On Mon, Jul 11, 2016 at 11:28 AM, Guru Shetty <g...@ovn.org> wrote:

> On 11 July 2016 at 10:29, Joe Stringer <j...@ovn.org> wrote:
>
> > NC_EOF_OPT should always be passed to netcat in system-traffic tests
> > when invoking netcat to send a single packet that does not expect a
> > response. While on typical fedora/RH based distributions the default
> > behaviour is to send the packet then return, there are multiple other
> > implementations of netcat that do not do this (for example, those used
> > by Debian and Ubuntu by default). For these alternative implementations,
> > we provide $NC_EOF_OPT to ensure that netcat simply sends the packet
> > then returns immediately.
> >
> > Signed-off-by: Joe Stringer <j...@ovn.org>
> >
>
> I did notice the "hang" without this patch. But with this patch, those
> tests fail now with:
> +nc: invalid option -- 'q'
> +Try `nc --help' for more information.
>
> My nc --version says:
>
> nc --version
> netcat (The GNU Netcat) 0.7.1
> Copyright (C) 2002 - 2003  Giovanni Giacobbi
>
> This program comes with NO WARRANTY, to the extent permitted by law.
> You may redistribute copies of this program under the terms of
> the GNU General Public License.
> For more information about these matters, see the file named COPYING.
>
> Original idea and design by Avian Research <hob...@avian.org>,
> Written by Giovanni Giacobbi <giova...@giacobbi.net>.
>

On my ubuntu 14.04.2LTS system. There are two possible packages that
installs nc,
netcat-tradition or netcat-openbsd.  Both versions accepts the -q option,
and do not
accept --version option. Did you install nc from source by chance?

>
>
> > ---
> >  tests/system-traffic.at | 14 +++++++-------
> >  1 file changed, 7 insertions(+), 7 deletions(-)
> >
> > diff --git a/tests/system-traffic.at b/tests/system-traffic.at
> > index 252ed20472f6..d3395d0423d8 100644
> > --- a/tests/system-traffic.at
> > +++ b/tests/system-traffic.at
> > @@ -290,7 +290,7 @@ AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
> >  dnl use this file as payload file for ncat
> >  AT_CHECK([dd if=/dev/urandom of=payload200.bin bs=200 count=1 2>
> > /dev/null])
> >  on_exit 'rm -f payload200.bin'
> > -NS_CHECK_EXEC([at_ns0], [nc -u 10.1.1.2 1234 < payload200.bin])
> > +NS_CHECK_EXEC([at_ns0], [nc $NC_EOF_OPT -u 10.1.1.2 1234 <
> > payload200.bin])
> >
> >  dnl packet with truncated size
> >  AT_CHECK([ovs-appctl revalidator/purge], [0])
> > @@ -312,7 +312,7 @@ in_port=1 dl_dst=e6:66:c1:22:22:22
> > actions=output(port=2,max_len=100),output:4,o
> >  ])
> >  AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
> >
> > -NS_CHECK_EXEC([at_ns0], [nc -u 10.1.1.2 1234 < payload200.bin])
> > +NS_CHECK_EXEC([at_ns0], [nc $NC_EOF_OPT -u 10.1.1.2 1234 <
> > payload200.bin])
> >
> >  dnl 100 + 100 + 242 + min(65535,242) = 684
> >  AT_CHECK([ovs-appctl revalidator/purge], [0])
> > @@ -346,7 +346,7 @@ This flow is handled by the userspace slow path
> > because it:
> >  dnl SLOW_ACTION test2: check actual packet truncate
> >  AT_CHECK([ovs-ofctl del-flows br0])
> >  AT_CHECK([ovs-ofctl add-flows br0 flows.txt])
> > -NS_CHECK_EXEC([at_ns0], [nc -u 10.1.1.2 1234 < payload200.bin])
> > +NS_CHECK_EXEC([at_ns0], [nc $NC_EOF_OPT -u 10.1.1.2 1234 <
> > payload200.bin])
> >
> >  dnl 100 + 100 + 242 + min(65535,242) = 684
> >  AT_CHECK([ovs-appctl revalidator/purge], [0])
> > @@ -428,7 +428,7 @@ priority=1,actions=drop
> >  AT_CHECK([ovs-ofctl add-flows br-underlay flows-underlay.txt])
> >
> >  dnl check tunnel push path, from at_ns1 to at_ns0
> > -NS_CHECK_EXEC([at_ns1], [nc -u 10.1.1.1 1234 < payload200.bin])
> > +NS_CHECK_EXEC([at_ns1], [nc $NC_EOF_OPT -u 10.1.1.1 1234 <
> > payload200.bin])
> >  AT_CHECK([ovs-appctl revalidator/purge], [0])
> >
> >  dnl Before truncation = ETH(14) + IP(20) + UDP(8) + 200 = 242B
> > @@ -441,7 +441,7 @@ n_bytes=138
> >  ])
> >
> >  dnl check tunnel pop path, from at_ns0 to at_ns1
> > -NS_CHECK_EXEC([at_ns0], [nc -u 10.1.1.2 5678 < payload200.bin])
> > +NS_CHECK_EXEC([at_ns0], [nc $NC_EOF_OPT -u 10.1.1.2 5678 <
> > payload200.bin])
> >  dnl After truncation = 100 byte at loopback device p2(4)
> >  AT_CHECK([ovs-appctl revalidator/purge], [0])
> >  AT_CHECK([ovs-ofctl dump-flows br0 | grep "in_port=4" | awk
> > --field-separator=', '  '{print $5}'], [0], [dnl
> > @@ -474,7 +474,7 @@ AT_CHECK([ovs-ofctl del-flows br-underlay])
> >  AT_CHECK([ovs-ofctl add-flows br-underlay flows-underlay.txt])
> >
> >  dnl check tunnel push path, from at_ns1 to at_ns0
> > -NS_CHECK_EXEC([at_ns1], [nc -u 10.1.1.1 1234 < payload200.bin])
> > +NS_CHECK_EXEC([at_ns1], [nc $NC_EOF_OPT -u 10.1.1.1 1234 <
> > payload200.bin])
> >  AT_CHECK([ovs-appctl revalidator/purge], [0])
> >
> >  dnl Before truncation = ETH(14) + IP(20) + UDP(8) + 200 = 242B
> > @@ -487,7 +487,7 @@ n_bytes=138
> >  ])
> >
> >  dnl check tunnel pop path, from at_ns0 to at_ns1
> > -NS_CHECK_EXEC([at_ns0], [nc -u 10.1.1.2 5678 < payload200.bin])
> > +NS_CHECK_EXEC([at_ns0], [nc $NC_EOF_OPT -u 10.1.1.2 5678 <
> > payload200.bin])
> >  dnl After truncation = 100 byte at loopback device p2(4)
> >  AT_CHECK([ovs-appctl revalidator/purge], [0])
> >  AT_CHECK([ovs-ofctl dump-flows br0 | grep "in_port=4" | awk
> > --field-separator=', '  '{print $5}'], [0], [dnl
> > --
> > 2.9.0
> >
> > _______________________________________________
> > dev mailing list
> > dev@openvswitch.org
> > http://openvswitch.org/mailman/listinfo/dev
> >
> _______________________________________________
> dev mailing list
> dev@openvswitch.org
> http://openvswitch.org/mailman/listinfo/dev
>
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to