make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 365.952996] eth0: renamed from r1h1 [ 365.996985] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 369.179117] eth0: renamed from r1h1 [ 369.225019] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 372.527994] eth0: renamed from r1h1 [ 372.573019] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 375.906091] eth0: renamed from r1h1 [ 375.955050] eth0: renamed from r2h1 [ 376.003060] eth1: renamed from r1h2 [ 376.052071] eth1: renamed from r2h2 [ 376.133887] br0: port 1(eth0) entered blocking state [ 376.134202] br0: port 1(eth0) entered disabled state [ 376.134482] eth0: entered allmulticast mode [ 376.134831] eth0: entered promiscuous mode [ 376.135443] br0: port 1(eth0) entered blocking state [ 376.135742] br0: port 1(eth0) entered forwarding state [ 376.150960] br0: port 2(eth1) entered blocking state [ 376.151251] br0: port 2(eth1) entered disabled state [ 376.151554] eth1: entered allmulticast mode [ 376.152078] eth1: entered promiscuous mode [ 376.152816] br0: port 2(eth1) entered blocking state [ 376.153179] br0: port 2(eth1) entered forwarding state [ 376.257483] br0: port 1(eth0) entered blocking state [ 376.257974] br0: port 1(eth0) entered disabled state [ 376.258361] eth0: entered allmulticast mode [ 376.258868] eth0: entered promiscuous mode [ 376.274487] br0: port 2(eth1) entered blocking state [ 376.274802] br0: port 2(eth1) entered disabled state [ 376.275069] eth1: entered allmulticast mode [ 376.275378] eth1: entered promiscuous mode [ 376.275714] br0: port 2(eth1) entered blocking state [ 376.275992] br0: port 2(eth1) entered forwarding state [ 377.278906] br0: port 1(eth0) entered blocking state [ 377.279212] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 378.858814] eth1: left allmulticast mode [ 378.859489] eth1: left promiscuous mode [ 378.860216] br0: port 2(eth1) entered disabled state [ 378.872954] eth0: left allmulticast mode [ 378.873685] eth0: left promiscuous mode [ 378.874356] br0: port 1(eth0) entered disabled state [ 378.967835] eth1: left allmulticast mode [ 378.968528] eth1: left promiscuous mode [ 378.969010] br0: port 2(eth1) entered disabled state [ 378.979043] eth0: left allmulticast mode [ 378.979439] eth0: left promiscuous mode [ 378.979817] br0: port 1(eth0) entered disabled state [ 379.609142] eth0: renamed from r1h1 [ 379.659025] eth0: renamed from r2h1 [ 379.704073] eth1: renamed from r1h2 [ 379.751985] eth1: renamed from r2h2 [ 379.833633] br0: port 1(eth0) entered blocking state [ 379.834080] br0: port 1(eth0) entered disabled state [ 379.834467] eth0: entered allmulticast mode [ 379.834923] eth0: entered promiscuous mode [ 379.835713] br0: port 1(eth0) entered blocking state [ 379.836131] br0: port 1(eth0) entered forwarding state [ 379.852962] br0: port 2(eth1) entered blocking state [ 379.853380] br0: port 2(eth1) entered disabled state [ 379.853752] eth1: entered allmulticast mode [ 379.854208] eth1: entered promiscuous mode [ 379.855026] br0: port 2(eth1) entered blocking state [ 379.855415] br0: port 2(eth1) entered forwarding state [ 379.960257] br0: port 1(eth0) entered blocking state [ 379.960689] br0: port 1(eth0) entered disabled state [ 379.961106] eth0: entered allmulticast mode [ 379.961560] eth0: entered promiscuous mode [ 379.979505] br0: port 2(eth1) entered blocking state [ 379.979961] br0: port 2(eth1) entered disabled state [ 379.980368] eth1: entered allmulticast mode [ 379.980843] eth1: entered promiscuous mode [ 379.981655] br0: port 2(eth1) entered blocking state [ 379.982078] br0: port 2(eth1) entered forwarding state [ 380.926964] br0: port 1(eth0) entered blocking state [ 380.927316] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 382.590841] eth1: left allmulticast mode [ 382.591516] eth1: left promiscuous mode [ 382.591883] br0: port 2(eth1) entered disabled state [ 382.610964] eth0: left allmulticast mode [ 382.611210] eth0: left promiscuous mode [ 382.611425] br0: port 1(eth0) entered disabled state [ 382.719239] eth1: left allmulticast mode [ 382.719608] eth1: left promiscuous mode [ 382.719975] br0: port 2(eth1) entered disabled state [ 382.731029] eth0: left allmulticast mode [ 382.731688] eth0: left promiscuous mode [ 382.732172] br0: port 1(eth0) entered disabled state [ 383.260020] eth0: renamed from r1h1 [ 383.308984] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 386.669008] eth0: renamed from r1h1 [ 386.716052] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 390.161018] eth0: renamed from r1h1 [ 390.213002] eth0: renamed from r2h1 [ 390.258053] eth1: renamed from r1h2 [ 390.310996] eth1: renamed from r2h2 [ 390.391218] br0: port 1(eth0) entered blocking state [ 390.391530] br0: port 1(eth0) entered disabled state [ 390.391814] eth0: entered allmulticast mode [ 390.392113] eth0: entered promiscuous mode [ 390.392774] br0: port 1(eth0) entered blocking state [ 390.393158] br0: port 1(eth0) entered forwarding state [ 390.409593] br0: port 2(eth1) entered blocking state [ 390.409937] br0: port 2(eth1) entered disabled state [ 390.410210] eth1: entered allmulticast mode [ 390.410510] eth1: entered promiscuous mode [ 390.411071] br0: port 2(eth1) entered blocking state [ 390.411343] br0: port 2(eth1) entered forwarding state [ 390.519393] br0: port 1(eth0) entered blocking state [ 390.519829] br0: port 1(eth0) entered disabled state [ 390.520217] eth0: entered allmulticast mode [ 390.520571] eth0: entered promiscuous mode [ 390.534136] br0: port 2(eth1) entered blocking state [ 390.534431] br0: port 2(eth1) entered disabled state [ 390.534700] eth1: entered allmulticast mode [ 390.535106] eth1: entered promiscuous mode [ 390.535446] br0: port 2(eth1) entered blocking state [ 390.535713] br0: port 2(eth1) entered forwarding state [ 391.486906] br0: port 1(eth0) entered blocking state [ 391.487209] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 393.132811] eth1: left allmulticast mode [ 393.133242] eth1: left promiscuous mode [ 393.133713] br0: port 2(eth1) entered disabled state [ 393.144915] eth0: left allmulticast mode [ 393.145422] eth0: left promiscuous mode [ 393.145885] br0: port 1(eth0) entered disabled state [ 393.233828] eth1: left allmulticast mode [ 393.234071] eth1: left promiscuous mode [ 393.234388] br0: port 2(eth1) entered disabled state [ 393.245898] eth0: left allmulticast mode [ 393.246383] eth0: left promiscuous mode [ 393.246825] br0: port 1(eth0) entered disabled state [ 393.817055] eth0: renamed from r1h1 [ 393.862975] eth0: renamed from r2h1 [ 393.905032] eth1: renamed from r1h2 [ 393.950162] eth1: renamed from r2h2 [ 394.026844] br0: port 1(eth0) entered blocking state [ 394.027248] br0: port 1(eth0) entered disabled state [ 394.027517] eth0: entered allmulticast mode [ 394.027832] eth0: entered promiscuous mode [ 394.028380] br0: port 1(eth0) entered blocking state [ 394.028647] br0: port 1(eth0) entered forwarding state [ 394.043884] br0: port 2(eth1) entered blocking state [ 394.044173] br0: port 2(eth1) entered disabled state [ 394.044438] eth1: entered allmulticast mode [ 394.044731] eth1: entered promiscuous mode [ 394.045283] br0: port 2(eth1) entered blocking state [ 394.045551] br0: port 2(eth1) entered forwarding state [ 394.143746] br0: port 1(eth0) entered blocking state [ 394.144180] br0: port 1(eth0) entered disabled state [ 394.144582] eth0: entered allmulticast mode [ 394.145136] eth0: entered promiscuous mode [ 394.160095] br0: port 2(eth1) entered blocking state [ 394.160440] br0: port 2(eth1) entered disabled state [ 394.160725] eth1: entered allmulticast mode [ 394.161122] eth1: entered promiscuous mode [ 394.161711] br0: port 2(eth1) entered blocking state [ 394.162094] br0: port 2(eth1) entered forwarding state [ 394.182844] br0: port 1(eth0) entered blocking state [ 394.183415] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 396.683823] eth1: left allmulticast mode [ 396.684387] eth1: left promiscuous mode [ 396.684946] br0: port 2(eth1) entered disabled state [ 396.691919] eth0: left allmulticast mode [ 396.692164] eth0: left promiscuous mode [ 396.692546] br0: port 1(eth0) entered disabled state [ 396.782834] eth1: left allmulticast mode [ 396.783252] eth1: left promiscuous mode [ 396.783701] br0: port 2(eth1) entered disabled state [ 396.796015] eth0: left allmulticast mode [ 396.796278] eth0: left promiscuous mode [ 396.796544] br0: port 1(eth0) entered disabled state # # Tests passed: 18 # Tests failed: 0 ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->