make -C tools/testing/selftests TARGETS=net TEST_PROGS=vrf_route_leaking.ssh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-1/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make[1]: Entering directory '/home/virtme/testing-1/tools/testing/selftests/net' TAP version 13 1..1 # timeout set to 3600 # selftests: net: vrf_route_leaking.sh # # ########################################################################### # IPv4 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 340.890330] eth0: renamed from r1h1 [ 340.921341] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 343.943353] eth0: renamed from r1h1 [ 343.980364] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv4 (sym route): VRF ICMP fragmentation error route lookup ping # ########################################################################### # [ 346.949382] eth0: renamed from r1h1 [ 346.983339] eth1: renamed from r1h2 # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP Frag needed [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 350.075360] eth0: renamed from r1h1 [ 350.113368] eth0: renamed from r2h1 [ 350.147390] eth1: renamed from r1h2 [ 350.188443] eth1: renamed from r2h2 [ 350.246767] br0: port 1(eth0) entered blocking state [ 350.247084] br0: port 1(eth0) entered disabled state [ 350.247421] eth0: entered allmulticast mode [ 350.247754] eth0: entered promiscuous mode [ 350.248345] br0: port 1(eth0) entered blocking state [ 350.248667] br0: port 1(eth0) entered forwarding state [ 350.261081] br0: port 2(eth1) entered blocking state [ 350.261382] br0: port 2(eth1) entered disabled state [ 350.261648] eth1: entered allmulticast mode [ 350.261947] eth1: entered promiscuous mode [ 350.262477] br0: port 2(eth1) entered blocking state [ 350.262747] br0: port 2(eth1) entered forwarding state [ 350.342377] br0: port 1(eth0) entered blocking state [ 350.342676] br0: port 1(eth0) entered disabled state [ 350.342946] eth0: entered allmulticast mode [ 350.343296] eth0: entered promiscuous mode [ 350.354428] br0: port 2(eth1) entered blocking state [ 350.354736] br0: port 2(eth1) entered disabled state [ 350.355014] eth1: entered allmulticast mode [ 350.355335] eth1: entered promiscuous mode [ 350.355843] br0: port 2(eth1) entered blocking state [ 350.356133] br0: port 2(eth1) entered forwarding state [ 350.520263] br0: port 1(eth0) entered blocking state [ 350.520577] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Ping received ICMP ttl exceeded [ OK ] # # ########################################################################### # IPv4 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 352.812378] eth1: left allmulticast mode [ 352.812755] eth1: left promiscuous mode [ 352.813020] br0: port 2(eth1) entered disabled state [ 352.813534] eth0: left allmulticast mode [ 352.813909] eth0: left promiscuous mode [ 352.814344] br0: port 1(eth0) entered disabled state [ 352.872396] eth1: left allmulticast mode [ 352.872825] eth1: left promiscuous mode [ 352.873210] br0: port 2(eth1) entered disabled state [ 352.873872] eth0: left allmulticast mode [ 352.874290] eth0: left promiscuous mode [ 352.874647] br0: port 1(eth0) entered disabled state [ 353.422424] eth0: renamed from r1h1 [ 353.457394] eth0: renamed from r2h1 [ 353.489392] eth1: renamed from r1h2 [ 353.523377] eth1: renamed from r2h2 [ 353.579512] br0: port 1(eth0) entered blocking state [ 353.579811] br0: port 1(eth0) entered disabled state [ 353.580079] eth0: entered allmulticast mode [ 353.580388] eth0: entered promiscuous mode [ 353.580919] br0: port 1(eth0) entered blocking state [ 353.581196] br0: port 1(eth0) entered forwarding state [ 353.593258] br0: port 2(eth1) entered blocking state [ 353.593572] br0: port 2(eth1) entered disabled state [ 353.593860] eth1: entered allmulticast mode [ 353.594302] eth1: entered promiscuous mode [ 353.594900] br0: port 2(eth1) entered blocking state [ 353.595210] br0: port 2(eth1) entered forwarding state [ 353.678568] br0: port 1(eth0) entered blocking state [ 353.678872] br0: port 1(eth0) entered disabled state [ 353.679140] eth0: entered allmulticast mode [ 353.679506] eth0: entered promiscuous mode [ 353.690623] br0: port 2(eth1) entered blocking state [ 353.690908] br0: port 2(eth1) entered disabled state [ 353.691173] eth1: entered allmulticast mode [ 353.691479] eth1: entered promiscuous mode [ 353.691974] br0: port 2(eth1) entered blocking state [ 353.692249] br0: port 2(eth1) entered forwarding state [ 353.832402] br0: port 1(eth0) entered blocking state [ 353.832845] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv4 connectivity [ OK ] # TEST: Traceroute reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 356.139890] eth1: left allmulticast mode [ 356.140329] eth1: left promiscuous mode [ 356.140600] br0: port 2(eth1) entered disabled state [ 356.141514] eth0: left allmulticast mode [ 356.141736] eth0: left promiscuous mode [ 356.142113] br0: port 1(eth0) entered disabled state [ 356.208382] eth1: left allmulticast mode [ 356.208821] eth1: left promiscuous mode [ 356.209059] br0: port 2(eth1) entered