[{"id":3679457,"web_url":"http://patchwork.ozlabs.org/comment/3679457/","msgid":"<20260420082334.7db8cbf4@kernel.org>","list_archive_url":null,"date":"2026-04-20T15:23:34","subject":"Re: [PATCH net v2] selftests: netfilter:\n conntrack_sctp_collision.sh: Introduce SCTP INIT collision test","submitter":{"id":77159,"url":"http://patchwork.ozlabs.org/api/people/77159/","name":"Jakub Kicinski","email":"kuba@kernel.org"},"content":"On Sun, 19 Apr 2026 03:58:43 +0800 Yi Chen wrote:\n> The existing test covered a scenario where a delayed INIT_ACK chunk\n> updates the vtag in conntrack after the association has already been\n> established.\n\nAI says:\n\nThe conntrack_sctp_collision.sh selftest is now failing in the NIPA CI on\nboth the normal and debug kernel builds:\n\n  not ok 1 1 selftests: net/netfilter: conntrack_sctp_collision.sh # exit=1\n\n  # Test for SCTP INIT_ACK Collision in nf_conntrack:\n  # Invalid netns name \"\"\n  # Invalid netns name \"\"\n\nThe root cause is a shell variable scoping bug introduced by this patch.\nThe new test structure wraps `topo_setup` in a subshell:\n\n  (topo_setup && conf_delay $SERVER_NS link0 2) || exit $?\n  if ! do_test; then\n      ...\n  fi\n\n`topo_setup` calls `setup_ns CLIENT_NS SERVER_NS ROUTER_NS`, which sets\nthose variables inside the subshell. Those assignments do not propagate\nback to the parent shell, so when `do_test` is called afterwards, both\n`$SERVER_NS` and `$CLIENT_NS` expand to empty strings. The `ip net exec \"\"`\ncalls then fail with \"Invalid netns name \"\"\".\n\nThe second test case (SCTP INIT Collision) would have the same problem.\n\nThe fix is to avoid the subshell or ensure the namespace variables are\nvisible to `do_test`. The simplest approach is to remove the subshell\nwrapping and call `topo_setup`, `conf_delay`, and `do_test` in the same\nshell scope:\n\n  topo_setup && conf_delay \"$SERVER_NS\" link0 2 || exit $?\n  if ! do_test; then\n      exit $ksft_fail\n  fi\n\n  topo_setup && conf_delay \"$CLIENT_NS\" link3 1 || exit $?\n  if ! do_test; then\n      exit $ksft_fail\n  fi\n\nPlease also note that `conf_delay` references `$ROUTER_NS` directly\n(not via a parameter), so it too requires that those variables be set\nin the same shell scope.","headers":{"Return-Path":"\n <netfilter-devel+bounces-12066-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=Z4sex0i0;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.105.105.114; helo=tor.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12066-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"Z4sex0i0\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from tor.lore.kernel.org (tor.lore.kernel.org [172.105.105.114])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzrPj3SPlz1yD4\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 02:23:05 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 82D563415D83\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 20 Apr 2026 15:23:45 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 0343A2C11CB;\n\tMon, 20 Apr 2026 15:23:37 