make -C tools/testing/selftests TARGETS="net" TEST_PROGS=vrf-xfrm-tests.shh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-3/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-3/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-3/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-3/tools/testing/selftests/net' TAP version 13 1..1 # overriding timeout to 7200 # selftests: net: vrf-xfrm-tests.sh # # No qdisc on VRF device # ./vrf-xfrm-tests.sh: line 195: 20248 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20249 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20250 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20251 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20252 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20253 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20254 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20255 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # TEST: IPv4 no xfrm policy [ OK ] # TEST: IPv6 no xfrm policy [ OK ] # ./vrf-xfrm-tests.sh: line 204: 20260 Segmentation fault ip -netns $host1 xfrm policy add src ${h1_4} dst ${h2_4} ${devarg} dir out tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20261 Segmentation fault ip -netns $host2 xfrm policy add src ${h1_4} dst ${h2_4} dir in tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20262 Segmentation fault ip -netns $host1 xfrm policy add src ${h2_4} dst ${h1_4} ${devarg} dir in tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20263 Segmentation fault ip -netns $host2 xfrm policy add src ${h2_4} dst ${h1_4} dir out tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20264 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h1_6} dst ${h2_6} ${devarg} dir out tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20265 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h1_6} dst ${h2_6} dir in tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20266 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h2_6} dst ${h1_6} ${devarg} dir in tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20267 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h2_6} dst ${h1_6} dir out tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20268 Segmentation fault ip -netns $host1 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20269 Segmentation fault ip -netns $host2 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} # ./vrf-xfrm-tests.sh: line 204: 20270 Segmentation fault ip -netns $host1 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20271 Segmentation fault ip -netns $host2 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} # ./vrf-xfrm-tests.sh: line 204: 20272 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20273 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} # ./vrf-xfrm-tests.sh: line 204: 20274 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20275 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} # TEST: IPv4 xfrm policy based on address [ OK ] # TEST: IPv6 xfrm policy based on address [ OK ] # ./vrf-xfrm-tests.sh: line 195: 20280 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20281 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20282 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20283 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20284 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20285 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20286 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20287 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # TEST: IPv6 xfrm policy with VRF in selector [ OK ] # ./vrf-xfrm-tests.sh: line 195: 20290 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20291 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20292 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20293 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20294 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20295 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20296 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20297 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 327: 20298 Segmentation fault ip -netns $host1 li add type xfrm dev eth0 if_id ${IF_ID} # Cannot find device "xfrm0" # Cannot find device "xfrm0" # Cannot find device "xfrm0" # ./vrf-xfrm-tests.sh: line 204: 20308 Segmentation fault ip -netns $host1 xfrm policy add src ${h1_4} dst ${h2_4} ${devarg} dir out tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20309 Segmentation fault ip -netns $host2 xfrm policy add src ${h1_4} dst ${h2_4} dir in tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20310 Segmentation fault ip -netns $host1 xfrm policy add src ${h2_4} dst ${h1_4} ${devarg} dir in tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20311 Segmentation fault ip -netns $host2 xfrm policy add src ${h2_4} dst ${h1_4} dir out tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20312 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h1_6} dst ${h2_6} ${devarg} dir out tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20313 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h1_6} dst ${h2_6} dir in tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20314 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h2_6} dst ${h1_6} ${devarg} dir in tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20315 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h2_6} dst ${h1_6} dir out tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20316 Segmentation fault ip -netns $host1 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20317 Segmentation fault ip -netns $host2 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} # ./vrf-xfrm-tests.sh: line 204: 20318 Segmentation fault ip -netns $host1 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20319 Segmentation fault ip -netns $host2 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} # ./vrf-xfrm-tests.sh: line 204: 20320 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20321 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} # ./vrf-xfrm-tests.sh: line 204: 20322 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20323 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} # TEST: IPv4 xfrm policy with xfrm device [FAIL] # TEST: IPv6 xfrm policy with xfrm device [FAIL] # Cannot find device "xfrm0" # # netem qdisc on VRF device # ./vrf-xfrm-tests.sh: line 195: 20334 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20335 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20336 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20337 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20338 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20339 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20340 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20341 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # TEST: IPv4 no xfrm policy [ OK ] # TEST: IPv6 no xfrm policy [ OK ] # ./vrf-xfrm-tests.sh: line 204: 20346 Segmentation fault ip -netns $host1 xfrm policy add src ${h1_4} dst ${h2_4} ${devarg} dir out tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20347 Segmentation fault ip -netns $host2 xfrm policy add src ${h1_4} dst ${h2_4} dir in tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20348 Segmentation fault ip -netns $host1 xfrm policy add src ${h2_4} dst ${h1_4} ${devarg} dir in tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20349 Segmentation fault ip -netns $host2 xfrm policy add src ${h2_4} dst ${h1_4} dir out tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20350 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h1_6} dst ${h2_6} ${devarg} dir out tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20351 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h1_6} dst ${h2_6} dir in tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20352 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h2_6} dst ${h1_6} ${devarg} dir in tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20353 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h2_6} dst ${h1_6} dir out tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20354 Segmentation fault ip -netns $host1 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20355 Segmentation fault ip -netns $host2 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} # ./vrf-xfrm-tests.sh: line 204: 20356 Segmentation fault ip -netns $host1 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20357 Segmentation fault ip -netns $host2 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} # ./vrf-xfrm-tests.sh: line 204: 20358 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20359 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} # ./vrf-xfrm-tests.sh: line 204: 20360 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20361 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} # TEST: IPv4 xfrm policy based on address [ OK ] # TEST: IPv6 xfrm policy based on address [ OK ] # ./vrf-xfrm-tests.sh: line 195: 20366 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20367 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20368 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20369 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20370 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20371 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20372 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20373 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # TEST: IPv6 xfrm policy with VRF in selector [ OK ] # ./vrf-xfrm-tests.sh: line 195: 20376 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20377 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20378 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20379 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20380 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20381 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20382 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 20383 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 327: 20384 Segmentation fault ip -netns $host1 li add type xfrm dev eth0 if_id ${IF_ID} # Cannot find device "xfrm0" # Cannot find device "xfrm0" # Cannot find device "xfrm0" # ./vrf-xfrm-tests.sh: line 204: 20393 Segmentation fault ip -netns $host1 xfrm policy add src ${h1_4} dst ${h2_4} ${devarg} dir out tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20394 Segmentation fault ip -netns $host2 xfrm policy add src ${h1_4} dst ${h2_4} dir in tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20395 Segmentation fault ip -netns $host1 xfrm policy add src ${h2_4} dst ${h1_4} ${devarg} dir in tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20396 Segmentation fault ip -netns $host2 xfrm policy add src ${h2_4} dst ${h1_4} dir out tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20397 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h1_6} dst ${h2_6} ${devarg} dir out tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20398 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h1_6} dst ${h2_6} dir in tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20399 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h2_6} dst ${h1_6} ${devarg} dir in tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20400 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h2_6} dst ${h1_6} dir out tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 20401 Segmentation fault ip -netns $host1 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20402 Segmentation fault ip -netns $host2 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} # ./vrf-xfrm-tests.sh: line 204: 20403 Segmentation fault ip -netns $host1 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20404 Segmentation fault ip -netns $host2 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} # ./vrf-xfrm-tests.sh: line 204: 20405 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20406 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} # ./vrf-xfrm-tests.sh: line 204: 20407 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 20408 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} # TEST: IPv4 xfrm policy with xfrm device [FAIL] # TEST: IPv6 xfrm policy with xfrm device [FAIL] # Cannot find device "xfrm0" # # Tests passed: 10 # Tests failed: 4 not ok 1 selftests: net: vrf-xfrm-tests.sh # exit=1 make[1]: Leaving directory '/home/virtme/testing-3/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-3/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak xx__->