make -C tools/testing/selftests TARGETS="net/netfilter" TEST_PROGS=nft_floowtable.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-15/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-15/tools/testing/selftests/net/netfilter' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-15/tools/testing/selftests/net/netfilter' make[1]: Entering directory '/home/virtme/testing-15/tools/testing/selftests/net/netfilter' TAP version 13 1..1 # timeout set to 1800 # selftests: net/netfilter: nft_flowtable.sh # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:29 /tmp/tmp.9QVEaBM8qB # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:29 /tmp/tmp.HfJ51ZsWUu # FAIL: flow offload for ns1/ns2: # table inet filter { # counter routed_orig { # packets 14 bytes 36200 # } # # counter routed_repl { # packets 1 bytes 60 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # PASS: dscp_none: dscp packet counters match # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:30 /tmp/tmp.9QVEaBM8qB # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:30 /tmp/tmp.HfJ51ZsWUu # PASS: dscp_ingress: dscp packet counters match # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:31 /tmp/tmp.9QVEaBM8qB # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:31 /tmp/tmp.HfJ51ZsWUu # PASS: dscp_egress: dscp packet counters match # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:32 /tmp/tmp.9QVEaBM8qB # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:32 /tmp/tmp.HfJ51ZsWUu # PASS: dscp_fwd: dscp packet counters match # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:33 /tmp/tmp.9QVEaBM8qB # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:33 /tmp/tmp.HfJ51ZsWUu # FAIL: flow offload for ns1/ns2 with NAT # table inet filter { # counter routed_orig { # packets 70 bytes 181000 # } # # counter routed_repl { # packets 5 bytes 300 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "veth0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 4 bytes 240 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:34 /tmp/tmp.9QVEaBM8qB # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:34 /tmp/tmp.HfJ51ZsWUu # FAIL: flow offload for ns1/ns2 with NAT and pmtu discovery # table inet filter { # counter routed_orig { # packets 2 bytes 112 # } # # counter routed_repl { # packets 1 bytes 60 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "veth0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 5 bytes 300 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:35 /tmp/tmp.9QVEaBM8qB # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:35 /tmp/tmp.HfJ51ZsWUu # FAIL: flow offload for ns1/ns2 with bridge NAT # table inet filter { # counter routed_orig { # packets 5 bytes 276 # } # # counter routed_repl { # packets 2 bytes 120 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 1 bytes 60 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:36 /tmp/tmp.9QVEaBM8qB # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:36 /tmp/tmp.HfJ51ZsWUu # FAIL: flow offload for ns1/ns2 with bridge NAT and VLAN # table inet filter { # counter routed_orig { # packets 8 bytes 440 # } # # counter routed_repl { # packets 3 bytes 180 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 2 bytes 120 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:37 /tmp/tmp.9QVEaBM8qB # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Apr 9 02:29 /tmp/tmp.WXAK4ezEgu # -rw------- 1 root root 0 Apr 9 02:37 /tmp/tmp.HfJ51ZsWUu # FAIL: ipsec tunnel mode for ns1/ns2 # table inet filter { # counter routed_orig { # packets 11 bytes 1990 # } # # counter routed_repl { # packets 4 bytes 240 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # XfrmInError 0 # XfrmInBufferError 0 # XfrmInHdrError 0 # XfrmInNoStates 0 # XfrmInStateProtoError 0 # XfrmInStateModeError 0 # XfrmInStateSeqError 0 # XfrmInStateExpired 0 # XfrmInStateMismatch 0 # XfrmInStateInvalid 0 # XfrmInTmplMismatch 0 # XfrmInNoPols 0 # XfrmInPolBlock 0 # XfrmInPolError 0 # XfrmOutError 0 # XfrmOutBundleGenError 0 # XfrmOutBundleCheckError 0 # XfrmOutNoStates 0 # XfrmOutStateProtoError 0 # XfrmOutStateModeError 0 # XfrmOutStateSeqError 0 # XfrmOutStateExpired 0 # XfrmOutPolBlock 0 # XfrmOutPolDead 0 # XfrmOutPolError 0 # XfrmFwdHdrError 0 # XfrmOutStateInvalid 0 # XfrmAcquireError 0 # XfrmOutStateDirError 0 # XfrmInStateDirError 0 # XfrmInIptfsError 0 # XfrmOutNoQueueSpace 0 # re-run with random mtus and file size: -o 9805 -l 14179 -r 18306 -s 29402000 # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:38 /tmp/tmp.axDAVsa73M # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:38 /tmp/tmp.eDzVCAasUQ # FAIL: flow offload for ns1/ns2: # table inet filter { # counter routed_orig { # packets 2 bytes 112 # } # # counter routed_repl { # packets 1 bytes 60 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # PASS: dscp_none: dscp packet counters match # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:39 /tmp/tmp.axDAVsa73M # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:39 /tmp/tmp.eDzVCAasUQ # PASS: dscp_ingress: dscp packet counters match # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:40 /tmp/tmp.axDAVsa73M # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:40 /tmp/tmp.eDzVCAasUQ # PASS: dscp_egress: dscp packet counters match # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:41 /tmp/tmp.axDAVsa73M # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:41 /tmp/tmp.eDzVCAasUQ # PASS: dscp_fwd: dscp packet counters match # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:42 /tmp/tmp.axDAVsa73M # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:42 /tmp/tmp.eDzVCAasUQ # FAIL: flow offload for ns1/ns2 with NAT # table inet filter { # counter routed_orig { # packets 10 bytes 560 # } # # counter routed_repl { # packets 5 bytes 300 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "veth0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 4 bytes 240 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:43 /tmp/tmp.axDAVsa73M # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:43 /tmp/tmp.eDzVCAasUQ # FAIL: flow offload for ns1/ns2 with NAT and pmtu discovery # table inet filter { # counter routed_orig { # packets 2 bytes 112 # } # # counter routed_repl { # packets 1 bytes 60 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "veth0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 5 bytes 300 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:44 /tmp/tmp.axDAVsa73M # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:44 /tmp/tmp.eDzVCAasUQ # FAIL: flow offload for ns1/ns2 with bridge NAT # table inet filter { # counter routed_orig { # packets 5 bytes 276 # } # # counter routed_repl { # packets 2 bytes 120 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 1 bytes 60 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:45 /tmp/tmp.axDAVsa73M # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:45 /tmp/tmp.eDzVCAasUQ # FAIL: flow offload for ns1/ns2 with bridge NAT and VLAN # table inet filter { # counter routed_orig { # packets 8 bytes 440 # } # # counter routed_repl { # packets 3 bytes 180 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 2 bytes 120 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:46 /tmp/tmp.axDAVsa73M # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 29402000 Apr 9 02:38 /tmp/tmp.3wNLq9Va2r # -rw------- 1 root root 0 Apr 9 02:46 /tmp/tmp.eDzVCAasUQ # FAIL: ipsec tunnel mode for ns1/ns2 # table inet filter { # counter routed_orig { # packets 11 bytes 604 # } # # counter routed_repl { # packets 5 bytes 300 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # XfrmInError 0 # XfrmInBufferError 0 # XfrmInHdrError 0 # XfrmInNoStates 0 # XfrmInStateProtoError 0 # XfrmInStateModeError 0 # XfrmInStateSeqError 0 # XfrmInStateExpired 0 # XfrmInStateMismatch 0 # XfrmInStateInvalid 0 # XfrmInTmplMismatch 0 # XfrmInNoPols 0 # XfrmInPolBlock 0 # XfrmInPolError 0 # XfrmOutError 0 # XfrmOutBundleGenError 0 # XfrmOutBundleCheckError 0 # XfrmOutNoStates 0 # XfrmOutStateProtoError 0 # XfrmOutStateModeError 0 # XfrmOutStateSeqError 0 # XfrmOutStateExpired 0 # XfrmOutPolBlock 0 # XfrmOutPolDead 0 # XfrmOutPolError 0 # XfrmFwdHdrError 0 # XfrmOutStateInvalid 0 # XfrmAcquireError 0 # XfrmOutStateDirError 0 # XfrmInStateDirError 0 # XfrmInIptfsError 0 # XfrmOutNoQueueSpace 0 not ok 1 selftests: net/netfilter: nft_flowtable.sh # exit=1 make[1]: Leaving directory '/home/virtme/testing-15/tools/testing/selftests/net/netfilter' make: Leaving directory '/home/virtme/testing-15/tools/testing/selftests' xx__-> echo $? 0 xx__->