make -C tools/testing/selftests TARGETS="net/netfilter" TEST_PROGS=nft_floowtable.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-15/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-15/tools/testing/selftests/net/netfilter' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-15/tools/testing/selftests/net/netfilter' make[1]: Entering directory '/home/virtme/testing-15/tools/testing/selftests/net/netfilter' TAP version 13 1..1 # timeout set to 1800 # selftests: net/netfilter: nft_flowtable.sh # PASS: flow offloaded for ns1/ns2 # PASS: dscp_none: dscp packet counters match # PASS: dscp_ingress: dscp packet counters match # PASS: dscp_egress: dscp packet counters match # PASS: dscp_fwd: dscp packet counters match # PASS: flow offload for ns1/ns2 with masquerade # PASS: flow offload for ns1/ns2 with dnat ns1 <- ns2 # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # FAIL: flow offload for ns1/ns2 with masquerade and pmtu discovery on bridge: original counter 2116452 exceeds expected value 2097152, reply counter 1984 # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # RTNETLINK answers: File exists # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery bridge and VLAN # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 2097152 Jan 9 01:17 /tmp/tmp.lDoozkJZyF # -rw------- 1 root root 0 Jan 9 01:17 /tmp/tmp.89xj0Ez2J9 # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 2097152 Jan 9 01:17 /tmp/tmp.lDoozkJZyF # -rw------- 1 root root 0 Jan 9 01:17 /tmp/tmp.r1lt4h5f6f # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # FAIL: flow offload for ns1/ns2 with bridge NAT and VLAN # table inet filter { # counter routed_orig { # packets 0 bytes 0 # } # # counter routed_repl { # packets 0 bytes 0 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 1 bytes 60 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 3 bytes 180 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # Error: ipv4: Address already assigned. # Error: ipv4: Address already assigned. # PASS: ipsec tunnel mode for ns1/ns2 # re-run with random mtus and file size: -o 16935 -l 28028 -r 25155 -s 44726860 # PASS: flow offloaded for ns1/ns2 # PASS: dscp_none: dscp packet counters match # PASS: dscp_ingress: dscp packet counters match # PASS: dscp_egress: dscp packet counters match # PASS: dscp_fwd: dscp packet counters match # PASS: flow offload for ns1/ns2 with masquerade # PASS: flow offload for ns1/ns2 with dnat ns1 <- ns2 # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # FAIL: flow offload for ns1/ns2 with masquerade and pmtu discovery on bridge: original counter 44914068 exceeds expected value 44726860, reply counter 112 # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # RTNETLINK answers: File exists # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery bridge and VLAN # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 44726860 Jan 9 01:18 /tmp/tmp.OMTLT5QO2C # -rw------- 1 root root 0 Jan 9 01:18 /tmp/tmp.au6HOCm06D # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 44726860 Jan 9 01:18 /tmp/tmp.OMTLT5QO2C # -rw------- 1 root root 0 Jan 9 01:18 /tmp/tmp.3IeMW8OPHL # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # FAIL: flow offload for ns1/ns2 with bridge NAT and VLAN # table inet filter { # counter routed_orig { # packets 0 bytes 0 # } # # counter routed_repl { # packets 0 bytes 0 # } # # flowtable f1 { # hook ingress priority filter # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority filter; policy drop; # ip dscp set cs3 # oif "veth1" tcp dport 12345 ct mark set 0x00000001 flow add @f1 counter name "routed_orig" accept # ct mark 0x00000001 counter name ct direction map { original : "routed_orig", reply : "routed_repl" } accept # ct state established,related accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # table ip nat { # chain prerouting { # type nat hook prerouting priority filter; policy accept; # iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 1 bytes 60 dnat to 10.0.2.99:12345 # } # # chain postrouting { # type nat hook postrouting priority filter; policy accept; # oifname "veth1" counter packets 3 bytes 180 masquerade # } # } # table netdev dscpmangle { # chain setdscp0 { # type filter hook egress device "veth1" priority filter; policy accept; # } # } # Error: ipv4: Address already assigned. # Error: ipv4: Address already assigned. # PASS: ipsec tunnel mode for ns1/ns2 not ok 1 selftests: net/netfilter: nft_flowtable.sh # exit=1 make[1]: Leaving directory '/home/virtme/testing-15/tools/testing/selftests/net/netfilter' make: Leaving directory '/home/virtme/testing-15/tools/testing/selftests' xx__-> echo $? 0 xx__->