KERNEL SELFTESTS: linux_headers_dir is /usr/src/linux-headers-x86_64-rhel-8.3-kselftests-9b17afb2c88bbadcc15b96f0275c426ae3d89a33 2022-01-24 22:57:55 ln -sf /usr/bin/clang 2022-01-24 22:57:55 ln -sf /usr/bin/llc 2022-01-24 22:57:56 sed -i s/default_timeout=45/default_timeout=300/ kselftest/runner.sh update-alternatives: using /usr/sbin/ebtables-legacy to provide /usr/sbin/ebtables (ebtables) in manual mode 2022-01-24 22:57:56 make -C netfilter make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-9b17afb2c88bbadcc15b96f0275c426ae3d89a33/tools/testing/selftests/netfilter' gcc nf-queue.c -lmnl -o /usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-9b17afb2c88bbadcc15b96f0275c426ae3d89a33/tools/testing/selftests/netfilter/nf-queue make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-9b17afb2c88bbadcc15b96f0275c426ae3d89a33/tools/testing/selftests/netfilter' 2022-01-24 22:57:56 make run_tests -C netfilter make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-9b17afb2c88bbadcc15b96f0275c426ae3d89a33/tools/testing/selftests/netfilter' TAP version 13 1..15 # selftests: netfilter: nft_trans_stress.sh ok 1 selftests: netfilter: nft_trans_stress.sh # selftests: netfilter: nft_fib.sh # PASS: fib expression did not cause unwanted packet drops # PASS: fib expression did drop packets for 1.1.1.1 # PASS: fib expression did drop packets for 1c3::c01d ok 2 selftests: netfilter: nft_fib.sh # selftests: netfilter: nft_nat.sh # PASS: netns routing/connectivity: ns0-YNeqdrdl can reach ns1-YNeqdrdl and ns2-YNeqdrdl # PASS: ping to ns1-YNeqdrdl was ip NATted to ns2-YNeqdrdl # PASS: ping to ns1-YNeqdrdl OK after ip nat output chain flush # PASS: ipv6 ping to ns1-YNeqdrdl was ip6 NATted to ns2-YNeqdrdl # PASS: ping to ns1-YNeqdrdl was inet NATted to ns2-YNeqdrdl # PASS: ping to ns1-YNeqdrdl OK after inet nat output chain flush # PASS: ipv6 ping to ns1-YNeqdrdl was inet NATted to ns2-YNeqdrdl # PASS: ip IP masquerade for ns2-YNeqdrdl # PASS: ip6 IPv6 masquerade for ns2-YNeqdrdl # PASS: inet IP masquerade for ns2-YNeqdrdl # PASS: inet IPv6 masquerade for ns2-YNeqdrdl # PASS: ip IP masquerade fully-random for ns2-YNeqdrdl # PASS: ip6 IPv6 masquerade fully-random for ns2-YNeqdrdl # PASS: inet IP masquerade fully-random for ns2-YNeqdrdl # PASS: inet IPv6 masquerade fully-random for ns2-YNeqdrdl # PASS: ip IP redirection for ns2-YNeqdrdl # PASS: ip6 IPv6 redirection for ns2-YNeqdrdl # PASS: inet IP redirection for ns2-YNeqdrdl # PASS: inet IPv6 redirection for ns2-YNeqdrdl # PASS: portshadow test default: got reply from ROUTER # PASS: portshadow test port-filter: got reply from ROUTER # PASS: portshadow test port-notrack: got reply from ROUTER # PASS: portshadow test pat: got reply from ROUTER ok 3 selftests: netfilter: nft_nat.sh # selftests: netfilter: bridge_brouter.sh # PASS: netns connectivity: ns1 and ns2 can reach each other # PASS: ns1/ns2 connectivity with active broute rule # PASS: ns1/ns2 connectivity with active broute rule and bridge forward drop ok 4 selftests: netfilter: bridge_brouter.sh # selftests: netfilter: conntrack_icmp_related.sh # ERROR: netns ip routing/connectivity broken not ok 5 selftests: netfilter: conntrack_icmp_related.sh # exit=1 # selftests: netfilter: nft_flowtable.sh # PASS: netns routing/connectivity: ns1 can reach ns2 # PASS: flow offloaded for ns1/ns2 # PASS: flow offloaded for ns1/ns2 with NAT # PASS: flow offloaded for ns1/ns2 with NAT and pmtu discovery # PASS: flow offloaded for ns1/ns2 with bridge NAT # PASS: flow offloaded for ns1/ns2 with bridge NAT and VLAN # PASS: ipsec tunnel mode for ns1/ns2 ok 6 selftests: netfilter: nft_flowtable.sh # selftests: netfilter: ipvs.sh # Testing DR mode... # Testing NAT mode... # Testing Tunnel mode... # -e ipvs.sh: PASS ok 7 selftests: netfilter: ipvs.sh # selftests: netfilter: nft_concat_range.sh # TEST: reported issues # Add two elements, flush, re-add [ OK ] # TEST: correctness # net,port [ OK ] # port,net [ OK ] # net6,port [ OK ] # port,proto [ OK ] # net6,port,mac [ OK ] # net6,port,mac,proto [ OK ] # net,port,net [ OK ] # net,mac [ OK ] # mac,net [ OK ] # net,mac - ICMP [ OK ] # net6,mac - ICMPv6 [ OK ] # net6,port,net6,port [ OK ] # net,port,mac,proto,net [ OK ] # TEST: concurrency # net,port [ OK ] # port,net [ OK ] # net6,port [ OK ] # net,port,net [ OK ] # net6,port,net6,port [ OK ] # TEST: timeout # net,port [ OK ] # port,net [ OK ] # net6,port [ OK ] # port,proto [ OK ] # net6,port,mac [ OK ] # net6,port,mac,proto [ OK ] # net,port,net [ OK ] # net,mac [ OK ] # mac,net [ OK ] # net,mac - ICMP [ OK ] # net6,mac - ICMPv6 [ OK ] # net6,port,net6,port [ OK ] # net,port,mac,proto,net [ OK ] # TEST: performance # net,port [SKIP] # perf not supported # port,net [SKIP] # perf not supported # net6,port [SKIP] # perf not supported # port,proto [SKIP] # perf not supported # net6,port,mac [SKIP] # perf not supported # net6,port,mac,proto [SKIP] # perf not supported # net,mac [SKIP] # perf not supported # not ok 8 selftests: netfilter: nft_concat_range.sh # TIMEOUT 300 seconds # selftests: netfilter: nft_conntrack_helper.sh # PASS: ns1-HA4BMC34 connection on port 2121 has ftp helper attached # PASS: ns2-HA4BMC34 connection on port 2121 has ftp helper attached # PASS: ns1-HA4BMC34 connection on port 2121 has ftp helper attached # PASS: ns2-HA4BMC34 connection on port 2121 has ftp helper attached # PASS: ns1-HA4BMC34 connection on port 21 has ftp helper attached # PASS: ns2-HA4BMC34 connection on port 21 has ftp helper attached # PASS: ns1-HA4BMC34 connection on port 21 has ftp helper attached # PASS: ns2-HA4BMC34 connection on port 21 has ftp helper attached ok 9 selftests: netfilter: nft_conntrack_helper.sh # selftests: netfilter: nft_queue.sh # PASS: ns1-V4TpJ9uK can reach ns2-V4TpJ9uK # PASS: ip: statement with no listener results in packet drop # PASS: ip6: statement with no listener results in packet drop # PASS: Expected and received 10 packets total # PASS: Expected and received 20 packets total # PASS: tcp and nfqueue in forward chain # PASS: tcp via loopback # PASS: tcp via loopback and re-queueing # PASS: icmp+nfqueue via vrf ok 10 selftests: netfilter: nft_queue.sh # selftests: netfilter: nft_meta.sh # FAIL: icurrentyearcounter, want "packets 2", got # table inet filter { # counter icurrentyearcounter { # packets 0 bytes 0 # } # } not ok 11 selftests: netfilter: nft_meta.sh # exit=1 # selftests: netfilter: nf_nat_edemux.sh # PASS: nc can connect via NAT'd address ok 12 selftests: netfilter: nf_nat_edemux.sh # selftests: netfilter: ipip-conntrack-mtu.sh # OK: PMTU without connection tracking # OK: PMTU with connection tracking ok 13 selftests: netfilter: ipip-conntrack-mtu.sh # selftests: netfilter: conntrack_tcp_unreplied.sh # INFO: connect ns1-pnAiN2K2 -> ns2-pnAiN2K2 to the virtual ip # INFO: NAT redirect added in ns ns2-pnAiN2K2, waiting for 20 seconds for nat to take effect # ............. # PASS: redirection took effect after 13 seconds # PASS: redirection counter has expected values ok 14 selftests: netfilter: conntrack_tcp_unreplied.sh # selftests: netfilter: conntrack_vrf.sh # FAIL: entry not found in conntrack zone 1 # FAIL: entry not in zone 1 or 2, dumping table # conntrack v1.4.5 (conntrack-tools): 0 flow entries have been shown. # table ip testct { # chain rawpre { # type filter hook prerouting priority raw; policy accept; # iif { "veth0", "tvrf" } counter packets 2 bytes 168 meta nftrace set 1 # iif "veth0" counter packets 0 bytes 0 ct zone set 1 counter packets 0 bytes 0 return # iif "tvrf" counter packets 0 bytes 0 ct zone set 2 counter packets 0 bytes 0 return # ip protocol icmp counter packets 2 bytes 168 # notrack counter packets 2 bytes 168 # } # # chain rawout { # type filter hook output priority raw; policy accept; # oif "veth0" counter packets 1 bytes 84 ct zone set 1 counter packets 1 bytes 84 return # oif "tvrf" counter packets 1 bytes 84 ct zone set 2 counter packets 1 bytes 84 return # notrack counter packets 0 bytes 0 # } # } # PASS: iperf3 connect with masquerade + sport rewrite on vrf device (default qdisc) # PASS: iperf3 connect with masquerade + sport rewrite on vrf device (pfifo qdisc) # PASS: iperf3 connect with masquerade + sport rewrite on veth device ok 15 selftests: netfilter: conntrack_vrf.sh make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-9b17afb2c88bbadcc15b96f0275c426ae3d89a33/tools/testing/selftests/netfilter'