make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 324.669368] eth0: renamed from r1h1 [ 324.714510] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 327.885350] eth0: renamed from r1h1 [ 327.929375] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 331.087400] eth0: renamed from r1h1 [ 331.129388] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 334.347371] eth0: renamed from r1h1 [ 334.391456] eth0: renamed from r2h1 [ 334.438360] eth1: renamed from r1h2 [ 334.485373] eth1: renamed from r2h2 [ 334.557933] br0: port 1(eth0) entered blocking state [ 334.558243] br0: port 1(eth0) entered disabled state [ 334.558509] eth0: entered allmulticast mode [ 334.558808] eth0: entered promiscuous mode [ 334.559382] br0: port 1(eth0) entered blocking state [ 334.559683] br0: port 1(eth0) entered forwarding state [ 334.572950] br0: port 2(eth1) entered blocking state [ 334.573318] br0: port 2(eth1) entered disabled state [ 334.573636] eth1: entered allmulticast mode [ 334.573948] eth1: entered promiscuous mode [ 334.574536] br0: port 2(eth1) entered blocking state [ 334.574820] br0: port 2(eth1) entered forwarding state [ 334.667627] br0: port 1(eth0) entered blocking state [ 334.667924] br0: port 1(eth0) entered disabled state [ 334.668183] eth0: entered allmulticast mode [ 334.668480] eth0: entered promiscuous mode [ 334.682104] br0: port 2(eth1) entered blocking state [ 334.682408] br0: port 2(eth1) entered disabled state [ 334.682675] eth1: entered allmulticast mode [ 334.682977] eth1: entered promiscuous mode [ 334.683494] br0: port 2(eth1) entered blocking state [ 334.683757] br0: port 2(eth1) entered forwarding state [ 334.835313] br0: port 1(eth0) entered blocking state [ 334.835619] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 337.308422] eth1: left allmulticast mode [ 337.308768] eth1: left promiscuous mode [ 337.309127] br0: port 2(eth1) entered disabled state [ 337.319403] eth0: left allmulticast mode [ 337.319828] eth0: left promiscuous mode [ 337.320330] br0: port 1(eth0) entered disabled state [ 337.571977] eth1: left allmulticast mode [ 337.572353] eth1: left promiscuous mode [ 337.572791] br0: port 2(eth1) entered disabled state [ 337.585379] eth0: left allmulticast mode [ 337.585721] eth0: left promiscuous mode [ 337.586036] br0: port 1(eth0) entered disabled state [ 337.928563] eth0: renamed from r1h1 [ 337.972374] eth0: renamed from r2h1 [ 338.017382] eth1: renamed from r1h2 [ 338.059400] eth1: renamed from r2h2 [ 338.126659] br0: port 1(eth0) entered blocking state [ 338.126948] br0: port 1(eth0) entered disabled state [ 338.127219] eth0: entered allmulticast mode [ 338.127515] eth0: entered promiscuous mode [ 338.127875] br0: port 1(eth0) entered blocking state [ 338.128134] br0: port 1(eth0) entered forwarding state [ 338.140129] br0: port 2(eth1) entered blocking state [ 338.140424] br0: port 2(eth1) entered disabled state [ 338.140682] eth1: entered allmulticast mode [ 338.140970] eth1: entered promiscuous mode [ 338.141509] br0: port 2(eth1) entered blocking state [ 338.141772] br0: port 2(eth1) entered forwarding state [ 338.228426] br0: port 1(eth0) entered blocking state [ 338.228716] br0: port 1(eth0) entered disabled state [ 338.228976] eth0: entered allmulticast mode [ 338.229347] eth0: entered promiscuous mode [ 338.243064] br0: port 2(eth1) entered blocking state [ 338.243358] br0: port 2(eth1) entered disabled state [ 338.243618] eth1: entered allmulticast mode [ 338.243906] eth1: entered promiscuous mode [ 338.244427] br0: port 2(eth1) entered blocking state [ 338.244689] br0: port 2(eth1) entered forwarding state [ 338.371669] br0: port 1(eth0) entered blocking state [ 338.372060] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 340.837267] eth1: left allmulticast mode [ 340.837670] eth1: left promiscuous mode [ 340.838094] br0: port 2(eth1) entered disabled state [ 340.845332] eth0: left allmulticast mode [ 340.845698] eth0: left promiscuous mode [ 340.846077] br0: port 1(eth0) entered disabled state [ 341.053038] eth1: left allmulticast mode [ 341.053288] eth1: left promiscuous mode [ 341.053509] br0: port 