make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 6000 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 372.825034] eth0: renamed from r1h1 [ 372.870061] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 375.977052] eth0: renamed from r1h1 [ 376.021028] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 379.231072] eth0: renamed from r1h1 [ 379.279004] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 382.656078] eth0: renamed from r1h1 [ 382.698042] eth0: renamed from r2h1 [ 382.741013] eth1: renamed from r1h2 [ 382.781042] eth1: renamed from r2h2 [ 382.865201] br0: port 1(eth0) entered blocking state [ 382.865501] br0: port 1(eth0) entered disabled state [ 382.865778] eth0: entered allmulticast mode [ 382.866097] eth0: entered promiscuous mode [ 382.866653] br0: port 1(eth0) entered blocking state [ 382.866987] br0: port 1(eth0) entered forwarding state [ 382.884089] br0: port 2(eth1) entered blocking state [ 382.884498] br0: port 2(eth1) entered disabled state [ 382.884895] eth1: entered allmulticast mode [ 382.885334] eth1: entered promiscuous mode [ 382.886110] br0: port 2(eth1) entered blocking state [ 382.886503] br0: port 2(eth1) entered forwarding state [ 382.989017] br0: port 1(eth0) entered blocking state [ 382.989316] br0: port 1(eth0) entered disabled state [ 382.989582] eth0: entered allmulticast mode [ 382.989909] eth0: entered promiscuous mode [ 382.996040] br0: port 1(eth0) entered blocking state [ 382.996353] br0: port 1(eth0) entered forwarding state [ 383.006147] br0: port 2(eth1) entered blocking state [ 383.006572] br0: port 2(eth1) entered disabled state [ 383.006988] eth1: entered allmulticast mode [ 383.007429] eth1: entered promiscuous mode [ 383.008163] br0: port 2(eth1) entered blocking state [ 383.008562] br0: port 2(eth1) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 385.556855] eth1: left allmulticast mode [ 385.557202] eth1: left promiscuous mode [ 385.557540] br0: port 2(eth1) entered disabled state [ 385.575036] eth0: left allmulticast mode [ 385.575408] eth0: left promiscuous mode [ 385.575637] br0: port 1(eth0) entered disabled state [ 385.663859] eth1: left allmulticast mode [ 385.664450] eth1: left promiscuous mode [ 385.664806] br0: port 2(eth1) entered disabled state [ 385.686008] eth0: left allmulticast mode [ 385.686325] eth0: left promiscuous mode [ 385.686708] br0: port 1(eth0) entered disabled state [ 386.321001] eth0: renamed from r1h1 [ 386.369123] eth0: renamed from r2h1 [ 386.419017] eth1: renamed from r1h2 [ 386.467040] eth1: renamed from r2h2 [ 386.548712] br0: port 1(eth0) entered blocking state [ 386.549052] br0: port 1(eth0) entered disabled state [ 386.549351] eth0: entered allmulticast mode [ 386.549663] eth0: entered promiscuous mode [ 386.550219] br0: port 1(eth0) entered blocking state [ 386.550488] br0: port 1(eth0) entered forwarding state [ 386.563976] br0: port 2(eth1) entered blocking state [ 386.564316] br0: port 2(eth1) entered disabled state [ 386.564625] eth1: entered allmulticast mode [ 386.564982] eth1: entered promiscuous mode [ 386.565623] br0: port 2(eth1) entered blocking state [ 386.565950] br0: port 2(eth1) entered forwarding state [ 386.671239] br0: port 1(eth0) entered blocking state [ 386.671730] br0: port 1(eth0) entered disabled state [ 386.672075] eth0: entered allmulticast mode [ 386.672389] eth0: entered promiscuous mode [ 386.688248] br0: port 2(eth1) entered blocking state [ 386.688543] br0: port 2(eth1) entered disabled state [ 386.688819] eth1: entered allmulticast mode [ 386.689107] eth1: entered promiscuous mode [ 386.689411] br0: port 2(eth1) entered blocking state [ 386.689696] br0: port 2(eth1) entered forwarding state [ 387.646970] br0: port 1(eth0) entered blocking state [ 387.647403] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 389.277865] eth1: left allmulticast mode [ 389.278239] eth1: left promiscuous mode [ 389.278622] br0: port 2(eth1) entered disabled state [ 389.295013] eth0: left allmulticast mode [ 389.295389] eth0: left promiscuous mode [ 389.295756] br0: port 1(eth0) entered disabled state [ 389.414906] eth1: left allmulticast mode [ 389.415274] eth1: left promiscuous mode [ 389.415653] br0: port 2(eth1) entered disabled state [ 389.426989] eth0: left allmulticast mode [ 389.427324] eth0: left