make -C tools/testing/selftests TARGETS="net" TEST_PROGS=vrf-xfrm-tests.shh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-3/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-3/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-3/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-3/tools/testing/selftests/net' TAP version 13 1..1 # overriding timeout to 7200 # selftests: net: vrf-xfrm-tests.sh # # No qdisc on VRF device # ./vrf-xfrm-tests.sh: line 195: 24590 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24591 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24592 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24593 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24594 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24595 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24596 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24597 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv4 no xfrm policy [FAIL] # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv6 no xfrm policy [FAIL] # ./vrf-xfrm-tests.sh: line 204: 24604 Segmentation fault ip -netns $host1 xfrm policy add src ${h1_4} dst ${h2_4} ${devarg} dir out tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24605 Segmentation fault ip -netns $host2 xfrm policy add src ${h1_4} dst ${h2_4} dir in tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24606 Segmentation fault ip -netns $host1 xfrm policy add src ${h2_4} dst ${h1_4} ${devarg} dir in tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24607 Segmentation fault ip -netns $host2 xfrm policy add src ${h2_4} dst ${h1_4} dir out tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24608 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h1_6} dst ${h2_6} ${devarg} dir out tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24609 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h1_6} dst ${h2_6} dir in tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24610 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h2_6} dst ${h1_6} ${devarg} dir in tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24611 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h2_6} dst ${h1_6} dir out tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24612 Segmentation fault ip -netns $host1 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24613 Segmentation fault ip -netns $host2 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} # ./vrf-xfrm-tests.sh: line 204: 24614 Segmentation fault ip -netns $host1 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24615 Segmentation fault ip -netns $host2 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} # ./vrf-xfrm-tests.sh: line 204: 24616 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24617 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} # ./vrf-xfrm-tests.sh: line 204: 24618 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24619 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv4 xfrm policy based on address [FAIL] # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv6 xfrm policy based on address [FAIL] # ./vrf-xfrm-tests.sh: line 195: 24626 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24627 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24628 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24629 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24630 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24631 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24632 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24633 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv6 xfrm policy with VRF in selector [FAIL] # ./vrf-xfrm-tests.sh: line 195: 24637 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24638 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24639 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24640 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24641 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24642 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24643 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24644 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 204: 24653 Segmentation fault ip -netns $host1 xfrm policy add src ${h1_4} dst ${h2_4} ${devarg} dir out tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24654 Segmentation fault ip -netns $host2 xfrm policy add src ${h1_4} dst ${h2_4} dir in tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24655 Segmentation fault ip -netns $host1 xfrm policy add src ${h2_4} dst ${h1_4} ${devarg} dir in tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24656 Segmentation fault ip -netns $host2 xfrm policy add src ${h2_4} dst ${h1_4} dir out tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24657 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h1_6} dst ${h2_6} ${devarg} dir out tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24658 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h1_6} dst ${h2_6} dir in tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24659 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h2_6} dst ${h1_6} ${devarg} dir in tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24660 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h2_6} dst ${h1_6} dir out tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24661 Segmentation fault ip -netns $host1 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24662 Segmentation fault ip -netns $host2 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} # ./vrf-xfrm-tests.sh: line 204: 24663 Segmentation fault ip -netns $host1 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24664 Segmentation fault ip -netns $host2 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} # ./vrf-xfrm-tests.sh: line 204: 24665 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24666 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} # ./vrf-xfrm-tests.sh: line 204: 24667 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24668 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv4 xfrm policy with xfrm device [FAIL] # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv6 xfrm policy with xfrm device [FAIL] # # netem qdisc on VRF device # ./vrf-xfrm-tests.sh: line 195: 24680 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24681 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24682 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24683 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24684 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24685 