KERNEL SELFTESTS: linux_headers_dir is /usr/src/linux-headers-x86_64-rhel-8.3-kselftests-719774377622bc4025d2a74f551b5dc2158c6c30 2022-01-20 02:13:07 ln -sf /usr/bin/clang 2022-01-20 02:13:07 ln -sf /usr/bin/llc 2022-01-20 02:13:07 sed -i s/default_timeout=45/default_timeout=300/ kselftest/runner.sh update-alternatives: using /usr/sbin/ebtables-legacy to provide /usr/sbin/ebtables (ebtables) in manual mode 2022-01-20 02:13:07 make -C netfilter make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-719774377622bc4025d2a74f551b5dc2158c6c30/tools/testing/selftests/netfilter' gcc nf-queue.c -lmnl -o /usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-719774377622bc4025d2a74f551b5dc2158c6c30/tools/testing/selftests/netfilter/nf-queue make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-719774377622bc4025d2a74f551b5dc2158c6c30/tools/testing/selftests/netfilter' 2022-01-20 02:13:08 make run_tests -C netfilter make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-719774377622bc4025d2a74f551b5dc2158c6c30/tools/testing/selftests/netfilter' TAP version 13 1..15 # selftests: netfilter: nft_trans_stress.sh ok 1 selftests: netfilter: nft_trans_stress.sh # selftests: netfilter: nft_fib.sh # PASS: fib expression did not cause unwanted packet drops # PASS: fib expression did drop packets for 1.1.1.1 # PASS: fib expression did drop packets for 1c3::c01d ok 2 selftests: netfilter: nft_fib.sh # selftests: netfilter: nft_nat.sh # PASS: netns routing/connectivity: ns0-gQtB0aXL can reach ns1-gQtB0aXL and ns2-gQtB0aXL # PASS: ping to ns1-gQtB0aXL was ip NATted to ns2-gQtB0aXL # PASS: ping to ns1-gQtB0aXL OK after ip nat output chain flush # PASS: ipv6 ping to ns1-gQtB0aXL was ip6 NATted to ns2-gQtB0aXL # PASS: ping to ns1-gQtB0aXL was inet NATted to ns2-gQtB0aXL # PASS: ping to ns1-gQtB0aXL OK after inet nat output chain flush # PASS: ipv6 ping to ns1-gQtB0aXL was inet NATted to ns2-gQtB0aXL # PASS: ip IP masquerade for ns2-gQtB0aXL # PASS: ip6 IPv6 masquerade for ns2-gQtB0aXL # PASS: inet IP masquerade for ns2-gQtB0aXL # PASS: inet IPv6 masquerade for ns2-gQtB0aXL # PASS: ip IP masquerade fully-random for ns2-gQtB0aXL # PASS: ip6 IPv6 masquerade fully-random for ns2-gQtB0aXL # PASS: inet IP masquerade fully-random for ns2-gQtB0aXL # PASS: inet IPv6 masquerade fully-random for ns2-gQtB0aXL # PASS: ip IP redirection for ns2-gQtB0aXL # PASS: ip6 IPv6 redirection for ns2-gQtB0aXL # PASS: inet IP redirection for ns2-gQtB0aXL # PASS: inet IPv6 redirection for ns2-gQtB0aXL # PASS: portshadow test default: got reply from ROUTER # PASS: portshadow test port-filter: got reply from ROUTER # PASS: portshadow test port-notrack: got reply from ROUTER # PASS: portshadow test pat: got reply from ROUTER ok 3 selftests: netfilter: nft_nat.sh # selftests: netfilter: bridge_brouter.sh # PASS: netns connectivity: ns1 and ns2 can reach each other # PASS: ns1/ns2 connectivity with active broute rule # PASS: ns1/ns2 connectivity with active broute rule and bridge forward drop ok 4 selftests: netfilter: bridge_brouter.sh # selftests: netfilter: conntrack_icmp_related.sh # PASS: icmp mtu error had RELATED state ok 5 selftests: netfilter: conntrack_icmp_related.sh # selftests: netfilter: nft_flowtable.sh # PASS: netns routing/connectivity: ns1 can reach ns2 # PASS: flow offloaded for ns1/ns2 # PASS: flow offloaded for ns1/ns2 with NAT # PASS: flow offloaded for ns1/ns2 with NAT and pmtu discovery # PASS: flow offloaded for ns1/ns2 with bridge NAT # PASS: flow offloaded for ns1/ns2 with bridge NAT and VLAN # PASS: ipsec tunnel mode for ns1/ns2 ok 6 selftests: netfilter: nft_flowtable.sh # selftests: netfilter: ipvs.sh # Testing DR mode... # Testing NAT mode... # Testing Tunnel mode... # -e ipvs.sh: PASS ok 7 