make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 334.987681] eth0: renamed from r1h1 [ 335.024663] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 338.037810] eth0: renamed from r1h1 [ 338.080789] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 341.178794] eth0: renamed from r1h1 [ 341.221734] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 344.404772] eth0: renamed from r1h1 [ 344.448749] eth0: renamed from r2h1 [ 344.486884] eth1: renamed from r1h2 [ 344.534722] eth1: renamed from r2h2 [ 344.603386] br0: port 1(eth0) entered blocking state [ 344.603699] br0: port 1(eth0) entered disabled state [ 344.603969] eth0: entered allmulticast mode [ 344.604283] eth0: entered promiscuous mode [ 344.604760] br0: port 1(eth0) entered blocking state [ 344.605079] br0: port 1(eth0) entered forwarding state [ 344.618269] br0: port 2(eth1) entered blocking state [ 344.618601] br0: port 2(eth1) entered disabled state [ 344.618872] eth1: entered allmulticast mode [ 344.619200] eth1: entered promiscuous mode [ 344.619763] br0: port 2(eth1) entered blocking state [ 344.620046] br0: port 2(eth1) entered forwarding state [ 344.710350] br0: port 1(eth0) entered blocking state [ 344.710716] br0: port 1(eth0) entered disabled state [ 344.711002] eth0: entered allmulticast mode [ 344.711337] eth0: entered promiscuous mode [ 344.725506] br0: port 2(eth1) entered blocking state [ 344.725955] br0: port 2(eth1) entered disabled state [ 344.726367] eth1: entered allmulticast mode [ 344.726916] eth1: entered promiscuous mode [ 344.727721] br0: port 2(eth1) entered blocking state [ 344.728131] br0: port 2(eth1) entered forwarding state [ 344.901790] br0: port 1(eth0) entered blocking state [ 344.902348] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 347.311588] eth1: left allmulticast mode [ 347.312271] eth1: left promiscuous mode [ 347.312901] br0: port 2(eth1) entered disabled state [ 347.327714] eth0: left allmulticast mode [ 347.328293] eth0: left promiscuous mode [ 347.328868] br0: port 1(eth0) entered disabled state [ 347.543038] eth1: left allmulticast mode [ 347.543457] eth1: left promiscuous mode [ 347.543889] br0: port 2(eth1) entered disabled state [ 347.554744] eth0: left allmulticast mode [ 347.555082] eth0: left promiscuous mode [ 347.555404] br0: port 1(eth0) entered disabled state [ 347.887804] eth0: renamed from r1h1 [ 347.929767] eth0: renamed from r2h1 [ 347.974715] eth1: renamed from r1h2 [ 348.012887] eth1: renamed from r2h2 [ 348.085370] br0: port 1(eth0) entered blocking state [ 348.085730] br0: port 1(eth0) entered disabled state [ 348.086001] eth0: entered allmulticast mode [ 348.086381] eth0: entered promiscuous mode [ 348.086979] br0: port 1(eth0) entered blocking state [ 348.087251] br0: port 1(eth0) entered forwarding state [ 348.100921] br0: port 2(eth1) entered blocking state [ 348.101214] br0: port 2(eth1) entered disabled state [ 348.101479] eth1: entered allmulticast mode [ 348.101800] eth1: entered promiscuous mode [ 348.102361] br0: port 2(eth1) entered blocking state [ 348.102646] br0: port 2(eth1) entered forwarding state [ 348.189052] br0: port 1(eth0) entered blocking state [ 348.189471] br0: port 1(eth0) entered disabled state [ 348.189889] eth0: entered allmulticast mode [ 348.190346] eth0: entered promiscuous mode [ 348.203493] br0: port 2(eth1) entered blocking state [ 348.203844] br0: port 2(eth1) entered disabled state [ 348.204110] eth1: entered allmulticast mode [ 348.204423] eth1: entered promiscuous mode [ 348.204936] br0: port 2(eth1) entered blocking state [ 348.205205] br0: port 2(eth1) entered forwarding state [ 348.381643] br0: port 1(eth0) entered blocking state [ 348.381944] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 350.783562] eth1: left allmulticast mode [ 350.783851] eth1: left promiscuous mode [ 350.784079] br0: port 2(eth1) entered disabled state [ 350.791697] eth0: left allmulticast mode [ 350.791987] eth0: left promiscuous mode [ 350.792265] br0: port 1(eth0) entered disabled state [ 350.946046] eth1: left allmulticast mode [ 350.946308] eth1: left promiscuous mode [ 350.946552] br0: port 