KERNEL SELFTESTS: linux_headers_dir is /usr/src/linux-headers-x86_64-rhel-8.3-kselftests-2cd764935de4447e8e3f1ec534b4700206857683 2022-05-08 22:03:51 ln -sf /usr/bin/clang 2022-05-08 22:03:51 ln -sf /usr/bin/llc 2022-05-08 22:03:52 sed -i s/default_timeout=45/default_timeout=300/ kselftest/runner.sh update-alternatives: using /usr/sbin/ebtables-legacy to provide /usr/sbin/ebtables (ebtables) in manual mode 2022-05-08 22:03:52 make -C netfilter make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-2cd764935de4447e8e3f1ec534b4700206857683/tools/testing/selftests/netfilter' gcc nf-queue.c -lmnl -o /usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-2cd764935de4447e8e3f1ec534b4700206857683/tools/testing/selftests/netfilter/nf-queue gcc connect_close.c -lmnl -o /usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-2cd764935de4447e8e3f1ec534b4700206857683/tools/testing/selftests/netfilter/connect_close make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-2cd764935de4447e8e3f1ec534b4700206857683/tools/testing/selftests/netfilter' 2022-05-08 22:03:52 make run_tests -C netfilter make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-2cd764935de4447e8e3f1ec534b4700206857683/tools/testing/selftests/netfilter' TAP version 13 1..16 # selftests: netfilter: nft_trans_stress.sh ok 1 selftests: netfilter: nft_trans_stress.sh # selftests: netfilter: nft_fib.sh # PASS: fib expression did not cause unwanted packet drops # PASS: fib expression did drop packets for 1.1.1.1 # PASS: fib expression did drop packets for 1c3::c01d ok 2 selftests: netfilter: nft_fib.sh # selftests: netfilter: nft_nat.sh # PASS: netns routing/connectivity: ns0-d7ksaJFm can reach ns1-d7ksaJFm and ns2-d7ksaJFm # PASS: ping to ns1-d7ksaJFm was ip NATted to ns2-d7ksaJFm # PASS: ping to ns1-d7ksaJFm OK after ip nat output chain flush # PASS: ipv6 ping to ns1-d7ksaJFm was ip6 NATted to ns2-d7ksaJFm # SKIP: inet nat tests # PASS: ip IP masquerade for ns2-d7ksaJFm # PASS: ip6 IPv6 masquerade for ns2-d7ksaJFm # PASS: ip IP masquerade fully-random for ns2-d7ksaJFm # PASS: ip6 IPv6 masquerade fully-random for ns2-d7ksaJFm # PASS: ip IP redirection for ns2-d7ksaJFm # PASS: ip6 IPv6 redirection for ns2-d7ksaJFm # PASS: portshadow test default: got reply from CLIENT # PASS: portshadow test port-filter: got reply from ROUTER # PASS: portshadow test port-notrack: got reply from ROUTER # PASS: portshadow test pat: got reply from ROUTER # /dev/stdin:3:17-22: Error: syntax error, unexpected string # typeof meta iifname . ip saddr . ip daddr : ip daddr # ^^^^^^ # /dev/stdin:9:17-22: Error: syntax error, unexpected string # typeof meta iifname . ip saddr . ip daddr : ip daddr # ^^^^^^ # /dev/stdin:2:13-20: Error: set definition does not specify key # map xlate_in { # ^^^^^^^^ # SKIP: Could not add ip statless rules ok 3 selftests: netfilter: nft_nat.sh # selftests: netfilter: bridge_brouter.sh # PASS: netns connectivity: ns1 and ns2 can reach each other # PASS: ns1/ns2 connectivity with active broute rule # PASS: ns1/ns2 connectivity with active broute rule and bridge forward drop ok 4 selftests: netfilter: bridge_brouter.sh # selftests: netfilter: conntrack_icmp_related.sh # PASS: icmp mtu error had RELATED state ok 5 selftests: netfilter: conntrack_icmp_related.sh # selftests: netfilter: nft_flowtable.sh # PASS: netns routing/connectivity: ns1 can reach ns2 # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4 # -rw------- 1 root root 99388 May 8 22:05 /tmp/tmp.LL8ohakyGQ # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX # -rw------- 1 root root 15584 May 8 22:05 /tmp/tmp.HnObAriWng # FAIL: flow offload for ns1/ns2: # table inet filter { # flowtable f1 { # hook ingress priority 0 # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority 0; policy drop; # oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0 # tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 14 bytes 103660 # tcp flags fin,rst ct mark set 0x00000000 accept # meta length > 1500 accept comment "something-to-grep-for" # tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop # ct state established,related accept # meta length < 200 oif "veth1" tcp dport 12345 counter packets 1 bytes 60 accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # /dev/stdin:4:73-74: Error: syntax error, unexpected to, expecting newline or semicolon # meta iif "veth0" ip daddr 10.6.6.6 tcp dport 1666 counter dnat ip to 10.0.2.99:12345 # ^^ # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4 # -rw------- 1 root root 0 May 8 22:05 /tmp/tmp.LL8ohakyGQ # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX # -rw------- 1 root root 0 May 8 22:05 /tmp/tmp.HnObAriWng # FAIL: flow offload for ns1/ns2 with NAT # table inet filter { # flowtable f1 { # hook ingress priority 0 # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority 0; policy drop; # oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0 # tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 15 bytes 103980 # tcp flags fin,rst ct mark set 0x00000000 accept # meta length > 1500 accept comment "something-to-grep-for" # tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop # ct state established,related accept # meta length < 200 oif "veth1" tcp dport 12345 counter packets 4 bytes 240 accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4 # -rw------- 1 root root 0 May 8 22:05 /tmp/tmp.LL8ohakyGQ # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX # -rw------- 1 root root 0 May 8 22:05 /tmp/tmp.HnObAriWng # FAIL: flow offload for ns1/ns2 with NAT and pmtu discovery # table inet filter { # flowtable f1 { # hook ingress priority 0 # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority 0; policy drop; # oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0 # tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 16 bytes 104300 # tcp flags fin,rst ct mark set 0x00000000 accept # tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop # ct state established,related accept # meta length < 200 oif "veth1" tcp dport 12345 counter packets 7 bytes 420 accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # /dev/stdin:5:71-72: Error: syntax error, unexpected to, expecting newline or semicolon # meta iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter dnat ip to 10.0.2.99:12345 # ^^ # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4 # -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.LL8ohakyGQ # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX # -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.HnObAriWng # FAIL: flow offload for ns1/ns2 with bridge NAT # table inet filter { # flowtable f1 { # hook ingress priority 0 # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority 0; policy drop; # oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0 # tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 17 bytes 104620 # tcp flags fin,rst ct mark set 0x00000000 accept # tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop # ct state established,related accept # meta length < 200 oif "veth1" tcp dport 12345 counter packets 10 bytes 600 accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4 # -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.LL8ohakyGQ # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX # -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.HnObAriWng # FAIL: flow offload for ns1/ns2 with bridge NAT and VLAN # table inet filter { # flowtable f1 { # hook ingress priority 0 # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority 0; policy drop; # oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0 # tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 17 bytes 104620 # tcp flags fin,rst ct mark set 0x00000000 accept # tcp sport 12345 ct mark 0x00000001 counter packets 57 bytes 8220 log prefix "mark failure " drop # ct state established,related accept # meta length < 200 oif "veth1" tcp dport 12345 counter packets 13 bytes 780 accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # Error: Could not process rule: No such file or directory # delete table ip nat # ^^^^^^^^^^^^^^^^^^^^ # FAIL: file mismatch for ns1 -> ns2 # -rw------- 1 root root 227328 May 8 22:05 /tmp/tmp.fnnwOCWcA4 # -rw------- 1 root root 12512 May 8 22:06 /tmp/tmp.LL8ohakyGQ # FAIL: file mismatch for ns1 <- ns2 # -rw------- 1 root root 296960 May 8 22:05 /tmp/tmp.1DlwdJLSUX # -rw------- 1 root root 0 May 8 22:06 /tmp/tmp.HnObAriWng # FAIL: ipsec tunnel mode for ns1/ns2 # table inet filter { # flowtable f1 { # hook ingress priority 0 # devices = { veth0, veth1 } # } # # chain forward { # type filter hook forward priority 0; policy drop; # oif "veth1" tcp dport 12345 flow offload @f1 counter packets 0 bytes 0 # tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 22 bytes 121550 # tcp flags fin,rst ct mark set 0x00000000 accept # tcp sport 12345 ct mark 0x00000001 counter packets 83 bytes 26278 log prefix "mark failure " drop # ct state established,related accept # meta length < 200 oif "veth1" tcp dport 12345 counter packets 14 bytes 840 accept # meta l4proto icmp accept # meta l4proto ipv6-icmp accept # } # } # XfrmInError 0 # XfrmInBufferError 0 # XfrmInHdrError 0 # XfrmInNoStates 0 # XfrmInStateProtoError 0 # XfrmInStateModeError 0 # XfrmInStateSeqError 0 # XfrmInStateExpired 0 # XfrmInStateMismatch 0 # XfrmInStateInvalid 0 # XfrmInTmplMismatch 0 # XfrmInNoPols 0 # XfrmInPolBlock 0 # XfrmInPolError 0 # XfrmOutError 0 # XfrmOutBundleGenError 0 # XfrmOutBundleCheckError 0 # XfrmOutNoStates 0 # XfrmOutStateProtoError 0 # XfrmOutStateModeError 0 # XfrmOutStateSeqError 0 # XfrmOutStateExpired 0 # XfrmOutPolBlock 0 # XfrmOutPolDead 0 # XfrmOutPolError 0 # XfrmFwdHdrError 0 # XfrmOutStateInvalid 0 # XfrmAcquireError 0 not ok 6 selftests: netfilter: nft_flowtable.sh # exit=1 # selftests: netfilter: ipvs.sh # Testing DR mode... # Testing NAT mode... # Testing Tunnel mode... # -e ipvs.sh: PASS ok 7 selftests: netfilter: ipvs.sh # selftests: netfilter: nft_concat_range.sh # TEST: reported issues # Add two elements, flush, re-add Error: concatenated types not supported in interval sets # add table t { set s { type ipv4_addr . inet_service; flags interval; }; } # ^ # [SKIP] # net,mac with reload /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # TEST: correctness # net,port /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # port,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # port,proto /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port,mac /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port,mac,proto /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net,port,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net,mac /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # mac,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net,mac - ICMP /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,mac - ICMPv6 /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port,net6,port /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net,port,mac,proto,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # TEST: concurrency # net,port /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # port,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net,port,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port,net6,port /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # TEST: timeout # net,port /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # port,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # port,proto /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port,mac /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port,mac,proto /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net,port,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net,mac /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # mac,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net,mac - ICMP /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,mac - ICMPv6 /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net6,port,net6,port /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # net,port,mac,proto,net /dev/stdin:9:13-16: Error: concatenated types not supported in interval sets # # /dev/stdin:29:13-16: Error: concatenated types not supported in interval sets # # [SKIP] # set not supported # TEST: performance # net,port [SKIP] # perf not supported # port,net [SKIP] # perf not supported # net6,port [SKIP] # perf not supported # port,proto [SKIP] # perf not supported # net6,port,mac [SKIP] # perf not supported # net6,port,mac,proto [SKIP] # perf not supported # net,mac [SKIP] # perf not supported ok 8 selftests: netfilter: nft_concat_range.sh # SKIP # selftests: netfilter: nft_conntrack_helper.sh # PASS: ns1-uygyz9ND connection on port 2121 has ftp helper attached # PASS: ns2-uygyz9ND connection on port 2121 has ftp helper attached # PASS: ns1-uygyz9ND connection on port 2121 has ftp helper attached # PASS: ns2-uygyz9ND connection on port 2121 has ftp helper attached # PASS: ns1-uygyz9ND connection on port 21 has ftp helper attached # PASS: ns2-uygyz9ND connection on port 21 has ftp helper attached # PASS: ns1-uygyz9ND connection on port 21 has ftp helper attached # PASS: ns2-uygyz9ND connection on port 21 has ftp helper attached ok 9 selftests: netfilter: nft_conntrack_helper.sh # selftests: netfilter: nft_queue.sh # PASS: ns1-p6ASOinY can reach ns2-p6ASOinY # PASS: ip: statement with no listener results in packet drop # PASS: ip6: statement with no listener results in packet drop # PASS: Expected and received 10 packets total # PASS: Expected and received 20 packets total # PASS: tcp and nfqueue in forward chain # PASS: tcp via loopback # PASS: tcp via loopback with connect/close # PASS: tcp via loopback and re-queueing # PASS: icmp+nfqueue via vrf ok 10 selftests: netfilter: nft_queue.sh # selftests: netfilter: nft_meta.sh # /dev/stdin:34:17-25: Error: syntax error, unexpected time, known keys are length, protocol, priority, mark, iif, oif, iifname, oifname, iiftype, oiftype, skuid, skgid, nftrace, rtclassid, nfproto, l4proto, ibrname, obrname, pkttype, cpu, iifgroup, oifgroup, cgroup, random, secpath # meta time "2021-01-01" - "2021-12-31" counter name ilastyearcounter # ^^^^^^^^^ # /dev/stdin:35:17-25: Error: syntax error, unexpected time, known keys are length, protocol, priority, mark, iif, oif, iifname, oifname, iiftype, oiftype, skuid, skgid, nftrace, rtclassid, nfproto, l4proto, ibrname, obrname, pkttype, cpu, iifgroup, oifgroup, cgroup, random, secpath # meta time "2022-01-01" - "2022-12-31" counter name icurrentyearcounter # ^^^^^^^^^ # SKIP: Could not add test ruleset ok 11 selftests: netfilter: nft_meta.sh # SKIP # selftests: netfilter: nf_nat_edemux.sh # PASS: socat can connect via NAT'd address ok 12 selftests: netfilter: nf_nat_edemux.sh # selftests: netfilter: ipip-conntrack-mtu.sh # OK: PMTU without connection tracking # OK: PMTU with connection tracking ok 13 selftests: netfilter: ipip-conntrack-mtu.sh # selftests: netfilter: conntrack_tcp_unreplied.sh # INFO: connect ns1-b6LWgaca -> ns2-b6LWgaca to the virtual ip # /dev/stdin:4:51-58: Error: NAT is only supported for IPv4/IPv6 # ip daddr 10.99.99.99 tcp dport 80 redirect to :8080 # ^^^^^^^^ # ERROR: Could not load nat redirect not ok 14 selftests: netfilter: conntrack_tcp_unreplied.sh # exit=1 # selftests: netfilter: conntrack_vrf.sh # /dev/stdin:3:54-56: Error: syntax error, unexpected string, expecting - or number # # /dev/stdin:13:50-52: Error: syntax error, unexpected string, expecting - or number # # FAIL: entry not found in conntrack zone 1 # FAIL: entry not in zone 1 or 2, dumping table # conntrack v1.4.5 (conntrack-tools): 0 flow entries have been shown. # /dev/stdin:4:50-52: Error: syntax error, unexpected string, expecting - or number # # /dev/stdin:9:55-60: Error: syntax error, unexpected string, expecting - or number # # Error: Could not process rule: No such file or directory # list table ip nat # ^^^ # FAIL: vrf rules have unexpected counter value # /dev/stdin:4:50-52: Error: syntax error, unexpected string, expecting - or number # # /dev/stdin:9:55-60: Error: syntax error, unexpected string, expecting - or number # # Error: Could not process rule: No such file or directory # list table ip nat # ^^^ # FAIL: vrf rules have unexpected counter value # PASS: iperf3 connect with masquerade + sport rewrite on veth device not ok 15 selftests: netfilter: conntrack_vrf.sh # exit=1 # selftests: netfilter: nft_synproxy.sh # /dev/stdin:12:94-102: Error: syntax error, unexpected timestamp, expecting newline or semicolon # meta iif veth0 meta l4proto tcp ct state untracked,invalid synproxy mss 1460 sack-perm timestamp # ^^^^^^^^^ # SKIP: Cannot add nft synproxy ok 16 selftests: netfilter: nft_synproxy.sh # SKIP make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-8.3-kselftests-2cd764935de4447e8e3f1ec534b4700206857683/tools/testing/selftests/netfilter'