Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp2329306rwd; Fri, 9 Jun 2023 09:34:23 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6gRc8rEW+JXJ2nU+iHm1Ldfqlbmez3dzXyWyRfudAqbJ904yIAPILGDBxLvqw5XTUWQKP0 X-Received: by 2002:a05:6a21:9985:b0:10c:3cf3:ef7e with SMTP id ve5-20020a056a21998500b0010c3cf3ef7emr2126827pzb.42.1686328463108; Fri, 09 Jun 2023 09:34:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686328463; cv=none; d=google.com; s=arc-20160816; b=t97m/hkdg+X1mmS4YYKXzDSZik3HCTu/ekC8IFUxic21J23dOEYh6UyI8sghZtEqRz ixzXTHids3wTro9rUDvcPNyg/7U1g4XZgoUheGRKvShr/ayTYrl9N6spggJf5EGfmpdf E5bMxE3Lx8/S2pyW1CkR4XYUtQaUw4gmoMYTQMXOd3L5hYTKMoGJL/ZYafd+KVhIAihL 3Nh4iLrMt7Atl3G9rL/BMdGdNP2L2xEHd+6lnzgJPdxAHchtPCVczMMKGBRJ1YzeX2bY gfwsPSx5Xe0qS+ORLGA/91plbELEKXXZ2LKhv+ZR33puOtvIW7p/oGLRihbflzhjnDP9 Fx9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=yjnwFmKQpbvVOv8RhC06l9oJtf9FhCX/e6y5G4jDiGU=; b=TGmIAgX8iK4xwrYwhGnNG4pLCzAxooA/C0nKIlNMo7cpVSfy52r6BxcvnkVtdxPnQW 6O6yNxiG+mVO+PyZwjMkeHddYZTAlAm7mqJVQLpDcYJshNVHD2ipXaVaphVW/qNIf2Ly 7u5bC+N5od/GGZtKTjqk930f8hp6K01DVFHFzAnI6ryOB0wtDUAJqkXuvZIqzG8V3bwU MucOf8+bkdc5xVBGF3gmOpaNEYUYZ+j3yaunbEfBLNuFO5YNv3zcAeyoxX/DrA44SBz+ y/etDDo28pNqsHaK8fYR5Wds5+d1bDLC3ziNfoY9K0PhzpeLfooVA3cnxMwpzuIdu7h2 naLQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IpdvPo1U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a23-20020aa79717000000b006635fd2ce52si2324243pfg.77.2023.06.09.09.34.09; Fri, 09 Jun 2023 09:34:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IpdvPo1U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241804AbjFIQOp (ORCPT + 99 others); Fri, 9 Jun 2023 12:14:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58878 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240564AbjFIQOn (ORCPT ); Fri, 9 Jun 2023 12:14:43 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D2128359C for ; Fri, 9 Jun 2023 09:13:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1686327231; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=yjnwFmKQpbvVOv8RhC06l9oJtf9FhCX/e6y5G4jDiGU=; b=IpdvPo1UvYL+9rYGNi/hW+Q7+0UwKFhOWKMyNRcPWJ/6NGmeUlmCDP3FOu0af8qoVU/tvE iaMWIkFksyB6Ifh3Y0XVSp1+/rC7CQHD360jOaCs+XHN+y8CE+VdmrKFGf6D7L1RXDOQ9U zpBN9FEefjVazSO5hFqLJgt3l0EwlBk= Received: from mail-lf1-f72.google.com (mail-lf1-f72.google.com [209.85.167.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-656-0AJE2yNNPly3LWgN_LAE8Q-1; Fri, 09 Jun 2023 12:13:50 -0400 X-MC-Unique: 0AJE2yNNPly3LWgN_LAE8Q-1 Received: by mail-lf1-f72.google.com with SMTP id 2adb3069b0e04-4ecb00906d0so1578746e87.1 for ; Fri, 09 Jun 2023 09:13:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686327228; x=1688919228; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=yjnwFmKQpbvVOv8RhC06l9oJtf9FhCX/e6y5G4jDiGU=; b=ICypJMrcP8dffA3VQXms4hur/iaWptRqo2FGdzr4X3kTOeYB61x6wiQ8iZRuOrliea n5cgHVZGKPbvjxYtbYnP9t1pVKHNpQpV1X9zbNNfQFosfFFeWhLzgoLkvPKvDdRif+tK v0H5HDrZ4anRRTJGjMUm5z3TBiBThsLcWsg3evbeNB8xx4sqzQ13IDOzHRII9RiQL3pX kUqxsqmAMz4FmbiyNlYqfPL4W3GoxAl4/nHVfcQl0aCIsKDHnNpcUkrw/+PoUAMujmtR 0g+8GjzcwX40i+1iUUnwvv0g4Zz18uAc2AZkzu3scJ7L5yn2R0w3/8ecZrypdQfgZV+A LmUQ== X-Gm-Message-State: AC+VfDySyfk6YXKKyzy2RcbhIklcFKFeFKicQaWHiztD35zrjyKeH94j bTHyIFmblmcNPsXwDnRXKV0hqLvPqg7Bf8kL2khzhUAfhhbNE3himY7nUviiEKb2VEDk0Yd/LQD Wma9tfysHagXB2naLH8CevLdi X-Received: by 2002:a19:671a:0:b0:4f1:458c:c4c with SMTP id b26-20020a19671a000000b004f1458c0c4cmr1048714lfc.43.1686327228514; Fri, 09 Jun 2023 09:13:48 -0700 (PDT) X-Received: by 2002:a19:671a:0:b0:4f1:458c:c4c with SMTP id b26-20020a19671a000000b004f1458c0c4cmr1048698lfc.43.1686327228139; Fri, 09 Jun 2023 09:13:48 -0700 (PDT) Received: from debian (2a01cb058918ce00d1f444ced1f78888.ipv6.abo.wanadoo.fr. [2a01:cb05:8918:ce00:d1f4:44ce:d1f7:8888]) by smtp.gmail.com with ESMTPSA id t11-20020a7bc3cb000000b003f7ed463954sm3107493wmj.25.2023.06.09.09.13.