promiscuous mode [ 389.427692] br0: port 1(eth0) entered disabled state [ 389.941025] eth0: renamed from r1h1 [ 389.986085] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 393.279063] eth0: renamed from r1h1 [ 393.321139] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 396.769038] eth0: renamed from r1h1 [ 396.822073] eth0: renamed from r2h1 [ 396.874182] eth1: renamed from r1h2 [ 396.922076] eth1: renamed from r2h2 [ 397.003246] br0: port 1(eth0) entered blocking state [ 397.003544] br0: port 1(eth0) entered disabled state [ 397.003821] eth0: entered allmulticast mode [ 397.004126] eth0: entered promiscuous mode [ 397.004755] br0: port 1(eth0) entered blocking state [ 397.005038] br0: port 1(eth0) entered forwarding state [ 397.019012] br0: port 2(eth1) entered blocking state [ 397.019305] br0: port 2(eth1) entered disabled state [ 397.019571] eth1: entered allmulticast mode [ 397.019877] eth1: entered promiscuous mode [ 397.020502] br0: port 2(eth1) entered blocking state [ 397.020836] br0: port 2(eth1) entered forwarding state [ 397.122907] br0: port 1(eth0) entered blocking state [ 397.123319] br0: port 1(eth0) entered disabled state [ 397.123689] eth0: entered allmulticast mode [ 397.124146] eth0: entered promiscuous mode [ 397.140818] br0: port 2(eth1) entered blocking state [ 397.141238] br0: port 2(eth1) entered disabled state [ 397.141641] eth1: entered allmulticast mode [ 397.142115] eth1: entered promiscuous mode [ 397.142884] br0: port 2(eth1) entered blocking state [ 397.143279] br0: port 2(eth1) entered forwarding state [ 398.006983] br0: port 1(eth0) entered blocking state [ 398.007291] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 399.796860] eth1: left allmulticast mode [ 399.797208] eth1: left promiscuous mode [ 399.797546] br0: port 2(eth1) entered disabled state [ 399.806014] eth0: left allmulticast mode [ 399.806257] eth0: left promiscuous mode [ 399.806517] br0: port 1(eth0) entered disabled state [ 399.891858] eth1: left allmulticast mode [ 399.892401] eth1: left promiscuous mode [ 399.892963] br0: port 2(eth1) entered disabled state [ 399.902026] eth0: left allmulticast mode [ 399.902637] eth0: left promiscuous mode [ 399.903209] br0: port 1(eth0) entered disabled state [ 400.612090] eth0: renamed from r1h1 [ 400.661125] eth0: renamed from r2h1 [ 400.710017] eth1: renamed from r1h2 [ 400.758155] eth1: renamed from r2h2 [ 400.837636] br0: port 1(eth0) entered blocking state [ 400.838001] br0: port 1(eth0) entered disabled state [ 400.838272] eth0: entered allmulticast mode [ 400.838593] eth0: entered promiscuous mode [ 400.839243] br0: port 1(eth0) entered blocking state [ 400.839518] br0: port 1(eth0) entered forwarding state [ 400.853483] br0: port 2(eth1) entered blocking state [ 400.853802] br0: port 2(eth1) entered disabled state [ 400.854081] eth1: entered allmulticast mode [ 400.854390] eth1: entered promiscuous mode [ 400.855000] br0: port 2(eth1) entered blocking state [ 400.855281] br0: port 2(eth1) entered forwarding state [ 400.965310] br0: port 1(eth0) entered blocking state [ 400.965723] br0: port 1(eth0) entered disabled state [ 400.966195] eth0: entered allmulticast mode [ 400.966650] eth0: entered promiscuous mode [ 400.984837] br0: port 2(eth1) entered blocking state [ 400.985250] br0: port 2(eth1) entered disabled state [ 400.985546] eth1: entered allmulticast mode [ 400.985865] eth1: entered promiscuous mode [ 400.986195] br0: port 2(eth1) entered blocking state [ 400.986463] br0: port 2(eth1) entered forwarding state [ 401.854916] br0: port 1(eth0) entered blocking state [ 401.855246] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 403.596901] eth1: left allmulticast mode [ 403.597263] eth1: left promiscuous mode [ 403.597611] br0: port 2(eth1) entered disabled state [ 403.609006] eth0: left allmulticast mode [ 403.609599] eth0: left promiscuous mode [ 403.610156] br0: port 1(eth0) entered disabled state [ 403.717961] eth1: left allmulticast mode [ 403.718306] eth1: left promiscuous mode [ 403.718786] br0: port 2(eth1) entered disabled state [ 403.729965] eth0: left allmulticast mode [ 403.730611] eth0: left promiscuous mode [ 403.731203] br0: port 1(eth0) entered disabled state # # Tests passed: 18 # Tests failed: 0 ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->