make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 330.692070] eth0: renamed from r1h1 [ 330.744203] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 333.859978] eth0: renamed from r1h1 [ 333.900025] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 336.923984] eth0: renamed from r1h1 [ 336.968004] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 340.039075] eth0: renamed from r1h1 [ 340.080972] eth0: renamed from r2h1 [ 340.126036] eth1: renamed from r1h2 [ 340.170023] eth1: renamed from r2h2 [ 340.241632] br0: port 1(eth0) entered blocking state [ 340.242043] br0: port 1(eth0) entered disabled state [ 340.242308] eth0: entered allmulticast mode [ 340.242624] eth0: entered promiscuous mode [ 340.243318] br0: port 1(eth0) entered blocking state [ 340.243592] br0: port 1(eth0) entered forwarding state [ 340.255973] br0: port 2(eth1) entered blocking state [ 340.256381] br0: port 2(eth1) entered disabled state [ 340.256767] eth1: entered allmulticast mode [ 340.257210] eth1: entered promiscuous mode [ 340.258068] br0: port 2(eth1) entered blocking state [ 340.258461] br0: port 2(eth1) entered forwarding state [ 340.353428] br0: port 1(eth0) entered blocking state [ 340.353952] br0: port 1(eth0) entered disabled state [ 340.354400] eth0: entered allmulticast mode [ 340.354865] eth0: entered promiscuous mode [ 340.369981] br0: port 2(eth1) entered blocking state [ 340.370379] br0: port 2(eth1) entered disabled state [ 340.370754] eth1: entered allmulticast mode [ 340.371275] eth1: entered promiscuous mode [ 340.371878] br0: port 2(eth1) entered blocking state [ 340.372259] br0: port 2(eth1) entered forwarding state [ 340.542985] br0: port 1(eth0) entered blocking state [ 340.543384] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 342.996879] eth1: left allmulticast mode [ 342.997121] eth1: left promiscuous mode [ 342.997341] br0: port 2(eth1) entered disabled state [ 343.009004] eth0: left allmulticast mode [ 343.009291] eth0: left promiscuous mode [ 343.009658] br0: port 1(eth0) entered disabled state [ 343.176415] eth1: left allmulticast mode [ 343.176843] eth1: left promiscuous mode [ 343.177225] br0: port 2(eth1) entered disabled state [ 343.187951] eth0: left allmulticast mode [ 343.188199] eth0: left promiscuous mode [ 343.188417] br0: port 1(eth0) entered disabled state [ 343.701033] eth0: renamed from r1h1 [ 343.744995] eth0: renamed from r2h1 [ 343.794059] eth1: renamed from r1h2 [ 343.842976] eth1: renamed from r2h2 [ 343.922484] br0: port 1(eth0) entered blocking state [ 343.922914] br0: port 1(eth0) entered disabled state [ 343.923295] eth0: entered allmulticast mode [ 343.923732] eth0: entered promiscuous mode [ 343.924557] br0: port 1(eth0) entered blocking state [ 343.924961] br0: port 1(eth0) entered forwarding state [ 343.939789] br0: port 2(eth1) entered blocking state [ 343.940092] br0: port 2(eth1) entered disabled state [ 343.940353] eth1: entered allmulticast mode [ 343.940647] eth1: entered promiscuous mode [ 343.941198] br0: port 2(eth1) entered blocking state [ 343.941462] br0: port 2(eth1) entered forwarding state [ 344.039363] br0: port 1(eth0) entered blocking state [ 344.039679] br0: port 1(eth0) entered disabled state [ 344.039951] eth0: entered allmulticast mode [ 344.040245] eth0: entered promiscuous mode [ 344.049895] br0: port 1(eth0) entered blocking state [ 344.050762] br0: port 1(eth0) entered forwarding state [ 344.056067] br0: port 2(eth1) entered blocking state [ 344.056373] br0: port 2(eth1) entered disabled state [ 344.056632] eth1: entered allmulticast mode [ 344.056945] eth1: entered promiscuous mode [ 344.057476] br0: port 2(eth1) entered blocking state [ 344.057741] br0: port 2(eth1) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 346.678926] eth1: left allmulticast mode [ 346.679286] eth1: left promiscuous mode [ 346.679675] br0: port 2(eth1) entered disabled state [ 346.701005] eth0: left allmulticast mode [ 346.701349] eth0: left promiscuous mode [ 346.701704] br0: port 1(eth0) entered disabled state [ 346.838729] eth1: left allmulticast mode [ 346.839027] eth1: left promiscuous mode [ 346.839326] br0: port 2(eth1) entered disabled state [ 346.850010] eth0: left allmulticast mode [ 346.850345] eth0: left promiscuous mode [ 346.850690] br0: port 1(eth0) entered disabled state [ 347.242004] eth0: renamed from r1h1 [ 347.286969] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 350.506013] eth0: renamed from r1h1 [ 350.554028] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 353.824054] eth0: renamed from r1h1 [ 353.868997] eth0: renamed from r2h1 [ 353.913993] eth1: renamed from r1h2 [ 353.955995] eth1: renamed from r2h2 [ 354.033136] br0: port 1(eth0) entered blocking state [ 354.033526] br0: port 1(eth0) entered disabled state [ 354.033876] eth0: entered allmulticast mode [ 354.034272] eth0: entered promiscuous mode [ 354.034959] br0: port 1(eth0) entered blocking state [ 354.035223] br0: port 1(eth0) entered forwarding state [ 354.049062] br0: port 2(eth1) entered blocking state [ 354.049358] br0: port 2(eth1) entered disabled state [ 354.049629] eth1: entered allmulticast mode [ 354.050018] eth1: entered promiscuous mode [ 354.050582] br0: port 2(eth1) entered blocking state [ 354.050858] br0: port 2(eth1) entered forwarding state [ 354.147299] br0: port 1(eth0) entered blocking state [ 354.147587] br0: port 1(eth0) entered disabled state [ 354.147864] eth0: entered allmulticast mode [ 354.148149] eth0: entered promiscuous mode [ 354.160075] br0: port 2(eth1) entered blocking state [ 354.160363] br0: port 2(eth1) entered disabled state [ 354.160623] eth1: entered allmulticast mode [ 354.160953] eth1: entered promiscuous mode [ 354.161567] br0: port 2(eth1) entered blocking state [ 354.161862] br0: port 2(eth1) entered forwarding state [ 354.212886] br0: port 1(eth0) entered blocking state [ 354.213178] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 356.751902] eth1: left allmulticast mode [ 356.752578] eth1: left promiscuous mode [ 356.753338] br0: port 2(eth1) entered disabled state [ 356.767923] eth0: left allmulticast mode [ 356.768176] eth0: left promiscuous mode [ 356.768469] br0: port 1(eth0) entered disabled state [ 356.924268] eth1: left allmulticast mode [ 356.924629] eth1: left promiscuous mode [ 356.925016] br0: port 2(eth1) entered disabled state [ 356.931954] eth0: left allmulticast mode [ 356.932188] eth0: left promiscuous mode [ 356.932398] br0: port 1(eth0) entered disabled state [ 357.419007] eth0: renamed from r1h1 [ 357.463001] eth0: renamed from r2h1 [ 357.514988] eth1: renamed from r1h2 [ 357.567100] eth1: renamed from r2h2 [ 357.645575] br0: port 1(eth0) entered blocking state [ 357.645880] br0: port 1(eth0) entered disabled state [ 357.646142] eth0: entered allmulticast mode [ 357.646431] eth0: entered promiscuous mode [ 357.647020] br0: port 1(eth0) entered blocking state [ 357.647289] br0: port 1(eth0) entered forwarding state [ 357.661628] br0: port 2(eth1) entered blocking state [ 357.661935] br0: port 2(eth1) entered disabled state [ 357.662205] eth1: entered allmulticast mode [ 357.662501] eth1: entered promiscuous mode [ 357.663076] br0: port 2(eth1) entered blocking state [ 357.663385] br0: port 2(eth1) entered forwarding state [ 357.751241] br0: port 1(eth0) entered blocking state [ 357.751565] br0: port 1(eth0) entered disabled state [ 357.751914] eth0: entered allmulticast mode [ 357.752212] eth0: entered promiscuous mode [ 357.766673] br0: port 2(eth1) entered blocking state [ 357.767050] br0: port 2(eth1) entered disabled state [ 357.767312] eth1: entered allmulticast mode [ 357.767647] eth1: entered promiscuous mode [ 357.768189] br0: port 2(eth1) entered blocking state [ 357.768455] br0: port 2(eth1) entered forwarding state [ 357.814909] br0: port 1(eth0) entered blocking state [ 357.815623] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 360.382856] eth1: left allmulticast mode [ 360.383101] eth1: left promiscuous mode [ 360.383329] br0: port 2(eth1) entered disabled state [ 360.390989] eth0: left allmulticast mode [ 360.391526] eth0: left promiscuous mode [ 360.392028] br0: port 1(eth0) entered disabled state # # Tests passed: 18 # Tests failed: 0 ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->