** Description changed:

- There are failed cases in the xfrm_policy.sh test, but the overall result is 
PASS
+ [Impact]
+ Even with failed cases reported in the xfrm_policy.sh test, the overall 
result is still "PASS"
  $ sudo ./xfrm_policy.sh
-  # selftests: net: xfrm_policy.sh
-  # PASS: policy before exception matches
-  # FAIL: expected ping to .254 to fail (exceptions)
-  # PASS: direct policy matches (exceptions)
-  # PASS: policy matches (exceptions)
-  # FAIL: expected ping to .254 to fail (exceptions and block policies)
-  # PASS: direct policy matches (exceptions and block policies)
-  # PASS: policy matches (exceptions and block policies)
-  # FAIL: expected ping to .254 to fail (exceptions and block policies after 
hresh changes)
-  # PASS: direct policy matches (exceptions and block policies after hresh 
changes)
-  # PASS: policy matches (exceptions and block policies after hresh changes)
-  # FAIL: expected ping to .254 to fail (exceptions and block policies after 
hthresh change in ns3)
-  # PASS: direct policy matches (exceptions and block policies after hthresh 
change in ns3)
-  # PASS: policy matches (exceptions and block policies after hthresh change 
in ns3)
-  # FAIL: expected ping to .254 to fail (exceptions and block policies after 
htresh change to normal)
-  # PASS: direct policy matches (exceptions and block policies after htresh 
change to normal)
-  # PASS: policy matches (exceptions and block policies after htresh change to 
normal)
-  # PASS: policies with repeated htresh change
-  ok 12 selftests: net: xfrm_policy.sh
+  # selftests: net: xfrm_policy.sh
+  # PASS: policy before exception matches
+  # FAIL: expected ping to .254 to fail (exceptions)
+  # PASS: direct policy matches (exceptions)
+  # PASS: policy matches (exceptions)
+  # FAIL: expected ping to .254 to fail (exceptions and block policies)
+  # PASS: direct policy matches (exceptions and block policies)
+  # PASS: policy matches (exceptions and block policies)
+  # FAIL: expected ping to .254 to fail (exceptions and block policies after 
hresh changes)
+  # PASS: direct policy matches (exceptions and block policies after hresh 
changes)
+  # PASS: policy matches (exceptions and block policies after hresh changes)
+  # FAIL: expected ping to .254 to fail (exceptions and block policies after 
hthresh change in ns3)
+  # PASS: direct policy matches (exceptions and block policies after hthresh 
change in ns3)
+  # PASS: policy matches (exceptions and block policies after hthresh change 
in ns3)
+  # FAIL: expected ping to .254 to fail (exceptions and block policies after 
htresh change to normal)
+  # PASS: direct policy matches (exceptions and block policies after htresh 
change to normal)
+  # PASS: policy matches (exceptions and block policies after htresh change to 
normal)
+  # PASS: policies with repeated htresh change
+  ok 12 selftests: net: xfrm_policy.sh
  $ echo $?
  0
  
  This is because of the variable "lret" in check_xfrm() is not a local
  variable, and it looks like it will override the one in
  check_exceptions() thus making the return value become 0 for the passed
  test case after the failed one.
+ 
+ [Fix]
+ * f6e9ceb7a7fc32 (" selftests: xfrm: fix test return value override issue in 
xfrm_policy.sh")
+ 
+ This patch can be cherry-picked into all of the affected kernels.
+ 
+ Focal kernel got this patch via stable update, and we don't have this
+ test in Bionic.
+ 
+ [Test]
+ Run the xfrm_policy.sh test, if there is any failed cases the final result 
will not be 0.
+ 
+ [Regression Potential]
+ This change is just for testing tools, it's unlikely to affect real kernel 
functionality. However it's expected to generate failures in our test report as 
it's reflecting the real test result.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1909647

Title:
  xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed
  sub-cases

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1909647/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to