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 7F8D4264612;\n\tMon, 20 Apr 2026 15:23:36 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id 949CDC2BCB4;\n\tMon, 20 Apr 2026 15:23:35 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776698616; cv=none;\n b=RSdQmBaIInQqcb9CXaIHT+mjAt85WiZCSfcElRaGjWub+/YFJqf7S+rum/kfG8OxeVxZ44ZdL7GN84lD2IScSItPqXxZxr3h53Q2xxEoYxAtoI+O1N1N8pLyOBRQYpqS5CfsIs8+FQuOkVxqlPWNm4J0LqujvYLPh5MJd8wL31U=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776698616; c=relaxed/simple;\n\tbh=Rt7p+f8035FwrglIyG/el9HvMHbr+wpImxFBHqJMTSs=;\n\th=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References:\n\t MIME-Version:Content-Type;\n b=KNddmhYGlyffLGp8uVy/Dr6cl41CmLqgDOy48WRdhO99iMPJeu+V7f0XAnewjoqmj+Icw8nMnxb8CoJ1Ab4O0zglkcbdZpW3fzgaweP0etCXp+IsoL+FQJsJk6XVMjFiXl5abLbah45nhS7wZrZBWGZN5T47RQpUy3J3FfKiCvc=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=Z4sex0i0; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1776698616;\n\tbh=Rt7p+f8035FwrglIyG/el9HvMHbr+wpImxFBHqJMTSs=;\n\th=Date:From:To:Cc:Subject:In-Reply-To:References:From;\n\tb=Z4sex0i0zWSKoFotw7bLfFZLHBh637MQHPf1EejQCwYYCKxdG10vZ8N3GOO7lEOac\n\t 96qjPzuN8ebdmcgO48coFKzp4MXm//Fa6/mVBojlvxL3C3npxMbIFIlmnBKyw41r2F\n\t JGfdNkYdYM/BfsKU2fdRe37gtAev3FTvjnYUiHQeoVz1ErY6MDRUKfJllbQv2M/s8H\n\t RlkSN2G86MbzB6PMzHgDcKHemgKYmxf/piBhQlzr6mZyq18+u37mRPR9mHKH4Uh4oD\n\t EuZVSJWbTJX2gi5j3gAjmU25p1o2/cPJ+Gvq87cNs7NjM5Zj6PhTt2JPeDv8V7fite\n\t d3dzkF0cYOxJA==","Date":"Mon, 20 Apr 2026 08:23:34 -0700","From":"Jakub Kicinski <kuba@kernel.org>","To":"Yi Chen <yiche.cy@gmail.com>","Cc":"Pablo Neira Ayuso <pablo@netfilter.org>, Florian Westphal\n <fw@strlen.de>, Phil Sutter <phil@nwl.cc>, Long Xin <lucien.xin@gmail.com>,\n \"David S . Miller\" <davem@davemloft.net>, Eric Dumazet\n <edumazet@google.com>, Paolo Abeni <pabeni@redhat.com>, Simon Horman\n <horms@kernel.org>, Shuah Khan <shuah@kernel.org>, coreteam@netfilter.org,\n netfilter-devel@vger.kernel.org, linux-kselftest@vger.kernel.org,\n linux-kernel@vger.kernel.org, netdev@vger.kernel.org","Subject":"Re: [PATCH net v2] selftests: netfilter:\n conntrack_sctp_collision.sh: Introduce SCTP INIT collision test","Message-ID":"<20260420082334.7db8cbf4@kernel.org>","In-Reply-To":"<20260418195843.303946-1-yiche.cy@gmail.com>","References":"<20260418195843.303946-1-yiche.cy@gmail.com>","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=US-ASCII","Content-Transfer-Encoding":"7bit"}},{"id":3679594,"web_url":"http://patchwork.ozlabs.org/comment/3679594/","msgid":"<CADvbK_cmmdqxXJC1q-5gDTzhq_XH1ESgRZCD6pO4Ws4GoWooYQ@mail.gmail.com>","list_archive_url":null,"date":"2026-04-20T20:52:27","subject":"Re: [PATCH net v2] selftests: netfilter: conntrack_sctp_collision.sh:\n Introduce SCTP INIT collision test","submitter":{"id":61073,"url":"http://patchwork.ozlabs.org/api/people/61073/","name":"Xin Long","email":"lucien.xin@gmail.com"},"content":"On Mon, Apr 20, 2026 at 11:23 AM Jakub Kicinski <kuba@kernel.org> wrote:\n>\n> On Sun, 19 Apr 2026 03:58:43 +0800 Yi Chen wrote:\n> > The existing test covered a scenario where a delayed INIT_ACK chunk\n> > updates the vtag in conntrack after the association has already been\n> > established.