make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 127.411376] eth0: renamed from r1h1 [ 127.456428] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 130.661442] eth0: renamed from r1h1 [ 130.709411] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 133.893393] eth0: renamed from r1h1 [ 133.937365] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 137.218368] eth0: renamed from r1h1 [ 137.264347] eth0: renamed from r2h1 [ 137.310357] eth1: renamed from r1h2 [ 137.354373] eth1: renamed from r2h2 [ 137.431100] br0: port 1(eth0) entered blocking state [ 137.431482] br0: port 1(eth0) entered disabled state [ 137.431766] eth0: entered allmulticast mode [ 137.432091] eth0: entered promiscuous mode [ 137.432669] br0: port 1(eth0) entered blocking state [ 137.432955] br0: port 1(eth0) entered forwarding state [ 137.445642] br0: port 2(eth1) entered blocking state [ 137.445945] br0: port 2(eth1) entered disabled state [ 137.446221] eth1: entered allmulticast mode [ 137.446521] eth1: entered promiscuous mode [ 137.447093] br0: port 2(eth1) entered blocking state [ 137.447378] br0: port 2(eth1) entered forwarding state [ 137.548707] br0: port 1(eth0) entered blocking state [ 137.549007] br0: port 1(eth0) entered disabled state [ 137.549284] eth0: entered allmulticast mode [ 137.549581] eth0: entered promiscuous mode [ 137.563378] br0: port 2(eth1) entered blocking state [ 137.563664] br0: port 2(eth1) entered disabled state [ 137.563928] eth1: entered allmulticast mode [ 137.564242] eth1: entered promiscuous mode [ 137.564720] br0: port 2(eth1) entered blocking state [ 137.564988] br0: port 2(eth1) entered forwarding state [ 137.583269] br0: port 1(eth0) entered blocking state [ 137.583578] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 140.142235] eth1: left allmulticast mode [ 140.142484] eth1: left promiscuous mode [ 140.142720] br0: port 2(eth1) entered disabled state [ 140.149391] eth0: left allmulticast mode [ 140.149683] eth0: left promiscuous mode [ 140.149989] br0: port 1(eth0) entered disabled state [ 140.262239] eth1: left allmulticast mode [ 140.262946] eth1: left promiscuous mode [ 140.263454] br0: port 2(eth1) entered disabled state [ 140.271397] eth0: left allmulticast mode [ 140.271971] eth0: left promiscuous mode [ 140.272506] br0: port 1(eth0) entered disabled state [ 140.860368] eth0: renamed from r1h1 [ 140.909379] eth0: renamed from r2h1 [ 140.957450] eth1: renamed from r1h2 [ 141.004402] eth1: renamed from r2h2 [ 141.087005] br0: port 1(eth0) entered blocking state [ 141.087321] br0: port 1(eth0) entered disabled state [ 141.087588] eth0: entered allmulticast mode [ 141.087879] eth0: entered promiscuous mode [ 141.088427] br0: port 1(eth0) entered blocking state [ 141.088697] br0: port 1(eth0) entered forwarding state [ 141.103516] br0: port 2(eth1) entered blocking state [ 141.103810] br0: port 2(eth1) entered disabled state [ 141.104101] eth1: entered allmulticast mode [ 141.104414] eth1: entered promiscuous mode [ 141.104982] br0: port 2(eth1) entered blocking state [ 141.105267] br0: port 2(eth1) entered forwarding state [ 141.198562] br0: port 1(eth0) entered blocking state [ 141.198862] br0: port 1(eth0) entered disabled state [ 141.199126] eth0: entered allmulticast mode [ 141.199436] eth0: entered promiscuous mode [ 141.201471] br0: port 1(eth0) entered blocking state [ 141.201869] br0: port 1(eth0) entered forwarding state [ 141.213437] br0: port 2(eth1) entered blocking state [ 141.213800] br0: port 2(eth1) entered disabled state [ 141.214159] eth1: entered allmulticast mode [ 141.214559] eth1: entered promiscuous mode [ 141.215172] br0: port 2(eth1) entered blocking state [ 141.215472] br0: port 2(eth1) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 143.769242] eth1: left allmulticast mode [ 143.769488] eth1: left promiscuous mode [ 143.769738] br0: port 2(eth1) entered disabled state [ 143.783422] eth0: left allmulticast mode [ 143.783902] eth0: left promiscuous mode [ 143.784390] br0: port 1(eth0) entered disabled state [ 143.886258] eth1: left allmulticast mode [ 143.886629] eth1: left promiscuous mode [ 143.886980] br0: port 2(eth1) entered disabled state [ 143.898367] eth0: left allmulticast mode [ 143.898728] eth0: left promiscuous mode [ 143.899071] br0: port 1(eth0) entered disabled state [ 144.411382] eth0: renamed from r1h1 [ 144.455449] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 147.654380] eth0: renamed from r1h1 [ 147.700393] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 151.077498] eth0: renamed from r1h1 [ 151.125402] eth0: renamed from r2h1 [ 151.173399] eth1: renamed from r1h2 [ 151.221374] eth1: renamed from r2h2 [ 151.301587] br0: port 1(eth0) entered blocking state [ 151.301880] br0: port 1(eth0) entered disabled state [ 151.302179] eth0: entered allmulticast mode [ 151.302596] eth0: entered promiscuous mode [ 151.303239] br0: port 1(eth0) entered blocking state [ 151.303509] br0: port 1(eth0) entered forwarding state [ 151.318205] br0: port 2(eth1) entered blocking state [ 151.318596] br0: port 2(eth1) entered disabled state [ 151.318962] eth1: entered allmulticast mode [ 151.319440] eth1: entered promiscuous mode [ 151.320126] br0: port 2(eth1) entered blocking state [ 151.320508] br0: port 2(eth1) entered forwarding state [ 151.424424] br0: port 1(eth0) entered blocking state [ 151.424836] br0: port 1(eth0) entered disabled state [ 151.425213] eth0: entered allmulticast mode [ 151.425611] eth0: entered promiscuous mode [ 151.437663] br0: port 2(eth1) entered blocking state [ 151.437957] br0: port 2(eth1) entered disabled state [ 151.438277] eth1: entered allmulticast mode [ 151.438588] eth1: entered promiscuous mode [ 151.439100] br0: port 2(eth1) entered blocking state [ 151.439377] br0: port 2(eth1) entered forwarding state [ 152.385344] br0: port 1(eth0) entered blocking state [ 152.385740] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 153.995223] eth1: left allmulticast mode [ 153.995658] eth1: left promiscuous mode [ 153.996041] br0: port 2(eth1) entered disabled state [ 154.007388] eth0: left allmulticast mode [ 154.007873] eth0: left promiscuous mode [ 154.008372] br0: port 1(eth0) entered disabled state [ 154.138239] eth1: left allmulticast mode [ 154.138655] eth1: left promiscuous mode [ 154.139047] br0: port 2(eth1) entered disabled state [ 154.154319] eth0: left allmulticast mode [ 154.154701] eth0: left promiscuous mode [ 154.155075] br0: port 1(eth0) entered disabled state [ 154.783352] eth0: renamed from r1h1 [ 154.832402] eth0: renamed from r2h1 [ 154.877413] eth1: renamed from r1h2 [ 154.923378] eth1: renamed from r2h2 [ 155.001914] br0: port 1(eth0) entered blocking state [ 155.002243] br0: port 1(eth0) entered disabled state [ 155.002529] eth0: entered allmulticast mode [ 155.002848] eth0: entered promiscuous mode [ 155.003483] br0: port 1(eth0) entered blocking state [ 155.003788] br0: port 1(eth0) entered forwarding state [ 155.017660] br0: port 2(eth1) entered blocking state [ 155.017950] br0: port 2(eth1) entered disabled state [ 155.018228] eth1: entered allmulticast mode [ 155.018521] eth1: entered promiscuous mode [ 155.019029] br0: port 2(eth1) entered blocking state [ 155.019302] br0: port 2(eth1) entered forwarding state [ 155.118563] br0: port 1(eth0) entered blocking state [ 155.118858] br0: port 1(eth0) entered disabled state [ 155.119122] eth0: entered allmulticast mode [ 155.119433] eth0: entered promiscuous mode [ 155.132384] br0: port 2(eth1) entered blocking state [ 155.132666] br0: port 2(eth1) entered disabled state [ 155.132928] eth1: entered allmulticast mode [ 155.133226] eth1: entered promiscuous mode [ 155.133698] br0: port 2(eth1) entered blocking state [ 155.133963] br0: port 2(eth1) entered forwarding state [ 156.097399] br0: port 1(eth0) entered blocking state [ 156.097713] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 157.669229] eth1: left allmulticast mode [ 157.669485] eth1: left promiscuous mode [ 157.669727] br0: port 2(eth1) entered disabled state [ 157.681690] eth0: left allmulticast mode [ 157.681932] eth0: left promiscuous mode [ 157.682148] br0: port 1(eth0) entered disabled state [ 157.797245] eth1: left allmulticast mode [ 157.797635] eth1: left promiscuous mode [ 157.798073] br0: port 2(eth1) entered disabled state # # Tests passed: 18 # Tests failed: 0 [ 157.809336] eth0: left allmulticast mode [ 157.809621] eth0: left promiscuous mode [ 157.809844] br0: port 1(eth0) entered disabled state ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->