make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 108.260317] eth0: renamed from r1h1 [ 108.306182] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 111.506103] eth0: renamed from r1h1 [ 111.550139] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 114.650120] eth0: renamed from r1h1 [ 114.694138] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 118.060105] eth0: renamed from r1h1 [ 118.108093] eth0: renamed from r2h1 [ 118.156071] eth1: renamed from r1h2 [ 118.204141] eth1: renamed from r2h2 [ 118.277650] br0: port 1(eth0) entered blocking state [ 118.278082] br0: port 1(eth0) entered disabled state [ 118.278356] eth0: entered allmulticast mode [ 118.278682] eth0: entered promiscuous mode [ 118.279261] br0: port 1(eth0) entered blocking state [ 118.279554] br0: port 1(eth0) entered forwarding state [ 118.292414] br0: port 2(eth1) entered blocking state [ 118.292705] br0: port 2(eth1) entered disabled state [ 118.293074] eth1: entered allmulticast mode [ 118.293399] eth1: entered promiscuous mode [ 118.294121] br0: port 2(eth1) entered blocking state [ 118.294400] br0: port 2(eth1) entered forwarding state [ 118.390708] br0: port 1(eth0) entered blocking state [ 118.391083] br0: port 1(eth0) entered disabled state [ 118.391394] eth0: entered allmulticast mode [ 118.391713] eth0: entered promiscuous mode [ 118.404566] br0: port 2(eth1) entered blocking state [ 118.404992] br0: port 2(eth1) entered disabled state [ 118.405340] eth1: entered allmulticast mode [ 118.405726] eth1: entered promiscuous mode [ 118.406361] br0: port 2(eth1) entered blocking state [ 118.406697] br0: port 2(eth1) entered forwarding state [ 119.426052] br0: port 1(eth0) entered blocking state [ 119.426428] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 120.939937] eth1: left allmulticast mode [ 120.940425] eth1: left promiscuous mode [ 120.940851] br0: port 2(eth1) entered disabled state [ 120.956106] eth0: left allmulticast mode [ 120.956645] eth0: left promiscuous mode [ 120.957148] br0: port 1(eth0) entered disabled state [ 121.059942] eth1: left allmulticast mode [ 121.060356] eth1: left promiscuous mode [ 121.060775] br0: port 2(eth1) entered disabled state [ 121.068029] eth0: left allmulticast mode [ 121.068361] eth0: left promiscuous mode [ 121.068577] br0: port 1(eth0) entered disabled state [ 121.662073] eth0: renamed from r1h1 [ 121.710089] eth0: renamed from r2h1 [ 121.759180] eth1: renamed from r1h2 [ 121.803106] eth1: renamed from r2h2 [ 121.879631] br0: port 1(eth0) entered blocking state [ 121.879960] br0: port 1(eth0) entered disabled state [ 121.880235] eth0: entered allmulticast mode [ 121.880535] eth0: entered promiscuous mode [ 121.880940] br0: port 1(eth0) entered blocking state [ 121.881213] br0: port 1(eth0) entered forwarding state [ 121.893769] br0: port 2(eth1) entered blocking state [ 121.894076] br0: port 2(eth1) entered disabled state [ 121.894345] eth1: entered allmulticast mode [ 121.894641] eth1: entered promiscuous mode [ 121.895174] br0: port 2(eth1) entered blocking state [ 121.895450] br0: port 2(eth1) entered forwarding state [ 121.993383] br0: port 1(eth0) entered blocking state [ 121.993694] br0: port 1(eth0) entered disabled state [ 121.993970] eth0: entered allmulticast mode [ 121.994273] eth0: entered promiscuous mode [ 122.003952] br0: port 1(eth0) entered blocking state [ 122.004263] br0: port 1(eth0) entered forwarding state [ 122.008660] br0: port 2(eth1) entered blocking state [ 122.008998] br0: port 2(eth1) entered disabled state [ 122.009266] eth1: entered allmulticast mode [ 122.009611] eth1: entered promiscuous mode [ 122.010152] br0: port 2(eth1) entered blocking state [ 122.010432] br0: port 2(eth1) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 124.561933] eth1: left allmulticast mode [ 124.562195] eth1: left promiscuous mode [ 124.562474] br0: port 2(eth1) entered disabled state [ 124.570091] eth0: left allmulticast mode [ 124.570363] eth0: left promiscuous mode [ 124.570652] br0: port 1(eth0) entered disabled state [ 124.670943] eth1: left allmulticast mode [ 124.671217] eth1: left promiscuous mode [ 124.671481] br0: port 2(eth1) entered disabled state [ 124.685112] eth0: left allmulticast mode [ 124.685495] eth0: left promiscuous mode [ 124.685878] br0: port 