ])
>
> @@ -2827,7 +2827,7 @@ ADD_VETH(p0, at_ns0, br0, "fc00::1/96")
>  ADD_VETH(p1, at_ns1, br0, "fc00::2/96")
>


Don't change the packet size in these two tests

AT_SETUP([conntrack - IPv6 fragmentation with fragments specified])
AT_SETUP([conntrack - IPv6 fragmentation out of order])

Add a macro
'CHECK_SMALL_V6_FRAG'
and check for it in these tests.

AT_SETUP([conntrack - IPv6 fragmentation with fragments specified])
AT_SETUP([conntrack - IPv6 fragmentation out of order])

and skip the kernel tests for kernel versions (>=4.19) where the check
IPV6_MIN_MTU=1280 is enforced.


>
>  AT_DATA([bundle.txt], [dnl
> -packet-out in_port=1,
> packet=5054000a5054000986dd61a02cfffc01fc0211010001000100020008f62900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809,
> actions=ct(commit
>  )
> +packet-out in_port=1,
> packet=5054000a5054000986dd65002cfffc01fc0211010001000100020008f6290001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900102030405060708090
>
>  
> 

[ovs-dev] [PATCH 1/2] test: Fix fragment-related tests that fail due to small-sized packets

2019-03-15 Thread Yifeng Sun
These fragment-related tests are failing on later kernels (4.19.x)
because kernel quietly drops any packet fragment that is not the last
but has a size smaller than IPV6_MIN_MTU. This patch fixes
them by increasing their sizes to IPV6_MIN_MTU.

Signed-off-by: Yifeng Sun 
---
 tests/system-traffic.at | 30 +++---
 1 file changed, 15 insertions(+), 15 deletions(-)

diff --git a/tests/system-traffic.at b/tests/system-traffic.at
index b1241812e..42bf09815 100644
--- a/tests/system-traffic.at
+++ b/tests/system-traffic.at
@@ -2611,7 +2611,7 @@ packet-out in_port=1, 
packet=5054000a505400090800453100310011a48
 ])
 
 AT_CHECK([ovs-ofctl bundle br0 bundle.txt])
-# There is one byte of overlap, hence the no packet gets thru. conntrack.
+dnl There is one byte of overlap, hence the no packet gets thru. conntrack.
 AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(10.1.1.2)], [0], [dnl
 ])
 
@@ -2635,7 +2635,7 @@ packet-out in_port=1, 
packet=5054000a505400090800450001a400012011834
 ])
 
 AT_CHECK([ovs-ofctl bundle br0 bundle.txt])
-# There is one byte of overlap, hence the no packet gets thru. conntrack.
+dnl There is one byte of overlap, hence the no packet gets thru. conntrack.
 AT_CHECK([ovs-appctl dpctl/dump-conntrack | FORMAT_CT(10.1.1.2)], [0], [dnl
 ])
 
@@ -2827,7 +2827,7 @@ ADD_VETH(p0, at_ns0, br0, "fc00::1/96")
 ADD_VETH(p1, at_ns1, br0, "fc00::2/96")
 
 AT_DATA([bundle.txt], [dnl
-packet-out in_port=1, 
packet=5054000a5054000986dd61a02cfffc01fc0211010001000100020008f62900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809,
  actions=ct(commit
 )
+packet-out in_port=1, 
packet=5054000a5054000986dd65002cfffc01fc0211010001000100020008f6290001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900102030405060708090
 
00102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040506070809000102030405060708090001020304050607080900010203040