disabled state [ 356.209498] eth0: left allmulticast mode [ 356.209711] eth0: left promiscuous mode [ 356.209931] br0: port 1(eth0) entered disabled state [ 356.632387] eth0: renamed from r1h1 [ 356.676480] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (sym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 359.769344] eth0: renamed from r1h1 [ 359.802386] eth1: renamed from r1h2 # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP ttl error route lookup ping # ########################################################################### # [ 363.032395] eth0: renamed from r1h1 [ 363.068356] eth0: renamed from r2h1 [ 363.106350] eth1: renamed from r1h2 [ 363.145358] eth1: renamed from r2h2 [ 363.208427] br0: port 1(eth0) entered blocking state [ 363.208733] br0: port 1(eth0) entered disabled state [ 363.209000] eth0: entered allmulticast mode [ 363.209338] eth0: entered promiscuous mode [ 363.209914] br0: port 1(eth0) entered blocking state [ 363.210197] br0: port 1(eth0) entered forwarding state [ 363.223345] br0: port 2(eth1) entered blocking state [ 363.223629] br0: port 2(eth1) entered disabled state [ 363.223961] eth1: entered allmulticast mode [ 363.224268] eth1: entered promiscuous mode [ 363.224811] br0: port 2(eth1) entered blocking state [ 363.225122] br0: port 2(eth1) entered forwarding state [ 363.313369] br0: port 1(eth0) entered blocking state [ 363.313673] br0: port 1(eth0) entered disabled state [ 363.313940] eth0: entered allmulticast mode [ 363.314258] eth0: entered promiscuous mode [ 363.326956] br0: port 2(eth1) entered blocking state [ 363.327256] br0: port 2(eth1) entered disabled state [ 363.327521] eth1: entered allmulticast mode [ 363.327812] eth1: entered promiscuous mode [ 363.328293] br0: port 2(eth1) entered blocking state [ 363.328560] br0: port 2(eth1) entered forwarding state [ 363.392255] br0: port 1(eth0) entered blocking state [ 363.392692] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Ping received ICMP Hop limit [ OK ] # # ########################################################################### # IPv6 (asym route): VRF ICMP error route lookup traceroute # ########################################################################### # [ 365.816409] eth1: left allmulticast mode [ 365.816687] eth1: left promiscuous mode [ 365.816955] br0: port 2(eth1) entered disabled state [ 365.817452] eth0: left allmulticast mode [ 365.817708] eth0: left promiscuous mode [ 365.817970] br0: port 1(eth0) entered disabled state [ 365.884425] eth1: left allmulticast mode [ 365.884687] eth1: left promiscuous mode [ 365.884975] br0: port 2(eth1) entered disabled state [ 365.885467] eth0: left allmulticast mode [ 365.885679] eth0: left promiscuous mode [ 365.885890] br0: port 1(eth0) entered disabled state [ 366.506354] eth0: renamed from r1h1 [ 366.541391] eth0: renamed from r2h1 [ 366.580382] eth1: renamed from r1h2 [ 366.618365] eth1: renamed from r2h2 [ 366.683127] br0: port 1(eth0) entered blocking state [ 366.683479] br0: port 1(eth0) entered disabled state [ 366.683751] eth0: entered allmulticast mode [ 366.684055] eth0: entered promiscuous mode [ 366.684659] br0: port 1(eth0) entered blocking state [ 366.684951] br0: port 1(eth0) entered forwarding state [ 366.698048] br0: port 2(eth1) entered blocking state [ 366.698357] br0: port 2(eth1) entered disabled state [ 366.698625] eth1: entered allmulticast mode [ 366.698928] eth1: entered promiscuous mode [ 366.699475] br0: port 2(eth1) entered blocking state [ 366.699751] br0: port 2(eth1) entered forwarding state [ 366.786147] br0: port 1(eth0) entered blocking state [ 366.786506] br0: port 1(eth0) entered disabled state [ 366.786774] eth0: entered allmulticast mode [ 366.787082] eth0: entered promiscuous mode [ 366.800200] br0: port 2(eth1) entered blocking state [ 366.800497] br0: port 2(eth1) entered disabled state [ 366.800766] eth1: entered allmulticast mode [ 366.801080] eth1: entered promiscuous mode [ 366.801707] br0: port 2(eth1) entered blocking state [ 366.801985] br0: port 2(eth1) entered forwarding state [ 366.843258] br0: port 1(eth0) entered blocking state [ 366.843581] br0: port 1(eth0) entered forwarding state # TEST: Basic IPv6 connectivity [ OK ] # TEST: Traceroute6 reports a hop on r1 [ OK ] [ 369.291658] eth1: left allmulticast mode [ 369.291927] eth1: left promiscuous mode [ 369.292212] br0: port 2(eth1) entered disabled state [ 369.292743] eth0: left allmulticast mode [ 369.292964] eth0: left promiscuous mode [ 369.293215] br0: port 1(eth0) entered disabled state [ 369.353336] eth1: left allmulticast mode [ 369.353601] eth1: left promiscuous mode [ 369.353882] br0: port 2(eth1) entered disabled state [ 369.354366] eth0: left allmulticast mode [ 369.354588] eth0: left promiscuous mode [ 369.354863] br0: port 1(eth0) entered disabled state # # Tests passed: 18 # Tests failed: 0 ok 1 selftests: net: vrf_route_leaking.sh make[1]: Leaving directory '/home/virtme/testing-1/tools/testing/selftests/net' make: Leaving directory '/home/virtme/testing-1/tools/testing/selftests' xx__-> echo $? 0 xx__->