selftests: netfilter: ipvs.sh # selftests: netfilter: nft_concat_range.sh # TEST: reported issues # Add two elements, flush, re-add [ OK ] # TEST: correctness # net,port [ OK ] # port,net [ OK ] # net6,port [ OK ] # port,proto [ OK ] # net6,port,mac [ OK ] # net6,port,mac,proto [ OK ] # net,port,net [ OK ] # net,mac [ OK ] # mac,net [ OK ] # net,mac - ICMP [ OK ] # net6,mac - ICMPv6 [ OK ] # net6,port,net6,port [ OK ] # net,port,mac,proto,net [ OK ] # TEST: concurrency # net,port [ OK ] # port,net [ OK ] # net6,port [ OK ] # net,port,net [ OK ] # net6,port,net6,port [ OK ] # TEST: timeout # net,port [ OK ] # port,net [ OK ] # net6,port [ OK ] # port,proto [ OK ] # net6,port,mac [ OK ] # net6,port,mac,proto [ OK ] # net,port,net [ OK ] # net,mac [ OK ] # mac,net [ OK ] # net,mac - ICMP [ OK ] # net6,mac - ICMPv6 [ OK ] # net6,port,net6,port [ OK ] # net,port,mac,proto,net [ OK ] # TEST: performance # net,port [SKIP] # perf not supported # port,net [SKIP] # perf not supported # net6,port [SKIP] # perf not supported # port,proto [SKIP] # perf not supported # net6,port,mac [SKIP] # perf not supported # net6,port,mac,proto [SKIP] # perf not supported # net,mac [SKIP] # perf not supported # not ok 8 selftests: netfilter: nft_concat_range.sh # TIMEOUT 300 seconds # selftests: netfilter: nft_conntrack_helper.sh # PASS: ns1-TMHznSyi connection on port 2121 has ftp helper attached # PASS: ns2-TMHznSyi connection on port 2121 has ftp helper attached # PASS: ns1-TMHznSyi connection on port 2121 has ftp helper attached # PASS: ns2-TMHznSyi connection on port 2121 has ftp helper attached # PASS: ns1-TMHznSyi connection on port 21 has ftp helper attached # PASS: ns2-TMHznSyi connection on port 21 has ftp helper attached # PASS: ns1-TMHznSyi connection on port 21 has ftp helper attached # PASS: ns2-TMHznSyi connection on port 21 has ftp helper attached ok 9 selftests: netfilter: nft_conntrack_helper.sh # selftests: netfilter: nft_queue.sh # PASS: ns1-ZdIerdLr can reach ns2-ZdIerdLr # PASS: ip: statement with no listener results in packet drop # PASS: ip6: statement with no listener results in packet drop # PASS: Expected and received 10 packets total # PASS: Expected and received 20 packets total # PASS: tcp and nfqueue in forward chain # PASS: tcp via loopback # PASS: tcp via loopback and re-queueing # PASS: icmp+nfqueue via vrf ok 10 selftests: netfilter: nft_queue.sh # selftests: netfilter: nft_meta.sh # OK: nftables meta iif/oif counters at expected values # OK: nftables meta cpu counter at expected values ok 11 selftests: netfilter: nft_meta.sh # selftests: netfilter: nf_nat_edemux.sh # PASS: nc can connect via NAT'd address ok 12 selftests: netfilter: nf_nat_edemux.sh # selftests: netfilter: ipip-conntrack-mtu.sh # OK: PMTU without connection tracking # OK: PMTU with connection tracking ok 13 selftests: netfilter: ipip-conntrack-mtu.sh # selftests: netfilter: conntrack_tcp_unreplied.sh # INFO: connect ns1-i79v2c1P -> ns2-i79v2c1P to the virtual ip # INFO: NAT redirect added in ns ns2-i79v2c1P, waiting for 20 seconds for nat to take effect # ............. # PASS: redirection took effect after 13 seconds # PASS: redirection counter has expected values ok 14 selftests: netfilter: conntrack_tcp_unreplied.sh # selftests: netfilter: conntrack_vrf.sh # PASS: entry found in conntrack zone 1 # PASS: iperf3 connect with masquerade + sport rewrite on vrf device (default qdisc) # PASS: iperf3 connect with masquerade + sport rewrite on vrf device (pfifo qdisc) # PASS: iperf3 connect with masquerade + sport rewrite on veth device ok 15 selftests: netfilter: conntrack_vrf.sh make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-719774377622bc4025d2a74f551b5dc2158c6c30/tools/testing/selftests/netfilter'