2(eth1) entered disabled state [ 350.958660] eth0: left allmulticast mode [ 350.958903] eth0: left promiscuous mode [ 350.959161] br0: port 1(eth0) entered disabled state [ 351.247710] eth0: renamed from r1h1 [ 351.288696] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 354.387752] eth0: renamed from r1h1 [ 354.438738] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 357.796773] eth0: renamed from r1h1 [ 357.846832] eth0: renamed from r2h1 [ 357.894855] eth1: renamed from r1h2 [ 357.943851] eth1: renamed from r2h2 [ 358.024106] br0: port 1(eth0) entered blocking state [ 358.024423] br0: port 1(eth0) entered disabled state [ 358.024706] eth0: entered allmulticast mode [ 358.025009] eth0: entered promiscuous mode [ 358.025630] br0: port 1(eth0) entered blocking state [ 358.025904] br0: port 1(eth0) entered forwarding state [ 358.041781] br0: port 2(eth1) entered blocking state [ 358.042090] br0: port 2(eth1) entered disabled state [ 358.042368] eth1: entered allmulticast mode [ 358.042721] eth1: entered promiscuous mode [ 358.043334] br0: port 2(eth1) entered blocking state [ 358.043646] br0: port 2(eth1) entered forwarding state [ 358.145886] br0: port 1(eth0) entered blocking state [ 358.146191] br0: port 1(eth0) entered disabled state [ 358.146461] eth0: entered allmulticast mode [ 358.146839] eth0: entered promiscuous mode [ 358.161994] br0: port 2(eth1) entered blocking state [ 358.162311] br0: port 2(eth1) entered disabled state [ 358.162596] eth1: entered allmulticast mode [ 358.162898] eth1: entered promiscuous mode [ 358.163572] br0: port 2(eth1) entered blocking state [ 358.163847] br0: port 2(eth1) entered forwarding state [ 359.164701] br0: port 1(eth0) entered blocking state [ 359.165015] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 360.790558] eth1: left allmulticast mode [ 360.790831] eth1: left promiscuous mode [ 360.791099] br0: port 2(eth1) entered disabled state [ 360.796665] eth0: left allmulticast mode [ 360.796925] eth0: left promiscuous mode [ 360.797215] br0: port 1(eth0) entered disabled state [ 360.972303] eth1: left allmulticast mode [ 360.972687] eth1: left promiscuous mode [ 360.973031] br0: port 2(eth1) entered disabled state [ 360.980719] eth0: left allmulticast mode [ 360.981088] eth0: left promiscuous mode [ 360.981425] br0: port 1(eth0) entered disabled state [ 361.404748] eth0: renamed from r1h1 [ 361.446738] eth0: renamed from r2h1 [ 361.484736] eth1: renamed from r1h2 [ 361.525717] eth1: renamed from r2h2 [ 361.593671] br0: port 1(eth0) entered blocking state [ 361.594071] br0: port 1(eth0) entered disabled state [ 361.594442] eth0: entered allmulticast mode [ 361.594888] eth0: entered promiscuous mode [ 361.595673] br0: port 1(eth0) entered blocking state [ 361.596068] br0: port 1(eth0) entered forwarding state [ 361.609227] br0: port 2(eth1) entered blocking state [ 361.609536] br0: port 2(eth1) entered disabled state [ 361.609805] eth1: entered allmulticast mode [ 361.610112] eth1: entered promiscuous mode [ 361.610642] br0: port 2(eth1) entered blocking state [ 361.610923] br0: port 2(eth1) entered forwarding state [ 361.711071] br0: port 1(eth0) entered blocking state [ 361.711382] br0: port 1(eth0) entered disabled state [ 361.711662] eth0: entered allmulticast mode [ 361.711963] eth0: entered promiscuous mode [ 361.727518] br0: port 2(eth1) entered blocking state [ 361.727847] br0: port 2(eth1) entered disabled state [ 361.728122] eth1: entered allmulticast mode [ 361.728429] eth1: entered promiscuous mode [ 361.728784] br0: port 2(eth1) entered blocking state [ 361.729053] br0: port 2(eth1) entered forwarding state [ 361.837631] br0: port 1(eth0) entered blocking state [ 361.837954] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 364.350679] eth1: left allmulticast mode [ 364.350945] eth1: left promiscuous mode [ 364.351220] br0: port 2(eth1) entered disabled state # # Tests passed: 18 # Tests failed: 0 [ 364.366678] eth0: left allmulticast mode [ 364.366911] eth0: left promiscuous mode [ 364.367131] br0: port 1(eth0) entered disabled state ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->