Doing some more research and testing, looking at the upstream commit
that added the test (1a01727676a8), this is in the bottom of the
message:

    [ The IPv6 MTU test still fails with the symmetric routing setup. It
      appears to be caused by source address selection picking ::1.  Fixing
      this is beyond the scope of this series. ]

Running the test in the failing state, we are indeed getting a Packet
too big message but we never seem to get it.

Now, within the create_vrf function, if we change the address added from ::1 to 
::3 
(ip -netns "${ns}" -6 addr add ::3 dev "${vrf}" nodad), it will start to work. 
I wonder if its getting confused since in the failing case, the src is ::1 and 
the dest is 2001:db8:16:1:1 so maybe the packet is going around in a loop or 
something.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928890

Title:
  vrf_route_leaking.sh in net from ubuntu_kernel_selftests linux ADT
  test failure with linux/5.11.0-18.19 (Ping received ICMP Packet too
  big)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1928890/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to