\n>\n> AI says:\n>\n> The conntrack_sctp_collision.sh selftest is now failing in the NIPA CI on\n> both the normal and debug kernel builds:\n>\n>   not ok 1 1 selftests: net/netfilter: conntrack_sctp_collision.sh # exit=1\n>\n>   # Test for SCTP INIT_ACK Collision in nf_conntrack:\n>   # Invalid netns name \"\"\n>   # Invalid netns name \"\"\n>\n> The root cause is a shell variable scoping bug introduced by this patch.\n> The new test structure wraps `topo_setup` in a subshell:\n>\n>   (topo_setup && conf_delay $SERVER_NS link0 2) || exit $?\nBetter to change it to:\n\ntopo_setup || exit $?\nconf_delay $SERVER_NS link0 2 || exit $?\n\nAgain, please do not post the patch until the fix gets merged into net.git:\n\nhttps://lore.kernel.org/netdev/cover.1775847557.git.lucien.xin@gmail.com/\n\nOtherwise, it will still be failing in the NIPA CI.\n\nThanks.\n\n>   if ! do_test; then\n>       ...\n>   fi\n>\n> `topo_setup` calls `setup_ns CLIENT_NS SERVER_NS ROUTER_NS`, which sets\n> those variables inside the subshell. Those assignments do not propagate\n> back to the parent shell, so when `do_test` is called afterwards, both\n> `$SERVER_NS` and `$CLIENT_NS` expand to empty strings. The `ip net exec \"\"`\n> calls then fail with \"Invalid netns name \"\"\".\n>\n> The second test case (SCTP INIT Collision) would have the same problem.\n>\n> The fix is to avoid the subshell or ensure the namespace variables are\n> visible to `do_test`. The simplest approach is to remove the subshell\n> wrapping and call `topo_setup`, `conf_delay`, and `do_test` in the same\n> shell scope:\n>\n>   topo_setup && conf_delay \"$SERVER_NS\" link0 2 || exit $?\n>   if ! do_test; then\n>       exit $ksft_fail\n>   fi\n>\n>   topo_setup && conf_delay \"$CLIENT_NS\" link3 1 || exit $?\n>   if ! do_test; then\n>       exit $ksft_fail\n>   fi\n>\n> Please also note that `conf_delay` references `$ROUTER_NS` directly\n> (not via a parameter), so it too requires that those variables be set\n> in the same shell scope.","headers":{"Return-Path":"\n <netfilter-devel+bounces-12090-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=FjIZLrLI;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12090-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=\"FjIZLrLI\"","smtp.subspace.kernel.org;\n arc=pass smtp.client-ip=209.85.210.179","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=gmail.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzyP509s4z1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 06:52:56 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 03E1B301BA66\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 20 Apr 2026 20:52:43 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id F28F038C401;\n\tMon, 20 Apr 2026 20:52:41 +0000 (UTC)","from mail-pf1-f179.google.com (mail-pf1-f179.google.com\n [209.85.210.179])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 