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 09 Jun 2023 09:13:47 -0700 (PDT) Date: Fri, 9 Jun 2023 18:13:45 +0200 From: Guillaume Nault To: Mirsad Goran Todorovac Cc: netdev@vger.kernel.org, "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Shuah Khan , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: Re: POSSIBLE BUG: selftests/net/fcnal-test.sh: [FAIL][FIX TESTED] in vrf "bind - ns-B IPv6 LLA" test Message-ID: References: <48cfd903-ad2f-7da7-e5a6-a22392dc8650@alu.unizg.hr> <884d9eb7-0e8e-3e59-cf6d-2c6931da35ee@alu.unizg.hr> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <884d9eb7-0e8e-3e59-cf6d-2c6931da35ee@alu.unizg.hr> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 08, 2023 at 07:37:15AM +0200, Mirsad Goran Todorovac wrote: > On 6/7/23 18:51, Guillaume Nault wrote: > > On Wed, Jun 07, 2023 at 12:04:52AM +0200, Mirsad Goran Todorovac wrote: > > > [...] > > > TEST: ping local, VRF bind - ns-A IP [ OK ] > > > TEST: ping local, VRF bind - VRF IP [FAIL] > > > TEST: ping local, VRF bind - loopback [ OK ] > > > TEST: ping local, device bind - ns-A IP [FAIL] > > > TEST: ping local, device bind - VRF IP [ OK ] > > > [...] > > > TEST: ping local, VRF bind - ns-A IP [ OK ] > > > TEST: ping local, VRF bind - VRF IP [FAIL] > > > TEST: ping local, VRF bind - loopback [ OK ] > > > TEST: ping local, device bind - ns-A IP [FAIL] > > > TEST: ping local, device bind - VRF IP [ OK ] > > > [...] > > > > I have the same failures here. They don't seem to be recent. > > I'll take a look. > > Certainly. I thought it might be something architecture-specific? > > I have reproduced it also on a Lenovo IdeaPad 3 with Ubuntu 22.10, > but on Lenovo desktop with AlmaLinux 8.8 (CentOS fork), the result > was "888/888 passed". I've taken a deeper look at these failures. That's actually a problem in ping. That's probably why you have different results depending on the distribution. The problem is that, for some versions, 'ping -I netdev ...' doesn't bind the socket to 'netdev' if the IPv4 address to ping is set on that same device. The VRF tests depend on this socket binding, so they fail when ping refuses to bind. That was fixed upstream with commit 92ce8ef21393 ("Revert "ping: do not bind to device when destination IP is on device"") (https://github.com/iputils/iputils/commit/92ce8ef2139353da3bf55fe2280bd4abd2155c9f). Long story short, the tests should pass with the latest upstream ping version. Alternatively, you can modify the commands run by fcnal-test.sh and provide the -I option twice: one for setting the device binding and one for setting the source IPv4 address. This way ping should accept to bind its socket. Something like (not tested): - run_cmd ping -c1 -w1 -I ${VRF} ${a} + run_cmd ping -c1 -w1 -I ${VRF} -I ${a} ${a} [...] - run_cmd ping -c1 -w1 -I ${NSA_DEV} ${a} + run_cmd ping -c1 -w1 -I ${NSA_DEV} -I ${a} ${a} > However, I have a question: > > In the ping + "With VRF" section, the tests with net.ipv4.raw_l3mdev_accept=1 > are repeated twice, while "No VRF" section has the versions: > > SYSCTL: net.ipv4.raw_l3mdev_accept=0 > > and > > SYSCTL: net.ipv4.raw_l3mdev_accept=1 > > The same happens with the IPv6 ping tests. > > In that case, it could be that we have only 2 actual FAIL cases, > because the error is reported twice. > > Is this intentional? I don't know why the non-VRF tests are run once with raw_l3mdev_accept=0 and once with raw_l3mdev_accept=1. Unless I'm missing something, this option shouldn't affect non-VRF users. Maybe the objective is to make sure that it really doesn't affect them. David certainly knows better. > Thanks, > Mirsad >