1(eth0) entered disabled state [ 125.173085] eth0: renamed from r1h1 [ 125.218239] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 128.469050] eth0: renamed from r1h1 [ 128.513051] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 131.875117] eth0: renamed from r1h1 [ 131.918105] eth0: renamed from r2h1 [ 131.962091] eth1: renamed from r1h2 [ 132.004115] eth1: renamed from r2h2 [ 132.076021] br0: port 1(eth0) entered blocking state [ 132.076328] br0: port 1(eth0) entered disabled state [ 132.076595] eth0: entered allmulticast mode [ 132.076886] eth0: entered promiscuous mode [ 132.077505] br0: port 1(eth0) entered blocking state [ 132.077780] br0: port 1(eth0) entered forwarding state [ 132.089767] br0: port 2(eth1) entered blocking state [ 132.090103] br0: port 2(eth1) entered disabled state [ 132.090368] eth1: entered allmulticast mode [ 132.090676] eth1: entered promiscuous mode [ 132.091155] br0: port 2(eth1) entered blocking state [ 132.091420] br0: port 2(eth1) entered forwarding state [ 132.180763] br0: port 1(eth0) entered blocking state [ 132.181200] br0: port 1(eth0) entered disabled state [ 132.181588] eth0: entered allmulticast mode [ 132.182032] eth0: entered promiscuous mode [ 132.196524] br0: port 2(eth1) entered blocking state [ 132.196835] br0: port 2(eth1) entered disabled state [ 132.197133] eth1: entered allmulticast mode [ 132.197437] eth1: entered promiscuous mode [ 132.197970] br0: port 2(eth1) entered blocking state [ 132.198250] br0: port 2(eth1) entered forwarding state [ 133.186062] br0: port 1(eth0) entered blocking state [ 133.186510] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 134.713005] eth1: left allmulticast mode [ 134.713369] eth1: left promiscuous mode [ 134.713707] br0: port 2(eth1) entered disabled state [ 134.722081] eth0: left allmulticast mode [ 134.722782] eth0: left promiscuous mode [ 134.723449] br0: port 1(eth0) entered disabled state [ 134.810941] eth1: left allmulticast mode [ 134.811369] eth1: left promiscuous mode [ 134.811776] br0: port 2(eth1) entered disabled state [ 134.824055] eth0: left allmulticast mode [ 134.824675] eth0: left promiscuous mode [ 134.825247] br0: port 1(eth0) entered disabled state [ 135.444070] eth0: renamed from r1h1 [ 135.488083] eth0: renamed from r2h1 [ 135.532134] eth1: renamed from r1h2 [ 135.576123] eth1: renamed from r2h2 [ 135.648750] br0: port 1(eth0) entered blocking state [ 135.649088] br0: port 1(eth0) entered disabled state [ 135.649356] eth0: entered allmulticast mode [ 135.649664] eth0: entered promiscuous mode [ 135.650250] br0: port 1(eth0) entered blocking state [ 135.650523] br0: port 1(eth0) entered forwarding state [ 135.663957] br0: port 2(eth1) entered blocking state [ 135.664247] br0: port 2(eth1) entered disabled state [ 135.664520] eth1: entered allmulticast mode [ 135.664820] eth1: entered promiscuous mode [ 135.665337] br0: port 2(eth1) entered blocking state [ 135.665605] br0: port 2(eth1) entered forwarding state [ 135.761861] br0: port 1(eth0) entered blocking state [ 135.762276] br0: port 1(eth0) entered disabled state [ 135.762662] eth0: entered allmulticast mode [ 135.763108] eth0: entered promiscuous mode [ 135.763869] br0: port 1(eth0) entered blocking state [ 135.764289] br0: port 1(eth0) entered forwarding state [ 135.778573] br0: port 2(eth1) entered blocking state [ 135.778865] br0: port 2(eth1) entered disabled state [ 135.779138] eth1: entered allmulticast mode [ 135.779427] eth1: entered promiscuous mode [ 135.779980] br0: port 2(eth1) entered blocking state [ 135.780248] br0: port 2(eth1) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 138.332944] eth1: left allmulticast mode [ 138.333464] eth1: left promiscuous mode [ 138.333914] br0: port 2(eth1) entered disabled state [ 138.342084] eth0: left allmulticast mode [ 138.342438] eth0: left promiscuous mode [ 138.342872] br0: port 1(eth0) entered disabled state [ 138.440948] eth1: left allmulticast mode [ 138.441254] eth1: left promiscuous mode [ 138.441488] br0: port 2(eth1) entered disabled state [ 138.449093] eth0: left allmulticast mode [ 138.449601] eth0: left promiscuous mode [ 138.450070] br0: port 1(eth0) entered disabled state # # Tests passed: 18 # Tests failed: 0 ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->