KERNEL SELFTESTS: linux_headers_dir is /usr/src/linux-headers-x86_64-rhel-8.3-bpf-1e1d7cc33bd78b992ab90e28b02d7a2feef96538 2024-11-02 22:35:56 sed -i s/default_timeout=45/default_timeout=300/ kselftest/runner.sh LKP WARN miss config CONFIG_SCTP_DIAG= of net/netfilter/config update-alternatives: using /usr/sbin/ebtables-legacy to provide /usr/sbin/ebtables (ebtables) in manual mode 2024-11-02 22:35:56 make -j36 -C net/netfilter make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-8.3-bpf-1e1d7cc33bd78b992ab90e28b02d7a2feef96538/tools/testing/selftests/net/netfilter' CC audit_logread CC connect_close CC nf_queue CC conntrack_reverse_clash CC sctp_collision make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-8.3-bpf-1e1d7cc33bd78b992ab90e28b02d7a2feef96538/tools/testing/selftests/net/netfilter' 2024-11-02 22:35:56 make quicktest=1 run_tests -C net/netfilter make: Entering directory '/usr/src/perf_selftests-x86_64-rhel-8.3-bpf-1e1d7cc33bd78b992ab90e28b02d7a2feef96538/tools/testing/selftests/net/netfilter' TAP version 13 1..1 # timeout set to 3600 # selftests: net/netfilter: nft_flowtable.sh # PASS: flow offloaded for ns1/ns2 # PASS: dscp_none: dscp packet counters match # PASS: dscp_ingress: dscp packet counters match # PASS: dscp_egress: dscp packet counters match # PASS: dscp_fwd: dscp packet counters match # PASS: flow offload for ns1/ns2 with masquerade # PASS: flow offload for ns1/ns2 with dnat ns1 <- ns2 # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery on bridge # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery bridge and VLAN # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # PASS: ipsec tunnel mode for ns1/ns2 # re-run with random mtus: -o 19699 -l 15249 -r 12931 # PASS: flow offloaded for ns1/ns2 # PASS: dscp_none: dscp packet counters match # PASS: dscp_ingress: dscp packet counters match # PASS: dscp_egress: dscp packet counters match # PASS: dscp_fwd: dscp packet counters match # PASS: flow offload for ns1/ns2 with masquerade # PASS: flow offload for ns1/ns2 with dnat ns1 <- ns2 # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery on bridge # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # PASS: flow offload for ns1/ns2 with masquerade and pmtu discovery bridge and VLAN # PASS: flow offload for ns1/ns2 with dnat and pmtu discovery ns1 <- ns2 # PASS: ipsec tunnel mode for ns1/ns2 ok 1 selftests: net/netfilter: nft_flowtable.sh make: Leaving directory '/usr/src/perf_selftests-x86_64-rhel-8.3-bpf-1e1d7cc33bd78b992ab90e28b02d7a2feef96538/tools/testing/selftests/net/netfilter'