54C942BE05F\n\tfor <netfilter-devel@vger.kernel.org>; Mon, 20 Apr 2026 20:52:40 +0000 (UTC)","by mail-pf1-f179.google.com with SMTP id\n d2e1a72fcca58-82735a41920so1454309b3a.2\n        for <netfilter-devel@vger.kernel.org>;\n Mon, 20 Apr 2026 13:52:40 -0700 (PDT)"],"ARC-Seal":["i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776718361; cv=pass;\n b=HECSCvuotYkUmh2/Zy0Ll6IxpuMNsEvsiJo1AviahB8SKNmnSnRc70z25yQquGpZn43gXnnXbLiwvvk53Bx2O7H9uTmH/A0Ks11Xx949P16iWWKyz/KCXpoBUQmT4keUKwUysXXHnvJsJzpQMfT28hFIA3z+YAn1Ov22muKTOUQ=","i=1; a=rsa-sha256; t=1776718360; cv=none;\n        d=google.com; s=arc-20240605;\n        b=LI7gbX2oLX28FYVb4ED/64ZLbTEjEStHHmAuiOwzb9+000GpB6J0vT1eMGhAM/leIB\n         GhvLBGuNlpNNhHCLzz0KFJi4blcvUxfuxD4y1UpjAn7QazYPLPWNQzzWB1+RLioOPiLF\n         LfweLDdF9rIeyUKguVHA4LUt69sPjwMdRf/pSasCHH+cQm/dnbwDlwfmOHNxDSF9L52V\n         ZCVEK2tEgii1Th0xSoqFVX/bFWEN7NLYpDSuH1NmXkfkwvp9HU78ivqOZhaG+KnZ254B\n         Bt8w02slBp1/8i/O41AC06zJNnGJCVkQC/9cWJzyIyh0JfUJnEsTaDi6SyhDiWwSYQi7\n         lHzg=="],"ARC-Message-Signature":["i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776718361; c=relaxed/simple;\n\tbh=Pnhnz1gyermNjSQP4+5/crpMQ9x95/YqL02Qcv52xEI=;\n\th=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject:\n\t To:Cc:Content-Type;\n b=Dq5uhcGHMrAWOgTSLphCL0BN1AzcAa3E3pXHIzz3DjmUkZBqt+LdfdUvXvnFlh39dCye7BlgJQpCwV6hjMEFrMCUwvvFS6/i3mEI9G89pA6ep3FRuy8RSh1qX+w5CdJNCDRz6hDv1NO+Lu5Avr8XN22f5E9/DcZIm9oO7oecK4Y=","i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;\n s=arc-20240605;\n        h=content-transfer-encoding:cc:to:subject:message-id:date:from\n         :in-reply-to:references:mime-version:dkim-signature;\n        bh=MxdD42vr//ngF98PTX13azQKwSAEPSKYCuEqwcGgkfs=;\n        fh=DIRYGsnXQfUpMpK/yv+CoRGQU6Y+ZHJRpIPUwiTsPvU=;\n        b=gDjshGbBa1N480Z9nurPN3Lkir7xQ72DMiHWuVO/i5sMJ1CbUyA5qnpkR/otsXEPJm\n         tsxgk54BLCJXWsWDeNQxgaf4oeED89j8l8/e8zB9xQ0iepzHRlfjjTV6vWF6YgjTR1qr\n         N3krvA/uY1PqvJWQ8tWEvw+E9x6p6yRvGsEeqdlEkZIKHjJWViUuunmmW2W8xEZ6zI0x\n         Ebf7tO4bfTovDnH1B3rs+hL6lQR4e3jjrUmLG+jxyhD7yPdB80G0t9AkI1HMHfSuhhKM\n         l/aDzxxnOaFJoAIFntJ0/62cuIiwgNEW5H5gfNFTUEyNZRIuchydgb/FPBB0exeDe2CB\n         vnuQ==;\n        darn=vger.kernel.org"],"ARC-Authentication-Results":["i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com;\n spf=pass smtp.mailfrom=gmail.com;\n dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=FjIZLrLI; arc=pass smtp.client-ip=209.85.210.179","i=1; mx.google.com; arc=none"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=gmail.com; s=20251104; t=1776718360; x=1777323160;\n darn=vger.kernel.org;\n        h=content-transfer-encoding:cc:to:subject:message-id:date:from\n         :in-reply-to:references:mime-version:from:to:cc:subject:date\n         :message-id:reply-to;\n        bh=MxdD42vr//ngF98PTX13azQKwSAEPSKYCuEqwcGgkfs=;\n        b=FjIZLrLI3KSkP9dhCKwgfkTNIuXNaYPG/XVG89sZwWDi+Lg5mTU+TIeS7qL8fIlP5Z\n         9D2UZMCzGtnxdVpbyJp1cUEWpvLOIIoyUCMvzhyNSo8yRVJL3g2ToV1cBKEDM/aXg7gT\n         //LIV2svgvvzAyQR80Sp0BLBm+jwmv74bzfOKz1Uz8KB1FF8oE2PeNK8CXhCpKdm/tyR\n         Ehzm2Cr60Sr86eIQg3l/2mJogk6wZTBJgg1xtcAv2NQ6ocaOjEztzaMLlQjDz5AlO/E7\n         /r5We0LGgS2WTO66XnvyjgPVPEI3K4NiwoC4Mx9BOfBeR2pM5DpGdVa6wt7RLoTNS7ss\n         x5JA==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1776718360; x=1777323160;\n        h=content-transfer-encoding:cc:to:subject:message-id:date:from\n         :in-reply-to:references:mime-version:x-gm-gg:x-gm-message-state:from\n         :to:cc:subject:date:message-id:reply-to;\n        bh=MxdD42vr//ngF98PTX13azQKwSAEPSKYCuEqwcGgkfs=;\n        b=jJwLqUO8YXU1sgRbrelUYQZytE5cqthd6whC/j943TY/EtOgfz3NMt0qQeQ3EtQ6K2\n         M7+KXT6XxSnKfmdcj4ysGAzxsAcCt7+ixtatenycUFueqi2U6cXMGVzw/Hl03TnqjAgA\n         qLOHJNu2s5qsOVIQNslL7XPlqbBHvw8wfxPQGMlJB3AMJai3eIOZ6TNRgMeEK2o17lBg\n         Jbc+WBfguwpFEjbHs99sx7OQZAI0l1sXdd6yq5/1S7E3+kV1U/5a7lHlKLNHQitmeBbJ\n         nO/uo8opoh6De7FMWWUvfucTPZFjq/c1qZAeyXbpQOvgJACes7uPQfvBO+nL4J9KE7vG\n         Kl/w==","X-Forwarded-Encrypted":"i=1;\n AFNElJ/TNjkA64NKEvHpctCXqrINv2RNp8NmdamSYuFrFqkv4NOgXWOSFyxE60qHF3JK5fqwpFcZFA2YQkKGXMRgIOQ=@vger.kernel.org","X-Gm-Message-State":"AOJu0YxWAHWmjYeAdF2Xxv96XGw59+grZ8Ishwmraorgf3EKu3FfxhLt\n\tz+pjJDen/9hwmhGrWCkHVQlQSpylPzpCOGRP3LceFeLOKfkXPWTZjebHhcdDRFuXF+9LYbN/5kn\n\t7+fU+xI7vMiDC5Ka7hyzLLBcXLOsghfy8boos","X-Gm-Gg":"AeBDiesK4DwUtQ5+zNCE1jml6oS+PBXfpYTRoyJSqH6JqAnKrlZzjgoORgwNxPo5pad\n\tsFRcJ9jcf0/FLazxDIQmA3Vke2f/jNUd7GhYwF7QeZqdHEO3pwmnm+wN8vWv4gQw6VezvWxQ7NG\n\tH58XvkhBZjW/Hi17+sfcpSLu88bmOCb0yNYYEruuf8sJHP7cWf1hiJ2+sZmZBBFwE5JZsKZgiXj\n\txYNa5wUqlpqlOMmCWyR9Xuf4hZ5+ccgxm6kdWL1kJPknPRKnQaI6jW6YmxDIoIsPBf1Q2A/Jz8V\n\t2zNJL9BrbAwlHgLuP/jVNOB/TalNsvD10bpAHwTKk3jVJqZVnDVqTjvjKmDlshshUK5a0kcInhL\n\tby5cLpBh8TDzJfQ3LriEcl2fG8lcnE8lU9TB4aSjGPlL0WoYK","X-Received":"by 2002:a05:6a00:2d1f:b0:82f:7252:38cf with SMTP id\n d2e1a72fcca58-82f8c82c396mr13602325b3a.16.1776718359711; Mon, 20 Apr 2026\n 13:52:39 -0700 (PDT)","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","References":"<20260418195843.303946-1-yiche.cy@gmail.com>\n <20260420082334.7db8cbf4@kernel.org>","In-Reply-To":"<20260420082334.7db8cbf4@kernel.org>","From":"Xin Long <lucien.xin@gmail.com>","Date":"Mon, 20 Apr 2026 16:52:27 -0400","X-Gm-Features":"AQROBzDGLUKJMnGtLHblO9Fg05E_lPRg8I9KEhfXLSlLZeyIegT3XxzFdfu_aUI","Message-ID":"\n <CADvbK_cmmdqxXJC1q-5gDTzhq_XH1ESgRZCD6pO4Ws4GoWooYQ@mail.gmail.com>","Subject":"Re: [PATCH net v2] selftests: netfilter: conntrack_sctp_collision.sh:\n Introduce SCTP INIT collision test","To":"Jakub Kicinski <kuba@kernel.org>","Cc":"Yi Chen <yiche.cy@gmail.com>, Pablo Neira Ayuso <pablo@netfilter.org>,\n\tFlorian Westphal <fw@strlen.de>, Phil Sutter <phil@nwl.cc>,\n \"David S . Miller\" <davem@davemloft.net>,\n\tEric Dumazet <edumazet@google.com>, Paolo Abeni <pabeni@redhat.com>,\n Simon Horman <horms@kernel.org>,\n\tShuah Khan <shuah@kernel.org>, coreteam@netfilter.org,\n netfilter-devel@vger.kernel.org,\n\tlinux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org,\n\tnetdev@vger.kernel.org","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable"}}]