2(eth1) entered disabled state [ 341.060454] eth0: left allmulticast mode [ 341.060764] eth0: left promiscuous mode [ 341.061064] br0: port 1(eth0) entered disabled state [ 341.307380] eth0: renamed from r1h1 [ 341.352380] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 344.530426] eth0: renamed from r1h1 [ 344.575398] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 347.777376] eth0: renamed from r1h1 [ 347.818387] eth0: renamed from r2h1 [ 347.858389] eth1: renamed from r1h2 [ 347.903425] eth1: renamed from r2h2 [ 347.969398] br0: port 1(eth0) entered blocking state [ 347.969701] br0: port 1(eth0) entered disabled state [ 347.969962] eth0: entered allmulticast mode [ 347.970262] eth0: entered promiscuous mode [ 347.970804] br0: port 1(eth0) entered blocking state [ 347.971085] br0: port 1(eth0) entered forwarding state [ 347.983161] br0: port 2(eth1) entered blocking state [ 347.983476] br0: port 2(eth1) entered disabled state [ 347.983752] eth1: entered allmulticast mode [ 347.984060] eth1: entered promiscuous mode [ 347.984710] br0: port 2(eth1) entered blocking state [ 347.985001] br0: port 2(eth1) entered forwarding state [ 348.070486] br0: port 1(eth0) entered blocking state [ 348.070772] br0: port 1(eth0) entered disabled state [ 348.071050] eth0: entered allmulticast mode [ 348.071574] eth0: entered promiscuous mode [ 348.085309] br0: port 2(eth1) entered blocking state [ 348.085673] br0: port 2(eth1) entered disabled state [ 348.086034] eth1: entered allmulticast mode [ 348.086390] eth1: entered promiscuous mode [ 348.086896] br0: port 2(eth1) entered blocking state [ 348.087160] br0: port 2(eth1) entered forwarding state [ 348.227296] br0: port 1(eth0) entered blocking state [ 348.227813] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 350.664383] eth1: left allmulticast mode [ 350.664713] eth1: left promiscuous mode [ 350.665109] br0: port 2(eth1) entered disabled state [ 350.677376] eth0: left allmulticast mode [ 350.677797] eth0: left promiscuous mode [ 350.678183] br0: port 1(eth0) entered disabled state [ 350.858697] eth1: left allmulticast mode [ 350.858955] eth1: left promiscuous mode [ 350.859188] br0: port 2(eth1) entered disabled state [ 350.867355] eth0: left allmulticast mode [ 350.867579] eth0: left promiscuous mode [ 350.867828] br0: port 1(eth0) entered disabled state [ 351.282463] eth0: renamed from r1h1 [ 351.329425] eth0: renamed from r2h1 [ 351.372434] eth1: renamed from r1h2 [ 351.414573] eth1: renamed from r2h2 [ 351.488113] br0: port 1(eth0) entered blocking state [ 351.488418] br0: port 1(eth0) entered disabled state [ 351.488690] eth0: entered allmulticast mode [ 351.488987] eth0: entered promiscuous mode [ 351.489586] br0: port 1(eth0) entered blocking state [ 351.489879] br0: port 1(eth0) entered forwarding state [ 351.501841] br0: port 2(eth1) entered blocking state [ 351.502117] br0: port 2(eth1) entered disabled state [ 351.502469] eth1: entered allmulticast mode [ 351.502840] eth1: entered promiscuous mode [ 351.503467] br0: port 2(eth1) entered blocking state [ 351.503751] br0: port 2(eth1) entered forwarding state [ 351.598301] br0: port 1(eth0) entered blocking state [ 351.598593] br0: port 1(eth0) entered disabled state [ 351.598851] eth0: entered allmulticast mode [ 351.599140] eth0: entered promiscuous mode [ 351.613001] br0: port 2(eth1) entered blocking state [ 351.613336] br0: port 2(eth1) entered disabled state [ 351.613624] eth1: entered allmulticast mode [ 351.613937] eth1: entered promiscuous mode [ 351.614480] br0: port 2(eth1) entered blocking state [ 351.614774] br0: port 2(eth1) entered forwarding state [ 351.723300] br0: port 1(eth0) entered blocking state [ 351.723626] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 354.281257] eth1: left allmulticast mode [ 354.281518] eth1: left promiscuous mode [ 354.281770] br0: port 2(eth1) entered disabled state [ 354.291349] eth0: left allmulticast mode [ 354.291606] eth0: left promiscuous mode [ 354.291858] br0: port 1(eth0) entered disabled state # # Tests passed: 18 # Tests failed: 0 ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->