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24686 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24687 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv4 no xfrm policy [FAIL] # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv6 no xfrm policy [FAIL] # ./vrf-xfrm-tests.sh: line 204: 24694 Segmentation fault ip -netns $host1 xfrm policy add src ${h1_4} dst ${h2_4} ${devarg} dir out tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24695 Segmentation fault ip -netns $host2 xfrm policy add src ${h1_4} dst ${h2_4} dir in tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24696 Segmentation fault ip -netns $host1 xfrm policy add src ${h2_4} dst ${h1_4} ${devarg} dir in tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24697 Segmentation fault ip -netns $host2 xfrm policy add src ${h2_4} dst ${h1_4} dir out tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24698 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h1_6} dst ${h2_6} ${devarg} dir out tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24699 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h1_6} dst ${h2_6} dir in tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24700 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h2_6} dst ${h1_6} ${devarg} dir in tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24701 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h2_6} dst ${h1_6} dir out tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24702 Segmentation fault ip -netns $host1 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24703 Segmentation fault ip -netns $host2 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} # ./vrf-xfrm-tests.sh: line 204: 24704 Segmentation fault ip -netns $host1 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24705 Segmentation fault ip -netns $host2 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} # ./vrf-xfrm-tests.sh: line 204: 24706 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24707 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} # ./vrf-xfrm-tests.sh: line 204: 24708 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24709 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv4 xfrm policy based on address [FAIL] # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv6 xfrm policy based on address [FAIL] # ./vrf-xfrm-tests.sh: line 195: 24716 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24717 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24718 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24719 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24720 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24721 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24722 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24723 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv6 xfrm policy with VRF in selector [FAIL] # ./vrf-xfrm-tests.sh: line 195: 24727 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24728 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24729 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24730 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24731 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24732 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24733 Segmentation fault ip -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 195: 24734 Segmentation fault ip -6 -netns ${ns} xfrm ${x} flush # ./vrf-xfrm-tests.sh: line 204: 24741 Segmentation fault ip -netns $host1 xfrm policy add src ${h1_4} dst ${h2_4} ${devarg} dir out tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24742 Segmentation fault ip -netns $host2 xfrm policy add src ${h1_4} dst ${h2_4} dir in tmpl src ${HOST1_4} dst ${HOST2_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24743 Segmentation fault ip -netns $host1 xfrm policy add src ${h2_4} dst ${h1_4} ${devarg} dir in tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24744 Segmentation fault ip -netns $host2 xfrm policy add src ${h2_4} dst ${h1_4} dir out tmpl src ${HOST2_4} dst ${HOST1_4} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24745 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h1_6} dst ${h2_6} ${devarg} dir out tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24746 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h1_6} dst ${h2_6} dir in tmpl src ${HOST1_6} dst ${HOST2_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24747 Segmentation fault ip -6 -netns $host1 xfrm policy add src ${h2_6} dst ${h1_6} ${devarg} dir in tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24748 Segmentation fault ip -6 -netns $host2 xfrm policy add src ${h2_6} dst ${h1_6} dir out tmpl src ${HOST2_6} dst ${HOST1_6} proto esp mode tunnel # ./vrf-xfrm-tests.sh: line 204: 24749 Segmentation fault ip -netns $host1 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24750 Segmentation fault ip -netns $host2 xfrm state add src ${HOST1_4} dst ${HOST2_4} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_4} dst ${h2_4} # ./vrf-xfrm-tests.sh: line 204: 24751 Segmentation fault ip -netns $host1 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24752 Segmentation fault ip -netns $host2 xfrm state add src ${HOST2_4} dst ${HOST1_4} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_4} dst ${h1_4} # ./vrf-xfrm-tests.sh: line 204: 24753 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24754 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST1_6} dst ${HOST2_6} proto esp spi ${SPI_1} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_1} 96 enc 'cbc(aes)' ${ENC_1} sel src ${h1_6} dst ${h2_6} # ./vrf-xfrm-tests.sh: line 204: 24755 Segmentation fault ip -6 -netns $host1 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} ${devarg} # ./vrf-xfrm-tests.sh: line 204: 24756 Segmentation fault ip -6 -netns $host2 xfrm state add src ${HOST2_6} dst ${HOST1_6} proto esp spi ${SPI_2} reqid 0 mode tunnel replay-window 4 replay-oseq 0x4 auth-trunc 'hmac(sha1)' ${AUTH_2} 96 enc 'cbc(aes)' ${ENC_2} sel src ${h2_6} dst ${h1_6} # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv4 xfrm policy with xfrm device [FAIL] # ./vrf-xfrm-tests.sh: line 68: warning: command substitution: ignored null byte in input # TEST: IPv6 xfrm policy with xfrm device [FAIL] # # Tests passed: 0 # Tests failed: 14 not ok 1 selftests: net: vrf-xfrm-tests.sh # exit=1 make[1]: Leaving directory '/home/virtme/testing-3/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-3/tools/testing/selftests' xx__-> echo $? 0 xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak xx__->