make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 351.839401] eth0: renamed from r1h1 [ 351.883324] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 354.863316] eth0: renamed from r1h1 [ 354.909371] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 357.854326] eth0: renamed from r1h1 [ 357.892419] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 360.926346] eth0: renamed from r1h1 [ 360.968375] eth0: renamed from r2h1 [ 361.008334] eth1: renamed from r1h2 [ 361.048381] eth1: renamed from r2h2 [ 361.109971] br0: port 1(eth0) entered blocking state [ 361.110286] br0: port 1(eth0) entered disabled state [ 361.110564] eth0: entered allmulticast mode [ 361.110864] eth0: entered promiscuous mode [ 361.111406] br0: port 1(eth0) entered blocking state [ 361.111716] br0: port 1(eth0) entered forwarding state [ 361.123067] br0: port 2(eth1) entered blocking state [ 361.123397] br0: port 2(eth1) entered disabled state [ 361.123669] eth1: entered allmulticast mode [ 361.123974] eth1: entered promiscuous mode [ 361.124483] br0: port 2(eth1) entered blocking state [ 361.124754] br0: port 2(eth1) entered forwarding state [ 361.201371] br0: port 1(eth0) entered blocking state [ 361.201666] br0: port 1(eth0) entered disabled state [ 361.201938] eth0: entered allmulticast mode [ 361.202264] eth0: entered promiscuous mode [ 361.214323] br0: port 2(eth1) entered blocking state [ 361.214617] br0: port 2(eth1) entered disabled state [ 361.214886] eth1: entered allmulticast mode [ 361.215191] eth1: entered promiscuous mode [ 361.215648] br0: port 2(eth1) entered blocking state [ 361.215928] br0: port 2(eth1) entered forwarding state [ 361.417265] br0: port 1(eth0) entered blocking state [ 361.417819] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 363.634234] eth1: left allmulticast mode [ 363.634469] eth1: left promiscuous mode [ 363.634695] br0: port 2(eth1) entered disabled state [ 363.646331] eth0: left allmulticast mode [ 363.646591] eth0: left promiscuous mode [ 363.646843] br0: port 1(eth0) entered disabled state [ 363.745274] eth1: left allmulticast mode [ 363.745525] eth1: left promiscuous mode [ 363.745777] br0: port 2(eth1) entered disabled state [ 363.753287] eth0: left allmulticast mode [ 363.753532] eth0: left promiscuous mode [ 363.753773] br0: port 1(eth0) entered disabled state [ 364.193307] eth0: renamed from r1h1 [ 364.232309] eth0: renamed from r2h1 [ 364.268328] eth1: renamed from r1h2 [ 364.305317] eth1: renamed from r2h2 [ 364.364751] br0: port 1(eth0) entered blocking state [ 364.365038] br0: port 1(eth0) entered disabled state [ 364.365319] eth0: entered allmulticast mode [ 364.365613] eth0: entered promiscuous mode [ 364.366092] br0: port 1(eth0) entered blocking state [ 364.366371] br0: port 1(eth0) entered forwarding state [ 364.377488] br0: port 2(eth1) entered blocking state [ 364.377771] br0: port 2(eth1) entered disabled state [ 364.378046] eth1: entered allmulticast mode [ 364.378412] eth1: entered promiscuous mode [ 364.378906] br0: port 2(eth1) entered blocking state [ 364.379198] br0: port 2(eth1) entered forwarding state [ 364.452779] br0: port 1(eth0) entered blocking state [ 364.453073] br0: port 1(eth0) entered disabled state [ 364.453355] eth0: entered allmulticast mode [ 364.453680] eth0: entered promiscuous mode [ 364.465010] br0: port 2(eth1) entered blocking state [ 364.465310] br0: port 2(eth1) entered disabled state [ 364.465581] eth1: entered allmulticast mode [ 364.465866] eth1: entered promiscuous mode [ 364.466348] br0: port 2(eth1) entered blocking state [ 364.466620] br0: port 2(eth1) entered forwarding state [ 364.684288] br0: port 1(eth0) entered blocking state [ 364.684605] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 366.857228] eth1: left allmulticast mode [ 366.857674] eth1: left promiscuous mode [ 366.858068] br0: port 2(eth1) entered disabled state [ 366.869351] eth0: left allmulticast mode [ 366.869699] eth0: left promiscuous mode [ 366.869989] br0: port 1(eth0) entered disabled state [ 366.956264] eth1: left allmulticast mode [ 366.956680] eth1: left promiscuous mode [ 366.957070] br0: port 2(eth1) entered disabled state [ 366.964284] eth0: left allmulticast mode [ 366.964693] eth0: left promiscuous mode [ 366.965075] br0: port 1(eth0) entered disabled state [ 367.341364] eth0: renamed from r1h1 [ 367.382326] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 370.355386] eth0: renamed from r1h1 [ 370.403367] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 373.498321] eth0: renamed from r1h1 [ 373.543388] eth0: renamed from r2h1 [ 373.581341] eth1: renamed from r1h2 [ 373.621478] eth1: renamed from r2h2 [ 373.684359] br0: port 1(eth0) entered blocking state [ 373.684657] br0: port 1(eth0) entered disabled state [ 373.684928] eth0: entered allmulticast mode [ 373.685232] eth0: entered promiscuous mode [ 373.685734] br0: port 1(eth0) entered blocking state [ 373.686007] br0: port 1(eth0) entered forwarding state [ 373.696873] br0: port 2(eth1) entered blocking state [ 373.697163] br0: port 2(eth1) entered disabled state [ 373.697524] eth1: entered allmulticast mode [ 373.697824] eth1: entered promiscuous mode [ 373.698307] br0: port 2(eth1) entered blocking state [ 373.698577] br0: port 2(eth1) entered forwarding state [ 373.774487] br0: port 1(eth0) entered blocking state [ 373.774795] br0: port 1(eth0) entered disabled state [ 373.775064] eth0: entered allmulticast mode [ 373.775407] eth0: entered promiscuous mode [ 373.786397] br0: port 2(eth1) entered blocking state [ 373.786696] br0: port 2(eth1) entered disabled state [ 373.786964] eth1: entered allmulticast mode [ 373.787287] eth1: entered promiscuous mode [ 373.787770] br0: port 2(eth1) entered blocking state [ 373.788043] br0: port 2(eth1) entered forwarding state [ 373.929240] br0: port 1(eth0) entered blocking state [ 373.929580] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 376.228285] eth1: left allmulticast mode [ 376.228525] eth1: left promiscuous mode [ 376.228759] br0: port 2(eth1) entered disabled state [ 376.251412] eth0: left allmulticast mode [ 376.251891] eth0: left promiscuous mode [ 376.252400] br0: port 1(eth0) entered disabled state [ 376.339317] eth1: left allmulticast mode [ 376.339890] eth1: left promiscuous mode [ 376.340464] br0: port 2(eth1) entered disabled state [ 376.351339] eth0: left allmulticast mode [ 376.351952] eth0: left promiscuous mode [ 376.352384] br0: port 1(eth0) entered disabled state [ 376.894336] eth0: renamed from r1h1 [ 376.934332] eth0: renamed from r2h1 [ 376.974345] eth1: renamed from r1h2 [ 377.014362] eth1: renamed from r2h2 [ 377.078085] br0: port 1(eth0) entered blocking state [ 377.078398] br0: port 1(eth0) entered disabled state [ 377.078669] eth0: entered allmulticast mode [ 377.078979] eth0: entered promiscuous mode [ 377.079589] br0: port 1(eth0) entered blocking state [ 377.079865] br0: port 1(eth0) entered forwarding state [ 377.092323] br0: port 2(eth1) entered blocking state [ 377.092617] br0: port 2(eth1) entered disabled state [ 377.092896] eth1: entered allmulticast mode [ 377.093218] eth1: entered promiscuous mode [ 377.093701] br0: port 2(eth1) entered blocking state [ 377.093977] br0: port 2(eth1) entered forwarding state [ 377.176131] br0: port 1(eth0) entered blocking state [ 377.176465] br0: port 1(eth0) entered disabled state [ 377.176744] eth0: entered allmulticast mode [ 377.177036] eth0: entered promiscuous mode [ 377.189677] br0: port 2(eth1) entered blocking state [ 377.189975] br0: port 2(eth1) entered disabled state [ 377.190260] eth1: entered allmulticast mode [ 377.190563] eth1: entered promiscuous mode [ 377.190859] br0: port 2(eth1) entered blocking state [ 377.191126] br0: port 2(eth1) entered forwarding state [ 377.297244] br0: port 1(eth0) entered blocking state [ 377.297548] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 379.647272] eth1: left allmulticast mode [ 379.647522] eth1: left promiscuous mode [ 379.647778] br0: port 2(eth1) entered disabled state [ 379.659309] eth0: left allmulticast mode [ 379.659540] eth0: left promiscuous mode [ 379.659757] br0: port 1(eth0) entered disabled state [ 379.738278] eth1: left allmulticast mode [ 379.738678] eth1: left promiscuous mode [ 379.739034] br0: port 2(eth1) entered disabled state [ 379.750284] eth0: left allmulticast mode [ 379.750513] eth0: left promiscuous mode [ 379.750799] br0: port 1(eth0) entered disabled state # # Tests passed: 18 # Tests failed: 0 ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->