** Description changed:
- There are failed cases in the xfrm_policy.sh test, but the overall result is
PASS
+ [Impact]
+ Even with failed cases reported in the xfrm_policy.sh test, the overall
result is still "PASS"
$ sudo ./xfrm_policy.sh
- # selftests: net: xfrm_policy.sh
- # PASS: policy before exception matches
- # FAIL: expected ping to .254 to fail (exceptions)
- # PASS: direct policy matches (exceptions)
- # PASS: policy matches (exceptions)
- # FAIL: expected ping to .254 to fail (exceptions and block policies)
- # PASS: direct policy matches (exceptions and block policies)
- # PASS: policy matches (exceptions and block policies)
- # FAIL: expected ping to .254 to fail (exceptions and block policies after
hresh changes)
- # PASS: direct policy matches (exceptions and block policies after hresh
changes)
- # PASS: policy matches (exceptions and block policies after hresh changes)
- # FAIL: expected ping to .254 to fail (exceptions and block policies after
hthresh change in ns3)
- # PASS: direct policy matches (exceptions and block policies after hthresh
change in ns3)
- # PASS: policy matches (exceptions and block policies after hthresh change
in ns3)
- # FAIL: expected ping to .254 to fail (exceptions and block policies after
htresh change to normal)
- # PASS: direct policy matches (exceptions and block policies after htresh
change to normal)
- # PASS: policy matches (exceptions and block policies after htresh change to
normal)
- # PASS: policies with repeated htresh change
- ok 12 selftests: net: xfrm_policy.sh
+ # selftests: net: xfrm_policy.sh
+ # PASS: policy before exception matches
+ # FAIL: expected ping to .254 to fail (exceptions)
+ # PASS: direct policy matches (exceptions)
+ # PASS: policy matches (exceptions)
+ # FAIL: expected ping to .254 to fail (exceptions and block policies)
+ # PASS: direct policy matches (exceptions and block policies)
+ # PASS: policy matches (exceptions and block policies)
+ # FAIL: expected ping to .254 to fail (exceptions and block policies after
hresh changes)
+ # PASS: direct policy matches (exceptions and block policies after hresh
changes)
+ # PASS: policy matches (exceptions and block policies after hresh changes)
+ # FAIL: expected ping to .254 to fail (exceptions and block policies after
hthresh change in ns3)
+ # PASS: direct policy matches (exceptions and block policies after hthresh
change in ns3)
+ # PASS: policy matches (exceptions and block policies after hthresh change
in ns3)
+ # FAIL: expected ping to .254 to fail (exceptions and block policies after
htresh change to normal)
+ # PASS: direct policy matches (exceptions and block policies after htresh
change to normal)
+ # PASS: policy matches (exceptions and block policies after htresh change to
normal)
+ # PASS: policies with repeated htresh change
+ ok 12 selftests: net: xfrm_policy.sh
$ echo $?
0
This is because of the variable "lret" in check_xfrm() is not a local
variable, and it looks like it will override the one in
check_exceptions() thus making the return value become 0 for the passed
test case after the failed one.
+
+ [Fix]
+ * f6e9ceb7a7fc32 (" selftests: xfrm: fix test return value override issue in
xfrm_policy.sh")
+
+ This patch can be cherry-picked into all of the affected kernels.
+
+ Focal kernel got this patch via stable update, and we don't have this
+ test in Bionic.
+
+ [Test]
+ Run the xfrm_policy.sh test, if there is any failed cases the final result
will not be 0.
+
+ [Regression Potential]
+ This change is just for testing tools, it's unlikely to affect real kernel
functionality. However it's expected to generate failures in our test report as
it's reflecting the real test result.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1909647
Title:
xfrm_policy.sh in net from ubuntu_kernel_selftests passed with failed
sub-cases
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1909647/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs