From patchwork Wed May 25 11:08:20 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Po-Hsu Lin X-Patchwork-Id: 1635380 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=canonical.com header.i=@canonical.com header.a=rsa-sha256 header.s=20210705 header.b=gs8f5N9P; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4L7SxR5mpLz9sGl for ; Wed, 25 May 2022 21:08:59 +1000 (AEST) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1ntoso-0006Fa-IU; Wed, 25 May 2022 11:08:54 +0000 Received: from smtp-relay-internal-0.internal ([10.131.114.225] helo=smtp-relay-internal-0.canonical.com) by huckleberry.canonical.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1ntosh-00065X-DK for kernel-team@lists.ubuntu.com; Wed, 25 May 2022 11:08:47 +0000 Received: from mail-pg1-f200.google.com (mail-pg1-f200.google.com [209.85.215.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 1E60E3F1AA for ; Wed, 25 May 2022 11:08:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1653476927; bh=T9O0SroyAIDD6XlNZfjRYu42oG4EOuMSCSIhvHX5pMM=; h=From:To:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=gs8f5N9PrJVtw9FwVK+XSsU8lyBJThD+t0+cH/RBEmMasSTLb8/XRL1Ei8dS+fwMu H9lyTmfMGHzo3PxGFPpViXtKETxMG8+lqW1tw0CmYKq+PEeBhefBA6b2vsPi8jMK4y qvC8MctXfv+Efp3ZkFD37zevjrJ8+w7tikMax61xxrftN5O1VHHWy3jrgWHRSQB2uf MkJWYwm8vdeVKWbdlXeGhwciQv3kH4/+v9fqgXBFssWPfevmMXw4HzKiu1XlxT+RNc 89yAbgnC66vmrXrHG1jIQgrZ8Kfy8dDg7X1GULOQaWh5U1Ae/BE9xGfgffevGT+bGw B+6+3yAzwmXOw== Received: by mail-pg1-f200.google.com with SMTP id g7-20020a655947000000b003c6bf87efdaso10137166pgu.14 for ; Wed, 25 May 2022 04:08:47 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=T9O0SroyAIDD6XlNZfjRYu42oG4EOuMSCSIhvHX5pMM=; b=wy06j049viAoICJbnczpQ6oTT91nY0N39/3es2SD0kWAyx5E0soEhVbXxt9g7OUZja n910Dy6Gmw/SSMtP2ZjIQ8Wr2tKiDIVBCdLQ9bwjNSfz10dkqrCqo5vINKNqK65XedVu S2YZ6PdIuClPRh37FUOwmiXUDXFI9fNXkrq0HuWfmDyX9gMKdPqfJ6PpUlqX3Nk60Gbw KBQcNRpxsrYOQTR7pFED223ScuuFPZI9SnHG/Fn4+zEgS9Z1VNmW13v5qEYxs8mI9M+x m3TTcMjr0moLtV6Fim86ajLU1RRYotFtewGiJbWTBp/uXSQ0FeU34WM07KrD/zq+3r86 UoWA== X-Gm-Message-State: AOAM530ZmtmKyPUKhvS1MIpt7GcLZQc6TfpbINCdwo7rbRxjkpkYMRqk rUHBfqiJqILO4mL9GxWkwwLOAl0MpDXfvZoIxfBFhNIm+8H+o2mf5H+pUrjD8nNRBdMIbEgFwke QO4L/iYVLvq8S6rngCs75DhyavJREH1cxAj68ckn5 X-Received: by 2002:a63:f046:0:b0:3c6:a37b:1613 with SMTP id s6-20020a63f046000000b003c6a37b1613mr28513485pgj.168.1653476924166; Wed, 25 May 2022 04:08:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz6WPlNkjWUYEjE3jmMzMX6izu/xaWGAKWVj2t05+O5BltO9itSbEx5DdWvXe7n45Gcmm/u/g== X-Received: by 2002:a63:f046:0:b0:3c6:a37b:1613 with SMTP id s6-20020a63f046000000b003c6a37b1613mr28513474pgj.168.1653476923853; Wed, 25 May 2022 04:08:43 -0700 (PDT) Received: from localhost.localdomain (114-136-187-239.emome-ip.hinet.net. [114.136.187.239]) by smtp.gmail.com with ESMTPSA id f5-20020a170902860500b0015ed3a112c9sm8914224plo.280.2022.05.25.04.08.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 25 May 2022 04:08:43 -0700 (PDT) From: Po-Hsu Lin To: kernel-team@lists.ubuntu.com Subject: [OEM-5.14][SRU][PATCHv2 1/1] selftests: net: test_vxlan_under_vrf: fix HV connectivity test Date: Wed, 25 May 2022 19:08:20 +0800 Message-Id: <20220525110820.171613-4-po-hsu.lin@canonical.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220525110820.171613-1-po-hsu.lin@canonical.com> References: <20220525110820.171613-1-po-hsu.lin@canonical.com> MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" From: Andrea Righi BugLink: https://bugs.launchpad.net/bugs/1871015 It looks like test_vxlan_under_vrf.sh is always failing to verify the connectivity test during the ping between the two simulated VMs. This is due to the fact that veth-hv in each VM should have a distinct MAC address. Fix by setting a unique MAC address on each simulated VM interface. Without this fix: $ sudo ./tools/testing/selftests/net/test_vxlan_under_vrf.sh Checking HV connectivity [ OK ] Check VM connectivity through VXLAN (underlay in the default VRF) [FAIL] With this fix applied: $ sudo ./tools/testing/selftests/net/test_vxlan_under_vrf.sh Checking HV connectivity [ OK ] Check VM connectivity through VXLAN (underlay in the default VRF) [ OK ] Check VM connectivity through VXLAN (underlay in a VRF) [FAIL] NOTE: the connectivity test with the underlay VRF is still failing; it seems that ARP requests are blocked at the simulated hypervisor level, probably due to some missing ARP forwarding rules. This requires more investigation (in the meantime we may consider to set that test as expected failure - XFAIL). Signed-off-by: Andrea Righi Signed-off-by: David S. Miller (cherry picked from commit e7e4785fa30f9b5d1b60ed2d8e221891325dfc5f) Signed-off-by: Po-Hsu Lin --- tools/testing/selftests/net/test_vxlan_under_vrf.sh | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/testing/selftests/net/test_vxlan_under_vrf.sh b/tools/testing/selftests/net/test_vxlan_under_vrf.sh index 5856814..4458bf0 100755 --- a/tools/testing/selftests/net/test_vxlan_under_vrf.sh +++ b/tools/testing/selftests/net/test_vxlan_under_vrf.sh @@ -101,6 +101,8 @@ setup-vm() { ip -netns hv-$id link set veth-tap master br0 ip -netns hv-$id link set veth-tap up + ip link set veth-hv address 02:1d:8d:dd:0c:6$id + ip link set veth-hv netns vm-$id ip -netns vm-$id addr add 10.0.0.$id/24 dev veth-hv ip -netns vm-$id link set veth-hv up