Doing some more research and testing, looking at the upstream commit
that added the test (1a01727676a8), this is in the bottom of the
message:
[ The IPv6 MTU test still fails with the symmetric routing setup. It
appears to be caused by source address selection picking ::1. Fixing
this is beyond the scope of this series. ]
Running the test in the failing state, we are indeed getting a Packet
too big message but we never seem to get it.
Now, within the create_vrf function, if we change the address added from ::1 to
::3
(ip -netns "${ns}" -6 addr add ::3 dev "${vrf}" nodad), it will start to work.
I wonder if its getting confused since in the failing case, the src is ::1 and
the dest is 2001:db8:16:1:1 so maybe the packet is going around in a loop or
something.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928890
Title:
vrf_route_leaking.sh in net from ubuntu_kernel_selftests linux ADT
test failure with linux/5.11.0-18.19 (Ping received ICMP Packet too
big)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1928890/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs