make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 356.511888] eth0: renamed from r1h1 [ 356.560828] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 359.841909] eth0: renamed from r1h1 [ 359.886938] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 363.157882] eth0: renamed from r1h1 [ 363.202825] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 366.457864] eth0: renamed from r1h1 [ 366.505854] eth0: renamed from r2h1 [ 366.550847] eth1: renamed from r1h2 [ 366.599820] eth1: renamed from r2h2 [ 366.686164] br0: port 1(eth0) entered blocking state [ 366.686463] br0: port 1(eth0) entered disabled state [ 366.686786] eth0: entered allmulticast mode [ 366.687110] eth0: entered promiscuous mode [ 366.687726] br0: port 1(eth0) entered blocking state [ 366.688030] br0: port 1(eth0) entered forwarding state [ 366.702829] br0: port 2(eth1) entered blocking state [ 366.703120] br0: port 2(eth1) entered disabled state [ 366.703389] eth1: entered allmulticast mode [ 366.703695] eth1: entered promiscuous mode [ 366.704207] br0: port 2(eth1) entered blocking state [ 366.704490] br0: port 2(eth1) entered forwarding state [ 366.812025] br0: port 1(eth0) entered blocking state [ 366.812330] br0: port 1(eth0) entered disabled state [ 366.812594] eth0: entered allmulticast mode [ 366.812953] eth0: entered promiscuous mode [ 366.828298] br0: port 2(eth1) entered blocking state [ 366.828598] br0: port 2(eth1) entered disabled state [ 366.828897] eth1: entered allmulticast mode [ 366.829206] eth1: entered promiscuous mode [ 366.829738] br0: port 2(eth1) entered blocking state [ 366.830025] br0: port 2(eth1) entered forwarding state [ 366.842714] br0: port 1(eth0) entered blocking state [ 366.843069] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 369.452704] eth1: left allmulticast mode [ 369.452972] eth1: left promiscuous mode [ 369.453212] br0: port 2(eth1) entered disabled state [ 369.464901] eth0: left allmulticast mode [ 369.465174] eth0: left promiscuous mode [ 369.465393] br0: port 1(eth0) entered disabled state [ 369.577726] eth1: left allmulticast mode [ 369.578190] eth1: left promiscuous mode [ 369.578550] br0: port 2(eth1) entered disabled state [ 369.585785] eth0: left allmulticast mode [ 369.586149] eth0: left promiscuous mode [ 369.586585] br0: port 1(eth0) entered disabled state [ 370.320020] eth0: renamed from r1h1 [ 370.370985] eth0: renamed from r2h1 [ 370.419958] eth1: renamed from r1h2 [ 370.468897] eth1: renamed from r2h2 [ 370.560533] br0: port 1(eth0) entered blocking state [ 370.560922] br0: port 1(eth0) entered disabled state [ 370.561208] eth0: entered allmulticast mode [ 370.561552] eth0: entered promiscuous mode [ 370.562247] br0: port 1(eth0) entered blocking state [ 370.562544] br0: port 1(eth0) entered forwarding state [ 370.578919] br0: port 2(eth1) entered blocking state [ 370.579218] br0: port 2(eth1) entered disabled state [ 370.579502] eth1: entered allmulticast mode [ 370.579821] eth1: entered promiscuous mode [ 370.580654] br0: port 2(eth1) entered blocking state [ 370.580928] br0: port 2(eth1) entered forwarding state [ 370.705561] br0: port 1(eth0) entered blocking state [ 370.705992] br0: port 1(eth0) entered disabled state [ 370.706381] eth0: entered allmulticast mode [ 370.706880] eth0: entered promiscuous mode [ 370.725480] br0: port 2(eth1) entered blocking state [ 370.725790] br0: port 2(eth1) entered disabled state [ 370.726070] eth1: entered allmulticast mode [ 370.726366] eth1: entered promiscuous mode [ 370.726979] br0: port 2(eth1) entered blocking state [ 370.727250] br0: port 2(eth1) entered forwarding state [ 371.564844] br0: port 1(eth0) entered blocking state [ 371.565288] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 373.393711] eth1: left allmulticast mode [ 373.394039] eth1: left promiscuous mode [ 373.394368] br0: port 2(eth1) entered disabled state [ 373.410848] eth0: left allmulticast mode [ 373.411511] eth0: left promiscuous mode [ 373.412031] br0: port 1(eth0) entered disabled state [ 373.508725] eth1: left allmulticast mode [ 373.508992] eth1: left promiscuous mode [ 373.509244] br0: port 2(eth1) entered disabled state [ 373.515811] eth0: left allmulticast mode [ 373.516208] eth0: left promiscuous mode [ 373.516570] br0: port 1(eth0) entered disabled state [ 373.991893] eth0: renamed from r1h1 [ 374.036881] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 377.261854] eth0: renamed from r1h1 [ 377.308853] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 380.639845] eth0: renamed from r1h1 [ 380.687934] eth0: renamed from r2h1 [ 380.735934] eth1: renamed from r1h2 [ 380.786861] eth1: renamed from r2h2 [ 380.867051] br0: port 1(eth0) entered blocking state [ 380.867350] br0: port 1(eth0) entered disabled state [ 380.867613] eth0: entered allmulticast mode [ 380.867925] eth0: entered promiscuous mode [ 380.868530] br0: port 1(eth0) entered blocking state [ 380.868810] br0: port 1(eth0) entered forwarding state [ 380.885738] br0: port 2(eth1) entered blocking state [ 380.886073] br0: port 2(eth1) entered disabled state [ 380.886375] eth1: entered allmulticast mode [ 380.886871] eth1: entered promiscuous mode [ 380.887568] br0: port 2(eth1) entered blocking state [ 380.887871] br0: port 2(eth1) entered forwarding state [ 380.994997] br0: port 1(eth0) entered blocking state [ 380.995395] br0: port 1(eth0) entered disabled state [ 380.995883] eth0: entered allmulticast mode [ 380.996339] eth0: entered promiscuous mode [ 381.012926] br0: port 2(eth1) entered blocking state [ 381.013247] br0: port 2(eth1) entered disabled state [ 381.013527] eth1: entered allmulticast mode [ 381.013849] eth1: entered promiscuous mode [ 381.014198] br0: port 2(eth1) entered blocking state [ 381.014459] br0: port 2(eth1) entered forwarding state [ 381.948823] br0: port 1(eth0) entered blocking state [ 381.949125] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 383.586917] eth1: left allmulticast mode [ 383.587650] eth1: left promiscuous mode [ 383.588284] br0: port 2(eth1) entered disabled state [ 383.595123] eth0: left allmulticast mode [ 383.595498] eth0: left promiscuous mode [ 383.595839] br0: port 1(eth0) entered disabled state [ 383.679726] eth1: left allmulticast mode [ 383.680150] eth1: left promiscuous mode [ 383.680610] br0: port 2(eth1) entered disabled state [ 383.687795] eth0: left allmulticast mode [ 383.688249] eth0: left promiscuous mode [ 383.688742] br0: port 1(eth0) entered disabled state [ 384.414941] eth0: renamed from r1h1 [ 384.464865] eth0: renamed from r2h1 [ 384.512979] eth1: renamed from r1h2 [ 384.559833] eth1: renamed from r2h2 [ 384.643639] br0: port 1(eth0) entered blocking state [ 384.644068] br0: port 1(eth0) entered disabled state [ 384.644463] eth0: entered allmulticast mode [ 384.644927] eth0: entered promiscuous mode [ 384.645707] br0: port 1(eth0) entered blocking state [ 384.646106] br0: port 1(eth0) entered forwarding state [ 384.663944] br0: port 2(eth1) entered blocking state [ 384.664357] br0: port 2(eth1) entered disabled state [ 384.664761] eth1: entered allmulticast mode [ 384.665180] eth1: entered promiscuous mode [ 384.665999] br0: port 2(eth1) entered blocking state [ 384.666365] br0: port 2(eth1) entered forwarding state [ 384.781591] br0: port 1(eth0) entered blocking state [ 384.781899] br0: port 1(eth0) entered disabled state [ 384.782169] eth0: entered allmulticast mode [ 384.782475] eth0: entered promiscuous mode [ 384.797692] br0: port 2(eth1) entered blocking state [ 384.797985] br0: port 2(eth1) entered disabled state [ 384.798251] eth1: entered allmulticast mode [ 384.798549] eth1: entered promiscuous mode [ 384.799102] br0: port 2(eth1) entered blocking state [ 384.799371] br0: port 2(eth1) entered forwarding state [ 385.660798] br0: port 1(eth0) entered blocking state [ 385.661114] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 387.389750] eth1: left allmulticast mode [ 387.390009] eth1: left promiscuous mode [ 387.390252] br0: port 2(eth1) entered disabled state [ 387.397872] eth0: left allmulticast mode [ 387.398296] eth0: left promiscuous mode [ 387.398704] br0: port 1(eth0) entered disabled state [ 387.507731] eth1: left allmulticast mode [ 387.508099] eth1: left promiscuous mode [ 387.508365] br0: port 2(eth1) entered disabled state [ 387.523834] eth0: left allmulticast mode [ 387.524331] eth0: left promiscuous mode [ 387.524767] br0: port 1(eth0) entered disabled state # # Tests passed: 18 # Tests failed: 0 ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->